• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Remote access connection issues

Scheduled Pinned Locked Moved OpenVPN
10 Posts 3 Posters 1.0k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    bwanajag
    last edited by Nov 14, 2018, 3:40 AM

    I had setup a remote access vpn using the wizard in pfSense more than a year ago, and it worked flawlessly. I recently changed hardware, and restored my backup. Now, when outside my network, I can connect to the OVPN server on the pfSense box, but have no access to the LAN. I've made sure the OpenVPN rule is in place (see below), but I'm not sure where else to look to resolve this issue. Any suggestions.

    0_1542166750214_Screen Shot 2018-11-14 at 11.30.25 AM.png

    1 Reply Last reply Reply Quote 0
    • V
      viragomann
      last edited by Nov 14, 2018, 1:27 PM

      Are the routes set on the client?

      What is your LAN subnet?

      B 1 Reply Last reply Nov 16, 2018, 1:37 AM Reply Quote 0
      • M
        marvosa
        last edited by Nov 15, 2018, 10:37 AM

        Post your server1.conf.

        B 1 Reply Last reply Nov 16, 2018, 1:40 AM Reply Quote 0
        • B
          bwanajag @viragomann
          last edited by Nov 16, 2018, 1:37 AM

          @viragomann I exported a new client config once I restored from backup, in case there were some backend changes. Whatever routes were setup in the server would have been passed to the client since I used the client export package in pfsense.

          My LAN subnet is 192.168.11.0/24 and tunnel subnet is 10.0.11.0/24

          V 1 Reply Last reply Nov 16, 2018, 11:02 AM Reply Quote 0
          • B
            bwanajag @marvosa
            last edited by Nov 16, 2018, 1:40 AM

            @marvosa Be glad to but I've only used the pfsense gui, I don't think you're asking for a pic of the front end configuration. Where is the server.conf file located?

            M 1 Reply Last reply Nov 17, 2018, 5:42 PM Reply Quote 0
            • B
              bwanajag
              last edited by Nov 16, 2018, 1:43 AM

              Also, I've never had any rules set related to the different subnets. Before the new hardware, I was able to access devices on the LAN when connected through the VPN simply by using their IP address

              1 Reply Last reply Reply Quote 0
              • V
                viragomann @bwanajag
                last edited by Nov 16, 2018, 11:02 AM

                @bwanajag said in Remote access connection issues:

                I exported a new client config once I restored from backup, in case there were some backend changes. Whatever routes were setup in the server would have been passed to the client since I used the client export package in pfsense.

                If we don't know neither the routes nor you provide the server configuration, it'd not possible to help here. Both would be better.
                You can also take a screenshot from the server settings page and insert it here.

                1 Reply Last reply Reply Quote 0
                • M
                  marvosa @bwanajag
                  last edited by marvosa Nov 17, 2018, 5:42 PM Nov 17, 2018, 5:42 PM

                  @bwanajag The OpenVPN configs are located in /var/etc/openvpn. You can get there via the shell or the GUI (Diagnostics -> Edit File)

                  1 Reply Last reply Reply Quote 0
                  • B
                    bwanajag
                    last edited by Nov 19, 2018, 3:57 AM

                    Here are the server and client configs:

                    Server:

                    dev ovpns2
                    verb 1
                    dev-type tun
                    dev-node /dev/tun2
                    writepid /var/run/openvpn_server2.pid
                    #user nobody
                    #group nobody
                    script-security 3
                    daemon
                    keepalive 10 60
                    ping-timer-rem
                    persist-tun
                    persist-key
                    proto udp4
                    cipher AES-256-CBC
                    auth SHA1
                    up /usr/local/sbin/ovpn-linkup
                    down /usr/local/sbin/ovpn-linkdown
                    client-connect /usr/local/sbin/openvpn.attributes.sh
                    client-disconnect /usr/local/sbin/openvpn.attributes.sh
                    local 20.21.20.29
                    engine rdrand
                    tls-server
                    server 10.0.11.0 255.255.255.0
                    client-config-dir /var/etc/openvpn-csc/server2
                    username-as-common-name
                    plugin /usr/local/lib/openvpn/plugins/openvpn-plugin-auth-script.so /usr/local/sbin/ovpn_auth_verify_async user TG9jYWwgRGF0YWJhc2U= false server2 1194
                    tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'pfso_scert' 1"
                    lport 1194
                    management /var/etc/openvpn/server2.sock unix
                    max-clients 7
                    push "dhcp-option DOMAIN 192.168.11.1"
                    push "dhcp-option NTP 192.168.11.1"
                    push "redirect-gateway def1"
                    client-to-client
                    ca /var/etc/openvpn/server2.ca 
                    cert /var/etc/openvpn/server2.cert 
                    key /var/etc/openvpn/server2.key 
                    dh /etc/dh-parameters.2048
                    tls-crypt /var/etc/openvpn/server2.tls-crypt 
                    ncp-ciphers AES-256-GCM:AES-128-GCM:AES-128-CBC:AES-256-CBC
                    compress lz4-v2
                    persist-remote-ip
                    float
                    topology subnet
                    

                    Client:

                    persist-tun
                    persist-key
                    cipher AES-256-CBC
                    ncp-ciphers AES-256-GCM:AES-128-GCM:AES-128-CBC:AES-256-CBC
                    auth SHA1
                    tls-client
                    client
                    remote 20.21.20.29 1194 udp
                    lport 0
                    verify-x509-name "pfso_scert" name
                    auth-user-pass
                    remote-cert-tls server
                    compress lz4-v2
                    
                    <ca>
                    -----BEGIN CERTIFICATE-----
                    (removed)
                    -----END CERTIFICATE-----
                    </ca>
                    <cert>
                    -----BEGIN CERTIFICATE-----
                    (removed)
                    -----END CERTIFICATE-----
                    </cert>
                    <key>
                    -----BEGIN PRIVATE KEY-----
                    (removed)
                    SMMQfc7Uii8d4I0Ee7NTnq9X
                    -----END PRIVATE KEY-----
                    </key>
                    <tls-crypt>
                    #
                    # 2048 bit OpenVPN static key
                    #
                    -----BEGIN OpenVPN Static key V1-----
                    (removed)
                    -----END OpenVPN Static key V1-----
                    </tls-crypt>
                    
                    1 Reply Last reply Reply Quote 0
                    • M
                      marvosa
                      last edited by marvosa Nov 21, 2018, 4:12 PM Nov 21, 2018, 3:58 PM

                      How are you trying to access your resources? I see one issue:

                      push "dhcp-option DOMAIN 192.168.11.1"
                      

                      You are pushing a DNS domain of 192.168.11.1 to your clients, so all of your name searches are being appended with "192.168.11.1" which is incorrect. The DNS Default Domain box in your config should have the name of your domain (e.g. MyDomain.com) in it, not an IP. Are you even using AD? If not, you shouldn't be pushing a DNS default domain.

                      I also see you have an AirVPN client tunnel configured. Is that new? I would modify the firewall rule on the OpenVPN tab, so it's explicit to your remote access tunnel network and your LAN. In other words, change the source to 10.0.11.0/24 and change the destination to "LAN net".

                      What do the rules look like on your AirVPN_WAN_HK tab? Hopefully, you don't have an any/any in there :)

                      Another question, what version of PFsense were you running on your old hardware? What version are you running now?

                      1 Reply Last reply Reply Quote 0
                      7 out of 10
                      • First post
                        7/10
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received