Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Setting up OpenVPN for new remote office

    Scheduled Pinned Locked Moved OpenVPN
    25 Posts 5 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      BlazeStar @Derelict
      last edited by

      On the client side, I don't want to make anything available.

      On the server side, I just want to make 10.0.3.0/24,10.0.4.0/24 available.

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        You have to put the networks you are sourcing from in the remote networks on the other side in order to route traffic. Else you have to assign an interface and perform outbound NAT to the tunnel address.

        You can determine what connections can be made into that side using firewall rules on the OpenVPN tab.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        B 1 Reply Last reply Reply Quote 0
        • B
          BlazeStar @Derelict
          last edited by

          So basically, on the CLIENT side I should put 10.0.3.0/24,10.0.4.0/24 in IPv4 Remote network(s)

          and on the SERVER side I should leave blank.

          Right?

          DerelictD 1 Reply Last reply Reply Quote 0
          • RicoR
            Rico LAYER 8 Rebel Alliance
            last edited by

            Check out
            https://www.netgate.com/resources/videos/site-to-site-vpns-on-pfsense.html
            to get a basic understanding how it works. :-)

            -Rico

            B 1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate @BlazeStar
              last edited by

              @BlazeStar said in Setting up OpenVPN for new remote office:

              So basically, on the CLIENT side I should put 10.0.3.0/24,10.0.4.0/24 in IPv4 Remote network(s)

              and on the SERVER side I should leave blank.

              Right?

              No. You have to put the remote networks on each side to be able to route traffic (or implement tunnel address NAT). You control who can connect to what using firewall rules.

              Yeah, some study into exactly what is going on is likely in order.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • B
                BlazeStar @Rico
                last edited by

                @Rico said in Setting up OpenVPN for new remote office:

                Check out
                https://www.netgate.com/resources/videos/site-to-site-vpns-on-pfsense.html

                That's the video I watched to set up my stuff.

                Yet I'm still very puzzled why it doesn't work.

                Around the end of the video, a few tests are recommended, and when I try them they fail.

                For example, I try to ping host 10.0.3.20 which is a server I have on the server-side.

                On the client-side, from pfSense, it works:

                139b8cab-3693-4c28-9c06-8c41e86988f5-image.png

                On the client-side, from LAN, it fails!!

                d45ab070-c5ea-45fe-80bc-74263ab66b97-image.png

                And in the routing tables I see this:

                82e0b31b-308d-4ee1-8e2c-1928c67ca8f2-image.png

                Which appears to me like, once again, this should work!

                Anything I'm not seeing here??

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  Does the server side have a route back to 192.168.1.1?

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  B 1 Reply Last reply Reply Quote 0
                  • B
                    BlazeStar @Derelict
                    last edited by

                    @Derelict on the server-side I can see this entry in my routing table:

                    99b6e77f-6974-4b27-9161-e50e7cc70bd2-image.png

                    So I would say yes there's a route back.

                    Is that what you meant?

                    B 1 Reply Last reply Reply Quote 0
                    • B
                      BlazeStar @BlazeStar
                      last edited by

                      And both side have this firewall rule in OpenVPN tab

                      65efe20c-2bee-44de-86a0-82bbfa74a73f-image.png

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        That doesn't look like a route back to me. How does the server side firewall know to route traffic back to 192.168.1.1 over the VPN?

                        Add 192.168.1.0/24 to the remote networks in the OpenVPN instance on the server side.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • B
                          BlazeStar
                          last edited by

                          Damn.

                          So I made a typo in the IPv4 Remote network(s) on the server-side.

                          Now everything works.

                          Thank you so much for you help @Derelict

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.