Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    openVPN different sites same WAN IPs (tricky homeBrew)

    Scheduled Pinned Locked Moved OpenVPN
    14 Posts 4 Posters 910 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • RicoR
      Rico LAYER 8 Rebel Alliance
      last edited by

      From your drawing 10.0.0.0/24 looks more like a transfer network and not the WAN IP. The WAN IP would be the red circle.
      noplan_WAN.png
      As long as you have one site with a Internet routable IP address you can run a hub-and-spoke OpenVPN, for full mesh you need all Sites with a routable IP address.

      -Rico

      noplanN 1 Reply Last reply Reply Quote 1
      • noplanN
        noplan @Rico
        last edited by

        @Rico

        i thought that i have to put more info in the grap ... here we go

        b7f2dfd2-7e04-44a2-94b4-73f12cb48f11-grafik.png

        each Modem gets a IP from the ISP
        purple ... 62.116.x.y
        yellow ... 91.113.x.y
        green ... 194.96.x.y

        those IPs are gonna change every 8 hours (therefore the dyndns accoounts)
        the pfS box is connected to the modem and receives the 10.0.0.100 (this Range is not changeable, yes it might be possible to get something like purpe .. 10.0.0.10 yellow 10.0.0.20 green 10.0.0.30)

        If I'm gettin you right, as log as my openVPN IP adress Range is differnt for each color (purple yellow green) i wont run into any problems ?

        br NP

        JeGrJ 1 Reply Last reply Reply Quote 1
        • JeGrJ
          JeGr LAYER 8 Moderator
          last edited by

          @noplan said in openVPN different sites same WAN IPs (tricky homeBrew):

          LAN and openVPN IP Ranges can be set at will :)
          ...
          The goal is to connect all 3 purple / yellow / green with eacht other.
          ...
          dyndns and an port forwarding for openVPN is working and supported by the ISP (and working afaik)

          Those 3 statements are normally all you need to have. So to recap that:

          1. WAN IPs are private and set to a 10/8 subnet
          2. LAN can be defined (by you?) so to NOT overlap with each other
          3. OpenVPN is reachable via internet in all 3 locations(?) via port forwarding

          So if you can connect via OpenVPN to all 3 locations correctly AND can define the LANs as per your plan (I'd suggest using more space in between like 192.168.10/20/30.x but OK), that's all you need.

          As long as the 3 pfSense instances can connect to each other in any way you want (star, hub/spoke, any2any...) via a tunnel setup, I see no problem in connecting the 3 locations. As they only communicate via their LAN IP ranges and they are separated from each other, the routing should be fine. And if you set up the ranges more along the CIDR ranges, you can even simplify your routing via OpenVPN further.

          But to give an example: Site A would reach Site B and C via routes 192.168.2.x/24 (ovpns2) and 192.168.3.x/24 (ovpns3) given that both are connected via a site2site tunnel to A. WAN and WAN IP is only interesting in Site2Site tunnel setup but there you'd only have to use the "server" site (e.g. Site A) and perhaps if you'd want direct comms from B to C another tunnel between them.

          Just a small hint at last: use the site with the biggest bandwith as "main site"/server site. If you don't have one really bigger site, take one with static IP. Makes Client->Server site2site VPN setup easier then relying on DynDNS.

          Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

          1 Reply Last reply Reply Quote 0
          • RicoR
            Rico LAYER 8 Rebel Alliance
            last edited by Rico

            Don't put any hosts in one of the 10.0.0.0/24 networks and you'll be fine.

            @noplan said in openVPN different sites same WAN IPs (tricky homeBrew):

            those IPs are gonna change every 8 hours

            Nasty stuff, means the pipe goes down during working hours?!

            -Rico

            1 Reply Last reply Reply Quote 1
            • JeGrJ
              JeGr LAYER 8 Moderator @noplan
              last edited by

              @noplan said in openVPN different sites same WAN IPs (tricky homeBrew):

              those IPs are gonna change every 8 hours (therefore the dyndns accoounts)

              WTF? That's against any regulation I'm aware of.

              Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

              If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

              1 Reply Last reply Reply Quote 1
              • RicoR
                Rico LAYER 8 Rebel Alliance
                last edited by

                evilest.jpg

                -Rico

                noplanN 1 Reply Last reply Reply Quote 1
                • noplanN
                  noplan @Rico
                  last edited by

                  @Rico @JeGr

                  8 hours yes i dont know why but thats what the log files say
                  i hope its not worse and configured als on demand connect ... oh boy we got some crazy stuff here ;)

                  when the pipe goes down there will be the next issuse how to bring the tunnel up again
                  (watchdog ? )

                  there is no other way than dyndns (at the moment)

                  as far as i got the memo the 10.0.0.0/24 network is only used by the Provider Modem and the WAN interface of the pfS box.

                  i'll give it a try tomorrow to set up openVPN Server on each color ;)
                  not thinkin thaht this will be fun ;)

                  1 Reply Last reply Reply Quote 0
                  • RicoR
                    Rico LAYER 8 Rebel Alliance
                    last edited by

                    OpenVPN tries to (re)connect infinite by default.

                    -Rico

                    noplanN 1 Reply Last reply Reply Quote 0
                    • noplanN
                      noplan @Rico
                      last edited by

                      @Rico
                      oh yesss ... thanks

                      1 Reply Last reply Reply Quote 0
                      • RicoR
                        Rico LAYER 8 Rebel Alliance
                        last edited by

                        You need to take care about the DynDNS to update the IPs as fast as possible then.

                        -Rico

                        noplanN 1 Reply Last reply Reply Quote 0
                        • noplanN
                          noplan @Rico
                          last edited by

                          @Rico

                          yes that will be a challenge,
                          i'm not sure whats a better way to go get a goDaddy DynDns or use dynDns pro account

                          i dont like this setup, these 8 hours .... SO NOT COOL !

                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate
                            last edited by jimp

                            As long as you can do DynDNS to the "real" address it's probably fine. Though depending on your budget and throughput needs it might be more stable if you had a hosted/DC/cloud/whatever type server with a static address and then all these dynamic clients connect to that. Then their address changes wouldn't matter. They'd timeout and reconnect in 60s and that's that.

                            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            noplanN 1 Reply Last reply Reply Quote 1
                            • noplanN
                              noplan @jimp
                              last edited by

                              @jimp

                              yes i can get dyndns working with the real IP assigned by the ISP

                              so something like this

                              purple ... 62.116.x.y ... dyndns1.dyndns.org
                              yellow ... 91.113.x.y ... dyndns2.dyndns.org
                              green ... 194.96.x.y ... dyndns3.dyndns.org

                              the budget in COVID times is slim to n00thing

                              thx for the hint with the static IP gonna look into it.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.