Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site to site clients of client side cannot reach server (solved)

    Scheduled Pinned Locked Moved OpenVPN
    8 Posts 2 Posters 525 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      ddbnj
      last edited by ddbnj

      I am sorry I have to bother to ask this but after weeks I can't figure this out.

      I have a site to site setup, site A is the server (pfsense 2.5.1), site B is the client (pfsense+21.02.2).

      All clients behind Site A (server) can reach Site B firewall and clients behind Site B.

      Site B firewall can reach Site A server and site A clients.

      Using pfsense+ firewall ping webgui:

      If I ping Site A from Site B's LAN interface and IOT interfaces it works.

      If I ping Site A from Site B's openvpn mobile clients interface it does not work.

      I have identical firewall rules for LAN, IOT, and openvpn clients.

      Does anyone know why the openvpn mobile client interface is treated differently? I think I need a client specific overide but I don't really know why.

      If I packet capture ping attempts from the Site B firewall to the Site A firewall on the openvpn client interface, no packets enter the tunnel:

      10:27:07.790622 IP 10.8.1.1 > 172.20.0.1: ICMP echo request, id 12100, seq 0, length 64
      10:27:08.793535 IP 10.8.1.1 > 172.20.0.1: ICMP echo request, id 12100, seq 1, length 64
      10:27:09.812040 IP 10.8.1.1 > 172.20.0.1: ICMP echo request, id 12100, seq 2, length 64
      

      Both ends of the tunnel do not receive the request packets from 10.8.1.1

      Here are the rules on the openvpn mobile client interface.
      openvpn_mobile_rules.JPG

      There are no firewall log entries for the ICMP packets. DNS requests across the tunnel are logged.

      Any help appreciated.

      Thank you,

      Devan

      bingo600B 2 Replies Last reply Reply Quote 0
      • bingo600B
        bingo600 @ddbnj
        last edited by

        @ddbnj

        Is your site B's OpenVPN Client network (lan) defined in the Site A routing table ?

        If the SiteB OpenVPN Client Lan is not known at Site A , then Site A ansvers wont be routed to Site B.

        /Bingo

        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

        pfSense+ 23.05.1 (ZFS)

        QOTOM-Q355G4 Quad Lan.
        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

        D 1 Reply Last reply Reply Quote 1
        • bingo600B
          bingo600 @ddbnj
          last edited by bingo600

          @ddbnj

          Are you using OpenVPN between SiteA and SiteB too or ?

          I'm using SSL/TLS /30 OpenVPN L2L tunnels.
          I have a feeling that the below might just fit there.

          In a setup like mine , you would normally define the remote networks in the OpenVPN Server or Client definitions.
          0407c06b-2b66-47ad-96f4-6852a725f8f4-image.png

          Here (on Site A definitions) , i would have had to enter the networks that can be "reached" on the remote end (Site B) , and that would have to include ANY networks on SiteB , including a OpenVPN "Dial-in" client network.

          /Bingo

          If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

          pfSense+ 23.05.1 (ZFS)

          QOTOM-Q355G4 Quad Lan.
          CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
          LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

          D 1 Reply Last reply Reply Quote 1
          • D
            ddbnj @bingo600
            last edited by ddbnj

            @bingo600

            First, thank you.

            I believe the routes are correct. Here are the relevant routes from Site A.

            siteAroutes.JPG

            10.8.1.0/24 are the openvpn mobile clients connecting to Site B

            10.3.101.0/24 is the openvpn tunnel over fiber optic (server)
            10.3.102.0/24 is the openvpn tunnel over LTE behind NAT (client/failover)

            Here are relevant routes from Site B:
            siteBroutes-1.JPG
            siteBroutes-2.JPG

            The 10.8.1.0/24 clients are listed in the remote networks available on the server setup for the OpenVPN tunnel.

            Thank you,

            Devan

            1 Reply Last reply Reply Quote 0
            • D
              ddbnj @bingo600
              last edited by

              @bingo600

              I believe they are set correctly:

              Site A OpenVPN server setting for site to site connection to Site B:

              siteAopenvpnserver.JPG

              Related CSO entry on same firewall:

              siteAcso.jpg

              bingo600B 1 Reply Last reply Reply Quote 0
              • bingo600B
                bingo600 @ddbnj
                last edited by bingo600

                @ddbnj
                I hope the 172.x.x.x net is in the SiteA routing table too , as it seems to reside there. But the CSO seems to indicate the 172 net is on Site B , where is it ?.

                But you are correct , the routing table seems to include the 10.8.1.0/24 on both ends.

                Can you ping the "opposite" openvpn (L2L) interface from SiteB , and from a SiteB client ?

                If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                pfSense+ 23.05.1 (ZFS)

                QOTOM-Q355G4 Quad Lan.
                CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                D 1 Reply Last reply Reply Quote 1
                • D
                  ddbnj @bingo600
                  last edited by ddbnj

                  @bingo600

                  After many weeks and hours I figured it out.

                  @jimp posted in another thread titled OpenVPN fails with 2.50

                  Make sure your default gateway is set to your WAN gateway on System > Routing
                  Try setting the OpenVPN server Protocol value to "UDP IPv4 and IPv6 on all interfaces (multihome)"

                  When I set Site A OpenVPN server protocol to multihome it works! I don't have any IPv6 interfaces so I never picked it. MultiWAN is a huge pain in the ass.

                  What a battle.

                  Thank you @bingo600 for helping me.

                  Devan

                  bingo600B 1 Reply Last reply Reply Quote 0
                  • bingo600B
                    bingo600 @ddbnj
                    last edited by

                    @ddbnj
                    Nice to have "helped" ... Or NOT 😊
                    Glad i'm still on 2.4.5-p1 , and not chasing "ghosts"

                    /Bingo

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.