Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    LAN net cannot ping through the tunnel, but OPT1 does

    Scheduled Pinned Locked Moved OpenVPN
    7 Posts 3 Posters 555 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dumpierre
      last edited by

      3d749201-6a25-427a-bead-808b05385803-image.png
      e38a1140-413b-4b44-817a-4636b4cc905c-image.png
      bdef8e98-da34-4b56-b559-f80919fe7416-image.png

      1 Reply Last reply Reply Quote 0
      • M
        marvosa
        last edited by

        Too many unknowns. It would appear you're testing from the B side. Would need to see the config. What is the subnet assigned to the LAN interface vs OPT1? Considering pings are going thru from OPT1, are you sure 10.1.1.0/24 isn't assigned to OPT1?

        This could be a simple misunderstanding or an issue with the subnet mask assigned to one of the interfaces.

        I would start by revisiting the configuration on all your interfaces.

        D 1 Reply Last reply Reply Quote 0
        • D
          dumpierre @marvosa
          last edited by

          @marvosa c0585696-d600-47b6-a083-b342a65679f8-image.png

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @dumpierre
            last edited by

            @dumpierre
            I assume, 10.1.1.254 is the LAN address of pfSense at B.

            Possibly you're missing the route. Post the routing table, please.

            Are both boxes the default gateway in their networks?

            BTW: Why are you using a public address space for the VPN tunnel?
            And why have you set a /24 mask for a site-to-site tunnel? You should better use a /30.

            D 1 Reply Last reply Reply Quote 1
            • D
              dumpierre @viragomann
              last edited by

              @viragomann exactly, the route was missing!
              1730ea7f-4d30-4d16-b746-4021e9f54d3d-image.png

              Now it's working
              d0c45056-c649-40a1-a45e-568fcd978dae-image.png

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @dumpierre
                last edited by

                @dumpierre
                You shouldn't set static routes to an VPN endpoint, even if will work.
                The routes should be managed by OpenVPN. So they are added properly when the connection is established.

                In the OpenVPN settings simply add the remote networks into the "IPv4 Remote Networks" box for adding the proper routes when connecting.

                D 1 Reply Last reply Reply Quote 0
                • D
                  dumpierre @viragomann
                  last edited by

                  @viragomann hi, ivt is already configured, however, the local network cannot communicate with the remote network, only the firewall can communicate.
                  It worked after adding the route
                  45365c70-f55e-433c-938a-a5abef8b1251-image.png

                  No route:
                  ping pfSense A to Host B: ok
                  ping Host A to Host B: failed

                  69cf9b74-f170-4c44-b7c2-9f5ca3426732-image.png

                  With route:
                  ping pfSense A to Host B: ok
                  ping Host A to Host B: ok
                  cb394d7c-33b7-4ffd-8740-0c554c772483-image.png

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.