Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    site-to-site, cannot ping from one lan to other lan

    Scheduled Pinned Locked Moved OpenVPN
    47 Posts 4 Posters 7.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      A Former User
      last edited by

      hi to all and thanks for reading this,
      in my home lan, I have netgate sg100 and the pfsense is running in azure cloud.

      from the server/negate.sg110 web interface I can ping virtual computers behind the azure.pfsense
      from the azure.pfsense.client web interface, I can ping physical computers behind my netgate sg1110.

      however,
      I cannot ping from a physical computer behind my netgate to a virtual computer behind the azure pfsense
      I cannot ping from a virtual computer behind azure pfsense to a physical computer behind my netgate.sg1110

      I thought that since I had added the correct "IPv4 Remote network" on the server and client, that I should be able to ping from computer to computer.

      Do I need a add a manual route somehow and if so, how might I do that?
      or what do you suggest?

      thanks very much,
      david

      1 Reply Last reply Reply Quote 0
      • RicoR
        Rico LAYER 8 Rebel Alliance
        last edited by

        Show both sides OpenVPN and firewall settings (screenshots).

        -Rico

        1 Reply Last reply Reply Quote 0
        • ?
          A Former User
          last edited by

          hi rico, and thanks.
          also, from the sg1110, i can ping 10.0.0.7, which is the ip address of the azure openvpn client's lan side ipaddress.
          and from the azure openvpn client, I can ping 192.168.62.1, which is sg1100 server's ip address on its lan side.

          this is from the netgate sg1110 openvpn server, which I am really liking.
          0_1551039175863_7b570691-9118-4383-bf70-55e79b3b6335-image.png
          0_1551039203865_5e870c38-9bd1-4bbd-bf77-9b19f001d21b-image.png
          0_1551039267290_d1b478fc-7d1b-4fc4-bac1-7e63ab5e6109-image.png
          0_1551039391083_345955c8-10a0-46a6-b5e4-ea141db517a2-image.png

          from azure pfsense openvpn client
          0_1551039431923_55f85afd-0890-4708-b847-43534a1e4733-image.png
          0_1551039450556_e884e6f9-61bb-426b-bf6e-061c03c11bd7-image.png
          0_1551039513686_f231adab-f568-4beb-9601-f1cb221797ce-image.png
          0_1551039547048_ccaf2fe4-fbb2-402c-a681-ab157bfaf81b-image.png
          0_1551039577091_379f385f-c285-48a2-9ffb-46a55ac0698c-image.png

          K 1 Reply Last reply Reply Quote 0
          • K
            Konstanti @A Former User
            last edited by Konstanti

            @asdffdsa6131
            Hey
            Try to check the rules on the WAN interface OPENVPN client. They are configured to only allow traffic for 10.0.0.7 .
            And show rules for Lan interface of OpenVPN server

            Check the firewall logs (status/system logs/Firewall) on both sides
            Are there any blocked packets?

            1 Reply Last reply Reply Quote 0
            • ?
              A Former User
              last edited by

              Konstanti, thanks for the fast reply.

              here are the rules for wan interface of the openvpn client
              0_1551042256031_b691261c-a9ce-41c3-b274-983f59e00d9c-image.png
              and here are the rules for the lan interface of the openvpn server
              0_1551042298102_76dcfdaa-33b9-4693-9aa9-ce22445307ca-image.png

              I am confused as I think the values for IPv4 Remote network(s) for both server and client are correct.

              thanks so much

              K 1 Reply Last reply Reply Quote 0
              • K
                Konstanti @A Former User
                last edited by

                @asdffdsa6131
                The problem , I think, is not routing
                According to the routing tables, it seems that everything is correct
                Look at the firewall logs on the Openvpn client side

                1 Reply Last reply Reply Quote 0
                • ?
                  A Former User
                  last edited by

                  thanks, I tried I cannot find where to look for the logs for the firewall.
                  and should I do someting like a continuous ping from the a computer on the server side to a computer on the client side, so as to trigger someting useful in the firewall logs?
                  again thanks

                  K 1 Reply Last reply Reply Quote 0
                  • K
                    Konstanti @A Former User
                    last edited by Konstanti

                    @asdffdsa6131
                    What is host 10.0.0.1 ??
                    How to set up routing from virtual machines ?
                    They know, that network 192.168.62.0 / 24 need to seek through 10.0.0.7 ?
                    And on wan interface 10.0.0.7 you need allow traffic to 192.168.62.0/24

                    I think you should do this.
                    1 configure static routes on virtual machines for network 192.168.62.0 / 24 through 10.0.0.7
                    2. create rules on wan interface 10.0.0.7 to allow traffic for network 192.168.62.0 / 24

                    1 Reply Last reply Reply Quote 0
                    • ?
                      A Former User
                      last edited by

                      thanks, this is not making sense, as I am no expert in linux and new to pfsense but all the settings look correct, the openvpn server settings, the openvpn client settings, the firewalls and routes.

                      but what has me confused is that the pfsense server in azure, only has a single interface of WAN, but there is not a lan interface. for me that makes no sense and is confusing.

                      0_1551043554856_75b89b9c-5563-429f-8e56-5f921c8c8983-image.png

                      10.0.0.1, that is the default gateway for my azure virtual machines

                      here is the ipconfig /all from a windows.10 virtual machine

                      Ethernet adapter HyperV:

                      Connection-specific DNS Suffix . : llb4b2ht4myejjazjx4yah4a0c.bx.internal.cloudapp.net
                      Description . . . . . . . . . . . : Microsoft Hyper-V Network Adapter
                      Physical Address. . . . . . . . . : 00-0D-3A-1C-73-51
                      DHCP Enabled. . . . . . . . . . . : Yes
                      Autoconfiguration Enabled . . . . : Yes
                      IPv4 Address. . . . . . . . . . . : 10.0.0.4(Preferred)
                      Subnet Mask . . . . . . . . . . . : 255.255.255.0
                      Lease Obtained. . . . . . . . . . : Thursday, February 21, 2019 2:46:26 PM
                      Lease Expires . . . . . . . . . . : Wednesday, April 2, 2155 10:51:01 PM
                      Default Gateway . . . . . . . . . : 10.0.0.1
                      DHCP Server . . . . . . . . . . . : 168.63.129.16
                      DNS Servers . . . . . . . . . . . : 168.63.129.16
                      NetBIOS over Tcpip. . . . . . . . : Enabled

                      K 1 Reply Last reply Reply Quote 0
                      • K
                        Konstanti @A Former User
                        last edited by Konstanti

                        @asdffdsa6131
                        As far as I understand , now PFSense - an internal host in a network 10.0.0.0/24 on which port 1194 from the main router is forwarded . Right ?

                        I think you should do this.
                        1 configure static routes on virtual machines for network 192.168.62.0 / 24 through 10.0.0.7

                        2 create rules on wan interface 10.0.0.7 to allow traffic for network 192.168.62.0 / 24

                        ? 1 Reply Last reply Reply Quote 0
                        • ?
                          A Former User @Konstanti
                          last edited by

                          @konstanti hi there,
                          correct, pfsense server is an internal host of 10.0.0.0/24 and its ip address is 10.0.0.7
                          and from my computer, 192.168.62.181, behind the sg1110, I can ping 10.0.0.7.

                          1 Reply Last reply Reply Quote 0
                          • ?
                            A Former User
                            last edited by

                            ok. can you please be a little more specific as to what needs to be done on the openvpn server and openvpn client.
                            I am new to linux, pfsense and azure, I have been many days getting this far and I am growing from the experience.
                            I am not asking you for exactly what needs to be done, in 100% detail but a more detailed outline?
                            thanks again.

                            1 Reply Last reply Reply Quote 0
                            • K
                              Konstanti
                              last edited by

                              @asdffdsa6131
                              This is easily explained, it is a feature of PFSense, an icmp packet that has passed through The OpenVPN client interface rule , is considered good and it is not blocked . But you can not ping , for example, 10.0.0.4 from your local computer , because the computer 10.0.0.4 knows nothing about the network 192.168. and sends the answer to 10.0.0.1 ( if you create the NAT OUTBOUND rule on the wan interface 10.0.0.7 for the network 192.168 , you can ping the entire network 10.0.0.0/24.
                              And in the opposite direction there is no (10.0.0.0 - >192.168.)
                              As much as I did , I wrote above
                              1 static routes
                              2 an allow rule for the network 192.168 on the WAN interface 10.0.0.7

                              1 Reply Last reply Reply Quote 0
                              • ?
                                A Former User
                                last edited by

                                ok. i will work on that thanks much

                                K 1 Reply Last reply Reply Quote 0
                                • K
                                  Konstanti @A Former User
                                  last edited by

                                  @asdffdsa6131
                                  what is the guest operating system on the virtual machines ? For example, 10.0.0.4 ?

                                  1 Reply Last reply Reply Quote 0
                                  • ?
                                    A Former User
                                    last edited by

                                    ms.windows.10

                                    K 1 Reply Last reply Reply Quote 0
                                    • K
                                      Konstanti @A Former User
                                      last edited by Konstanti

                                      @asdffdsa6131
                                      1.From windows cli
                                      route add 192.168.62.0 mask 255.255.255.0 10.0.0.7
                                      2 Create an allow rule for the network 192.168 on the WAN interface 10.0.0.7

                                      0_1551045285954_ee6a2146-e192-4b1e-9c41-9696b8f5d7c1-image.png

                                      1 Reply Last reply Reply Quote 0
                                      • ?
                                        A Former User
                                        last edited by

                                        newbie question, on 10.0.0.7, the openvpn client, the outbound nat rule mode is automatic outbound nat rule generation and there is no option for adding rules, but I can add a mapping.
                                        should I add a mapping or do I need to change the outbound nat mode?

                                        K 1 Reply Last reply Reply Quote 0
                                        • K
                                          Konstanti @A Former User
                                          last edited by Konstanti

                                          @asdffdsa6131

                                          Do not create a NAT OUTBOUND rule yet
                                          Try to do as I wrote in the previous post

                                          If I understand everything correctly, you will be able to ping 10.0.0.4 from a network 192.168.62.0 / 24 and Vice versa

                                          1 Reply Last reply Reply Quote 0
                                          • ?
                                            A Former User
                                            last edited by

                                            on the openvpn client, I did
                                            0_1551046014656_63952d70-241c-4be7-b734-dc71f7e39b83-image.png

                                            on 10.0.0.7, the openvpn client, the outbound nat rule mode is automatic outbound nat rule generation and there is no option for adding rules, but I can add a mapping.
                                            should I add a mapping or do I need to change the outbound nat mode?

                                            K 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.