Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSEC site to site Openvpn site to site

    Scheduled Pinned Locked Moved IPsec
    8 Posts 2 Posters 656 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jba
      last edited by

      Good morning,

      I need help I don't know what to do

      I have a firewall connected point to point by ipsec to a paloalto

      works fine even openvpn clients connect correctly and can access ipsec

      I have the problem with other sites that are connected with openvpn point to point

      If I launch a ping from the client firewall and select OpenVPN client it responds but if I launch from the LAN it does not work

      If I make a tracer it is sent fine but I don't know something :(

      d7c10121-6c2d-48a3-91dd-5db7586f48dc-image.png
      ff2d7cc0-01a7-4839-8435-b16c47289a52-image.png
      5910c1d0-6f90-42a3-88c5-be679a49f27c-image.png
      9ad71180-15bb-4805-8f5e-b0e82cc39014-image.png
      870208e2-981b-4074-85d6-0cd89472218b-image.png

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @jba
        last edited by

        @jba
        Did you configure a CSO for this client on the server and is it applied without issues?
        To check this, set the log level to 4 on the server and reestablish the connection.

        1 Reply Last reply Reply Quote 1
        • J
          jba
          last edited by

          I have configured the IPs on the OpenVPN client, I don't know what you mean by the level and the CSO

          cb297f4f-71cb-498c-bca4-cedf09875c6f-image.png

          Server OpenVPN
          609a349e-faa1-457d-a216-a7cd7d714aed-image.png

          excuse my ignorance, Thanks for helping me

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @jba
            last edited by

            @jba
            VPN > OpenVPN > Client Specific Overrides
            It is necessary to route traffic to the clients side local network.

            1 Reply Last reply Reply Quote 1
            • J
              jba
              last edited by

              Hello again I can't get it to work

              I put the configuration on the vpn override client firewall or on the server side

              the common name I put the cn of the certificate

              Do I have to specify in advanced? or configure Tunnel Settings

              I try it but it doesn't work for me :(

              Thank you

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @jba
                last edited by

                @jba
                The CSO has to be configured on the server, as I mentioned already.

                In the CSO at "tunnel network" you have to state an IP out of the servers tunnel pool, e.g. 10.0.10.23/24.
                And down at "Remote Networks" you have to enter the client side networks as well as you have in the server settings.

                If this is all correct check the log to see if the CSO is applied properly.

                J 1 Reply Last reply Reply Quote 1
                • J
                  jba @viragomann
                  last edited by

                  Thanks for the support viragomann,
                  in the end it worked for me by going to IPsec to phase 2 and adding the IP range of the client's LAN

                  Thanks for everything

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @jba
                    last edited by

                    @jba
                    Glade that you got it working.
                    You're right, all subnets you want to connect across the IPSec need to be stated in a phase 2 as well.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.