site-to-site, cannot ping from one lan to other lan
- 
 @asdffdsa6131 
 Hmmm.
 Let's check.
 I see that packets went in the direction 192.168.62.0/24
 Check to see if the numbers appear in this place ?
 This is a rule on the OpenVpn server interface
  Can host 10.0.0.4 ping 192.168.62.1 ? 
 Can host 192.168.62.1 ping 10.0.0.4 ?
- 
 hi again, 
 I have a continuous ping from 10.0.0.4 to 192.168.62.1 and it is 'request time out'
- 
 @asdffdsa6131 
 On the Openvpn server side
 In WEBGUI
 /Diagnostics/Packet Capture /
 Interface Openvpn
 Protocol ICMP
 Startwhat is the result ? 
- 
 thank much, 18:05:09.356421 IP 192.168.62.181 > 10.0.0.4: ICMP echo request, id 1, seq 15875, length 40 
 18:05:11.355996 IP 192.168.62.181 > 10.0.0.4: ICMP echo request, id 1, seq 15876, length 40
 18:05:13.344929 IP 192.168.62.181 > 10.0.0.4: ICMP echo request, id 1, seq 15877, length 40
- 
 @asdffdsa6131 Now the same is on the Openvpn client side 
 WAN interface only
 we continue to ping 192.168.62.181 > 10.0.0.4
- 
 192.168.62.181 is my windows 10 laptop 
- 
 openvpn client side, wan interface only 18:10:15.358365 IP 192.168.62.181 > 10.0.0.4: ICMP echo request, id 1, seq 16028, length 40 
 18:10:17.360473 IP 192.168.62.181 > 10.0.0.4: ICMP echo request, id 1, seq 16029, length 40
- 
 @asdffdsa6131 
 We can see that the tunnel is working
 but the host 10.0.0.4 does not respond to pings
 Can host 192.168.62.181 ping 10.0.0.7 ?
 If you run ping 10.0.0.4 ->192.168.62.181 (or 192.168.62.1)
 What will packet capture show ?
- 
 We can see that the tunnel is working 
 --- correct
 but the host 10.0.0.4 does not respond to pings
 --- correct
 Can host 192.168.62.181 ping 10.0.0.7 ?
 --- I tried again and the answer is no
 If you run ping 10.0.0.4 ->192.168.62.181
 --- I have a continous ping from 10.0.0.4 -> 192.168.62.181
 What will packet capture show ?
 --- If you mean on the openvpn client
  
 18:22:40.814131 IP 40.97.154.82.443 > 47.20.7.132.20255: tcp 43 
 18:22:40.866569 IP 47.20.7.132.20255 > 40.97.154.82.443: tcp 0
 18:22:41.070851 IP 47.20.7.132 > 47.20.4.1: ICMP echo request, id 16129, seq 7040, length 8
 18:22:41.077374 IP 47.20.4.1 > 47.20.7.132: ICMP echo reply, id 16129, seq 7040, length 8
 18:22:41.567306 IP 40.85.175.163.443 > 47.20.7.132.40913: tcp 51
 18:22:41.603084 IP 47.20.7.132 > 47.20.4.1: ICMP echo request, id 16129, seq 7041, length 8
 18:22:41.609795 IP 47.20.4.1 > 47.20.7.132: ICMP echo reply, id 16129, seq 7041, length 8
 18:22:41.617013 IP 47.20.7.132.40913 > 40.85.175.163.443: tcp 0
 18:22:42.132944 IP 47.20.7.132 > 47.20.4.1: ICMP echo request, id 16129, seq 7042, length 8
 18:22:42.142050 IP 47.20.4.1 > 47.20.7.132: ICMP echo reply, id 16129, seq 7042, length 8
 18:22:42.665103 IP 47.20.7.132 > 47.20.4.1: ICMP echo request, id 16129, seq 7043, length 8
 18:22:42.668422 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.677302 IP 47.20.4.1 > 47.20.7.132: ICMP echo reply, id 16129, seq 7043, length 8
 18:22:42.685356 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 0
 18:22:42.685659 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.697633 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 517
 18:22:42.716822 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 0
 18:22:42.731861 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 0
 18:22:42.737668 IP 47.20.7.132.10038 > 23.10.93.204.443: tcp 226
 18:22:42.738583 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.738726 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.738752 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.738881 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.738907 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 521
 18:22:42.738942 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.739068 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.739089 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.741041 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 126
 18:22:42.743358 IP 1.1.1.1.853 > 47.20.7.132.37964: tcp 0
 18:22:42.743432 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 0
 18:22:42.743650 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 311
 18:22:42.754079 IP 23.10.93.204.443 > 47.20.7.132.10038: tcp 128
 18:22:42.754123 IP 23.10.93.204.443 > 47.20.7.132.10038: tcp 38
 18:22:42.756267 IP 47.20.7.132.10038 > 23.10.93.204.443: tcp 0
 18:22:42.756930 IP 1.1.1.1.853 > 47.20.7.132.37964: tcp 0
 18:22:42.757434 IP 1.1.1.1.853 > 47.20.7.132.37964: tcp 1460
 18:22:42.757472 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 0
 18:22:42.757482 IP 1.1.1.1.853 > 47.20.7.132.37964: tcp 1242
 18:22:42.757509 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 0
 18:22:42.758787 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 51
 18:22:42.759295 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 242
 18:22:42.769256 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 126
 18:22:42.779281 IP 1.1.1.1.853 > 47.20.7.132.37964: tcp 424
 18:22:42.779366 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 0
 18:22:42.779793 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 86
 18:22:42.790808 IP 1.1.1.1.853 > 47.20.7.132.37964: tcp 499
 18:22:42.790873 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 0
 18:22:42.791582 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 31
 18:22:42.791901 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 0
 18:22:42.797959 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 356
 18:22:42.800224 IP 1.1.1.1.853 > 47.20.7.132.37964: tcp 0
 18:22:42.800262 IP 1.1.1.1.853 > 47.20.7.132.37964: tcp 0
 18:22:42.800644 IP 1.1.1.1.853 > 47.20.7.132.37964: tcp 0
 18:22:42.800689 IP 47.20.7.132.37964 > 1.1.1.1.853: tcp 0
 18:22:42.829447 IP 40.97.228.178.443 > 47.20.7.132.30169: tcp 43
 18:22:42.837753 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.894908 IP 47.20.7.132.30169 > 40.97.228.178.443: tcp 0
 18:22:42.993896 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.993988 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 927
 18:22:42.994014 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.994147 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.994179 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 646
 18:22:42.994202 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.994226 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.994250 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.994274 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 365
 18:22:42.994295 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:42.994447 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.994468 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.994489 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.994516 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.994536 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:42.994662 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.011965 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.011992 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.012016 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.012277 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.012297 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.012316 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.017503 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.017529 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.017785 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.017823 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.017843 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.017850 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.017978 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.018004 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.018040 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.018151 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.018190 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.018197 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.018220 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.018244 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.018280 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.018406 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.018413 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.018437 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
 18:22:43.018473 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.018493 IP 47.20.7.132.4987 > 38.27.106.14.443: tcp 0
 18:22:43.018609 IP 38.27.106.14.443 > 47.20.7.132.4987: tcp 1460
- 
 sorry made mistake on the packet capture, that was from server, not client hang on. 
- 
  i tried a few times, the packets captured is blank 
  
- 
 @asdffdsa6131 
 Host 10.0.0.4 not rebooted ?
 Check if there is a route to 192.168 in its routing table
- 
 Host 10.0.0.4 not rebooted ? 
 --- not rebooted
 Check if there is a route to 192.168 in its routing table
 --- i checked a few times, each time I try to re-add the rule I get the following error
 C:\Users\user01>route add 192.168.62.0 mask 255.255.255.0 10.0.0.7
 The route addition failed: The object already exists.
- 
 @asdffdsa6131 
 Good
 Let's try another way
 Ping 192.168.62.181->10.0.0.4 (or 10.0.0.1 or any other host from 10.0.0.0/24)
 on the client side
 Firewall/NAT Outbound/Edit (manual outbound)
   If everything is configured correctly, then in packet capture (client side) you will see 
 10.0.0.7 ->10.0.0.4
 10.0.0.4 ->10.0.0.7
- 
 Ping 192.168.62.181->10.0.0.4 
 --- I have a continous ping going all the time.
  Ping 192.168.62.181->10.0.0.4 continues to fail 
 ping 192.168.62.181 -> 10.0.0.1 also fails.does this have something to do with that the client is an azure virtual machine and has no lan interface, just a wan interface? 
- 
 @asdffdsa6131 NAT OUTBOUND changes the sender address (192.168.62.181) to its network address in the WAN interface (10.0.0.7) .the capture and package should show this 
 for example
 IP 10.0.0.7 > 10.0.0.4: ICMP echo request, id 1, seq 16028, length 40
 IP 10.0.0.7 > 10.0.0.4: ICMP echo request, id 1, seq 16029, length 40
- 
 not sure what you are asking, sorry 
- 
 @asdffdsa6131 
 192.168.62.181 -> 10.0.0.7 (nat outbound) -> 10.0.0.4 ->10.0.0.7 -> 192.168.62.181In packet capture you should see instead of 192.168.62.181 10.0.0.7 (client side , wan interface) 
- 
 sorry, again I am not clear what you are asking for 
- 
 @asdffdsa6131 
 NAT OUTBOUND changes the sender address (192.168.62.181) to its network address in the WAN interface (10.0.0.7) .the packet capture should show this (client side , wan interface)
 for example
 IP 10.0.0.7 > 10.0.0.4: ICMP echo request, id 1, seq 16028, length 40
 IP 10.0.0.7 > 10.0.0.4: ICMP echo request, id 1, seq 16029, length 40