Site-to-Site OpenVPN with Mikrotik : all ok from mikrotik, can't access mikrotik from pfsense
-
@RoSs81_ct
Are you missing the client specific override by any chance? -
sorry but I can't understand what you mean by your question
you mean: that I forced OVPN to use local and remote networks in a forced way? I can also remove them.
thank you in advance
-
@RoSs81_ct
VPN > OpenVPN > Client Specific Override
I assume, you've configured an SSL OpenVPN? With a shared key site-to-site this is not needed. -
you mean this?
-
@RoSs81_ct
Yes. -
-
@RoSs81_ct
In the server list you have to select the respective server for which you want to configure a CSO.You didn't reply to the VPN type. Maybe there is an easier solution.
-
unfortunately, nothing change :(
I'm considering the idea of adding a mikrotik at the other site and adding the IPs of a new internal lan to the necessary clients.
works on a pfsense with a single IF was stressful. :)
thank you so much to ALL :)
-
@RoSs81_ct
Still not clear, which authentication type you've configured.
If it's an SSL AND you don't need to connect multiple clients to the server you can simply set the tunnel mask to /30. With this the CSO isn't needed.Otherwise you have to ensure, that the CSO is applied properly and that the route are added. You can check this in the OpenVPN log, however, you have to enhance the verbosity level to 4 first and reconnect the client.
-
You are right, i forgot it.
Tls/ssl with certificate and pre shared keyConnection between the 2 side was ok, from site b ( internal lan 192.168.88.0 ) i can reach all the host of site A pfsense included .
I have one client on site A must accept 3 o 4 connection at same time, rdp session for a software.
Tomorrow, if I have time, i can post some other screenshot of pfsense vpn config for the p2p.
Best regards and thank you so much.
Have a nice WE!
-
Hi to all
so, little RECAP
SITE A:
Operator Router-> SWITCH -> ESXi with PFsense
Public IP -> Internal Lan 192.168.1.0/24 -> PFSENSE wan 192.168.1.240 with GTW 192.168.1.1 and virtual Interface ovpn peer2peerSITE B:
Operator Router-> Mikrotik -> Internal LAN
Public IP -> wan 192.168.8.1 - LAN 192.168.88.1 -> Internal Lan 192.168.88.1/24Peer to Peer tunnel 10.10.11.0/28 ( site A 10.10.11.1 / site B 10.10.11.2)
Connection OK between site
ping - other service from B to A -> OK
ping - other service from A to B -> KOPFSENSE CONFIG:
With and Without CSO tested, but nothing change.
NAT
Rules
ROUTING
SITE B: MIKROTIK
Sorry for all the photos, but, it's to understand how the 2 devices were configured.
Any help is welcome, I don't know what else to check or other configurations to try.
Esxi has no rules on the internal switch.**thank you so much for all the advice already writed, and have a nice new week.
ANDDD sorry for my English XD.**
REGARDS