• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

site-to-site, cannot ping from one lan to other lan

Scheduled Pinned Locked Moved OpenVPN
47 Posts 4 Posters 7.2k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K
    Konstanti @A Former User
    last edited by Konstanti Feb 24, 2019, 9:35 PM Feb 24, 2019, 9:31 PM

    @asdffdsa6131
    As far as I understand , now PFSense - an internal host in a network 10.0.0.0/24 on which port 1194 from the main router is forwarded . Right ?

    I think you should do this.
    1 configure static routes on virtual machines for network 192.168.62.0 / 24 through 10.0.0.7

    2 create rules on wan interface 10.0.0.7 to allow traffic for network 192.168.62.0 / 24

    ? 1 Reply Last reply Feb 24, 2019, 9:35 PM Reply Quote 0
    • ?
      A Former User @Konstanti
      last edited by Feb 24, 2019, 9:35 PM

      @konstanti hi there,
      correct, pfsense server is an internal host of 10.0.0.0/24 and its ip address is 10.0.0.7
      and from my computer, 192.168.62.181, behind the sg1110, I can ping 10.0.0.7.

      1 Reply Last reply Reply Quote 0
      • ?
        A Former User
        last edited by Feb 24, 2019, 9:43 PM

        ok. can you please be a little more specific as to what needs to be done on the openvpn server and openvpn client.
        I am new to linux, pfsense and azure, I have been many days getting this far and I am growing from the experience.
        I am not asking you for exactly what needs to be done, in 100% detail but a more detailed outline?
        thanks again.

        1 Reply Last reply Reply Quote 0
        • K
          Konstanti
          last edited by Feb 24, 2019, 9:45 PM

          @asdffdsa6131
          This is easily explained, it is a feature of PFSense, an icmp packet that has passed through The OpenVPN client interface rule , is considered good and it is not blocked . But you can not ping , for example, 10.0.0.4 from your local computer , because the computer 10.0.0.4 knows nothing about the network 192.168. and sends the answer to 10.0.0.1 ( if you create the NAT OUTBOUND rule on the wan interface 10.0.0.7 for the network 192.168 , you can ping the entire network 10.0.0.0/24.
          And in the opposite direction there is no (10.0.0.0 - >192.168.)
          As much as I did , I wrote above
          1 static routes
          2 an allow rule for the network 192.168 on the WAN interface 10.0.0.7

          1 Reply Last reply Reply Quote 0
          • ?
            A Former User
            last edited by Feb 24, 2019, 9:46 PM

            ok. i will work on that thanks much

            K 1 Reply Last reply Feb 24, 2019, 9:48 PM Reply Quote 0
            • K
              Konstanti @A Former User
              last edited by Feb 24, 2019, 9:48 PM

              @asdffdsa6131
              what is the guest operating system on the virtual machines ? For example, 10.0.0.4 ?

              1 Reply Last reply Reply Quote 0
              • ?
                A Former User
                last edited by Feb 24, 2019, 9:49 PM

                ms.windows.10

                K 1 Reply Last reply Feb 24, 2019, 9:52 PM Reply Quote 0
                • K
                  Konstanti @A Former User
                  last edited by Konstanti Feb 24, 2019, 9:54 PM Feb 24, 2019, 9:52 PM

                  @asdffdsa6131
                  1.From windows cli
                  route add 192.168.62.0 mask 255.255.255.0 10.0.0.7
                  2 Create an allow rule for the network 192.168 on the WAN interface 10.0.0.7

                  0_1551045285954_ee6a2146-e192-4b1e-9c41-9696b8f5d7c1-image.png

                  1 Reply Last reply Reply Quote 0
                  • ?
                    A Former User
                    last edited by Feb 24, 2019, 9:56 PM

                    newbie question, on 10.0.0.7, the openvpn client, the outbound nat rule mode is automatic outbound nat rule generation and there is no option for adding rules, but I can add a mapping.
                    should I add a mapping or do I need to change the outbound nat mode?

                    K 1 Reply Last reply Feb 24, 2019, 9:57 PM Reply Quote 0
                    • K
                      Konstanti @A Former User
                      last edited by Konstanti Feb 24, 2019, 10:01 PM Feb 24, 2019, 9:57 PM

                      @asdffdsa6131

                      Do not create a NAT OUTBOUND rule yet
                      Try to do as I wrote in the previous post

                      If I understand everything correctly, you will be able to ping 10.0.0.4 from a network 192.168.62.0 / 24 and Vice versa

                      1 Reply Last reply Reply Quote 0
                      • ?
                        A Former User
                        last edited by Feb 24, 2019, 10:09 PM

                        on the openvpn client, I did
                        0_1551046014656_63952d70-241c-4be7-b734-dc71f7e39b83-image.png

                        on 10.0.0.7, the openvpn client, the outbound nat rule mode is automatic outbound nat rule generation and there is no option for adding rules, but I can add a mapping.
                        should I add a mapping or do I need to change the outbound nat mode?

                        K 1 Reply Last reply Feb 24, 2019, 10:15 PM Reply Quote 0
                        • ?
                          A Former User
                          last edited by Feb 24, 2019, 10:13 PM

                          are you running a different version of pfsense, as your screenshot look visually different

                          0_1551046402857_50d8e7a9-724b-4e42-aed4-3c306b8fffa7-image.png

                          1 Reply Last reply Reply Quote 0
                          • K
                            Konstanti @A Former User
                            last edited by Konstanti Feb 24, 2019, 10:16 PM Feb 24, 2019, 10:15 PM

                            @asdffdsa6131

                            1. 10.0.0.7 already knows about this network
                              0_1551046307753_1b7cad08-5ae7-4f73-80e1-cf16e971e152-image.png

                            No need to create another static route on 10.0.0.7 for network 192.168.62.0 / 24
                            Don't need to configure OUTBOUND NAT now
                            Need to, for example

                            1. on host 10.0.0.4, run the route add command ( see previous post)
                            2. create allow rule (see previous post)

                            Then you can ping the host 10.0.0.4 from the network 192.168.62.0/24
                            and the host 10.0.0.4 will be able to ping the network 192.168.62.0/24

                            https://forum.netgate.com/topic/140925/site-to-site-cannot-ping-from-one-lan-to-other-lan/17

                            1 Reply Last reply Reply Quote 0
                            • ?
                              A Former User
                              last edited by Feb 24, 2019, 10:31 PM

                              thanks but i added the firewall rule in openvpn client and the route add 192.168.62.0 mask 255.255.255.0 10.0.0.7 on 10.0.0.4
                              but no pinging.

                              0_1551047356628_12f59c89-b642-4194-bdbf-3809f59ecddd-image.png
                              and added the "route add 192.168.62.0 mask 255.255.255.0 10.0.0.7"

                              C:\Users\user01>route print

                              Interface List
                              7...00 0d 3a 1c 73 51 ......Microsoft Hyper-V Network Adapter
                              8...00 ff e3 05 f1 eb ......TAP-ProtonVPN Windows Adapter V9
                              6...00 ff d6 ca 59 0c ......TAP-Windows Adapter V9
                              1...........................Software Loopback Interface 1

                              IPv4 Route Table

                              Active Routes:
                              Network Destination Netmask Gateway Interface Metric
                              0.0.0.0 0.0.0.0 10.0.0.1 10.0.0.4 10
                              10.0.0.0 255.255.255.0 On-link 10.0.0.4 266
                              10.0.0.4 255.255.255.255 On-link 10.0.0.4 266
                              10.0.0.255 255.255.255.255 On-link 10.0.0.4 266
                              127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
                              127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
                              127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
                              168.63.129.16 255.255.255.255 10.0.0.1 10.0.0.4 11
                              169.254.169.254 255.255.255.255 10.0.0.1 10.0.0.4 11
                              192.168.62.0 255.255.255.0 10.0.0.7 10.0.0.4 11
                              224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
                              224.0.0.0 240.0.0.0 On-link 10.0.0.4 266
                              255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
                              255.255.255.255 255.255.255.255 On-link 10.0.0.4 266

                              Persistent Routes:
                              None

                              IPv6 Route Table

                              Active Routes:
                              If Metric Network Destination Gateway
                              1 331 ::1/128 On-link
                              1 331 ff00::/8 On-link

                              Persistent Routes:
                              None

                              K 1 Reply Last reply Feb 24, 2019, 10:55 PM Reply Quote 0
                              • K
                                Konstanti @A Former User
                                last edited by Konstanti Feb 24, 2019, 10:59 PM Feb 24, 2019, 10:55 PM

                                @asdffdsa6131
                                Hmmm.
                                Let's check.
                                I see that packets went in the direction 192.168.62.0/24
                                Check to see if the numbers appear in this place ?
                                This is a rule on the OpenVpn server interface
                                0_1551048928252_d553ef14-0f5b-449a-bd0d-09c2b6214446-image.png

                                Can host 10.0.0.4 ping 192.168.62.1 ?
                                Can host 192.168.62.1 ping 10.0.0.4 ?

                                1 Reply Last reply Reply Quote 0
                                • ?
                                  A Former User
                                  last edited by Feb 24, 2019, 10:59 PM

                                  hi again,
                                  I have a continuous ping from 10.0.0.4 to 192.168.62.1 and it is 'request time out'

                                  K 1 Reply Last reply Feb 24, 2019, 11:03 PM Reply Quote 0
                                  • K
                                    Konstanti @A Former User
                                    last edited by Konstanti Feb 24, 2019, 11:04 PM Feb 24, 2019, 11:03 PM

                                    @asdffdsa6131
                                    On the Openvpn server side
                                    In WEBGUI
                                    /Diagnostics/Packet Capture /
                                    Interface Openvpn
                                    Protocol ICMP
                                    Start

                                    what is the result ?

                                    1 Reply Last reply Reply Quote 0
                                    • ?
                                      A Former User
                                      last edited by Feb 24, 2019, 11:06 PM

                                      thank much,

                                      18:05:09.356421 IP 192.168.62.181 > 10.0.0.4: ICMP echo request, id 1, seq 15875, length 40
                                      18:05:11.355996 IP 192.168.62.181 > 10.0.0.4: ICMP echo request, id 1, seq 15876, length 40
                                      18:05:13.344929 IP 192.168.62.181 > 10.0.0.4: ICMP echo request, id 1, seq 15877, length 40

                                      K 1 Reply Last reply Feb 24, 2019, 11:08 PM Reply Quote 0
                                      • K
                                        Konstanti @A Former User
                                        last edited by Konstanti Feb 24, 2019, 11:09 PM Feb 24, 2019, 11:08 PM

                                        @asdffdsa6131

                                        Now the same is on the Openvpn client side
                                        WAN interface only
                                        we continue to ping 192.168.62.181 > 10.0.0.4

                                        1 Reply Last reply Reply Quote 0
                                        • ?
                                          A Former User
                                          last edited by Feb 24, 2019, 11:08 PM

                                          192.168.62.181 is my windows 10 laptop

                                          1 Reply Last reply Reply Quote 0
                                          29 out of 47
                                          • First post
                                            29/47
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received