Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problem with vpn on OpenVPN

    Scheduled Pinned Locked Moved OpenVPN
    12 Posts 3 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JKnottJ
      JKnott
      last edited by

      Why are you using both IPSec and OpenVPN? Pick one or the other.

      PfSense running on Qotom mini PC
      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
      UniFi AC-Lite access point

      I haven't lost my mind. It's around here...somewhere...

      1 Reply Last reply Reply Quote 0
      • G
        garona
        last edited by

        Hi @JKnott. IPsec is to close the connection with our firewall, openvpn because the other side isn't managed by us. Can i make this kind of connection possible or only i can choose one of this kinds of VPN?

        1 Reply Last reply Reply Quote 0
        • JKnottJ
          JKnott
          last edited by

          You should be able to do it, as a VPN is simply another IP path. We'll need a bit more info about your configuration though.

          PfSense running on Qotom mini PC
          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
          UniFi AC-Lite access point

          I haven't lost my mind. It's around here...somewhere...

          1 Reply Last reply Reply Quote 0
          • K
            Konstanti @garona
            last edited by Konstanti

            @garona Hey
            Do you have access to both routers with IPSEC tunnel ?
            If so, you can try to solve your problem
            What is the address of the network behind the OPENVPN tunnel ?
            what is the address of the network that is behind the IPSEC tunnel ?

            The solution is to create an additional phase 2 ipsec tunnel specifying the openvpn networks and the network behind the ipsec tunnel as the source and destination. And on the reverse side of the tunnel settings should be mirrored

            There are other solutions to this problem . But for this we need to see a diagram of your network and you have to understand that you can change in this scheme

            Can you show the IPSec tunnel phase 2 settings ?

            1 Reply Last reply Reply Quote 0
            • G
              garona
              last edited by

              Hi @Konstanti Yes, i have access to both routers.
              100.100.100.0/24 is the network behind openvpn tunnel.
              172.72.70.0/24 is the network behind ipsec.
              I will create the other phase 2, but i want to know what is the other possibilities to solve this problem.
              Actually we have the ipsec vpn between a pfsense and a cisco router, and this tunnel is acessible, i can ping ips of the network on pfsense, i can't only reach on openvpn tunnel, i tried use command push "route" on openvpn but i don't have success.
              Is a route problem, right?

              K 1 Reply Last reply Reply Quote 0
              • K
                Konstanti @garona
                last edited by Konstanti

                @garona said in Problem with vpn on OpenVPN:
                Ipsec in its pure form does not know how to route traffic.
                Thus, it can only transfer traffic between networks from phase 2.
                Nothing else.
                the command "push route" here is absolutely useless

                G 1 Reply Last reply Reply Quote 1
                • G
                  garona @Konstanti
                  last edited by garona

                  @konstanti ok, thanks for fast reply, the only solution is the phase 2 between the openvpn and remote network(172.72.70.x), right?

                  K 2 Replies Last reply Reply Quote 0
                  • K
                    Konstanti @garona
                    last edited by Konstanti

                    @garona Yes
                    Need to test this theory
                    As far as I understand , from cisco it is necessary to change acl

                    1 Reply Last reply Reply Quote 1
                    • K
                      Konstanti @garona
                      last edited by

                      @garona
                      and on the pfsense side, we need to add another phase 2

                      G K 2 Replies Last reply Reply Quote 1
                      • G
                        garona @Konstanti
                        last edited by

                        Ok, i'll test this and tell you what happened later.
                        Thanks for the help.

                        1 Reply Last reply Reply Quote 0
                        • K
                          Konstanti @Konstanti
                          last edited by Konstanti

                          @konstanti
                          Ok
                          For example
                          cisco side
                          access-list 100 permit ip 172.70.70.0 0.0.0.255 100.100.100.0 0.0.0.255
                          pfsense side
                          0_1546541458002_4e868b7e-4cfb-4231-8d39-2bc43d3da4b4-image.png

                          Forgotten
                          The network behind openvpn can be different if you use NAT .
                          About this we must remember
                          I gave an example , assuming that NAT is not being used

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.