Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN to Lan

    Scheduled Pinned Locked Moved OpenVPN
    15 Posts 3 Posters 3.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      cyberbot
      last edited by

      hi Guys,
      i am new to the producte and really hope someone could help,
      my problem ,
      i have a PFSENSE Firewall installed,

      PFSENSE on Location B
      WAN 192.168.2.100 ,
      LAN 192.168.1.1
      between the PFSENSE and the internet there is a ISP Gateway,
      i've configured the PFSENSE OPEN VPN, so when the remote client in location A can connect to the LAN network in the location B, however the tunnels works fine but my clients picksup my WAN ip 192.168.2.6 rather than my LAN IP after the VPN tunnel is up,

      behind the LAN i have servers which needs to be accessible from other locations,
      how can i configure the client to pick up the IP for the LAN to access the servers behind the LAN,

      to Sum up the story is the VPN not picking up a IP from my LAN but from my VPN tunnel Subnet,
      and i need it to pick up IP from the LAN
      really need your help here

      thank you so much

      1 Reply Last reply Reply Quote 0
      • M
        mattb253
        last edited by

        have you added a route to that LAN in your OpenVPN server settings?

        1 Reply Last reply Reply Quote 0
        • P
          phil.davis
          last edited by

          You should not need to use "push route" statements any more in pfSense 2.1. Put your LAN subnet in Local Network/s in the OpenVPN Server GUI settings. Then the push route stuff will be done automagically for you.
          You probably also want to give the clients a DNS server that is on your LAN so they can lookup names in your local domain - otherwise they will have to type the actual IP addresses of services on the LAN.

          Edit: You can put a comma-separated list of subnets in Local Network/s and Remote Network/s so even if you have multiple local LANs that you want the clients to reach, you can list them all and the client will be told all the routes.

          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

          1 Reply Last reply Reply Quote 0
          • M
            mattb253
            last edited by

            @phil.davis:

            You should not need to use "push route" statements any more in pfSense 2.1. Put your LAN subnet in Local Network/s in the OpenVPN Server GUI settings. Then the push route stuff will be done automagically for you.
            You probably also want to give the clients a DNS server that is on your LAN so they can lookup names in your local domain - otherwise they will have to type the actual IP addresses of services on the LAN.

            oh that's good to know, i've been putting it in anyways. been so used to putting in  :)

            1 Reply Last reply Reply Quote 0
            • C
              cyberbot
              last edited by

              @phil.davis:

              You should not need to use "push route" statements any more in pfSense 2.1. Put your LAN subnet in Local Network/s in the OpenVPN Server GUI settings. Then the push route stuff will be done automagically for you.
              You probably also want to give the clients a DNS server that is on your LAN so they can lookup names in your local domain - otherwise they will have to type the actual IP addresses of services on the LAN.

              Edit: You can put a comma-separated list of subnets in Local Network/s and Remote Network/s so even if you have multiple local LANs that you want the clients to reach, you can list them all and the client will be told all the routes.

              can you please explain the steps to do this ? as i am new to Pfsense ?
              you mean create a rules on the firewall on the VPN NIC ?

              1 Reply Last reply Reply Quote 0
              • P
                phil.davis
                last edited by

                It should all be stuff in the OpenVPN server GUI. I have attached a screenshot of an OpenVPN "Road Warrior" server I was using for testing.
                IPv4 Local Network/s - this server had the whole of 10.49.0.0/16 and 10.51.0.0/16 reachable behind it, so I listed both of those.
                DNS Default Domain - put your internal domain name here, then the clients will "become part of it".
                DNS Servers - put the IP address of the DNS server on your network. In this case, I put the address of pfSense itself because it was running DNS Forwarder.

                On the OpenVPN firewall rules tab, make sure to have rules that allow traffic to the various subnets/IPs… that you want to be reached in "IPv4 Local Network/s" and to the DNS server you specify.

                OpenVPN-Road-Warrior.png
                OpenVPN-Road-Warrior.png_thumb

                As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                1 Reply Last reply Reply Quote 0
                • C
                  cyberbot
                  last edited by

                  Dear Phil,
                  thank you so much for your continue help, i've tried exactly what you suggested however when the client is connected it still provide the tunnel ip and not the Lan ip, like this i can't reach the Servers behind ip over the VPN !
                  any more suggestions?
                  i really like the producte and wanna move from Vyatta to PFSENSE, and need to have the VPN part working,
                  thank you

                  thank you so much

                  1 Reply Last reply Reply Quote 0
                  • P
                    phil.davis
                    last edited by

                    On the client, what routes does it have when the VPN is connected?
                    e.g. On Windows, "route print".
                    Can you reach the servers by using the server IP address?
                    What IP subnet is the client on?
                    (It cannot be somewhere that also uses 192.168.1.0/24, because that needs to be routed across the VPN)

                    As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                    If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                    1 Reply Last reply Reply Quote 0
                    • C
                      cyberbot
                      last edited by

                      @phil.davis:

                      On the client, what routes does it have when the VPN is connected?
                      e.g. On Windows, "route print".
                      Can you reach the servers by using the server IP address?
                      What IP subnet is the client on?
                      (It cannot be somewhere that also uses 192.168.1.0/24, because that needs to be routed across the VPN)

                      Dear Phil,
                      thank you for your continu support,
                      when the client is connected with the VPN recieve those routing :

                      
                      H:\>ipconfig
                      
                      Windows IP Configuration
                      
                      Ethernet adapter Local Area Connection 2:
                      
                         Connection-specific DNS Suffix  . : pfsense.lan
                         Link-local IPv6 Address . . . . . : fe80::e9c9:759c:f3f2:2f77%16
                         IPv4 Address. . . . . . . . . . . : 192.168.100.6
                         Subnet Mask . . . . . . . . . . . : 255.255.255.252
                         Default Gateway . . . . . . . . . :
                      
                      Ethernet adapter Local Area Connection:
                      
                         Connection-specific DNS Suffix  . :
                         Link-local IPv6 Address . . . . . : fe80::bc7f:5607:b5db:bfa%12
                         IPv4 Address. . . . . . . . . . . : 192.168.178.8
                         Subnet Mask . . . . . . . . . . . : 255.255.255.0
                         Default Gateway . . . . . . . . . : 192.168.178.1
                      
                      Tunnel adapter isatap.pfsense.lan:
                      
                         Media State . . . . . . . . . . . : Media disconnected
                         Connection-specific DNS Suffix  . : pfsense.lan
                      
                      Tunnel adapter Local Area Connection* 9:
                      
                         Media State . . . . . . . . . . . : Media disconnected
                         Connection-specific DNS Suffix  . :
                      
                      Tunnel adapter isatap.{5029CD45-C9E4-4FD6-8BDF-BEE9F45411A7}:
                      
                         Media State . . . . . . . . . . . : Media disconnected
                         Connection-specific DNS Suffix  . :
                      

                      the IP is different than the VPN tunnel IP,
                      when i am connected on VPN i cant reach the PFSENSE or ping thought the IP ( ping 192.168.1.1 comes back with time out ).

                      1 Reply Last reply Reply Quote 0
                      • P
                        phil.davis
                        last edited by

                        Your ipconfig looks fine - 192.168.100.6 is the normal IP given to the first client in this tunnel. You should be able to "ping 192.168.100.1" - the other end of the tunnel.
                        Also post the output of "route print" - then we can see if the client has learned the route to your LAN.
                        We haven't talked about Firewall Rules either - on tghe server-end pfSense Firewall Rules, OpenVPN tab you need a rule that allows traffic from the client (tunnel network) to LANnet.

                        As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                        If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                        1 Reply Last reply Reply Quote 0
                        • C
                          cyberbot
                          last edited by

                          @phil.davis:

                          Your ipconfig looks fine - 192.168.100.6 is the normal IP given to the first client in this tunnel. You should be able to "ping 192.168.100.1" - the other end of the tunnel.
                          Also post the output of "route print" - then we can see if the client has learned the route to your LAN.
                          We haven't talked about Firewall Rules either - on tghe server-end pfSense Firewall Rules, OpenVPN tab you need a rule that allows traffic from the client (tunnel network) to LANnet.

                          Dear Phil,
                          the 192.168.100.0/24 is been giving just to build the tunnel, i want my client to get the IP from my LAN so i will be able to connect to my LAN network 192.168.6.0/24
                          here you have the route print

                          
                          ===========================================================================
                          Interface List
                           16...00 ff 82 7e 19 be ......TAP-Windows Adapter V9
                           12...00 0c 29 bc 40 c3 ......vmxnet3 Ethernet Adapter
                            1...........................Software Loopback Interface 1
                           13...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
                           11...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter
                           14...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2
                          ===========================================================================
                          
                          IPv4 Route Table
                          ===========================================================================
                          Active Routes:
                          Network Destination        Netmask          Gateway       Interface  Metric
                                    0.0.0.0          0.0.0.0    192.168.178.1    192.168.178.8    261
                                  127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
                                  127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
                            127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
                              192.168.100.4  255.255.255.252         On-link     192.168.100.6    286
                              192.168.100.6  255.255.255.255         On-link     192.168.100.6    286
                              192.168.100.7  255.255.255.255         On-link     192.168.100.6    286
                              192.168.178.0    255.255.255.0         On-link     192.168.178.8    261
                              192.168.178.8  255.255.255.255         On-link     192.168.178.8    261
                            192.168.178.255  255.255.255.255         On-link     192.168.178.8    261
                                  224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
                                  224.0.0.0        240.0.0.0         On-link     192.168.178.8    261
                                  224.0.0.0        240.0.0.0         On-link     192.168.100.6    286
                            255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
                            255.255.255.255  255.255.255.255         On-link     192.168.178.8    261
                            255.255.255.255  255.255.255.255         On-link     192.168.100.6    286
                          ===========================================================================
                          Persistent Routes:
                            Network Address          Netmask  Gateway Address  Metric
                                    0.0.0.0          0.0.0.0    192.168.178.1  Default
                          ===========================================================================
                          
                          IPv6 Route Table
                          ===========================================================================
                          Active Routes:
                           If Metric Network Destination      Gateway
                            1    306 ::1/128                  On-link
                           12    261 fe80::/64                On-link
                           16    286 fe80::/64                On-link
                           12    261 fe80::bc7f:5607:b5db:bfa/128
                                                              On-link
                           16    286 fe80::e9c9:759c:f3f2:2f77/128
                                                              On-link
                            1    306 ff00::/8                 On-link
                           12    261 ff00::/8                 On-link
                           16    286 ff00::/8                 On-link
                          ===========================================================================
                          Persistent Routes:
                          
                          ```  None
                          
                          its appreate my Client that are connected with VPN recieved the virtual IP not my LAN IP
                          
                          

                          Wed Jan 22 01:16:15 2014 Warning: cannot open --log file: C:\Program Files\OpenVPN\log\pfSense-udp-1194-VPNUSER2.log: Access is denied.  (errno=5)
                          Wed Jan 22 01:16:15 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
                          Wed Jan 22 01:16:21 2014 Control Channel Authentication: using 'pfSense-udp-1194-VPNUSER2-tls.key' as a OpenVPN static key file
                          Wed Jan 22 01:16:21 2014 UDPv4 link local (bound): [undef]
                          Wed Jan 22 01:16:21 2014 UDPv4 link remote: [AF_INET]XX.XXXX.XX.XX:1194
                          Wed Jan 22 01:16:21 2014 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
                          Wed Jan 22 01:16:22 2014 [HassVPN] Peer Connection Initiated with [AF_INET]XX.XXXX.XX.XX:1194
                          Wed Jan 22 01:16:25 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
                          Wed Jan 22 01:16:25 2014 open_tun, tt->ipv6=0
                          Wed Jan 22 01:16:25 2014 TAP-WIN32 device [Local Area Connection 2] opened: \.\Global{827E19BE-09E0-42EB-BB12-FBC95F53EDB7}.tap
                          Wed Jan 22 01:16:25 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.10.10.6/255.255.255.252 on interface {827E19BE-09E0-42EB-BB12-FBC95F53EDB7} [DHCP-serv: 10.10.10.5, lease-time: 31536000]

                          1 Reply Last reply Reply Quote 0
                          • P
                            phil.davis
                            last edited by

                            Couple of things here:

                            1. Your routing table has:
                                192.168.100.4  255.255.255.252         On-link     192.168.100.6    286
                                192.168.100.6  255.255.255.255         On-link     192.168.100.6    286
                                192.168.100.7  255.255.255.255         On-link     192.168.100.6    286
                            

                            but the client log has the message:

                            Wed Jan 22 01:16:25 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.10.10.6/255.255.255.252 on interface {827E19BE-09E0-42EB-BB12-FBC95F53EDB7} [DHCP-serv: 10.10.10.5, lease-time: 31536000]
                            

                            Why is one saying 192.168.100.* and the other 10.10.10.* ?

                            1. There is no route back to the LAN. How are you making the client conf file? The route should get pushed from the Local Network/s box in the server GUI page. Post the server settings (conf or a shot of the server GUI page).

                            2. If you want the client to get an actual LAN IP address then you have to use "tap" mode on OpenVPN. If you do that then lots of LAN broadcast traffic will flow across the VPN to you. Personally I always use "tun" mode and have routing to my LAN. Then I use DNS names (or IP addresses for real nerds) to access stuff on the LAN. With "tun" you don't get the broadcast traffic, but also you don't get Windows-style browsing for lAN resources (file shares, printers…) - you have to already know the names or IPs of the resources.

                            As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                            If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                            1 Reply Last reply Reply Quote 0
                            • C
                              cyberbot
                              last edited by

                              @phil.davis:

                              Couple of things here:

                              1. Your routing table has:
                                  192.168.100.4  255.255.255.252         On-link     192.168.100.6    286
                                  192.168.100.6  255.255.255.255         On-link     192.168.100.6    286
                                  192.168.100.7  255.255.255.255         On-link     192.168.100.6    286
                              

                              but the client log has the message:

                              Wed Jan 22 01:16:25 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.10.10.6/255.255.255.252 on interface {827E19BE-09E0-42EB-BB12-FBC95F53EDB7} [DHCP-serv: 10.10.10.5, lease-time: 31536000]
                              

                              Why is one saying 192.168.100.* and the other 10.10.10.* ?

                              1. There is no route back to the LAN. How are you making the client conf file? The route should get pushed from the Local Network/s box in the server GUI page. Post the server settings (conf or a shot of the server GUI page).

                              2. If you want the client to get an actual LAN IP address then you have to use "tap" mode on OpenVPN. If you do that then lots of LAN broadcast traffic will flow across the VPN to you. Personally I always use "tun" mode and have routing to my LAN. Then I use DNS names (or IP addresses for real nerds) to access stuff on the LAN. With "tun" you don't get the broadcast traffic, but also you don't get Windows-style browsing for lAN resources (file shares, printers…) - you have to already know the names or IPs of the resources.

                              hi Phil sorry for the confession,
                              I've changed the VPN ip that why you see two different subnets, the 192.168.100.0 is the same 10.10.10.0, thought to change the subnet for the VPN tunnel could make a different,
                              2- the client config is made with open VPN import ultility to the WAN after that I change the config file External ip to my phisuque IP, because between PF and the internet there is my ISP Gateway, and the ports are already forwarded  500, 5400 UDP
                              3 - I want the client to get the LAN IP address because it just one user who is going to use the VPN to access the LAN,  I believe Tun mode is already selected on my VPN configuration,

                              i believe the problem is not the ISP Gateway but configuration on the PF, because the tunnel mades up and the client receive a IP,

                              i am supposed to do some routing here?

                              thank you so much for your help,

                              1 Reply Last reply Reply Quote 0
                              • P
                                phil.davis
                                last edited by

                                3 - I want the client to get the LAN IP address because it just one user who is going to use the VPN to access the LAN,  I believe Tun mode is already selected on my VPN configuration

                                For the client to get real LAN IP, you have to use tap mode.

                                But the tun mode should also work - if you want to keep trying to make tun mode work, then post the OpenVPN server settings. Somehow the client is not getting the route - until that is fixed it definitely won't work.

                                As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                1 Reply Last reply Reply Quote 0
                                • C
                                  cyberbot
                                  last edited by

                                  @phil.davis:

                                  3 - I want the client to get the LAN IP address because it just one user who is going to use the VPN to access the LAN,  I believe Tun mode is already selected on my VPN configuration

                                  For the client to get real LAN IP, you have to use tap mode.

                                  But the tun mode should also work - if you want to keep trying to make tun mode work, then post the OpenVPN server settings. Somehow the client is not getting the route - until that is fixed it definitely won't work.

                                  Dear Phil,
                                  the below is the confi file of the VPN I used on the client laptop to connect to the office,
                                  P.S I changed the external IP and log in name :

                                  dev tun
                                  persist-tun
                                  persist-key
                                  cipher AES-128-CBC
                                  auth SHA1
                                  tls-client
                                  client
                                  resolv-retry infinite
                                  remote XX.XXX.XX.X 1194 udp
                                  lport 0
                                  verify-x509-name "HassVPN" name
                                  auth-user-pass
                                  pkcs12 pfSense-udp-1194-jjansen.p12
                                  tls-auth pfSense-udp-1194-jjansen-tls.key 1
                                  ns-cert-type server
                                  comp-lzo
                                  

                                  Dear Philp,
                                  i managed to fix the issue !
                                  first i had to create a rule to allow the connection between the Lan and OPENVPN, like this it routed the connection from the virtual tunnel to the LAN

                                  thank you so much for your help !

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.