Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VPN -> LAN (OK) | LAN -> VPN (OFF) need both working

    Scheduled Pinned Locked Moved General pfSense Questions
    53 Posts 2 Posters 3.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      BRQ_michael @stephenw10
      last edited by

      @stephenw10 Done, no ping

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        So no states created on any interface?

        Was the ping running while you checked the states? The states will close quickly after the ping stops, like maybe 30s.

        1 Reply Last reply Reply Quote 0
        • B
          BRQ_michael @stephenw10
          last edited by

          @stephenw10 Exactly, Totally unavailable LAN -> VPN

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Hmm, then check the firewall logs. Is that blocked on LAN?

            If not check the routing table on the LAN client running the ping. Is it somehow trying to ping directly? Like maybe is still has a VPN connection active and isn't even trying to use the LAN?

            B 1 Reply Last reply Reply Quote 0
            • B
              BRQ_michael @stephenw10
              last edited by

              @stephenw10 Nothing appears in the logs when I try to ping.
              It's not possible that this is something that abnormal, I don't even make settings other than what comes by default in PFSENSE

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                If the LAN host is pinging something in the 50.50.50.X subnet and it is using pfSense as it's default gateway that traffic will arrive at the LAN interface. So it will either be blocked or passed and open a state.

                Try running a packet capture on the LAN filtered by the target IP (50.50.50.X) and then running the ping from the LAN host. If those pings don't arrive at the LAN then there is some routing issue on the LAN host.

                B 1 Reply Last reply Reply Quote 0
                • B
                  BRQ_michael @stephenw10
                  last edited by stephenw10

                  @stephenw10

                  CONFIG FOR LOGS:
                  b04dff00-8f65-44e6-8503-bef033b86df8-image.png

                  LOGS:

                  10:50:20.318469 IP 192.168.140.3.445 > 50.50.50.2.54499: tcp 132
                  10:50:20.318544 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 750
                  10:50:20.318586 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 750
                  10:50:20.318657 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 750
                  10:50:20.318717 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 749
                  10:50:20.318793 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 766
                  10:50:20.320465 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 72
                  10:50:20.323776 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 51
                  10:50:20.324112 IP 50.50.50.2.52351 > 192.168.140.3.445: tcp 1
                  10:50:20.324316 IP 192.168.140.3.445 > 50.50.50.2.52351: tcp 0
                  10:50:20.341619 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 73
                  10:50:20.343805 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 48
                  10:50:20.347624 IP 50.50.50.2.54499 > 192.168.140.3.445: tcp 92
                  10:50:20.347697 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 80
                  10:50:20.347853 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 767
                  10:50:20.347928 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 767
                  10:50:20.347929 IP 192.168.140.3.445 > 50.50.50.2.54499: tcp 128
                  10:50:20.354125 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.355054 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.356012 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.356996 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.357897 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.358843 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.359862 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.360770 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.361752 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.362722 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.363615 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1120
                  10:50:20.363803 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 48
                  10:50:20.364059 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 104
                  10:50:20.364600 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1118
                  10:50:20.365594 IP 50.50.50.2.50020 > 192.168.140.90.50025: UDP, length 1134
                  10:50:20.366410 IP 50.50.50.2.50020 > 192.168.140.90.50025: UDP, length 1134
                  10:50:20.366494 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 71
                  10:50:20.374943 IP 50.50.50.2.54499 > 192.168.140.3.445: tcp 136
                  10:50:20.375246 IP 192.168.140.3.445 > 50.50.50.2.54499: tcp 156
                  10:50:20.380252 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 75
                  10:50:20.380740 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 742
                  10:50:20.380810 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 742
                  10:50:20.380871 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 742
                  10:50:20.380941 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 742
                  10:50:20.381000 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 742
                  10:50:20.381071 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 742
                  10:50:20.381131 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 742
                  10:50:20.381201 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 742
                  10:50:20.381260 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 742
                  10:50:20.381336 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 736
                  10:50:20.381399 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 758
                  10:50:20.383143 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 51
                  10:50:20.398530 IP 50.50.50.2.53657 > 192.168.140.3.53: UDP, length 50
                  10:50:20.400254 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 61
                  10:50:20.402203 IP 50.50.50.2.50020 > 192.168.140.90.50025: UDP, length 80
                  10:50:20.402585 IP 50.50.50.2.54499 > 192.168.140.3.445: tcp 108
                  10:50:20.402791 IP 192.168.140.3.445 > 50.50.50.2.54499: tcp 100
                  10:50:20.403809 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 48
                  10:50:20.415028 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 743
                  10:50:20.415104 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 743
                  10:50:20.419528 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.420497 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.421476 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.422432 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.423124 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 48
                  10:50:20.423410 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.424435 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.425411 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.426391 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.427365 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.428353 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.429330 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.429831 IP 50.50.50.2.54499 > 192.168.140.3.445: tcp 276
                  10:50:20.430068 IP 192.168.140.3.445 > 50.50.50.2.54499: tcp 84
                  10:50:20.430548 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.431225 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.432285 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.433288 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1162
                  10:50:20.434268 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1158
                  10:50:20.434278 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 76
                  10:50:20.440307 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 64
                  10:50:20.443141 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 771
                  10:50:20.443173 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 763
                  10:50:20.443244 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 763
                  10:50:20.443306 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 763
                  10:50:20.443379 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 763
                  10:50:20.443439 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 763
                  10:50:20.443512 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 763
                  10:50:20.443571 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 763
                  10:50:20.443644 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 763
                  10:50:20.443710 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 757
                  10:50:20.443781 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 779
                  10:50:20.443785 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 51
                  10:50:20.457078 IP 50.50.50.2.54499 > 192.168.140.3.445: tcp 117
                  10:50:20.457394 IP 192.168.140.3.445 > 50.50.50.2.54499: tcp 200
                  10:50:20.460799 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 60
                  10:50:20.463234 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 48
                  10:50:20.477045 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 788
                  10:50:20.477115 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 788
                  10:50:20.480347 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 62
                  10:50:20.483227 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 48
                  10:50:20.484522 IP 50.50.50.2.54499 > 192.168.140.3.445: tcp 260
                  10:50:20.484758 IP 192.168.140.3.445 > 50.50.50.2.54499: tcp 84
                  10:50:20.488096 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1058
                  10:50:20.489003 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1058
                  10:50:20.489890 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1058
                  10:50:20.490847 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1058
                  10:50:20.491749 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1058
                  10:50:20.492651 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1058
                  10:50:20.493522 IP 50.50.50.2.50054 > 192.168.140.90.50049: UDP, length 1058
                  10:50:20.500071 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 62
                  10:50:20.503213 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 51
                  10:50:20.504777 IP 192.168.140.90.50049 > 50.50.50.2.50054: UDP, length 188
                  10:50:20.507329 IP 50.50.50.2.50635 > 192.168.140.3.53: UDP, length 32
                  10:50:20.511759 IP 50.50.50.2.54499 > 192.168.140.3.445: tcp 117
                  10:50:20.511931 IP 192.168.140.3.445 > 50.50.50.2.54499: tcp 132
                  10:50:20.518403 IP 50.50.50.2.50020 > 192.168.140.90.50025: UDP, length 1132
                  10:50:20.519377 IP 50.50.50.2.50020 > 192.168.140.90.50025: UDP, length 1132
                  10:50:20.520360 IP 50.50.50.2.50020 > 192.168.140.90.50025: UDP, length 1132
                  10:50:20.521351 IP 50.50.50.2.50020 > 192.168.140.90.50025: UDP, length 1132
                  10:50:20.521359 IP 50.50.50.2.50010 > 192.168.140.90.50001: UDP, length 58
                  10:50:20.523636 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1003
                  10:50:20.523722 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1003
                  10:50:20.523808 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1003
                  10:50:20.523894 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1003
                  10:50:20.523980 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1003
                  10:50:20.524066 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1003
                  10:50:20.524151 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1003
                  10:50:20.524237 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1003
                  10:50:20.524322 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1003
                  10:50:20.524407 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 997
                  10:50:20.524502 IP 192.168.140.90.50025 > 50.50.50.2.50020: UDP, length 1019
                  10:50:20.524504 IP 192.168.140.90.50001 > 50.50.50.2.50010: UDP, length 48
                  
                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    OK so no ICMP packets at all there. But those were all inside 0.2 seconds so maybe it wasn't running long enough?

                    What IP address on LAN were you pinging from?

                    What we can see there though is that OpenVPN clients are able to connect to hosts on the LAN and they are able to reply. And importantly that there is no NAT. The OpenVPN tunnel IPs appear directly on the LAN.

                    B 2 Replies Last reply Reply Quote 0
                    • B
                      BRQ_michael @stephenw10
                      last edited by

                      @stephenw10 This test I showed you is from the packet capture of PFSENSE itself for the IP that my clientOPENVPN is getting 50.50.50.2

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        So you didn't try to ping from LAN host?

                        Repeat the capture but try to ping from a host on the LAN.

                        Pings from pfSense itself never go through the LAN interface to reach the VPN so would not appear in the pcap.

                        1 Reply Last reply Reply Quote 0
                        • B
                          BRQ_michael @stephenw10
                          last edited by

                          @stephenw10 It's in Portuguese, but it causes 100% packet loss

                          55d6eeeb-c8ce-4628-a46a-6c5a8b146c4a-image.png

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Ok and what does the packet capture show on LAN whilst that is running?

                            What IP address in the LAN are you pinging from?

                            What is 50.50.50.2 there? Another client device?

                            By the way 50.50.50.0/24 is a public subnet belonging to Frontier Communications. You should really use a private subnet for the tunnel.

                            Steve

                            B 1 Reply Last reply Reply Quote 0
                            • B
                              BRQ_michael @stephenw10
                              last edited by

                              @stephenw10 But packet capture where? in pfsense? You told me to use ping elsewhere, I don't understand
                              50.50.50.2 is another client device that
                              50.50.50.0/24 But the tunnel already uses a private subnet, doesn't it?

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                You are saying that you need to be able to connect to OpenVPN clients from hosts in the LAN subnet and it is not working.

                                We are trying to find out why it's failing.

                                So to test that we are trying send ping traffic from a host in the LAN to a VPN client and then looking to see where it goes.

                                The first place it should hit is the pfSense LAN interface.

                                So the test is to start a packet capture on the pfSense LAN interface. Then run the ping and make sure it arrives there.

                                If it doesn't arrive then the issue is on the LAN host.

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  50.50.50.0/24 is a public subnet that should not be used here. BUT that is not the cause of the problem. It only means you could not connect to that subnet if you ever had to which is very unlikely.

                                  B 1 Reply Last reply Reply Quote 0
                                  • B
                                    BRQ_michael @stephenw10
                                    last edited by

                                    @stephenw10 I pinged directly from my machine to an OPENVPN client and captured the packets from my PFSENSE LAN interface, with these settings:65047155-16ef-422c-ae2d-3f102cc0885d-image.png

                                    Try ping 50.50.50.2:7a46ea67-b807-4ac1-9c21-0b97380515bc-image.png

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Ok great. So the ping packets are arriving in the correct place. The client is not responding so either it can't respond (it's blocking them) or it never sees the pings.

                                      Next try running the packet capture on the openvpn interface to make sure the pings are leaving the correct way.

                                      You can also check the state table while that ping is running so make sure pfSense is open states on the correct interfaces.

                                      Can I assume that if you ping the other way, from 50.50.50.2 to 192.168.140.57, it works?

                                      B 1 Reply Last reply Reply Quote 0
                                      • B
                                        BRQ_michael @stephenw10
                                        last edited by

                                        @stephenw10

                                        If I am capturing ICMP packets from my OpenVPN Server interface, the same log that I sent you appears.

                                        Yes, if I try to ping ip 50.50.50.2 to 192.168.140.57 it works normally

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Ok if you see the pings leaving the OpenVPN interface the packets are almost certainly being blocked at the VPN client. A local software firewall on 50.50.50.2.

                                          B 1 Reply Last reply Reply Quote 0
                                          • B
                                            BRQ_michael @stephenw10
                                            last edited by

                                            @stephenw10 But what could this be blocking? my rules allow everything
                                            11ea3a3b-a608-4b5c-aaa0-7f9f5e132a8f-image.png

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.