Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Access printer from foreign network over IPSEC (multiple locations)

    Scheduled Pinned Locked Moved IPsec
    36 Posts 3 Posters 3.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bashuis @conor
      last edited by

      @conor

      i did create an static route on pfsense01 (location1):
      (gateway: LAN2)
      cf595ee7-e4c0-4765-888e-f81e7f188fe0-image.png

      this wil route the traffic in location1 back to the costommer network. i think the problem is that Location2 is not knowing this interface.

      I cannot add the route to pfsense02 (location2) because i cannot create an gateway on the ipsec interface to route the traffic to 172.16.0.0/24 back to pfsense01.

      C 2 Replies Last reply Reply Quote 0
      • C
        conor @bashuis
        last edited by

        @bashuis

        Your gateway is wrong though that should not be .129 but .132.

        200+ pfSense installs - best firewall ever.

        1 Reply Last reply Reply Quote 0
        • C
          conor
          last edited by

          can you ping 10.130.76.129 from 172.16.0.0/24?

          200+ pfSense installs - best firewall ever.

          1 Reply Last reply Reply Quote 0
          • B
            bashuis
            last edited by

            i run packet capturing on LAN2 (pfsense01) i see the following:

            10:57:45.117448 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 27238, length 36
            10:57:45.157610 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 27239, length 36
            10:57:45.197928 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 27240, length 36
            10:57:45.237965 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 27241, length 36
            10:57:45.277946 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 27242, length 36

            no reply is comming back

            C 1 Reply Last reply Reply Quote 0
            • C
              conor @bashuis
              last edited by

              @bashuis said in Access printer from foreign network over IPSEC (multiple locations):

              I cannot add the route to pfsense02 (location2) because i cannot create an gateway on the ipsec interface to route the traffic to 172.16.0.0/24 back to pfsense01.

              Then you simply create a outbound NAT on pfsense01 for the 172 network, but before you do that make sure that the LAN2 interface on pfsense01 can communicate with the 172 network first.

              One problem at a time.

              200+ pfSense installs - best firewall ever.

              B 1 Reply Last reply Reply Quote 0
              • C
                conor @bashuis
                last edited by

                @bashuis
                Disable the port forward for the ICMP for .136 and try again and see if it replies.

                200+ pfSense installs - best firewall ever.

                1 Reply Last reply Reply Quote 0
                • B
                  bashuis @conor
                  last edited by bashuis

                  @conor
                  i already have the outbound rule on pfsense01:
                  NAT address: 10.130.76.132/25
                  1558511277126-59ab3f12-9afb-452b-8371-d7d1203973c0-image.png

                  C 1 Reply Last reply Reply Quote 0
                  • C
                    conor @bashuis
                    last edited by

                    @bashuis
                    I have no idea if you have that set up right as you have covered up all the important bits.

                    200+ pfSense installs - best firewall ever.

                    B 1 Reply Last reply Reply Quote 0
                    • B
                      bashuis @conor
                      last edited by

                      @conor

                      i disabled outgoing NAT + disabled icmp forwarding and still get no reply:

                      11:07:09.031164 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 40292, length 36
                      11:07:09.071096 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 40293, length 36
                      11:07:09.111122 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 40294, length 36
                      11:07:09.151517 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 40295, length 36
                      11:07:09.192282 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 40296, length 36
                      11:07:09.232982 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 40297, length 36
                      11:07:09.273003 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 249, seq 40298, length 36

                      1 Reply Last reply Reply Quote 0
                      • C
                        conor
                        last edited by

                        Ok then the first problem is that the .136 IP on pfsense01 can't reply to the 172 network.

                        1. Make sure that the firewall rules permit traffic from the 172 network arriving on the LAN2 interface.
                        2. The 172 network is being routed by the customer router what is the ip in the range 10.130.76.132 for that router. That IP will be your gateway for the 172 static route.

                        200+ pfSense installs - best firewall ever.

                        1 Reply Last reply Reply Quote 0
                        • B
                          bashuis
                          last edited by

                          I'm able to ping from LAN2(location1) to the printer (10.130.76.136) if i use an source address in the range 10.130.76.129/25.

                          i think the problem is that the traffic is comming from 172.16.0.0/24 and the site: location2(pfsense02) is not knowing this subnet to route it back to location1

                          i added the following firewallrule on LAN2
                          08c3a518-fc1b-49a8-8319-b6ed6d2a454f-image.png
                          this should allow traffic from 172.16.0.0/24 to 10.130.76.136

                          i disabled the ICMP portforwarding and disabled outgoing NAT

                          the address 10.130.76.136/25 is added als virtual IP, is this needed?

                          packet capturing on interface LAN2 (pfsense01) give no reply:
                          11:25:30.561151 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 281, length 36
                          11:25:30.601003 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 282, length 36
                          11:25:30.640925 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 283, length 36
                          11:25:30.680956 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 284, length 36
                          11:25:30.720877 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 285, length 36
                          11:25:30.760985 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 286, length 36
                          11:25:30.801084 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 287, length 36
                          11:25:30.841004 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 288, length 36

                          1 Reply Last reply Reply Quote 0
                          • B
                            bashuis
                            last edited by bashuis

                            now i get een reply back:

                            11:27:44.554463 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 3382, length 36
                            11:27:44.554492 IP 10.130.76.136 > 172.16.0.26: ICMP echo reply, id 250, seq 3382, length 36

                            so the connection from pfsense01(LAN2) to the custommer is ok.

                            C 1 Reply Last reply Reply Quote 0
                            • C
                              conor
                              last edited by

                              You have a pile of things to fix, stop trying to guess it all in one go. First fix the fact that the pfsense01 can't communicate with the 172 network. You probably don't need the Virtual IP and could ping the LAN2 interface directly but eiteher way you first need to make sure the pfsense01 can talk with the 172, otherwise no matter what you do with the pfsense02 it won't work.

                              200+ pfSense installs - best firewall ever.

                              1 Reply Last reply Reply Quote 0
                              • C
                                conor @bashuis
                                last edited by

                                @bashuis said in Access printer from foreign network over IPSEC (multiple locations):

                                now i get een reply back:
                                11:27:44.554463 IP 172.16.0.26 > 10.130.76.136: ICMP echo request, id 250, seq 3382, length 36
                                11:27:44.554492 IP 10.130.76.136 > 172.16.0.26: ICMP echo reply, id 250, seq 3382, length 36
                                so the connection from pfsense01(LAN2) to the custommer is ok.

                                Good now you need to add a P2 entry to your IPSEC on both sides for the 172 network so they know how to talk to each other good explaination here: https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/ipsec-with-multiple-subnets.html

                                200+ pfSense installs - best firewall ever.

                                1 Reply Last reply Reply Quote 0
                                • B
                                  bashuis
                                  last edited by

                                  should that like this?

                                  pfsense01
                                  172.16.0.0/24(local) --> 192.168.41.0/24(remote)

                                  pfsense03
                                  192.168.41.0/24(local) --> 172.16.0.0/24(remote)

                                  1 Reply Last reply Reply Quote 0
                                  • C
                                    conor
                                    last edited by

                                    yes

                                    200+ pfSense installs - best firewall ever.

                                    B 1 Reply Last reply Reply Quote 0
                                    • B
                                      bashuis @conor
                                      last edited by bashuis

                                      @conor
                                      OK, i created the P2.
                                      it is not UP, but that could be because there is no traffic going over it..

                                      several other P2's over the samen P1 are online..

                                      location 1 (pfsense01):
                                      9cd3ddc1-5860-4644-bf3b-aaab6e7fb812-image.png

                                      location 2 (pfsense02):
                                      502d36c4-e9aa-4b60-966a-6509a2f1c8ed-image.png

                                      Should i disconnect and reconnect the whole IPSEC connection?

                                      C 1 Reply Last reply Reply Quote 0
                                      • C
                                        conor
                                        last edited by

                                        on pfsense 02 for the sake of testing goto Firewall > Rules > IPSEC
                                        add an allow all rule for this interface, you can fine tune it later this is just for testing

                                        200+ pfSense installs - best firewall ever.

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          conor @bashuis
                                          last edited by

                                          @bashuis said in Access printer from foreign network over IPSEC (multiple locations):

                                          Should i disconnect and reconnect the whole IPSEC connection?

                                          if the down time isn't going to bother you probably best.

                                          200+ pfSense installs - best firewall ever.

                                          B 1 Reply Last reply Reply Quote 0
                                          • B
                                            bashuis
                                            last edited by

                                            @conor said in Access printer from foreign network over IPSEC (multiple locations):

                                            sake of testing goto Firewall > Rules > IPSEC
                                            add an allow all rule for this interface, you can fine tune it later this is just for testing

                                            this rule was already active (for testing) on the IPSEC interface
                                            fd807ff2-c41f-4782-8667-35d7543bad38-image.png

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.