pritunl VPN - pass traffic to private network

  • Hello.

    I have network like this:
    network.jpg image url)

    I would to like open traffic form VPN client to network

    I have route on pritnul server to

    When I pinging from vpn client, in tcpdump on pritunl server i see:

    06:36:24.593668 IP > ICMP echo request, id 1, seq 438, length 40

    So i thing, I have to add "something" on pfSense router to create route from to, but I don't know how do this.


  • Netgate Administrator

    So 'pritunl' is a remote access OpenVPN on pfSense here?

    The 10/8 network doesn't appear anywhere on your diagram so I'm not sure why or where that is being used.

    You need to pass a route to to clients connecting to the server.


  • LAYER 8 Global Moderator

    Looks to me like a asymmetrical mess waiting to happen.. Since I assume that router is the default gateway for those servers.

    And yeah don't see where this 10 network comes into play.. And unless your trying to summary route - 10/8 is a horrible Idea!!

    Not sure why you would vpn from rfc to rfc in the first place... is that 192.168.226 your tunnel network?

  • First of all, you need to clarify if the pritunl VPN users (while connected) will be "going" out with their 192.168.22.x IP address , or with the IP address of the Pritunl network interface (

    Also, I assume that you have created a Server in the pritunl that assigns the 192.168.226.x IP addresses. In that server, you will have to add a route towards the 172.17.172.x network (see below)

    After you do the above, then you can start pinging from a VPN user towards your Servers. In order to see if the Pritunl VPN user is going out with its assigned IP addres (192.168.2226.2) and not with the Pritunl server IP (, go to Packet Capture in pfsense and check the traffic on the pfsense interface that belongs to 172.17.172.x network.

    *I would create an alias for these VPN users and name it "OpenVPN_Users" (Alias type is network with an IP address

    Then I would go to the firewall rules and I would add a rule to allow the OpenVPN_Users network towards the network. Not sure if you have to configure the Advanced Settings on that rule, but if you still cannot ping the servers, you may have to go and change the TCP flags to "Any" and the State Type to "sloppy" (see below)


    Also, I assume these VPN users will be having internet access via your pfsense, which means that they will be going to the outside world via the WAN interface. If so, maybe you would have to add a NAT rule, but check first if it works without any NAT rule.

Log in to reply