Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Inter-Vlan Routing Accross VPN

    Scheduled Pinned Locked Moved OpenVPN
    47 Posts 4 Posters 21.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      You have your public IP NATed  > pfsense boxes?

      TINC doesn't like NAT.  I assumed you would be setting this right against the public IP as the primary router/firewall so TINC would not be behind any NAT.
      I'm not a TINC Expert or even TINC novice for that matter.  I know a few people do chat about using it.
      The guys at the last DEFCON were saying they use it for their Chaos Network.  Maybe some of their grey hats would be willing to set you up.
      (Kidding) - I hope you get it worked out.  I might later find an excuse to use it, but not so far.

      1 Reply Last reply Reply Quote 0
      • J
        jfinnigan
        last edited by

        They will each have Public IPs in practice.

        however I need to do labs with them before I deploy them.

        Too bad Pfsense doesn't have WIC cards like Cisco Router (hehe)

        I've tried a cross-over cable between both boxes, with static WAN IPs (and even tried put the opposite one as the others Gateway)
        Tried them on the same switch with  etc.

        Nothing seems to work to make them talk over a fake WAN locally.  This happens with any of the three VPN technologies currently. Any Ideas how to make them talk? I need to do some labs with time to make sure they will configure correctly before I just deploy them.

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          If you want to pretend they are in a Public IP environment, with no NAT screwing with them, try this.

          Use a cheap off the shelf old router (like a linksys or belkin or whatever).  Use DHCP.
          Plug the WAN of each of your PFsense boxes into LAN ports on that router.
          Now, they should each get a IP and they shouln't be behind NAT.
          At this point they should be able to do whatever it is you are trying to make them do.
          However, this assumes TINC is working correctly and your settings are correct.
          I'm not sure what your LAN is like, but I know that a cheap dumb router should let you accomplish this.
          (Disclaimer - I've never set up TINC, so no idea if the package works.  My fingers are crossed)

          1 Reply Last reply Reply Quote 0
          • J
            jfinnigan
            last edited by

            Just an Update, I could never get TINC working it try to connect and does for a few mintine or so, and then fails..

            IPSEC works fine though.

            To bad pfsense doesn't have this: http://sourceforge.net/projects/opennhrp/

            1 Reply Last reply Reply Quote 0
            • K
              kejianshi
              last edited by

              I'm glad its working…

              "NHRP, GRE and IPsec. It aims to be Cisco DMVPN compatible."

              I've had many many bad experiences with GRE and I avoid it like the plague, but I'll take a look it this.

              Are you still on pfsense then?

              Other than simply "IPSEC" what other issues did you work out?

              1 Reply Last reply Reply Quote 0
              • J
                jfinnigan
                last edited by

                you know one other thing I didn't think about with TINC is the firewall may need to be opened on wan for port 655.  all the other (Ipsec and OpenVPN) automatically do that, without creating rules but since tinc is not an official package it may not.. just a though. I'll check it again.

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  "the firewall may need to be opened on wan for port 655"

                  haha…  I said that early on, but maybe it was lost in the clutter and frustration.

                  It happens.

                  1 Reply Last reply Reply Quote 0
                  • J
                    jfinnigan
                    last edited by

                    I feel really dumb now.. The firewall rules was the only Issue with it not connecting. I'm going to play with the multiple subnets this weekend but it's looking promising. Seems to have much less over head than IPsec does too

                    1 Reply Last reply Reply Quote 0
                    • K
                      kejianshi
                      last edited by

                      To error is human…  And a little funny when its someone else erroring :D

                      I feel your pain.  I've been there.

                      For what its worth, you sound wicked smart and fast learner.

                      1 Reply Last reply Reply Quote 0
                      • J
                        jfinnigan
                        last edited by

                        FYI, this is working great It's been in production for a while now. Great throughput even over TINC VPN

                        now the only thing I wish I could figure out is how to get Pfsense to do local dns lookup for dhcp client that don't specify a domain, just a hostname.

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          Services > DNS forwarder

                          Options there don't get you what you want?

                          1 Reply Last reply Reply Quote 0
                          • J
                            jfinnigan
                            last edited by

                            It works if I do an NSlookup/ping for Computer.localdomain but just computer does not work. if I do the nslookup or ping from pfsense itself it works with just the computer hostname.

                            1 Reply Last reply Reply Quote 0
                            • K
                              kejianshi
                              last edited by

                              I wonder if a ubuntu machine with Samba 4.0 set up as a  WINs server would help?

                              1 Reply Last reply Reply Quote 0
                              • J
                                jfinnigan
                                last edited by

                                Oh yeah I fogort how DNS works there :)

                                I wonder if there is a pre-made WINS Server VM for ESXI lol.

                                1 Reply Last reply Reply Quote 0
                                • K
                                  kejianshi
                                  last edited by

                                  Probably - But its stupid easy to make your own and you have demonstrated the ability.  I think it would be a piece of cake for you.  Just set it up to act as your DC.

                                  1 Reply Last reply Reply Quote 0
                                  • J
                                    jfinnigan
                                    last edited by

                                    I only needed DNS to work from Staff Vlans -> Public and not vice versa. Our staff vlan doesn't use pfsense for DHCP/DNS it uses our domain controllers

                                    So what I did was.
                                    Make each pfsense box a different domain so they would be appended different dns suffixes to the hostnames
                                    On the DNS Server on the domain controllers  I setup conditional forwarders for Pfsense domain
                                    and In Group Policy Set DNS Suffix Search List to a comma seperated list with our Windows Domain being first and the pfsense domains after.

                                    1 Reply Last reply Reply Quote 0
                                    • K
                                      kejianshi
                                      last edited by

                                      That sounds fun…  Did it work?

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        jfinnigan
                                        last edited by

                                        It's working great so far. Sadly, if I intergted to sync between DNS Server/Active Directory it fails, but if I put it manually on each of them it works fine.

                                        1 Reply Last reply Reply Quote 0
                                        • T
                                          thetallkid
                                          last edited by

                                          jfinnigan, I have a few setup related questions about tinc.

                                          Under VPN –> Tinc --> Hosts
                                          Should the public key be the same as the one used in the Config section?

                                          1 Reply Last reply Reply Quote 0
                                          • J
                                            jfinnigan
                                            last edited by

                                            The ones under Hosts should be the public key from the other Hosts you are connecting too, not the same as the public key you configured on that box. (for security all hosts should use different public/private keys)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.