Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Concentrator or something else?

    Scheduled Pinned Locked Moved OpenVPN
    18 Posts 4 Posters 878 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      lewis
      last edited by

      I have a network where remote users have to access resources. They don't really need a VPN, at least, they don't need direct access to the local LAN but they need a way to get to services and servers, similar to regular rules but without having to constantly update the IPs.

      Some users would have access to services on servers while some users would have direct ssh/etc access to servers on the LAN.
      I was told that pfsense could act as a 'concentrator' but I'm not sure that's what I need.
      One more kind of user would be remote Linux servers that should be given access to the local LAN as if they were on the LAN.

      Can I do all this using the OpenVPN part of pfsense?

      johnpozJ Dobby_D 2 Replies Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @lewis
        last edited by johnpoz

        @lewis said in Concentrator or something else?:

        pfsense could act as a 'concentrator'

        Well yeah, a vpn "concentrator" is just really something that handles multiple vpn connections. So sure pfsense could have vpn connections to multiple work locations for example for site to site stuff. It can handle multiple types, ipsec, openvpn, wireguard, etc.

        So for example your client could connect via a road warrior connection into pfsense, and get to say a remote location via pfsense ipsec vpn connection to that remote site, etc.

        What you allow a client to connect to once they vpn into pfsense would be up to you, be it you allow them complete access to anything on the lan on any port. or just allow them to access one server IP on port 443, etc.. user 2 might be able to connect some lan or other network of IP of yours on rdp for example.

        Once a client connects to your vpn, they would be able to use your networks dns and resolve www.workdomain.home.arpa that points to some servers rfc1918 IP address on your network, etc.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        L 1 Reply Last reply Reply Quote 1
        • L
          lewis @johnpoz
          last edited by

          Hi @johnpoz,

          So the word 'concentrator' isn't really what this would be but pretty much a vpn server then.
          And it sounds like I could still use rules to control access to different things.

          I've done vpn setups before but they were mainly just remote access to the entire LAN, not selective services and servers.
          I guess I'll set one up and see how far I can get.

          Also, I recall that in the version before this latest, there was a memory issue with ipsec so I used to turn it off any time I'd set up a firewall. I assume this is no longer an issue.

          johnpozJ JKnottJ 2 Replies Last reply Reply Quote 0
          • Dobby_D
            Dobby_ @lewis
            last edited by

            @lewis said in Concentrator or something else?:

            I was told that pfsense could act as a 'concentrator' but I'm not sure that's what I need.
            One more kind of user would be remote Linux servers that should be given access to the local LAN as if they were on the LAN.

            A "VPN Concentrator" is often set up near by a normal border router or border firewall
            it makes then sense to let there all VPN users in and don´t stress the other border units.

            • Strong and/or fast CPU
            • Much and/or fast amount of RAM
            • Much Cores/HT without the need of PPPoE
            • QAT card, AES-NI CPU or crypto card like AHA Comtech to speed up much VPN`s
              massively or for an amount of many VPN users or roadwarriors.

            Can I do all this using the OpenVPN part of pfsense?

            Often it makes more sense to set up a small but strong
            VPN server in the DMZ. Like a SoftEtherVPN Server.

            #~. @Dobby

            Turris Omnia - 4 Ports - 2 GB RAM / TurrisOS 7 Release (Btrfs)
            PC Engines APU4D4 - 4 Ports - 4 GB RAM / pfSense CE 2.7.2 Release (ZFS)
            PC Engines APU6B4 - 4 Ports - 4 GB RAM / pfSense+ (Plus) 24.03_1 Release (ZFS)

            1 Reply Last reply Reply Quote 1
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @lewis
              last edited by

              @lewis said in Concentrator or something else?:

              'concentrator' isn't really what this would be but pretty much a vpn server then.

              They use the word to describe something that does more than just 1 vpn connection, etc. And normally might handle multiple types of connections site2site, road warrior, etc.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • L
                lewis
                last edited by

                Got it. I'll try setting one up on a firewall that's not very busy and see where I get.

                1 Reply Last reply Reply Quote 0
                • L
                  lewis
                  last edited by lewis

                  I decided to use this as a reference since a split tunnel is in fact the configuration I'd like.
                  https://www.wundertech.net/how-to-set-up-openvpn-on-pfsense/

                  It works, I can connect and ping (in this case) the vpn tunnel IP of 10.10.10.1.

                  The PC I'm connecting from is on a LAN that has networks 192.168.1.0/24, 192.168.254.0/24, and 10,0.0.0/24.
                  When the vpn is disconnected, I can ping all three gateways but when the vpn is connected, I can ping two but not the 10.0.0.0/24.

                  The thing is that the LAN network on the vpn server side is 10.0.0.0/24 and the vpn user will need access to those from the vpn connection.

                  I suppose I have to set up some rules on pfsense now to provide access to some of those servers/services on the the lan.
                  It's a bit unclear yet how I do that. For example, say I want to give ssh access to 10.0.0.9 on the vpn server side. I'd have to add a rule that would give either everyone or a specific user/ip access to 10.0.0.9. Would the remote user connect to 10.0.0.9 or 10.10.10,1, port 22. If that's the same, it means I'd have to use custom ports for everything.

                  Maybe I should be using a 172.16.x.x/24 instead for the vpn server, just to prevent some confusion.
                  I'm also assigning specific IPs to each user so I know who is who.

                  Lots to learn, another new thing for me.

                  1 Reply Last reply Reply Quote 0
                  • JKnottJ
                    JKnott @lewis
                    last edited by

                    @lewis said in Concentrator or something else?:

                    So the word 'concentrator' isn't really what this would be but pretty much a vpn server then.

                    A "concentrator" is simply a means for multiple devices to share a connection, assuming those devices only use it part time. I first came across the term about 50 years ago, when I was a technician working in the Toronto Stock Exchange. Concentrators were used to connect multiple stock broker terminals to a single port on a computer. These days an Ethernet switch could be called a concentrator, when connecting a local network to an ISP. Another name for it is "statistical multiplexer".

                    PfSense running on Qotom mini PC
                    i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                    UniFi AC-Lite access point

                    I haven't lost my mind. It's around here...somewhere...

                    1 Reply Last reply Reply Quote 1
                    • L
                      lewis
                      last edited by lewis

                      I've hit a roadblock.

                      I added a rule to allow a specific user/IP to reach a server on the 10.0.0.0 network.
                      02b6cfb2-d1c6-42c8-9f1a-e9030aa1931d-image.png

                      I allowed the IP on the server itself for ssh. I can see the remote vpn user hitting the server but not getting a response.

                      The firewalld rule;
                              rule family="ipv4" source address="10.10.10.10/32" port port="22" protocol="tcp" accept
                      
                      # tcpdump -i ens18 src host 10.10.10.10
                      dropped privs to tcpdump
                      tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
                      listening on ens18, link-type EN10MB (Ethernet), capture size 262144 bytes
                      12:20:03.468302 IP 10.10.10.10.50526 > dev09.loc.ssh: Flags [S], seq 1895313320, win 8192, options [mss 1358,nop,wscale 8,nop,nop,sackOK], length 0
                      12:20:06.465188 IP 10.10.10.10.50526 > dev09.loc.ssh: Flags [S], seq 1895313320, win 8192, options [mss 1358,nop,wscale 8,nop,nop,sackOK], length 0
                      12:20:12.469257 IP 10.10.10.10.50526 > dev09.loc.ssh: Flags [S], seq 1895313320, win 8192, options [mss 1358,nop,nop,sackOK], length 0
                      
                      

                      Since other hosts can make it to the server's ssh, I'm not sure why this is not working.

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @lewis
                        last edited by

                        @lewis said in Concentrator or something else?:

                        Since other hosts can make it to the server's ssh, I'm not sure why this is not working.

                        You have an any rule there at the bottom so yeah anyone would be able to go anywhere.. And rule that allows 10.10.10/24 to go anywhere as well

                        If you don't want them to get to ssh but only that .10 address, then create below your allow to ssh that specifically blocks to ssh.. or blocks all, etc.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        L 1 Reply Last reply Reply Quote 0
                        • L
                          lewis @johnpoz
                          last edited by

                          @johnpoz

                          Yes, I noticed that I have an extra/wrong rule but wasn't yet sure what to do so left it there.

                          Do you mean like this?
                          c501c72a-d054-4c68-8615-b270afb845ae-image.png

                          Since this still doesn't work, I guess I have to review rules I've made in the past on a multi network pfsense that allows traffic between nets.

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @lewis
                            last edited by johnpoz

                            @lewis that rule would allow specific only - nothing else would be allowed.. So for example if your trying to look up where you want to ssh via dns - dns wouldn't work.

                            But that rule would allow that source IP to talk to that destination IP on 22 only.

                            Keep in mind just turning off a rule wouldn't actually block anything that already had a state.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • L
                              lewis
                              last edited by

                              Yes, that's what I'm after, a rules based access to specific resources.
                              This first user should have access to certain hosts and ports only.
                              The split network aspect is perfect for this setup.

                              Now, I'm still not sure why this rule is not working then. It's forwarding to the 10.0.0.9 server and I see the incoming connection but is never completes.

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @lewis
                                last edited by

                                @lewis Well does this 10.0.0.9 box know how to get back to this 10.10.10 network, its gateway is pfsense?

                                Does this 10.0.0.9 box have its own firewall?

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • L
                                  lewis
                                  last edited by lewis

                                  It does. I shared it a few comments ago.

                                  The firewalld rule;
                                  rule family="ipv4" source address="10.10.10.10/32" port port="22" protocol="tcp" accept

                                  I can see the remote hitting the server but oddly, it's not allowing it. Strange.

                                  14:33:54.341956 IP 10.10.10.10.60188 > dev09.loc.ssh: Flags [S], seq 2394177693, win 8192, options [mss 1358,nop,wscale 8,nop,nop,sackOK], length 0
                                  14:33:57.348343 IP 10.10.10.10.60188 > dev09.loc.ssh: Flags [S], seq 2394177693, win 8192, options [mss 1358,nop,wscale 8,nop,nop,sackOK], length 0
                                  14:34:03.359242 IP 10.10.10.10.60188 > dev09.loc.ssh: Flags [S], seq 2394177693, win 8192, options [mss 1358,nop,nop,sackOK], length 0
                                  
                                  johnpozJ 1 Reply Last reply Reply Quote 0
                                  • johnpozJ
                                    johnpoz LAYER 8 Global Moderator @lewis
                                    last edited by johnpoz

                                    @lewis so your firewall rule is wrong on the host.. Or its not listening on 22? Or maybe its sending it answer elsewhere?

                                    Just because you see traffic via a sniff, doesn't mean the firewall actually allows it up the stack..

                                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                                    If you get confused: Listen to the Music Play
                                    Please don't Chat/PM me for help, unless mod related
                                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                                    1 Reply Last reply Reply Quote 0
                                    • L
                                      lewis
                                      last edited by lewis

                                      I understand but It's pretty weird to me that the firewall is allowing everything but this host.
                                      I shared the rule output above. It's like all the other ones.
                                      I think I know why this isn't working. It's because the firewall I set this up on is not on the same network as the server is. Meaning, the servers gateway is different so it's not routing back to this firewall. I'll just move this config to the other one and it should be fine.

                                      At this point, it's not a pfsense issue so I think the post is done :).

                                      1 Reply Last reply Reply Quote 0
                                      • L
                                        lewis
                                        last edited by lewis

                                        I confirm. Everything is working now. The packets were going back to the wrong gw.
                                        It's too bad the dashboard widget doesn't provide more information about the individual connections but I guess I can get that from some other program on the firewall like bandwidthd for example.

                                        Update: Nope, can't get that from bandwidthd.

                                        All good now.

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.