• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

RDP through (open)VPN Problem

Scheduled Pinned Locked Moved OpenVPN
9 Posts 2 Posters 756 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D
    dabbelju007
    last edited by Feb 9, 2021, 1:09 PM

    Hi all,

    I am wondering if someone had the same situation and has a hint for me what to do.

    Scenario:

    • OpenVPN on pfSense Appliance (2.4.5) configured and working.
    • Users are connecting from Windows PCs (Windows7,8 10) to openVPN Server using openVPN Client for windows.
    • openVPN "LAN" is a seperated subnet. From there I have a natted IP which allows RDP into my Office LAN to my Terminal Server (Windows 2008 R2). And yes I know it is out of everything but I still need to use it for a while.
    • It works as expected. User opens VPN connection and opens RDP to the natted IP.

    With two of my users I have a problem (one is running Win 10 Pro the other Win 7). They can not connect via RDP to the server.

    What did I do:

    • I did check FW rules, NAT settings. whatever.
    • I did check FW logs and state logs.
    • I can not see any difference.
    • No FW, Antivirus or whatever on the local PCs.
    • When I send the natted IP to another machine in my Office LAN (Windows 10) it works without changing anything on client side.

    Any ideas?

    thanks and best regards
    Dabbelju

    J 1 Reply Last reply Feb 9, 2021, 2:15 PM Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator @dabbelju007
      last edited by Feb 9, 2021, 2:15 PM

      Ok want to make sure we are on the same page here.. When you say natted IP, you mean just the rfc1918 address.. Lets say this 2k8r2 server is 192.168.0.100

      So with a remote vpn client connecting to your pfsense vpn server you would have say this

      Client (10.0.8.X) -- tunnel network 10.0.8/24 -- pfsense - 192.168.0/24 - server (192.168.0.100)

      Couple gotchas with remote vpn... If the remote client is using the same local network as you, say 192.168.0/24 then yeah you could have issues connecting to devices on your 192.168.0 network. For sure if they for example using the same 192.168.0.x address as the server they are trying to talk to..

      If you are going to have remote clients coming from all kinds of different networks, say hot spots like starbucks or mcdonalds, their homes, etc. You have no idea what network they might be using where they are at.

      So its good practice if your going to support remote vpn users, to try and use as least common rfc1918 network on your side as possible.. 172.27.13/24 for example..

      Same goes for your tunnel network.. If you are using 10.0.8/24 which I believe is the default - if your remote users local network is 10.0.8 or something that overlaps say 10/8 which have seen.. Then yes you could have problems with these users connecting. So use as well a non common tunnel network.

      Another gotcha is firewall on the server your wanting to rdp too. Does it allow your tunnel network.. Since your saying other devices are working fine. This prob not the case - but it a common mistake made.

      RDP can sometimes be finicky on version, using udp or not.. So yeah its possible sometimes for specific clients having issues talking to specific servers depending on the version of rdp client used and settings both on the client or the server.

      I would get the specifics of the clients network, look to see what vpn tunnel IP they are getting when they vpn in. What version of rdp client they are using, what are the settings for connection..

      You sure your just not running into a license issue - unless you have terminal services installed, only 2 concurrent connections could be made to your server, etc.

      What specific error are the clients getting? Can they ping the IP? Do a traceroute and make sure its going through the tunnel for the IP of the server.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • D
        dabbelju007
        last edited by dabbelju007 Feb 10, 2021, 10:47 AM Feb 10, 2021, 10:36 AM

        @johnpoz

        Thanks for your detailed reply.

        yes, I am using RFC1918 addresses and I did make sure that the local IP networks @my clients side are not the same as I use for the tunneling network or any other network inlcuded in my scenario.

        Here a bit more details from my end:

        IPv4 Tunnel Network: 172.29.112.0/24
        OfficeLAN: 10.203.112.0/23

        "natted IP": virtual IP on pfSense 172.29.112.210. NAT from Port 42168 to internal 10.203.112.122:3389 (2k8 Server). According FW Rule is set up.

        My remote clients are employees from our company working from home. All of them have the classic DSL or similar router setup at home.

        When VPN connection on client side is up only traffic to 172.29.112.0/24 is routed into the tunnel. Everything else goes out the normal way cause I do not want this traffic in my Network.

        I have about 20 clients connected to the openvpn server getting IP adresses from IPv4 Tunnel network. 18 of them can use RDP to 172.29.112.210:42168, 2 can not.

        Licensing problem on TS is checked and it is no problem.

        Then I started to check local things on the client PCs like FW, Antivirus, whatever. This is not the problem.

        The funny thing is: If I do the same thing but with an public IP natted to the internal TS win2k8 without using a VPN tunnel Server it works.

        And: If I do the same thing to lets say a Win10 client, it works too.

        So the problem must have something to do with RDP over VPN to Win2k8/Win7.

        J 1 Reply Last reply Feb 10, 2021, 10:50 AM Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator @dabbelju007
          last edited by johnpoz Feb 10, 2021, 10:51 AM Feb 10, 2021, 10:50 AM

          @dabbelju007 said in RDP through (open)VPN Problem:

          "natted IP": virtual IP on pfSense 172.29.112.210. NAT from Port 42168 to internal 10.203.112.122:3389 (2k8 Server). According FW Rule is set up.

          Why would you do that?

          They should just access the 10.203.112.122, there is no reason to nat this at all.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          D 1 Reply Last reply Feb 10, 2021, 10:55 AM Reply Quote 0
          • D
            dabbelju007 @johnpoz
            last edited by Feb 10, 2021, 10:55 AM

            @johnpoz

            I do this, because I do not want to route traffic to my 10.203.112.0/23 Network in the tunnel. The next reason is, that the IP of my TS will change in a while. Then I only need to change the NAT rule.

            J 1 Reply Last reply Feb 10, 2021, 11:01 AM Reply Quote 0
            • J
              johnpoz LAYER 8 Global Moderator @dabbelju007
              last edited by Feb 10, 2021, 11:01 AM

              Well I would sniff the traffic, also checking there are no conflicting states with that vip and port, etc.

              Does traffic hit your vip to that port, does pfsense send it on to 10.203.112.122:3389

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              D 1 Reply Last reply Feb 10, 2021, 11:18 AM Reply Quote 0
              • D
                dabbelju007 @johnpoz
                last edited by Feb 10, 2021, 11:18 AM

                @johnpoz

                I did. I took trcaes at pfSense and at the same time at TS.

                • If do see the traffic hitting my TS.
                • I see the entry in the pfSense FW log (logging for the rule is enabled)
                • I see an established connection state in the pfSense logs
                • It asks me for Username and Password. If I do enter a wrong combination it rejectes me.
                • If I do enter valid credentials is says: "Configuring remote session" and the it takes a while till the error message comes "An error occured".
                J 1 Reply Last reply Feb 10, 2021, 12:57 PM Reply Quote 0
                • J
                  johnpoz LAYER 8 Global Moderator @dabbelju007
                  last edited by Feb 10, 2021, 12:57 PM

                  Well that has ZERO to do with pfsense.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  D 1 Reply Last reply Feb 10, 2021, 1:11 PM Reply Quote 0
                  • D
                    dabbelju007 @johnpoz
                    last edited by Feb 10, 2021, 1:11 PM

                    @johnpoz

                    True. I never said that it has something to do with pfsense. But I found the problem and perhaps it might be interesting for others.

                    I dig a bit further and I did figure out that it has to do with the MTU Size of the packets in connection with certain providers.

                    How did I come up with it?
                    Yesterday I did configure one Notebook here in the office with openVPN and rdp connection. I did use our Guest lan to test it.

                    openVPN => works
                    RDP => works

                    Today the Notebook is at home and I have the described problem.

                    So I did start playing arround with ping MTU size (option -l) and did figure out that I can get a reply with packet size 1471 but not anymore with 1472.

                    I did use the custom option in openVPN server config and did try it with tun-mtu 1300; and it works!

                    I will now try to figure out what the best MTU size is.

                    thanks a lot for your help, always usefull to me!

                    1 Reply Last reply Reply Quote 0
                    9 out of 9
                    • First post
                      9/9
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                      This community forum collects and processes your personal information.
                      consent.not_received