Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN Site-to-Site Routes

    Scheduled Pinned Locked Moved OpenVPN
    13 Posts 2 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @m4xm0rris
      last edited by

      @m4xm0rris
      The log shows your public IP. You'd better hide this.

      But there is no entry of adding routes on the client and on the server it obviously failed.

      For getting closer, please post the OpenVPN configurations of both site (with public IPs hidden) and the routing tables of both, when the VPN is down.

      1 Reply Last reply Reply Quote 0
      • M
        m4xm0rris
        last edited by

        @viragomann said in OpenVPN Site-to-Site Routes:

        ng closer, please post the OpenVPN configurations of both site

        Thanks for the heads up, have yet to consume my 3rd coffee for the day ๐Ÿ˜…

        When you say "When the VPN is down", do you mean connected but unroutable (as it is now) or after disabling the connection's daemon?

        V 1 Reply Last reply Reply Quote 0
        • V
          viragomann @m4xm0rris
          last edited by

          @m4xm0rris
          When the connection is disabled, to see the origin routing table.

          M 1 Reply Last reply Reply Quote 0
          • M
            m4xm0rris @viragomann
            last edited by

            @viragomann Any black boxes indicate the Primary Sites WAN IP, as the Secondary Site has a WAN connection on another private subnet I have not censored this. Also I may have forgotten to mention, the Primary Site also has a OpenVPN Remote Access server on 10.1.1.0/24 so you may see this on the Route table. Let me know if you need anything else ๐Ÿ˜„

            Primary Site VPN:
            Primary Site VPN Config.png

            Primary Site Routes:
            Primary Site Routes.png

            Secondary Site VPN:
            Secondary Site VPN Config.png

            Secondary Site Routes:
            Secondary Site Routes.png

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @m4xm0rris
              last edited by

              @m4xm0rris
              The subnet 10.1.60.0/24 is defined on both sites.
              On primary it is assigned to em0, the same as 10.1.50.0/24 and pfSense has the IP 10.1.60.60.
              โ”

              M 2 Replies Last reply Reply Quote 0
              • M
                m4xm0rris @viragomann
                last edited by

                @viragomann Why this is appearing as this I have no idea. There are no interfaces, nor have there ever been any assisgnmnets on the 10.1.60.0/24 network on the Primary site. Only interfaces assigned at primary are the LAN (10.1.50.0/24), an IoT VLAN (10.1.51.0/24) and a Guest VLAN (10.1.52.0/24). Can you think as to why this would be the case?

                1 Reply Last reply Reply Quote 0
                • M
                  m4xm0rris @viragomann
                  last edited by

                  @viragomann
                  I've just noticed in the Auto Rules in Outbound NAT on primary, there are listing of the 10.1.60.0/24 network. I have very little knowledge of how these work, does it help?

                  e4a420b3-9ccc-4730-b761-d793dbd20c8d-image.png

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @m4xm0rris
                    last edited by

                    @m4xm0rris
                    Its there, cause its assigned to an interface.
                    Check the virtual IPs and the interface settings.

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      m4xm0rris @viragomann
                      last edited by

                      @viragomann Well I'll admit I've rarely felt stupider than that. Indeed there was a Virtual IP setup for 10.1.60.60, think I must have created it at some weird point for some weird reason. ๐Ÿ™„
                      Having said that, I have deleted it now and restarted the OpenVPN service on both ends of the tunnel and Reset States, still the issue persists.

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        m4xm0rris @m4xm0rris
                        last edited by

                        So after deleting the Virtual IP, clearing the "IPv4 Remote Network(s)" fields on both of the OpenVPN configs and adding in Static Routes for the remote subnets, it seems this is now working and the Static Route persists between tunnel reconnects. For some reason it still doesn't seem to work without defining a Static Route for the remote subnets to route over the VPN Interface gateway, but nonetheless, it works!

                        Would have never even considered to look in the Virtual IPs, thanks for your help @viragomann ๐Ÿ‘

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.