Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site-to-Site OpenVPN Problem on 2.7.0

    Scheduled Pinned Locked Moved OpenVPN
    9 Posts 4 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      Doody
      last edited by

      Just adding my 2 cents here, I am also having issues with OpenVPN since the upgrade to 2.70.

      Pfsense is configured as the OpenVPN server, after the upgrade to 2.70 my LAN clients (192.168.0.1/24) on the Pfsense side could not trace or ping anything to the client side anymore

      So I deleted the Pfsense OpenVPN server config and then followed this guide and set it all up from scratch, but I still have the same issue :-

      https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-s2s-tls.html

      The OpenVPN client establishes the tunnel to Pfsense, Pfsense FW can ping all clients on the remote client subnet (192.168.8.0/24) and the remote firewall on the client side can ping all hosts on the Pfsense LAN (192.168.0.1/24) including the Pfsense FW

      87f06318-5f20-42c2-b30b-7b4fb514d43d-image.png

      Tunnel :-

      974e73cb-2d1b-4f64-8c09-bd78db0d5edf-image.png

      OpenVPN logs :-

      ef0120ae-503d-43ff-8cf1-f4693d09a9a4-image.png

      All I see in regards to ICMP from 192.168.1.11 to 192.168.8.0 when pinging from the Pfsense client side in states is :-

      0cd973f2-6d62-49fc-9bc3-2f7b7c8214e3-image.png

      The Firewall and NAT rules are also setup as per the linked document above.

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        I moved this to another thread because that other thread isn't the place to add on new potentially unrelated issues even if the symptoms seem similar.

        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          • Look under Diagnostics > Routes and:
            • Make sure there is a default route for IPv4
            • See what the entry for 192.168.8.0/24 looks like. Is it pointing to the correct OpenVPN interface/address?
          • Make sure you do not have any routes for 192.168.8.0/24 under System > Routing, Routes tab
          • Try a ping from the firewall itself using the LAN for the source
          • Check the LAN rules, make sure the client on LAN isn't hitting a rule with a gateway set

          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          D 1 Reply Last reply Reply Quote 0
          • D
            Doody @jimp
            last edited by

            @jimp

            IPV4 routes, ovpns10 is the correct interface and there is a default route :-

            001d0184-4483-4a71-841c-ff5f853fd7cc-image.png

            System /Routing / Static Routes :-

            2249c7e4-e1a9-435d-94c9-e52482d12777-image.png

            Ping from LAN :-

            2ef2c9f1-5e84-4bd7-a73a-e3ce44b3f45c-image.png

            So I guess, last thing to check is the LAN rules

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @Doody
              last edited by

              @Doody
              Change the tunnel subnet mask to /30 in the server settings if you need only one client to connect, otherwise configure a CSO for each.

              jimpJ 1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate @viragomann
                last edited by

                @viragomann said in Site-to-Site OpenVPN Problem on 2.7.0:

                @Doody
                Change the tunnel subnet mask to /30 in the server settings if you need only one client to connect, otherwise configure a CSO for each.

                No, don't do that. OpenVPN is neglecting that code path so it may stop working in the future. Stick with SSL/TLS and overrides.

                Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                V 1 Reply Last reply Reply Quote 1
                • V
                  viragomann @jimp
                  last edited by

                  @jimp
                  So in future you need to configure a CSO for each single site to site?

                  jimpJ 1 Reply Last reply Reply Quote 1
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate @viragomann
                    last edited by

                    @viragomann said in Site-to-Site OpenVPN Problem on 2.7.0:

                    @jimp
                    So in future you need to configure a CSO for each single site to site?

                    That seems to be the way they're pushing people upstream. Though you can also use TAP mode in certain cases if you want to use things like routing protocols.

                    With DCO mode on Plus you can use traditional routing because of the way it's hooked into the kernel. It works more like a regular interface there instead of only using OpenVPN's internal routing.

                    But for plain site-to-site setups with OpenVPN they really want people using the client/server/override model.

                    Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 1
                    • P
                      pita25216
                      last edited by

                      With DCO mode on Plus you can use traditional routing because of the way it's hooked into the kernel. It works more like a regular interface there instead of only using OpenVPN's internal routing.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.