Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Multiple OpenVPN/VLAN Issue

    Scheduled Pinned Locked Moved OpenVPN
    8 Posts 3 Posters 895 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pROcraTE
      last edited by

      I have a pfSense setup with three VLANS each with an OpenVPN connection using a different ExpressVPN server per VLAN. Only the connection listed first in the NAT rules will allow traffic. Each of the other connections fail unless it is the first NAT rule listed. Does anyone have any suggestions on resolving this issue?

      JKnottJ 1 Reply Last reply Reply Quote 0
      • JKnottJ
        JKnott @pROcraTE
        last edited by

        @procrate

        Why do you have 3 servers? Each VLAN would have it's own subnet which can be routed to the other end.

        PfSense running on Qotom mini PC
        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
        UniFi AC-Lite access point

        I haven't lost my mind. It's around here...somewhere...

        P 1 Reply Last reply Reply Quote 0
        • P
          pROcraTE @JKnott
          last edited by

          @jknott I do not have an IT background, so my terminology might not always be accurate.

          Each VLAN is on its own subnet. Each of those connections has its own OpenVPN connection to a unique ExpressVPN server. All of the VPN connections are up. If I reorder the NAT rules, whichever VPN/VLAN/subnet is first is the one that traffic passes and the remainder fail.

          I hope this clarifies the issue.

          JKnottJ 1 Reply Last reply Reply Quote 0
          • JKnottJ
            JKnott @pROcraTE
            last edited by

            @procrate

            Are all 3 VLANs connecting to the same point? If so, you don't need 3 servers. If you have a VPN up, you have a route that all 3 can be routed over.

            PfSense running on Qotom mini PC
            i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
            UniFi AC-Lite access point

            I haven't lost my mind. It's around here...somewhere...

            P 1 Reply Last reply Reply Quote 0
            • P
              pROcraTE @JKnott
              last edited by

              @jknott No, all three VLANS point to separate servers. Based upon some research, the VPN connections fail seemingly because pfSense monitors the "far side" of the tunnel. Then if it determines that the gateway is unreachable or slow the tunnel drops. I am still researching it.

              JKnottJ 1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott @pROcraTE
                last edited by

                @procrate

                My question was about locations, not servers. Are all those servers in the same place? Or in different locations?

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                P 1 Reply Last reply Reply Quote 0
                • P
                  pROcraTE @JKnott
                  last edited by

                  @jknott They are all in different locations.

                  1 Reply Last reply Reply Quote 0
                  • Bob.DigB
                    Bob.Dig LAYER 8
                    last edited by Bob.Dig

                    Show as the outbound NAT rules and check, that every client got a different private IP address from your VPN provider. If they share an address, it will not work.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.