Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN Server and Client at the same time

    OpenVPN
    2
    21
    6.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      chulio
      last edited by

      Hi viragoman,

      Thanks a lot for your answer.

      1. Yesterday I created the interfaces for the two OpenVPN Servers,
        as I had seen your answer in a similar thread.
      • there was no IP address for the OpenVPN Servers like for the WAN or VPN Client Gateways
      • should I have rebooted or restarted the service ?
        And from this point on I was a bit lost…
      1. I created an Outbound FW NAT for the two OpenVPN Gateways
      • source = network (CIDR)
      • NAT address = WAN (ISP)
      1. Under FW Rules and the respective OpenVPN Server tab
      • interface = WAN
      • protocal = any
      • source = network (CIDR) of the OpenVPN Server
      • destination = LAN net
      • Gateway = default
      1. Under FW Rules and the respective OpenVPN Server tab (after 3)
      • interface = WAN
      • protocal = any
      • source = any
      • destination = any
      • Gateway = WAN (ISP)

      And it did not work, no internet, no LAN access.
      Should I have rebooted ?
      I know I messed something up, the rules did not seem logical to me.
      (I'm still confused by the FW Rule in the OpenVPN tab where I had to enter the VPN Client Gateway.)

      Many thanks in advance !

      1 Reply Last reply Reply Quote 0
      • V
        viragomann
        last edited by

        Yes, rebooting could solve some issues.

        It'll be more clearly if you post screenshots from your settings instead describing the rules.

        @chulio:

        I know I messed something up, the rules did not seem logical to me.
        (I'm still confused by the FW Rule in the OpenVPN tab where I had to enter the VPN Client Gateway.)

        I absolutely agree.

        1. In the outbound NAT rule for the VPN client the interface should be the VPN client interface and translation address should be "interface address".

        3 + 4) The firewall rules for allowing access from VPN clients connected to your server has to be added to the VPN servers interface, not to WAN.

        1 Reply Last reply Reply Quote 0
        • C
          chulio
          last edited by

          Hi viragomann,

          Thanks a lot for your help.

          I gave my best and this is the current configuration (see screenshots).
          The situation is still the same as I did not really change something, except that rebooting "created" IP addresses to the two OpenVPN Servers
          a) OpenVPN Client works
          b) OpenVPN Servers: internet access works, no LAN access

          Now I guess my firewall settings are wrong…

          Many thanks in advance !

          I added the following screenshots:

          1. Dashboard Interfaces
          2. System Routing
          3. Interfaces
          4. NAT Outbound
          5. NAT Outbound VPN Client
          6. FW Rules OpenVPN TCP Server (3 images)
          7. FW Rule VPN Client
          8. FW Rule "OpenVPN"
          9. OpenVPN Server Settings (2 images)
          10. VPN Client (2 images)

          Dashboard_Interfaces.png
          Dashboard_Interfaces.png_thumb
          Routing.png
          Routing.png_thumb
          Interfaces.png
          Interfaces.png_thumb
          NAT_Outbound.png
          NAT_Outbound.png_thumb
          NAT_Outbound_VPNClient.png
          NAT_Outbound_VPNClient.png_thumb
          FW_Rule_oVPNTCP.png
          FW_Rule_oVPNTCP.png_thumb
          FW_Rule_oVPNTCP_Edit.png
          FW_Rule_oVPNTCP_Edit.png_thumb
          FW_Rule_oVPNTCP_Edit_GW.png
          FW_Rule_oVPNTCP_Edit_GW.png_thumb
          FW_Rule_eVPNUDP.png
          FW_Rule_eVPNUDP.png_thumb
          FW_Rule_OpenVPN.png
          FW_Rule_OpenVPN.png_thumb
          oVPNTCP_Edit_1.png
          oVPNTCP_Edit_1.png_thumb
          oVPNTCP_Edit_2.png
          oVPNTCP_Edit_2.png_thumb
          VPNClient_2.png
          VPNClient_2.png_thumb
          VPNClient_4.png
          VPNClient_4.png_thumb

          1 Reply Last reply Reply Quote 0
          • V
            viragomann
            last edited by

            Why do you hide your internal RFC 1918 networks? Nobody can access these from outside albeit he knows your IPs. These networks are not routed in the internet.

            @chulio:

            • Some LAN devices could then be accessed but many others not. Without the whole OpenVPN Client settings it worked seamlessly,

            Seems that tunnel subnets or remote client networks are overlapping with LAN. You have 4 internal interface, presumable with 4 subnets. Are the unreachable hosts in a certain subnet or spread over different subnets?
            To get this straight it's necessary to know your interface setup (Status > Interfaces) and the VPN tunnel subnets without hiding IPs and mask, just WAN could obscured, the only one which makes sense for you.

            Another point, not the issue here: You should delete the allow rule on VPN client interface, if this connection is just for upstreaming, as I understand it.

            1 Reply Last reply Reply Quote 0
            • C
              chulio
              last edited by

              Hi viragomann,

              Yes, sorry, please find the screenshot of Status -> Interfaces attached.
              It seems the 10.16.XX.XX subnet is created automatically.
              Optional, just curious: Could I use these IPs somehow or are they just for NAT?

              I need just access to some hosts in the LAN net when connecting to the OpenVPN Servers.
              The other subnets should not be reachable, intentionally.

              A question to "Another point, not the issue here:" Are you referring to the rule in 7) FW Rule VPN Client ?

              Many thanks in advance !

              Status_Interfaces_1.png
              Status_Interfaces_1.png_thumb
              Status_Interfaces_2.png
              Status_Interfaces_2.png_thumb
              Status_Interfaces_3.png
              Status_Interfaces_3.png_thumb

              1 Reply Last reply Reply Quote 0
              • V
                viragomann
                last edited by

                @chulio:

                It seems the 10.16.XX.XX subnet is created automatically.
                Optional, just curious: Could I use these IPs somehow or are they just for NAT?

                This is the VPN clients IP, you get this from the VPN server.
                You can only use it by its variable (clients interface address), cause it's dynamic.

                @chulio:

                I need just access to some hosts in the LAN net when connecting to the OpenVPN Servers.
                The other subnets should not be reachable, intentionally.

                I can't see any cause for the issue here.
                Can you rule out that the LAN subnet overlaps with the VPN servers clients LAN?

                Do also want access the internet over the VPN from your clients? If you don't want this, uncheck "redirect gateway" in the Server settings and enter your LAN subnet in the "Local Networks" box instead.
                However, preventing access to other subnets have to be done later by firewall rules.

                @chulio:

                A question to "Another point, not the issue here:" Are you referring to the rule in 7) FW Rule VPN Client ?

                Yes, this rule allow access from the OpenVPN server site your client is connected to. I don't think that is what you want.

                1 Reply Last reply Reply Quote 0
                • C
                  chulio
                  last edited by

                  Thanks a lot for your answer.
                  Now I understand what dynamic means in terms of address "settings".

                  VPN Servers, I'm not sure if I understood your question. Maybe this answers (Status Interfaces):

                  • The VPN Servers network address range is different to the LAN address range.
                  • The VPN Servers' IPv4 tunnel networks set are also correctly mapped in System->Routing.
                  • Yes, I want to redirect via the OpenVPN Servers all corresponding VPN clients to the internet, as well as get acces to the LAN network.

                  It's good to know that in fact I don't want anybody from ExpressVPN to access my network :)
                  Should (can) I remove the rule completely or should I change from source=any to destination=any to something more useful ?

                  I'm also confused, that the OpenVPN Servers don't work correctly anymore after having installed the ExpressVPN Client. The FW Rule for the OpenVPN tab seems to be key in order that the ExpressVPN Client works, i.e. where I set to Gateway=ExpressVPN. This rule seems to mess up the OpenVPN Servers ?
                  Therefore I'm looking for a better solution to make the OpenVPN Servers work again as they did before :(

                  Many thanks in advance !

                  1 Reply Last reply Reply Quote 0
                  • V
                    viragomann
                    last edited by

                    Hi,

                    above you mentioned that you can access some hosts over VPN but not all. This could be an indication that your server side LAN overlaps the client side LAN. So you should check if this is the case here.

                    If you don't want to grant access from the ExpressVPN subnet you do not need any firewall rule at this tab.
                    Also you should delete all rule on OpenVPN tab, since you have now the rules on the appropriate interface.

                    Basically in pfSense firewall rules have to be added to that interface where the traffic comes in. So for instance if you want your LAN users to go out to ExpressVPN you have to add rule allowing this to the LAN interface only.

                    Please post the interface settings of your OpenVPN servers from the interfaces menu. Maybe there is something wrong.

                    1 Reply Last reply Reply Quote 0
                    • C
                      chulio
                      last edited by

                      Hi viragomann,

                      At the moment I cannot access hosts over the VPN Servers. I tried once adding a rule and it did not work correctly.

                      I turned off all FW Rules in the OpenVPN tab. Now I cannot connect to the OpenVPN Servers from the internet.

                      • Please find attached the OpenVPN TCP Server (OpenVPN UDP Server is identical) from the interface menu.
                      • As well I attached the FW Rules for WAN, whereas the two OpenVPN rules at the lower end were created automatically from the OpenVPN Wizard. Maybe they're not needed anymore as we use OpenVPN Server Gateways now ?

                      Many thanks in advance !

                      Interfaces_OpenVPNTCPServer.png
                      Interfaces_OpenVPNTCPServer.png_thumb
                      FW_Rule_WAN.png
                      FW_Rule_WAN.png_thumb

                      1 Reply Last reply Reply Quote 0
                      • C
                        chulio
                        last edited by

                        And here also the FW Rules for LAN, attached.
                        Without the third rule I get no internet access from the LAN.

                        FW_Rule_LAN.png
                        FW_Rule_LAN.png_thumb

                        1 Reply Last reply Reply Quote 0
                        • V
                          viragomann
                          last edited by

                          @chulio:

                          Without the third rule I get no internet access from the LAN.

                          If you want to direct traffic from LAN over ExpressVPN you have to change the gateway here to ExpressVPNUDP_VPN4.

                          This matter gave me another input. You will get the default route pushed from the VPN provider. This has to be prevented in your case.
                          To do so go to the VPN client settings and check "Don't pull routes". This should solve the issue with the VPN servers.

                          1 Reply Last reply Reply Quote 0
                          • C
                            chulio
                            last edited by

                            Hi viragomann,

                            I'm using individual hosts in the "VPN Client UDP" alias,
                            i.e. specific IP addresses on the GOST net,
                            to go over ExpressVPN to the internet. (see attachment)
                            All other subnets are not allowed to use ExpressVPN, which I redirected to WAN ISP (see previous post with FW Rule LAN attachment).

                            On the other hand I need to access the LAN over the OpenVPN Servers when I'm not at home,
                            i.e. the LAN hosts shall not have access to the ExpressVPN Gateway.

                            I added the Don't pull routes to the OpenVPN Client (ExpressVPN) and now I can connect again to the OpenVPN Servers ! I can access again a few hosts on LAN ! Unfortunately not all and it's extremely slow (compared to what I was used to).
                            We're getting closer :) Thanks a lot !

                            I'm wondering what it could be which blocks a few hosts but others not and being at the same time very slow.

                            Many thanks in advance !

                            FW_Rule_GOST_ExpressVPN.png
                            FW_Rule_GOST_ExpressVPN.png_thumb

                            1 Reply Last reply Reply Quote 0
                            • C
                              chulio
                              last edited by

                              Is it possible that pfBlockerNG is slowing down something ?

                              1 Reply Last reply Reply Quote 0
                              • V
                                viragomann
                                last edited by

                                No, pfBockerNG just sets filter rules which is the basically job of pfSense.

                                Why do you use TCP for VPN connection. UDP will be considerably faster.

                                Are the host you cant reach over VPN all in LAN subnet? Have allready asked this, but no answer.

                                1 Reply Last reply Reply Quote 0
                                • C
                                  chulio
                                  last edited by

                                  Hi,

                                  Ah ok thanks.

                                  I use TCP 443 because it's typically not blocked, and UDP for streaming (faster as you said :) ).

                                  Yes exactly all host I need to reach via OpenVPN Servers are in the LAN subnet, all other subnets such as GOST, VOIP or GAME are not of interest to be reached from the internet via the OpenVPN Servers intentionally.

                                  As mentioned I can reach only a few hosts on LAN and pretty slow. Some other hosts on the LAN are not reachable at all, which confuses me. Something in my FW Rules or NAT is strange and may cause this strange behaviour. The CPU is an overkill, shouldn't be an issue (i5 quad core).

                                  As you recommended I turned off the

                                  • FW Rule in ExpressVPNClient tab as well as
                                  • all FW Rules in the OpenVPN tab
                                    I attached my current screenshots, I think I missed something you recommended me to set (in the NAT or Rules part?)…

                                  Many thanks in advance.

                                  System_Routing.png
                                  System_Routing.png_thumb
                                  FW_NAT_oVPNs1s2c1.png
                                  FW_NAT_oVPNs1s2c1.png_thumb
                                  FW_NAT_LAN_and_VLAN.png
                                  FW_NAT_LAN_and_VLAN.png_thumb
                                  FW_Rules_WAN.png
                                  FW_Rules_WAN.png_thumb
                                  FW_Rules_ExpressVPNClient.png
                                  FW_Rules_ExpressVPNClient.png_thumb
                                  FW_Rules_oVPNs1.png
                                  FW_Rules_oVPNs1.png_thumb
                                  FW_Rules_OpenVPN.png
                                  FW_Rules_OpenVPN.png_thumb

                                  1 Reply Last reply Reply Quote 0
                                  • C
                                    chulio
                                    last edited by

                                    How about the FW traffic shaper which I set up prior setting up all the VPN Servers and Client.
                                    Is it possible that this causes some "blocking" ?

                                    Many thanks in advance!

                                    1 Reply Last reply Reply Quote 0
                                    • C
                                      chulio
                                      last edited by

                                      Hi viragomann,

                                      Thanks to your help everything is working now !
                                      The screenshot I posted actually work.

                                      1. I found an issue with some LAN hosts … which had nothing to do with pfSense, I had changed something in their firewalls... shame on me !
                                      2. And it seems that mobile providers started closing some ports.

                                      Many thanks for your help  :) :) :)

                                      Now I have a last question :)
                                      I read about DNS leaks while using VPN providers, I'm not doing anything illegal, but I was wondering if this can be set to work correctly.
                                      Do these occur with pfSense or could we avoid or minimize DNS leaks when attributing specific DNS servers to the VPN client ?
                                      (And if yes, how can we do this in pfSense without altering the DNS servers used for the WAN ISP?)

                                      Many thanks in advance !

                                      1 Reply Last reply Reply Quote 0
                                      • V
                                        viragomann
                                        last edited by

                                        Fine that it's working.

                                        To avoid DNS leaks set your VPN clients to use an external DNS. So the request will be directed over the VPN and gets your ExpressVPN address.

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          chulio
                                          last edited by

                                          Hi viragomann,

                                          Thanks for your reply.

                                          It works, there are no DNS leaks anymore :) !

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.