Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VPN clients can't access Internet

    Scheduled Pinned Locked Moved HA/CARP/VIPs
    9 Posts 2 Posters 895 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • cemyl95C Offline
      cemyl95
      last edited by

      Hey everyone! So I set up CARP VIPs yesterday (with an existing IPsec VPN setup) and it's working great with one exception... Before I set up HA, VPN clients would route all of their network traffic over the VPN tunnel. Now they can still connect to the VPN server, and they can access the internal network, but they can't get out to the Internet (my Windows 10 computer falls-back to its locally-connected network for Internet access).

      I've reviewed NAT, firewall rules, VPN config and I'm completely stumped. I've Googled for hours and I've found numerous posts on not being able to ping the secondary node (which is working since I created the Outbound NAT rule) but have found nothing on VPN clients having no Internet access through the VPN connection. I'm hoping someone could help point me in the right direction.

      Thanks in advance!
      -- Chris

      1 Reply Last reply Reply Quote 0
      • DerelictD Offline
        Derelict LAYER 8 Netgate
        last edited by

        Be sure the VPN tunnel network is properly covered in your outbound NAT rules.

        You'll probably want to post them for us to look at.

        There is not really anything in HA other than that that could affect this.

        Either way we're going to need a much more detailed picture of what you have there.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • cemyl95C Offline
          cemyl95
          last edited by

          Ah yes, sorry. Makes sense in hindsight lol... Here are my outbound NAT rules for the VPN.

          0_1551895947605_41f5065f-8e07-47c7-98a4-eb2318473905-image.png

          The top rule is so VPN clients can access the secondary node. The bottom two are for the VPN network to access the internet. The NAT address (ending in 227) is one of 3 CARP addresses on the WAN interface. Not sure if it matters but VPN connections also come in on that address.

          1 Reply Last reply Reply Quote 0
          • DerelictD Offline
            Derelict LAYER 8 Netgate
            last edited by

            @cemyl95 said in VPN clients can't access Internet:

            Now they can still connect to the VPN server, and they can access the internal network, but they can't get out to the Internet (my Windows 10 computer falls-back to its locally-connected network for Internet access).

            Sounds like an issue on the windows computer. pfSense can only route traffic it receives.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • cemyl95C Offline
              cemyl95
              last edited by

              I'm not sure that's the case, my Android phone is experiencing the same thing. Those NAT rules look good though right?

              1 Reply Last reply Reply Quote 0
              • DerelictD Offline
                Derelict LAYER 8 Netgate
                last edited by

                NAT rule looks fine as long as the traffic being processed is sourced from 10.0.100.0/28 and outbound connections work sourced from the .227 address.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • cemyl95C Offline
                  cemyl95
                  last edited by

                  I reviewed the settings on my Android phone (using the StrongSwan VPN client to connect). There's nothing under the "split tunnel" settings that would modify the default of all traffic going through the VPN tunnel, yet it's still not sending Internet traffic over the VPN tunnel. Here are my VPN server settings.

                  0_1551897401910_d395e75e-1af9-4bb2-8843-cfae833a94a6-image.png
                  0_1551897453631_b4e1b4f6-b6c3-47c3-a0ba-5a84862ec8fe-image.png
                  0_1551897463705_c58f36a4-2a5d-4b4d-a084-8246594e8124-image.png

                  1 Reply Last reply Reply Quote 0
                  • DerelictD Offline
                    Derelict LAYER 8 Netgate
                    last edited by

                    If it is still not sending traffic over the VPN then what should the server do about that? It is already being instructed to provide a network list and that list is 0.0.0.0/0.

                    pfSense cannot route and NAT traffic the client does not send to it.

                    You might packet capture on the IPsec interface for host address 10.0.100.0/28 and see what, if anything, the client is trying to send over the tunnel and what the disposition of that traffic flow is.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • cemyl95C Offline
                      cemyl95
                      last edited by cemyl95

                      I did the packet capture like you suggested, and I saw DNS requests coming over the VPN tunnel but nothing that was destined for the Internet. That got me thinking, so I checked my default route while connected to the VPN. Sure enough, the default route was to the local network gateway (instead of the VPN connection). I dug through my VPN settings a little and found that the "Use default gateway on remote network" wasn't checked. Checked that box, reconnected, and now it works!

                      @Derelict thank you for your help! ^_^ I was banging my head against a wall trying to figure this out lol

                      Documenting my solution:

                      1. Go to the interface settings for the VPN interface
                      2. Go to the Networking tab and open IPv4 properties
                      3. Open the Advanced window and check the "Use default gateway on remote network"
                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.