Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Remote client cannot access internal network

    Scheduled Pinned Locked Moved OpenVPN
    12 Posts 3 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      marvosa @warnerthuis
      last edited by

      @warnerthuis
      Post your server1.conf (/var/etc/openvpn)

      W 1 Reply Last reply Reply Quote 0
      • W
        warnerthuis @viragomann
        last edited by

        @viragomann Yes, tried with different clients.
        I even removed the OpenVPN service entry from the server and with the
        Wizard created a completely new one. I use 2.5 on the client.
        Yes, it is the default gateway although it it not running DHCP.
        Internal network is 192.168.0.0/21
        If a client is connected there is no internetconnection anymore.
        That is restored the moment the connection is broken.
        route print on the client gives this:

        Interface List
        19...00 ff f1 98 69 09 ......TAP-Windows Adapter V9
        14...........................Wintun Userspace Tunnel
        8...d0 27 88 19 99 03 ......Realtek PCIe GbE Family Controller #2
        1...........................Software Loopback Interface 1

        IPv4 Route Table

        Active Routes:
        Network Destination Netmask Gateway Interface Metric
        0.0.0.0 0.0.0.0 192.168.1.1 192.168.3.105 25
        10.76.99.0 255.255.255.0 172.31.24.1 172.31.24.2 259
        127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
        127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
        127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
        172.31.24.0 255.255.255.224 On-link 172.31.24.2 259
        172.31.24.2 255.255.255.255 On-link 172.31.24.2 259
        172.31.24.31 255.255.255.255 On-link 172.31.24.2 259
        192.168.0.0 255.255.248.0 On-link 192.168.3.105 281
        192.168.0.0 255.255.248.0 172.31.24.1 172.31.24.2 259
        192.168.3.105 255.255.255.255 On-link 192.168.3.105 281
        192.168.7.255 255.255.255.255 On-link 192.168.3.105 281
        224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
        224.0.0.0 240.0.0.0 On-link 192.168.3.105 281
        224.0.0.0 240.0.0.0 On-link 172.31.24.2 259
        255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
        255.255.255.255 255.255.255.255 On-link 192.168.3.105 281
        255.255.255.255 255.255.255.255 On-link 172.31.24.2 259

        Persistent Routes:
        None

        IPv6 Route Table

        Active Routes:
        If Metric Network Destination Gateway
        1 331 ::1/128 On-link
        8 281 fe80::/64 On-link
        19 259 fe80::/64 On-link
        19 259 fe80::c8c1:b4eb:ac3d:11b9/128
        On-link
        8 281 fe80::f582:d662:f994:5e88/128
        On-link
        1 331 ff00::/8 On-link
        8 281 ff00::/8 On-link
        19 259 ff00::/8 On-link

        Persistent Routes:
        None

        V 1 Reply Last reply Reply Quote 0
        • W
          warnerthuis @marvosa
          last edited by

          @marvosa server1.conf:
          dev ovpns1
          dev-type tun
          dev-node /dev/tun1
          writepid /var/run/openvpn_server1.pid
          #user nobody
          #group nobody
          script-security 3
          daemon
          keepalive 10 60
          ping-timer-rem
          persist-tun
          persist-key
          proto udp4
          cipher AES-256-CBC
          auth SHA256
          up /usr/local/sbin/ovpn-linkup
          down /usr/local/sbin/ovpn-linkdown
          client-connect /usr/local/sbin/openvpn.attributes.sh
          client-disconnect /usr/local/sbin/openvpn.attributes.sh
          local 92.65.253.75
          tls-server
          server 172.31.24.0 255.255.255.224
          client-config-dir /var/etc/openvpn-csc/server1
          username-as-common-name
          plugin /usr/local/lib/openvpn/plugins/openvpn-plugin-auth-script.so /usr/local/sbin/ovpn_auth_verify_async user TG9jYWwgRGF0YWJhc2U= false server1 1194
          tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'WerkWentSC' 1"
          lport 1194
          management /var/etc/openvpn/server1.sock unix
          max-clients 3
          push "route 192.168.0.0 255.255.248.0"
          push "route 10.76.99.0 255.255.255.0"
          push "dhcp-option DOMAIN werkwent.org"
          push "dhcp-option DNS 192.168.0.101"
          push "dhcp-option DNS 192.168.0.100"
          push "dhcp-option DNS 8.8.8.8"
          push "dhcp-option DNS 8.8.4.4"
          client-to-client
          ca /var/etc/openvpn/server1.ca
          cert /var/etc/openvpn/server1.cert
          key /var/etc/openvpn/server1.key
          dh /etc/dh-parameters.2048
          tls-auth /var/etc/openvpn/server1.tls-auth 0
          persist-remote-ip
          float
          topology subnet

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @warnerthuis
            last edited by

            @warnerthuis said in Remote client cannot access internal network:

            192.168.0.0/21

            Your client and server side networks are overlapping. You have 192.168.0.0/21 at both sites.
            So the client is not able to route this network over the VPN.

            1 Reply Last reply Reply Quote 0
            • W
              warnerthuis
              last edited by warnerthuis

              Sorry, I used the wrong setup.
              First I have to mention that I deleted the whole setup on the pfSense and created a new one with the wizard.
              Now I started a machine without network.
              Connected it to my phone with USB tethering.
              I can ping 8.8.8.8 (of course) but not our server 192.168.0.101.
              And the icon on the pc changes from connected to no internet available.
              On the pc the route print gives the following:

              ===========================================================================
              Interface List
              8...d0 27 88 19 99 03 ......Realtek PCIe GbE Family Controller #2
              14...........................Wintun Userspace Tunnel
              31...5e 70 3b bc 8c 70 ......Remote NDIS Compatible Device
              19...00 ff f1 98 69 09 ......TAP-Windows Adapter V9
              1...........................Software Loopback Interface 1

              IPv4 Route Table

              Active Routes:
              Network Destination Netmask Gateway Interface Metric
              0.0.0.0 0.0.0.0 192.168.42.129 192.168.42.114 25
              127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
              127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
              127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
              192.168.42.0 255.255.255.0 On-link 192.168.42.114 281
              192.168.42.114 255.255.255.255 On-link 192.168.42.114 281
              192.168.42.255 255.255.255.255 On-link 192.168.42.114 281
              224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
              224.0.0.0 240.0.0.0 On-link 192.168.42.114 281
              255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
              255.255.255.255 255.255.255.255 On-link 192.168.42.114 281

              Persistent Routes:
              None

              IPv6 Route Table

              Active Routes:
              If Metric Network Destination Gateway
              1 331 ::1/128 On-link
              31 281 fe80::/64 On-link
              31 281 fe80::c442:303d:398e:ac72/128
              On-link
              1 331 ff00::/8 On-link
              31 281 ff00::/8 On-link

              Persistent Routes:
              None
              (why does it make the font so large? I cut and paste this from Notepad)
              I still have the feeling that there is a rule missing that allows access to the 192.168.0.0 network, but all the rules are there in "Firewall"tab OpenVPN and are the same as in the pfSense firewall at my home that does work.
              But it is strange that I can from that pc login in the firewall at address 192.168.1.1.

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @warnerthuis
                last edited by

                @warnerthuis
                Now you're missing the route to the remote network. Did you change the server config?

                W 1 Reply Last reply Reply Quote 0
                • W
                  warnerthuis @viragomann
                  last edited by

                  @viragomann
                  I only changed the external address.
                  Maybe I should look in the routing setup....

                  1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @warnerthuis
                    last edited by

                    The server pushes the routes as the config shows:

                    push "route 192.168.0.0 255.255.248.0"
                    push "route 10.76.99.0 255.255.255.0"

                    But nothing of this is in the client routing table. Was the client really connected to the server, when you print the routing table?

                    If the routes are not set on the client check its OpenVPN log. It should give hints to the problem.

                    W 1 Reply Last reply Reply Quote 0
                    • W
                      warnerthuis @viragomann
                      last edited by

                      @viragomann
                      I have to wait till monday, as I cannot access the machine right now.
                      Something to do with a changed password ;-)

                      W 1 Reply Last reply Reply Quote 0
                      • W
                        warnerthuis @warnerthuis
                        last edited by warnerthuis

                        I found the problem. There was a floating rule that disabled access to the internal network. We never used floating rules, but we did have virtual networks where the rules were for and these networks were removed with the move to the new location. After disabling these rules my test works (a simple webserver with a default page and a NAT-rule to access it from outside)

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.