Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Connected to OpenVPN, but no network except for 1 IP Address

    Scheduled Pinned Locked Moved OpenVPN
    22 Posts 5 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      tocheeba
      last edited by

      Sounds stupid, but on my LAN interface, it's setup as 192.168.1.1/24. I'm not limiting myself at all am I ? That's just configuring the IP of the pfSense box, right?

      1 Reply Last reply Reply Quote 0
      • V
        viragomann
        last edited by

        For troubleshooting try to ping the LAN address 192.168.1.1.
        This should work at least if the client routes are set correctly.
        Then try to ping a LAN device.

        1 Reply Last reply Reply Quote 0
        • T
          tocheeba
          last edited by

          Not able to ping either when connected as the 2nd VPN client (1921.68.2.3)

          1 Reply Last reply Reply Quote 0
          • V
            viragomann
            last edited by

            So please post the clients IPv4 routing table.

            1 Reply Last reply Reply Quote 0
            • M
              marvosa
              last edited by

              Post your server1.conf (/var/etc/openvpn).

              1 Reply Last reply Reply Quote 0
              • T
                tocheeba
                last edited by

                I posted the IPv4 routing table above earlier, and you stated that it looked fine?

                Here is the server1.conf files:

                dev ovpns1
                verb 1
                dev-type tun
                dev-node /dev/tun1
                writepid /var/run/openvpn_server1.pid
                #user nobody
                #group nobody
                script-security 3
                daemon
                keepalive 10 60
                ping-timer-rem
                persist-tun
                persist-key
                proto tcp-server
                cipher AES-128-CBC
                auth SHA256
                up /usr/local/sbin/ovpn-linkup
                down /usr/local/sbin/ovpn-linkdown
                client-connect /usr/local/sbin/openvpn.attributes.sh
                client-disconnect /usr/local/sbin/openvpn.attributes.sh
                multihome
                tls-server
                server 192.168.2.0 255.255.255.0
                client-config-dir /var/etc/openvpn-csc/server1
                username-as-common-name
                plugin /usr/local/lib/openvpn/plugins/openvpn-plugin-auth-script.so /usr/local/sbin/ovpn_auth_verify_async user TG9jYWwgRGF0YWJhc2U= false server1 1195
                tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'OpenVPN+Server+Certificate' 1"
                lport 1195
                management /var/etc/openvpn/server1.sock unix
                push "route 192.168.2.0 255.255.255.0"
                push "route 192.168.1.0 255.255.255.0"
                push "dhcp-option DNS 8.8.8.8"
                push "dhcp-option DNS 4.4.4.4"
                duplicate-cn
                ca /var/etc/openvpn/server1.ca
                cert /var/etc/openvpn/server1.cert
                key /var/etc/openvpn/server1.key
                dh /etc/dh-parameters.2048
                tls-auth /var/etc/openvpn/server1.tls-auth 0
                ncp-ciphers AES-128-GCM
                persist-remote-ip
                float
                topology subnet
                ~
                ~
                ~
                ~
                ~
                ~
                ~
                ~
                
                
                1 Reply Last reply Reply Quote 0
                • M
                  marvosa
                  last edited by marvosa

                  A couple things I see:

                  • The tunnel network is being pushed out to your clients as a route to a remote network, which is incorrect. Remove "192.168.2.0/24" from the IPv4 Local network(s) line.
                  • Considering this is a routed, split-tunnel deployment, why push public DNS servers?

                  Another thing to watch out for is... in a routed solution, the LAN subnets have to be unique across both ends. So, in your situation, any client that's connecting from a LAN subnet of either 192.168.1.0/24 or 192.168.2.0/24 will break the routing to the tunnel.

                  On the server-side, ideally, you will want to move away from popular subnets used by common SOHO routers (192.168.1.0/24, 192.168.2.0/24, etc) on both the LAN and the tunnel network.

                  T 1 Reply Last reply Reply Quote 0
                  • PippinP
                    Pippin
                    last edited by

                    This post is deleted!
                    1 Reply Last reply Reply Quote 0
                    • T
                      tocheeba @marvosa
                      last edited by

                      @marvosa Thanks. I removed the DNS and removed the 192.168.2.0/24 from local network line. Connected again just fine on the client, but still can't connect to anything. The network I'm on right now is using a 10.x.x.x scheme. I'm pulling my hair out trying to figure out wtf the problem is.

                      1 Reply Last reply Reply Quote 0
                      • M
                        marvosa
                        last edited by

                        Post new screenshots of both the client's routing table when connected and PFsense.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.