• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Setting up OpenVPN for new remote office

OpenVPN
5
25
2.5k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    BlazeStar
    last edited by Aug 29, 2019, 11:16 PM

    Hey guys,

    We've been using pfSense for YEARS and it's great.

    Now for the first time, our small business will have two offices.

    In the head office are several servers which should be accessed ideally from the remote office.

    Therefore, I was thinking of setting up an OpenVPN server on the pfSense box located at the head office.

    And I would like to have another (new) pfSense box at the remote office, which would act as a n OpenVPN client.

    Here are my questions:

    • I chose OpenVPN for now but I can always roll back on that and go for another solution, like IPsec. What do you recommend?

    • Is there a guide or tutorial to accomplish what I'm trying to do? I've been looking around but I can't find any.

    • How do I configure my OpenVPN server? There are so many options I'm not sure which are best. We're looking to insure security but optimize speed too.

    • How can I make sure only specific trafic is passed through the VPN. In my case that would be anything in relation to 10.0.3.XXX

    • The remote office will have 5 employees and 5 IP phones going through the VPN. I would like to buy one of the following, any recommandation?

      • https://store.netgate.com/pfSense/SG-1100.aspx
      • https://store.netgate.com/SG-3100.aspx
      • https://store.netgate.com/SG-5100.aspx
      • https://store.netgate.com/pfSense/XG-7100-desktop.aspx

    Thanks !

    1 Reply Last reply Reply Quote 0
    • K
      KOM
      last edited by KOM Aug 29, 2019, 11:31 PM Aug 29, 2019, 11:30 PM

      I chose OpenVPN for now but I can always roll back on that and go for another solution, like IPsec. What do you recommend?

      OpenVPN. It's easier to configure and get working and has good speed, relatively speaking.

      Is there a guide or tutorial to accomplish what I'm trying to do? I've been looking around but I can't find any.

      https://docs.netgate.com/pfsense/en/latest/book/openvpn/site-to-site-example-configuration-ssl-tls.html

      https://docs.netgate.com/pfsense/en/latest/vpn/openvpn/configuring-a-site-to-site-static-key-openvpn-instance.html

      Site to Site VPNs on pfSense (YouTube)

      How do I configure my OpenVPN server?

      The video should answer all your questions, and any others can be answered here later.

      How can I make sure only specific trafic is passed through the VPN.

      With firewall rules and policy routing.

      The remote office will have 5 employees and 5 IP phones going through the VPN. I would like to buy one of the following, any recommandation?

      Even the 1100 would be fine for a remote office VPN link for a few people. It really depends on your link speed and packages you want to run. I don't recommend going through the tunnel for VoIP. The added latency may not play nice with realtime requirements. You can always try it and see how it performs and then make your choice as to where to route your calls.

      1 Reply Last reply Reply Quote 1
      • B
        BlazeStar
        last edited by BlazeStar Sep 9, 2019, 4:51 AM Sep 9, 2019, 12:40 AM

        So I've been trying to set up an Site-to-Site Static Key OpenVPN Instance, in order to connect two sites, using this documentation : https://docs.netgate.com/pfsense/en/latest/vpn/openvpn/configuring-a-site-to-site-static-key-openvpn-instance.html

        What I'm trying to accomplish:
        I want to make available 10.0.3.XXX and 10.0.4.5 on the service side, to the client side.
        I don't need anything available from the client side to the server side.
        I want all other traffic to go OUT of the tunnel.

        So I can get the connection up and running, but from the client side, I cannot connect to 10.0.3.XXX or 10.0.4.5

        Here are my configs, I really don't know what I did wrong??

        I only took out the shared key and the hostname, everything else is below.

        Note: I haven't done anything on the client side firewall, should there be a rule?

        Server side

        login-to-view

        login-to-view

        login-to-view

        login-to-view

        Client side

        login-to-view

        login-to-view

        login-to-view

        login-to-view

        login-to-view

        1 Reply Last reply Reply Quote 0
        • D
          Derelict LAYER 8 Netgate
          last edited by Sep 9, 2019, 2:28 AM

          You cannot push routes using shared key. OpenVPN does not support it.

          Set those networks as "Remote Networks" on the other side.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          B 1 Reply Last reply Sep 9, 2019, 4:43 AM Reply Quote 0
          • C
            chpalmer
            last edited by chpalmer Sep 9, 2019, 2:29 AM Sep 9, 2019, 2:28 AM

            Get rid of the custom options. You do not need that there.

            Use " 10.0.3.0/25,10.0.4.0/28" on the IPv4 Remote Networks line at the office opposite of those. Do the same for the office where those are with the subnet of the opposite office on the other end. Yes you have to.

            Control access with firewall rules on the OpenVPN tab. OpenVPN interface comes from the opposing side.

            Source (IP subnet or addresses from opposite address) Destination (LAN Subnet) ect.

            Edit- beat me to it. :)

            Triggering snowflakes one by one..
            Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

            1 Reply Last reply Reply Quote 0
            • B
              BlazeStar @Derelict
              last edited by Sep 9, 2019, 4:43 AM

              Thanks @Derelict

              So on the server side, I got rid of the custom options.

              On both side, IPv4 Remote network(s) are set to:

              10.0.3.0/24,10.0.4.5/30
              

              I reloaded OpenVPN server and OpenVPN client services.

              Again, the VPN can connect, but I can't access 10.0.3.XXX or 10.0.4.5

              The logs don't show much except the connections.

              Is there anything I need to do with the firewall rules?

              The only thing I did was on the server side :
              PASS / WAN / IPv4 / UDP / Destination : port 1195

              I didn't do anything on the client side.

              1 Reply Last reply Reply Quote 0
              • D
                Derelict LAYER 8 Netgate
                last edited by Derelict Sep 9, 2019, 5:23 AM Sep 9, 2019, 5:21 AM

                You need rules on the OpenVPN tab on each side passing traffic you want to be allowed into the firewall.

                You also need to be sure the firewalls on the target hosts pass traffic from "foreign" networks. Think windows firewall here.

                10.0.4.5/30 is not a valid /30 subnet. The proper /30 containing 10.0.4.5 is 10.0.4.4/30. Doubt that is interfering with your ability to connect to 10.0.3.0/24 though.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                B 1 Reply Last reply Sep 9, 2019, 5:35 AM Reply Quote 0
                • B
                  BlazeStar @Derelict
                  last edited by BlazeStar Sep 9, 2019, 6:22 AM Sep 9, 2019, 5:35 AM

                  Hey @Derelict,

                  I just noticed something.

                  I have two OpenVPN servers running on the "server side"

                  One is a remote access (SSL / TLS + User Auth) server for "road warriors", running on port 1194 and with a subnet of 10.8.0.0/24

                  The second one is a shared key server for the remote site (the one I'm trying to set up right now), running on port 1195 and with a subnet of 10.8.1.0/24

                  Now I've just noticed that when both servers are running, it's impossible to connect to 10.0.3.XXX or 10.0.4.5!

                  So there must be some kind of conflict but I can't figure it out.

                  For exemple, I was not able to connect using my "road warrior" setup.
                  But I disabled the 1195 server (shared key) and immediately, my road warrior setup was connecting successfully.

                  Any idea how I can fix the so-called conflict?

                  1 Reply Last reply Reply Quote 0
                  • B
                    BlazeStar
                    last edited by Sep 10, 2019, 5:57 PM

                    Anyone has an idea for my two Open VPN servers conflict?

                    Please 😢

                    1 Reply Last reply Reply Quote 0
                    • D
                      Derelict LAYER 8 Netgate
                      last edited by Derelict Sep 10, 2019, 6:13 PM Sep 10, 2019, 6:06 PM

                      Based on the information given, no.

                      There is no problem having multiple OpenVPN servers running on different ports.

                      If traffic enters an OpenVPN interface, there must be a rule allowing it.

                      If traffic is to be sent out an OpenVPN interface, there must be a route. You do not set the remote networks the same on both sides of a tunnel. You set the remote networks to the networks on the other side you want to route to. (aka the remote networks).

                      You will probably want to include the current configurations and a specific example (including source and destination addresses, etc) that cannot communicate.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      B 1 Reply Last reply Sep 10, 2019, 6:57 PM Reply Quote 0
                      • B
                        BlazeStar @Derelict
                        last edited by Sep 10, 2019, 6:57 PM

                        Hey @Derelict, thank you so much for your help.

                        So I'm trying to figure out what you're saying, sorry for being a n00b.

                        Based on the information given, no.

                        There is no problem having multiple OpenVPN servers running on different ports.

                        If traffic enters an OpenVPN interface, there must be a rule allowing it.

                        On the server side, there are two firewall rules :

                        • PASS / IPv4 UDP / WAN / 1194
                        • PASS / IPv4 UDP / WAN / 1195

                        No rules on the client side (SG-1100).

                        I think on the firewall side everything seems correct?

                        If traffic is to be sent out an OpenVPN interface, there must be a route. You do not set the remote networks the same on both sides of a tunnel. You set the remote networks to the networks on the other side you want to route to. (aka the remote networks).

                        On my "road warrior" set up (Remote Access (SSL/TLS + User Auth)), I set up IPv4 Local network(s) to:

                        10.0.3.0/24,10.0.4.0/24
                        

                        Everything works perfect: I can connect to a host on 10.0.3.XXX using OpenVPN client on Windows and Viscosity on MAC. We've been using it for years successfully.

                        As soon as I fire up the second OpenVPN service (openvpn_2), nothing works anymore.

                        You will probably want to include the current configurations and a specific example (including source and destination addresses, etc) that cannot communicate.

                        The current configuration is up there:
                        https://forum.netgate.com/topic/146151/setting-up-openvpn-for-new-remote-office/3

                        With the exception that now on both sides of the Peer to Peer (Shared Key) Open VPN configuration, the IPv4 Remote network(s) are set to:

                        10.0.3.0/24,10.0.4.0/24
                        

                        So for example, I have a NAS server on 10.0.3.20

                        I want to connect to it with SMB.

                        Normally, I would fire up my OpenVPN client, connect through 1194 to my OpenVPN server with Remote Access (SSL/TLS + User Auth) and I can easily connect to my shares, no problem.

                        Now as soon as the second OpenVPN server on 1195 with Peer to Peer (Shared Key) configuration is running on the server side: I will still be able to connect like I usually do to my 1194 OpenVPN server I will not be able to connect with SMB to my 10.0.3.20 host.

                        I'm not sure if that's the info you wanted? If not, let me know and I'll be happy to provide more.

                        1 Reply Last reply Reply Quote 0
                        • D
                          Derelict LAYER 8 Netgate
                          last edited by Sep 10, 2019, 6:59 PM

                          Why are you setting the remote networks on both sides of a p2p connection to the same networks? Set each side to list the networks on the other side.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          B 1 Reply Last reply Sep 10, 2019, 7:00 PM Reply Quote 0
                          • B
                            BlazeStar @Derelict
                            last edited by Sep 10, 2019, 7:00 PM

                            @Derelict that's because of that:

                            @chpalmer said in Setting up OpenVPN for new remote office:

                            Get rid of the custom options. You do not need that there.

                            Use " 10.0.3.0/25,10.0.4.0/28" on the IPv4 Remote Networks line at the office opposite of those. Do the same for the office where those are with the subnet of the opposite office on the other end. Yes you have to.

                            So I set it up on both sides.

                            Now I'm assuming I need to get rid of it on the client side, right?

                            1 Reply Last reply Reply Quote 0
                            • D
                              Derelict LAYER 8 Netgate
                              last edited by Sep 10, 2019, 7:02 PM

                              The networks that are on the other side of the tunnel go in the remote networks setting on each side. Consult your network diagram to determine which networks are where.

                              Chattanooga, Tennessee, USA
                              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                              Do Not Chat For Help! NO_WAN_EGRESS(TM)

                              B 1 Reply Last reply Sep 10, 2019, 7:03 PM Reply Quote 0
                              • B
                                BlazeStar @Derelict
                                last edited by Sep 10, 2019, 7:03 PM

                                On the client side, I don't want to make anything available.

                                On the server side, I just want to make 10.0.3.0/24,10.0.4.0/24 available.

                                1 Reply Last reply Reply Quote 0
                                • D
                                  Derelict LAYER 8 Netgate
                                  last edited by Sep 10, 2019, 7:05 PM

                                  You have to put the networks you are sourcing from in the remote networks on the other side in order to route traffic. Else you have to assign an interface and perform outbound NAT to the tunnel address.

                                  You can determine what connections can be made into that side using firewall rules on the OpenVPN tab.

                                  Chattanooga, Tennessee, USA
                                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                  B 1 Reply Last reply Sep 10, 2019, 7:07 PM Reply Quote 0
                                  • B
                                    BlazeStar @Derelict
                                    last edited by Sep 10, 2019, 7:07 PM

                                    So basically, on the CLIENT side I should put 10.0.3.0/24,10.0.4.0/24 in IPv4 Remote network(s)

                                    and on the SERVER side I should leave blank.

                                    Right?

                                    D 1 Reply Last reply Sep 10, 2019, 7:09 PM Reply Quote 0
                                    • RicoR
                                      Rico LAYER 8 Rebel Alliance
                                      last edited by Sep 10, 2019, 7:07 PM

                                      Check out
                                      https://www.netgate.com/resources/videos/site-to-site-vpns-on-pfsense.html
                                      to get a basic understanding how it works. :-)

                                      -Rico

                                      B 1 Reply Last reply Sep 19, 2019, 1:17 AM Reply Quote 0
                                      • D
                                        Derelict LAYER 8 Netgate @BlazeStar
                                        last edited by Sep 10, 2019, 7:09 PM

                                        @BlazeStar said in Setting up OpenVPN for new remote office:

                                        So basically, on the CLIENT side I should put 10.0.3.0/24,10.0.4.0/24 in IPv4 Remote network(s)

                                        and on the SERVER side I should leave blank.

                                        Right?

                                        No. You have to put the remote networks on each side to be able to route traffic (or implement tunnel address NAT). You control who can connect to what using firewall rules.

                                        Yeah, some study into exactly what is going on is likely in order.

                                        Chattanooga, Tennessee, USA
                                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                        1 Reply Last reply Reply Quote 0
                                        • B
                                          BlazeStar @Rico
                                          last edited by Sep 19, 2019, 1:17 AM

                                          @Rico said in Setting up OpenVPN for new remote office:

                                          Check out
                                          https://www.netgate.com/resources/videos/site-to-site-vpns-on-pfsense.html

                                          That's the video I watched to set up my stuff.

                                          Yet I'm still very puzzled why it doesn't work.

                                          Around the end of the video, a few tests are recommended, and when I try them they fail.

                                          For example, I try to ping host 10.0.3.20 which is a server I have on the server-side.

                                          On the client-side, from pfSense, it works:

                                          login-to-view

                                          On the client-side, from LAN, it fails!!

                                          login-to-view

                                          And in the routing tables I see this:

                                          login-to-view

                                          Which appears to me like, once again, this should work!

                                          Anything I'm not seeing here??

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.