• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Can't Get The Gateway up for a Site-To-Site OpenVPN Connection.

Scheduled Pinned Locked Moved OpenVPN
11 Posts 2 Posters 869 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N
    neogrid
    last edited by neogrid Jun 27, 2022, 10:25 AM Jun 27, 2022, 10:19 AM

    Hi,

    Perhaps someone can spot my error, I've removed my RAS and Client from two pfSense connections and am trying to replace the connection with a Site-to-Site connection, using the same subnets. My target looks like this:

    Site2Site.drawio.png

    My goal is to connect the two sites over the two vlans. My CA structure is in place and working.

    I’ve basically followed the pfsense setup for 2 sites

    https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-s2s-tls.html

    I’ve setup my CA and certs, I believe it works as it should.

    My vpn server setup looks like this:

    001.png

    My Create Client-Specific Overrides look like this:

    002.png

    My WAN rule looks like this:

    003.png

    I’ve created an interface:

    004.png

    My firewall rules for the interface look like this, in the alias all subnets I use are included:

    005.png

    My outbound NAT rule:

    007.png

    At this stage on the Server side I believe that gateway should be up, before even looking at the client but still not up.

    Can’t quite tell if the route is setup correctly:
    006.png

    I have setup the client side also and it appears that there is a connection of sorts:

    008.png

    Any clues on what I’ve messed up I just can’t see it …

    V 1 Reply Last reply Jun 27, 2022, 10:34 AM Reply Quote 0
    • V
      viragomann @neogrid
      last edited by Jun 27, 2022, 10:34 AM

      @neogrid
      Is there only a single client connecting to the server or multiple?
      If it's only one you should rather use a /30 tunnel network for a site-to-site VPN. So there is no need to configure a CSO.

      N 1 Reply Last reply Jun 27, 2022, 10:44 AM Reply Quote 1
      • N
        neogrid @viragomann
        last edited by Jun 27, 2022, 10:44 AM

        @viragomann hi

        On the client side there will be multiple machines but I won't run out IP addresses.

        However, I thought this configuration / approach should work.

        Is the error the CSO ? It looked ok to me.

        V 1 Reply Last reply Jun 27, 2022, 10:48 AM Reply Quote 0
        • V
          viragomann @neogrid
          last edited by Jun 27, 2022, 10:48 AM

          @neogrid
          The question is how many OpenVPN clients are connecting to the server. The devices behind the client don't matter at all.

          If you have only one OpenVPN client use a /30 tunnel and remove the CSO.
          If you have multiple clients you need a CSO for each.

          N 1 Reply Last reply Jun 27, 2022, 10:51 AM Reply Quote 0
          • N
            neogrid @viragomann
            last edited by Jun 27, 2022, 10:51 AM

            @viragomann It's a single pfSense box. Let me try it.

            V 1 Reply Last reply Jun 27, 2022, 10:56 AM Reply Quote 0
            • V
              viragomann @neogrid
              last edited by Jun 27, 2022, 10:56 AM

              @neogrid
              So instead of CSO enter the server sides LAN into the "Remote Networks" box in the client settings.

              N 1 Reply Last reply Jun 27, 2022, 11:46 AM Reply Quote 0
              • N
                neogrid @viragomann
                last edited by neogrid Jun 27, 2022, 11:48 AM Jun 27, 2022, 11:46 AM

                @viragomann What witchcraft is this ??

                Clearly I don't understand something, though I know not what.

                Why when I change my tunnel IP from 192.168.140.0/24 to 10.128.240.0/30 (disabling the CSO) does it now work ?

                I thought the main principle was that there should be no overlapping IP ranges (I had tried a different /24 subnet I had never used and it did not work either).

                V 1 Reply Last reply Jun 27, 2022, 12:18 PM Reply Quote 0
                • V
                  viragomann @neogrid
                  last edited by Jun 27, 2022, 12:18 PM

                  @neogrid
                  As mentioned, when you use a larger tunnel network, you need a CSO and the configuration gets more complicated.

                  The CSO is especially needed at server site to route the clients site LAN properly.
                  If that doesn't work check in the OpenVPN log if the CSO is applied. There are often issues due to wrong common names stated in the CSO or whatever.

                  N 1 Reply Last reply Jun 27, 2022, 12:24 PM Reply Quote 0
                  • N
                    neogrid @viragomann
                    last edited by Jun 27, 2022, 12:24 PM

                    @viragomann ok thanks very much for the help. I must have made a config error, though I'm sure I triple checked everything. I'll look into the CSO a bit more. Thanks for helping out.

                    V 1 Reply Last reply Jun 27, 2022, 12:39 PM Reply Quote 0
                    • V
                      viragomann @neogrid
                      last edited by Jun 27, 2022, 12:39 PM

                      @neogrid
                      Checked you screens again. The only one failure I can find is the source network in the firewall rule on PEMSITE_A. The pass rules only allows access for the tunnel network, but not the clients LAN.

                      However, this is also applied now when using a /30 tunnel.
                      But maybe there are rules on the OpenVPN tab allowing access to any source.

                      Remember that the OpenVPN tab is an interface group which includes all OpenVPN instances you're running on this node. Rule on interface groups have priority over ones on the interface tab. So if there is a rule for allowing any to any (default after running the OpenVPN server setup wizard), rules on the interface tabs are ignored.

                      N 1 Reply Last reply Jun 27, 2022, 12:48 PM Reply Quote 0
                      • N
                        neogrid @viragomann
                        last edited by Jun 27, 2022, 12:48 PM

                        @viragomann actually I use an alias with my various subnets, including the tunnel subnets, so I believe it is covered. I also use an interface for my OpenVPN servers and don't use the "general" OpenVPN tab as such. That way I have some idea what is going on by doing things manually.

                        I need to do a bit more digging into this.

                        1 Reply Last reply Reply Quote 0
                        11 out of 11
                        • First post
                          11/11
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received