Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unable to access Site B through Site to Site VPN when remote connected to Site A.

    Scheduled Pinned Locked Moved OpenVPN
    15 Posts 3 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      MWZDZ79
      last edited by

      New to pfSense, VPN configuration, and network management. I setup a site to site VPN using 2 SG-1100 gateway appliances. This was easy to establish following some tutorials on youtube. When I am at site A I can ping and access devices at site B. However when I VPN into site A I am not able to ping or reach anything at site B unless I ssh into a site A device and use it to reach site B.

      I am new to this so I am sure there are some firewall settings or other items that need to be adjusted to allow this traffic. What information can I provide so that I can get some help getting this set correctly?

      Here is a diagram of the setup.
      Network.jpg

      The second part of this is to forward some ports at site B through the VPN tunnel since I cannot forward them through the ISP.

      Ideally I would forward the port at Site A for the device at site B.

      Any help is greatly appreciated.

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @MWZDZ79
        last edited by

        @MWZotti

        What's your routing set up for? You need some route from the client to B. If you have the tunnel configured to pass all traffic through it, then it should work. If not, you may get as far a A but not further.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        1 Reply Last reply Reply Quote 0
        • M
          MWZDZ79
          last edited by

          I have a rule setup in Firewall/Rules/OpenVPN to Pass any traffic on the OpenPN interface. This rule is the same as the rule for the Site to Site rule.
          OpenVPN firewall.JPG
          OpenVPN firewall1.JPG

          If I am at A locally I can access B. It's when I remote into A that I cannot access B. I have 2 separate VPN tunnels. The first being a Peer to Peer (shared key) between A and B and the second is the Remote Access ( User Auth).

          For the Remote Access I have the IPV4 local networks as 192.168.3.0/24,192.168.2.0/24

          Is there another tunnel I need to create to pass all traffic?

          JKnottJ 1 Reply Last reply Reply Quote 0
          • V
            viragomann
            last edited by

            You have also to tell the pfSense on site B the route to the access servers tunnel network.
            To do so open the OpenVPN settings on site B and add the access servers tunnel network to the "Remote Networks".

            1 Reply Last reply Reply Quote 0
            • JKnottJ
              JKnott @MWZDZ79
              last edited by

              @MWZotti

              On the OpenVPN server page, there's a setting Redirect IPv4 Gateway, which forces all traffic through the VPN. If that is set, you should be able to reach B. If it isn't, you'll need a route to do that and also return.

              PfSense running on Qotom mini PC
              i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
              UniFi AC-Lite access point

              I haven't lost my mind. It's around here...somewhere...

              1 Reply Last reply Reply Quote 0
              • M
                MWZDZ79
                last edited by

                I am heading out there this evening and will give that a try. Would this be the 172.20.64.0/24? Since site B is a client would I be doing this at VPN/OpenVPN/Servers and modifying the client?

                OpenVPN firewall2.JPG

                V 1 Reply Last reply Reply Quote 0
                • V
                  viragomann @MWZDZ79
                  last edited by

                  @MWZotti
                  Yes, looks fine.

                  1 Reply Last reply Reply Quote 0
                  • M
                    MWZDZ79
                    last edited by

                    @viragomann Thank you. I will let you know how it turns out.

                    1 Reply Last reply Reply Quote 0
                    • M
                      MWZDZ79
                      last edited by

                      @viragomann That worked great. Thank you.

                      Is this also supposed to help with the port forwarding Site B through the VPN to Site A so they can be accessed or are there other rules I will need to apply?

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @MWZDZ79
                        last edited by

                        @MWZotti
                        When forwarding pakets through the VPN to site A, it's necessary to assign an interface to the OpenVPN instance, at least on A, but I suggest to so that on both sites.
                        Go to Interfaces > Assign, select the respective OpenVPN instance (eg. ovpnc1, ovpns2) and hit Add. Open the new interface and enable it. Enter also an appropriate description.

                        Consider that after adding the interface no traffic may flow across the VPN. You may have to assign firewall rules to the new interface to allow the traffic.

                        1 Reply Last reply Reply Quote 0
                        • M
                          MWZDZ79
                          last edited by

                          @viragomann I was able to get it working. I referenced a different thread and had to read it about 100 times to comprehend what was happening. I think I have everything set correctly and am able to port forward over the tunnel. However I don't know if one of the rules I setup really has any validity.

                          Link used for reference:
                          https://forum.netgate.com/topic/74534/a-definitive-example-driven-openvpn-reference-thread

                          Site B I changed the open VPN rules to the following:

                          OpenVPN firewall3.JPG

                          And changed the OVPNC1 firewall rule to pass any traffic.
                          I don't know if the rule I have set for source on OpenVPN tab for 192.168.3.0/24 actually does anything? Like I said I had a hard time following the guide in that thread, but was able to port forwarding through the tunnel from site B to site A to work.

                          V 1 Reply Last reply Reply Quote 0
                          • M
                            MWZDZ79
                            last edited by

                            @izak01 All traffic appears to be flowing at this time. I can reach both devices while VPN'd into Site A. Devices at Site A can Ping and access site B. Devices at site B can do the same to site A. And ports are forwarded at site A that reach and display info from site B.

                            Is there something I am missing?

                            1 Reply Last reply Reply Quote 0
                            • V
                              viragomann @MWZDZ79
                              last edited by

                              @MWZotti
                              Congratulations!
                              However, the first rule of the shown tab is useless. It allows access from LAN in site A to the OpenVPN tunnel (transit) network. There is no need to for that.
                              As you can see in the States column, no packet hit that rule.

                              For your info: "OpenVPN" is an interface group including any OpenVPN instance (servers and clients) you are running on that machine. So it includes OVPNC1 as well.
                              Rules on an interface group have a higher prio than a rule on a member tab.

                              1 Reply Last reply Reply Quote 0
                              • M
                                MWZDZ79
                                last edited by

                                @viragomann Thank you again. I will remove the first rule since it is not needed.

                                1 Reply Last reply Reply Quote 0
                                • M
                                  MWZDZ79
                                  last edited by

                                  I must say using these SG-1100's and pfSense was way easier than when I tried to do it using another vendors firewalls. Thank you again community for your help.

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.