• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

openvpn site to site cannot access remote pfsense router

Scheduled Pinned Locked Moved OpenVPN
13 Posts 3 Posters 1.5k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R
    rampuse
    last edited by rampuse Jul 5, 2023, 8:21 AM Jul 5, 2023, 8:17 AM

    hello,
    i have setup openvpn site to site tunnel. i have set tunnel address to 172.55.55.0/30 on both sides. both sides are using pfsense on a x86 pcs.
    i can ping from client side (NOT static ip. mostly cgnat by isp. pfsense pc is in lan subnet of main router) the other pfsense server.
    i am not doing any extra vpn things on any machines. i am purely using the two pfsense machines to create a site to site connection. i want the pcs connected to one pfsense's subnet to access the other pfsense's sunbet pcs. both machines have dhcp as their wan (since main gateway routers are different). i have port forwarded the port from the main gateway to the pfsense machine on the server side.
    i ahve setup opnvpn "interface" on both siddes.
    i have setup allow rules in the firewall tab on both machines.
    the server and client are both connected to each other thru the tunnel.
    Problem--> i cannot open the main pfsense server interface via the web browser from the client subnet machines. i can ping it BUT not open its interface via web browser!!!

    BTW i am completely new to networking and pfsense and firewalls. i dont use the cmd to setup anything. i used the gui of pfsense to setup everything. complete newbie to firewalls and pfsense.

    V 1 Reply Last reply Jul 5, 2023, 10:05 AM Reply Quote 0
    • V
      viragomann @rampuse
      last edited by Jul 5, 2023, 10:05 AM

      @rampuse said in openvpn site to site cannot access remote pfsense router:

      i can ping it BUT not open its interface via web browser!!!

      What do you get in the browser exactly?

      i want the pcs connected to one pfsense's subnet to access the other pfsense's sunbet pcs.

      Is this working already?

      Are the local network devices on either side connected to pfSense LAN or are they directly connected to the main router?

      Which local subnets to you use?
      Show the routing table of both pfSense. Diagnostic > Routes

      R 1 Reply Last reply Jul 5, 2023, 4:24 PM Reply Quote 0
      • R
        rampuse @viragomann
        last edited by Jul 5, 2023, 4:24 PM

        @viragomann
        the browser is just blank:
        "This site can’t be reached
        192.168.7.7 took too long to respond."

        the local network devices are connected to pfsense lan.

        BTW i reset BOTH pfsenses to factory defaults, BUT same issue. this time i did NOT create the "interface" s
        smb share from one subnet to other subnet are working fine!!!!!!!
        just the pfsense webpage doesnt open in browser!!!!!!!!

        subnet on server side: 192.168.7.0/24
        subnet on client side: 192.168.2.0/24

        routing table of server:
        server routes.jpg

        routing table of client:
        client routes.jpg .

        V 1 Reply Last reply Jul 5, 2023, 5:52 PM Reply Quote 0
        • V
          viragomann @rampuse
          last edited by Jul 5, 2023, 5:52 PM

          @rampuse said in openvpn site to site cannot access remote pfsense router:

          "This site can’t be reached
          192.168.7.7 took too long to respond."

          So the browser doesn't get a response like the access was blocked by the server.
          That's weird, as you can access smb shares on the server site. So I assume that you have allowed at least TCP from 192.168.2.0/24 to 192.168.7.0/24 on the VPN interface.

          Anyway, something in the firewall log?
          Maybe enable the logging in all related rules.
          Do you have floating block rules, which match this traffic by any chance?

          R 1 Reply Last reply Jul 6, 2023, 4:44 PM Reply Quote 0
          • R
            rampuse @viragomann
            last edited by rampuse Jul 6, 2023, 4:54 PM Jul 6, 2023, 4:44 PM

            @viragomann
            Now i have configured NEW tunnel/VPN with ssl/tls method. this tunnel simply cannot ping the remote server. the setup is same. this time also the both sides have got/assigned a tunnel ip of 172.55.55.1 and all. but i cannot ping the other side!!!!! no smb either this time. cannot ping the other lans pcs!!!!! this time i have also created a openvpn 'interface' on client side. still no luck............
            i just followed the netgate documentation to create the vpn.

            server side routes:

            llllllll.jpg

            server side dashbaord:

            pppppppp.jpg

            client side routes:

            ttttt.jpg

            client side dashboard:

            dashboard.jpg

            should i do anything in firewall > rules > floating ???????? it is currently just at default.

            V 1 Reply Last reply Jul 6, 2023, 5:10 PM Reply Quote 0
            • V
              viragomann @rampuse
              last edited by Jul 6, 2023, 5:10 PM

              @rampuse
              Set the tunnel network mask to /30 on the server.

              There is no need to assign interfaces to the OpenVPN instances as long as you don't need to policy route traffic to the other site or forward public traffic to the remote site.

              Firewall rules are needed on all incoming interfaces. Either on the interfaces which you've assigned especially or on the OpenVPN tab.
              And also on the LAN.
              E.g. to access from site A LAN to B LAN you need a proper rule at A on LAN and at B on the VPN interface.

              Consider the OpenVPN rule tab is an interface group for all OpenVPN instances. Rules you add there are applied to all incoming vpn traffic in case it matches.

              R 1 Reply Last reply Jul 8, 2023, 5:09 PM Reply Quote 0
              • R
                rampuse @viragomann
                last edited by Jul 8, 2023, 5:09 PM

                @viragomann
                the server side dashboard shows under 'client instance statistics' the remote/virtual ip as '172.55.55.1' and the same on client side shows '172.55.55.2'
                is this correct/ok?
                client dashboard:
                egggef.jpg

                V 1 Reply Last reply Jul 8, 2023, 6:17 PM Reply Quote 0
                • V
                  viragomann @rampuse
                  last edited by Jul 8, 2023, 6:17 PM

                  @rampuse
                  Yes, that's ok. The server takes the first IP in the tunnel subnet, the first client gets the next one.

                  R 1 Reply Last reply Jul 10, 2023, 1:11 PM Reply Quote 0
                  • R
                    rampuse @viragomann
                    last edited by Jul 10, 2023, 1:11 PM

                    @viragomann
                    it seems i found the problem. i just changed the following settings and now everything works!!! :
                    changed tunnel address from /30 to /31
                    added 'concurrent connections' as '1'
                    now ssl works.
                    also did wireguard site2site. it also wasnt working TILL i did tunnel address as /31

                    now everything works!!
                    thus, for site 2 site, the tunnel address HAS to be a /31 !!!

                    R 1 Reply Last reply Jul 10, 2023, 1:13 PM Reply Quote 1
                    • R
                      rampuse @rampuse
                      last edited by Jul 10, 2023, 1:13 PM

                      @rampuse thanks for everyone who tried to help

                      1 Reply Last reply Reply Quote 0
                      • R
                        Rico LAYER 8 Rebel Alliance
                        last edited by Jul 10, 2023, 1:14 PM

                        Using public IP space in private networks is a bad idea ("172.55.55.0 - 172.55.55.255 is an IP address range owned by T-Mobile USA, Inc. and located in United States").

                        -Rico

                        R 1 Reply Last reply Jul 10, 2023, 2:20 PM Reply Quote 1
                        • R
                          rampuse @Rico
                          last edited by Jul 10, 2023, 2:20 PM

                          @Rico
                          WTF !! I thought 10. AND 172. AND 192. are ALL private ranges. need to search the net for some clarification/info.

                          1 Reply Last reply Reply Quote 0
                          • R
                            Rico LAYER 8 Rebel Alliance
                            last edited by Jul 10, 2023, 2:22 PM

                            10.0.0.0/8 (255.0.0.0) [10.0.0.0 – 10.255.255.255]
                            172.16.0.0/12 (255.240.0.0) [172.16.0.0 – 172.31.255.255]
                            192.168.0.0/16 (255.255.0.0) [192.168.0.0 – 192.168.255.255]

                            https://en.wikipedia.org/wiki/Private_network

                            -Rico

                            1 Reply Last reply Reply Quote 2
                            13 out of 13
                            • First post
                              13/13
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                              This community forum collects and processes your personal information.
                              consent.not_received