Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    AWS Pfsense OpenVPN no access to private subnet

    Scheduled Pinned Locked Moved OpenVPN
    awspfsense 2.4.4openvpnsubnetwindows 10
    18 Posts 5 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I
      isolatedvirus
      last edited by

      sorry, should have also requested LAN rules as well. please post those too.

      H 1 Reply Last reply Reply Quote 0
      • H
        Heikum @isolatedvirus
        last edited by

        @isolatedvirus no worries, thank you for your time. Updated the topic with the requested information!

        1 Reply Last reply Reply Quote 0
        • I
          isolatedvirus
          last edited by

          can you confirm pfsense can ping the instance (.58)
          Also confirm the following:
          System->Advanced->Networking
          -All offloading is disabled (Checksum/TCP Seg/Large Receive

          H 1 Reply Last reply Reply Quote 0
          • H
            Heikum @isolatedvirus
            last edited by

            @isolatedvirus

            Yes pfsense can ping all instances in the private subnet.

            Confirmed:
            alt text

            I don't get a default gateway when connecting to the vpn, could that have something to do with it?
            alt text

            L 1 Reply Last reply Reply Quote 1
            • I
              isolatedvirus
              last edited by

              ok i think it might be a route or firewall entry on the linux host itself.

              You can post your screenshots of your OpenVPN server config, but i doubt theres an issue there primarily because: Windows can ping the firewall tunnel IP and the firewall interface on the subnet in question. This leads me to believe youre forwarding the correct routes for the vpn.

              Post the route table and firewall config for the linux host.

              H 1 Reply Last reply Reply Quote 0
              • H
                Heikum @isolatedvirus
                last edited by

                @isolatedvirus ok, thank you for your reply. I currently have 2 linux hosts in the private subnet (which has access to the internet for now otherwise I could not SSH into the hosts):

                Nagios XI on centos:
                alt text

                Ubuntu server:
                alt text

                firewall is off:
                alt text

                Amazon private subnet (should be without internet access):
                alt text

                1 Reply Last reply Reply Quote 0
                • I
                  isolatedvirus
                  last edited by

                  your hosts have their gateway set as 10.3.1.1, it should be 10.3.1.5 (PFSense Lan) unless you have another gateway in the environment.

                  Otherwise, set a route for your VPN subnet to point to 10.3.1.5 on the linux hosts

                  H 1 Reply Last reply Reply Quote 1
                  • H
                    Heikum @isolatedvirus
                    last edited by

                    @isolatedvirus said in AWS Pfsense OpenVPN no access to private subnet:

                    10.3.1.5

                    Yes this worked!

                    I can now ping my private subnet instances from the vpn client.
                    Do you happen to know why the default gateway gets set to 10.3.1.1?
                    Everytime I make a new instance it sounds like I need to change the default gateway manually.

                    Thank you for your time and help.

                    I 1 Reply Last reply Reply Quote 0
                    • I
                      isolatedvirus @Heikum
                      last edited by

                      I'm not sure why. If youre handing out IP's behind pfsense via DHCP i'd check the dhcp config to verify youre not handing out the wrong gateway config.

                      Its also possible that this is just a AWS thing, since im not familiar with AWS i cant really say.

                      1 Reply Last reply Reply Quote 1
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        What have you done in the VPC routing table so it knows to send traffic for the 10.3.2.0/24 subnet back to the pfSense interface?

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        H 1 Reply Last reply Reply Quote 1
                        • H
                          Heikum @Derelict
                          last edited by

                          @derelict

                          Is this regarding the default gateway of the instances?
                          I thought I should edit the route table of the private subnet to point to 10.3.1.5 which is the LAN side of the pfsense firewall but it won't let me do just that:

                          private subnet
                          alt text

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by Derelict

                            You can't use subnets contained inside your VPC subnet anywhere but the VPC itself.

                            Use something outside of that for the other side of the VPN. Sorry. That's just the way AWS works, as you can see from that error message.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • L
                              Leonardo Fernandes @Heikum
                              last edited by

                              @Heikum in my case hardware checksum offloading chacked solved the problem. Thanks!

                              DerelictD K 2 Replies Last reply Reply Quote 1
                              • DerelictD
                                Derelict LAYER 8 Netgate @Leonardo Fernandes
                                last edited by

                                @Leonardo-Fernandes That is only when using ena adapters and is fixed by a later version of the ena driver in pfSense 2.5.0.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • K
                                  Konron @Leonardo Fernandes
                                  last edited by

                                  @leonardo-fernandes You are my hero. Thank you very much. My OpenVPN with AWS works perfectly now

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.