• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

OpenVPN Remote users are able to access Router but not hosts on local network

Scheduled Pinned Locked Moved OpenVPN
13 Posts 3 Posters 1.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • V
    viragomann @gizmobrat
    last edited by Mar 20, 2023, 4:40 PM

    @gizmobrat
    Assumed that OpenVPN server is running on the default gateway, check if the destination device's firewall allows access from outside of its subnet.

    G 1 Reply Last reply Mar 20, 2023, 5:00 PM Reply Quote 0
    • G
      gizmobrat @viragomann
      last edited by gizmobrat Mar 20, 2023, 5:37 PM Mar 20, 2023, 5:00 PM

      @viragomann
      I am not able to reach any devices on the 10.0.0.0/24 subnet with the exception of the router. I am unable to reach any of the hosts even with Firewalls disabled on both remote host and host on the network. This leads me to believe that either I need to set a default gateway on the VPN or I need to set up a way to route traffic between the two local networks. Any Ideas?

      Thanks
      gizmobrat

      V 1 Reply Last reply Mar 20, 2023, 5:23 PM Reply Quote 0
      • V
        viragomann @gizmobrat
        last edited by Mar 20, 2023, 5:23 PM

        @gizmobrat
        Can you confirm that the remote pfSense running the server is the default gateway in the remote network?

        Also ensure that the local network is not overlapping with the remoute.
        Maybe you can post the clients route table for verification.

        If that's given sniff the traffic on the remote LAN interface with packet capture on pfSense, while you try to access a remote device from the client to see if the packets are passed through.

        G 1 Reply Last reply Mar 20, 2023, 5:35 PM Reply Quote 0
        • G
          gizmobrat @viragomann
          last edited by Mar 20, 2023, 5:35 PM

          @viragomann
          The PF sense router is the device that is running the OpenVPN server.
          The local network is 10.0.0.0/24 on the Lan Interface 10.0.0.1 is he default gateway
          The VPN Network is 10.0.2.0/24 on the OpenVPN interface.
          The remote network is 192.168.1.1

          Below is the remote Windows 10 route table and IPconfig

          IPv4 Route Table
          ===========================================================================
          Active Routes:
          Network Destination        Netmask          Gateway       Interface  Metric
                    0.0.0.0          0.0.0.0      192.168.1.1    192.168.1.174     25
                   10.0.0.0    255.255.255.0         10.0.2.1         10.0.2.2    281
                   10.0.2.0    255.255.255.0         On-link          10.0.2.2    281
                   10.0.2.2  255.255.255.255         On-link          10.0.2.2    281
                 10.0.2.255  255.255.255.255         On-link          10.0.2.2    281
                  127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
                  127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
            127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
                192.168.1.0    255.255.255.0         On-link     192.168.1.174    281
              192.168.1.174  255.255.255.255         On-link     192.168.1.174    281
              192.168.1.255  255.255.255.255         On-link     192.168.1.174    281
               192.168.56.0    255.255.255.0         On-link      192.168.56.1    281
               192.168.56.1  255.255.255.255         On-link      192.168.56.1    281
             192.168.56.255  255.255.255.255         On-link      192.168.56.1    281
                  224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
                  224.0.0.0        240.0.0.0         On-link      192.168.56.1    281
                  224.0.0.0        240.0.0.0         On-link     192.168.1.174    281
                  224.0.0.0        240.0.0.0         On-link          10.0.2.2    281
            255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
            255.255.255.255  255.255.255.255         On-link      192.168.56.1    281
            255.255.255.255  255.255.255.255         On-link     192.168.1.174    281
            255.255.255.255  255.255.255.255         On-link          10.0.2.2    281
          ===========================================================================
          Persistent Routes:
            None
          
          Windows IP Configuration
          
          
          Unknown adapter OpenVPN Wintun:
          
             Media State . . . . . . . . . . . : Media disconnected
             Connection-specific DNS Suffix  . :
          
          Ethernet adapter Ethernet 2:
          
             Connection-specific DNS Suffix  . :
             Link-local IPv6 Address . . . . . : fe80::9dad:46f6:ba7f:13fc%6
             IPv4 Address. . . . . . . . . . . : 192.168.1.174
             Subnet Mask . . . . . . . . . . . : 255.255.255.0
             Default Gateway . . . . . . . . . : 192.168.1.1
          
          Ethernet adapter Ethernet 3:
          
             Connection-specific DNS Suffix  . :
             Link-local IPv6 Address . . . . . : fe80::679f:839e:efa0:54a9%23
             IPv4 Address. . . . . . . . . . . : 192.168.56.1
             Subnet Mask . . . . . . . . . . . : 255.255.255.0
             Default Gateway . . . . . . . . . :
          
          Unknown adapter OpenVPN TAP-Windows6:
          
             Connection-specific DNS Suffix  . :
             Link-local IPv6 Address . . . . . : fe80::fe25:85c2:b1b1:e166%29
             IPv4 Address. . . . . . . . . . . : 10.0.2.2
             Subnet Mask . . . . . . . . . . . : 255.255.255.0
             Default Gateway . . . . . . . . . :
          
          Wireless LAN adapter Wi-Fi 2:
          
             Media State . . . . . . . . . . . : Media disconnected
             Connection-specific DNS Suffix  . :
          
          Wireless LAN adapter Local Area Connection* 11:
          
             Media State . . . . . . . . . . . : Media disconnected
             Connection-specific DNS Suffix  . :
          
          Wireless LAN adapter Local Area Connection* 12:
          
             Media State . . . . . . . . . . . : Media disconnected
             Connection-specific DNS Suffix  . :
          
          Ethernet adapter Bluetooth Network Connection 2:
          
             Media State . . . . . . . . . . . : Media disconnected
             Connection-specific DNS Suffix  . :
          

          When Running packet sniff on the PF sense on the OpenVPN interface I can see 10.0.2.2 (Remote windows 10) on the VPN interface but not on the LAN interface when running a ping for 10.0.0.250.

          -Douglas

          V 1 Reply Last reply Mar 20, 2023, 5:45 PM Reply Quote 0
          • V
            viragomann @gizmobrat
            last edited by Mar 20, 2023, 5:45 PM

            @gizmobrat
            The client side route look well. No conflict there to see.

            When Running packet sniff on the PF sense on the OpenVPN interface I can see 10.0.2.2 (Remote windows 10) on the VPN interface but not on the LAN interface when running a ping for 10.0.0.250.

            So we are back at the firewall rules. The pinged IP is existing, I guess, and you can ping it from pfSense itself?
            You said you ran the wizard. This should have added a rule on the OpenVPN tab allowing any source to any destination. Can you verify this?

            Or maybe can you see any blocks in the firewall logs?

            G 2 Replies Last reply Mar 20, 2023, 5:51 PM Reply Quote 0
            • G
              gizmobrat @viragomann
              last edited by Mar 20, 2023, 5:51 PM

              @viragomann
              10.0.0.250 is the file server and it can be pinged from PFSense and from local devices. I have attached screenshots of the Firewall rules dealing with OpenVPN. Going to start looking at logs now.

              7261c8fe-ee0e-495e-b563-789310af3cf2-image.png

              ae4cd39f-378e-4862-b04e-aef6b1f33919-image.png
              3dc88429-7306-4912-8b14-e8f1fe88052f-image.png

              V 1 Reply Last reply Mar 20, 2023, 6:01 PM Reply Quote 0
              • G
                gizmobrat @viragomann
                last edited by gizmobrat Mar 20, 2023, 6:03 PM Mar 20, 2023, 6:01 PM

                @viragomann
                Looking through the logs, I am seeing the following items being blocked on destination 10.0.2.2.

                b28b1e31-e792-4b27-85de-8c3e5030ae2e-image.png

                1 Reply Last reply Reply Quote 0
                • V
                  viragomann @gizmobrat
                  last edited by Mar 20, 2023, 6:01 PM

                  @gizmobrat
                  The rule on OpenVPN only allows TCP. So it doesn't match to ping.
                  However, since you have assigned the OpenVPNInterface to the server, where the rule allows any, ping should be allowed though.

                  Note that OpenVPN is an interface group. It includes all OpenVPN instances running on the machine.
                  Rules on interface groups a probed before one on the member interface. Hence such rule have priority.

                  When you ping 10.0.0.250 from pfSense, change the source to the OpenVPN server and check if you get still responses.

                  G 1 Reply Last reply Mar 20, 2023, 6:08 PM Reply Quote 0
                  • G
                    gizmobrat @viragomann
                    last edited by Mar 20, 2023, 6:08 PM

                    @viragomann
                    When pinging from the OpenVPN Interface I get 100% packet loss. So will this be a firewall or a routing error?

                    Secondly under Interfaces/Interface Groups I am seeing no groups.

                    V 1 Reply Last reply Mar 20, 2023, 6:13 PM Reply Quote 0
                    • V
                      viragomann @gizmobrat
                      last edited by Mar 20, 2023, 6:13 PM

                      @gizmobrat said in OpenVPN Remote users are able to access Router but not hosts on local network:

                      @viragomann
                      When pinging from the OpenVPN Interface I get 100% packet loss. So will this be a firewall or a routing error?

                      I suspect, it is. But on the server side. Either the destination device blocks the ping or it routes responses to anywhere else than back to pfSense.
                      Are you sure it has pfSense set as default gateway?

                      Secondly under Interfaces/Interface Groups I am seeing no groups.

                      You can see custom groups only there. OpenVPN is implicitly added by pfSense.
                      But that shouldn't matter so far.
                      You wouldn't need to assign an interface to the server for your purposes. It's only needed for policy routing or alike.

                      1 Reply Last reply Reply Quote 0
                      13 out of 13
                      • First post
                        13/13
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received