• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

[Solved] DHCP clients on LAN do not see OpenVPN network

Scheduled Pinned Locked Moved OpenVPN
5 Posts 2 Posters 620 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F
    Falselock
    last edited by Feb 11, 2018, 5:34 AM Feb 10, 2018, 6:08 AM

    Have remote OpenVPN server. It is up and running.

    Have pfsense as main gateway for local network. There is DHCP service on pfsense LAN interface.
    Also set up OpenVPN client on my pfsense and do connect to remove OpenVPN server. It is working, no any errors in log. Even can ping remove OpenVPN network from pfsense console.

    BUT!

    My DCHP clients on LAN interface do not see OpenVPN network. That is strange, cause I expect pfsense will route traffic automatically after successful connection.
    I 100% sure problem on pfsense side, cause had the same scheme on non pfsense router and everything works as expected.

    What should I tune on pfsense to be able access remote VPN network from LAN DHCP clients?

    1 Reply Last reply Reply Quote 0
    • M
      marvosa
      last edited by Feb 10, 2018, 2:49 PM

      Are you seeing blocks in the logs?  Would need to see the config on both sides to offer any targetted help.  Post the server1.conf from the server and the client1.conf from the client.

      1 Reply Last reply Reply Quote 0
      • F
        Falselock
        last edited by Feb 10, 2018, 5:19 PM

        @marvosa:

        Are you seeing blocks in the logs?  Would need to see the config on both sides to offer any targetted help.  Post the server1.conf from the server and the client1.conf from the client.

        No any blocks.

        Client side

        
        dev ovpnc1
        verb 3
        dev-type tun
        dev-node /dev/tun1
        writepid /var/run/openvpn_client1.pid
        #user nobody
        #group nobody
        script-security 3
        daemon
        keepalive 10 60
        ping-timer-rem
        persist-tun
        persist-key
        proto udp4
        cipher AES-256-CBC
        auth SHA1
        up /usr/local/sbin/ovpn-linkup
        down /usr/local/sbin/ovpn-linkdown
        multihome
        engine cryptodev
        tls-client
        client
        nobind
        management /var/etc/openvpn/client1.sock unix
        remote 285.325.45.142 53294
        ifconfig 10.8.0.2 10.8.0.1
        ca /var/etc/openvpn/client1.ca
        cert /var/etc/openvpn/client1.cert
        key /var/etc/openvpn/client1.key
        tls-auth /var/etc/openvpn/client1.tls-auth 1
        ncp-ciphers AES-256-GCM:AES-128-GCM
        resolv-retry infinite
        topology subnet
        auth-nocache
        remote-cert-tls server
        
        

        Server side

        
        dev ovpns2
        verb 1
        dev-type tun
        dev-node /dev/tun2
        writepid /var/run/openvpn_server2.pid
        #user nobody
        #group nobody
        script-security 3
        daemon
        keepalive 10 60
        ping-timer-rem
        persist-tun
        persist-key
        proto udp
        cipher AES-256-CBC
        auth SHA1
        up /usr/local/sbin/ovpn-linkup
        down /usr/local/sbin/ovpn-linkdown
        multihome
        engine cryptodev
        tls-server
        server 10.8.0.0 255.255.255.0
        client-config-dir /var/etc/openvpn-csc/server2
        tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'server.kz' 1"
        lport 53294
        management /var/etc/openvpn/server2.sock unix
        push "route 192.168.10.0 255.255.255.0"
        ca /var/etc/openvpn/server2.ca
        cert /var/etc/openvpn/server2.cert
        key /var/etc/openvpn/server2.key
        dh /etc/dh-parameters.1024
        crl-verify /var/etc/openvpn/server2.crl-verify
        tls-auth /var/etc/openvpn/server2.tls-auth 0
        ncp-ciphers AES-256-GCM:AES-128-GCM
        persist-remote-ip
        float
        topology subnet
        route 192.168.1.0 255.255.255.0 # Office
        
        
        1 Reply Last reply Reply Quote 0
        • M
          marvosa
          last edited by Feb 10, 2018, 6:27 PM

          What is the LAN subnet on both sides?

          1 Reply Last reply Reply Quote 0
          • F
            Falselock
            last edited by Feb 11, 2018, 5:33 AM

            @marvosa:

            What is the LAN subnet on both sides?

            thanks. fixed by defining "Client Specific Overrides" and```
            iroute 192.168.1.0 255.255.255.0;

            1 Reply Last reply Reply Quote 0
            5 out of 5
            • First post
              5/5
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
              This community forum collects and processes your personal information.
              consent.not_received