Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Issues with OpenVPN Configuration

    Scheduled Pinned Locked Moved OpenVPN
    73 Posts 6 Posters 17.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dhendriksen
      last edited by

      @kejianshi:

      "I have my gateway setup as 192.168.1.1, and that is the IP of PFSense."

      This can be a big issue.  I'd make my pfsense ip be something not like you will see on standard home setups.  Pick IPs 192.168.x.1 where x isn't 0, 1 or 254.

      Can you elaborate? This has worked great for years.

      I have some VLANs that are .2.x and .3.x.

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        Lets say your pfsense lan is at 192.168.1.1

        and lets say 1000 miles from home someone is on a network who's lan ip is also 192.168.1.1  (super common)

        Now, lets say he joins your vpn and types in 192.168.1.1 in his browser.

        He will get the closest 192.168.1.1 - the frist one in his routes.

        So, in all likelihood, he will get his modem/router setup page and not the pfsense gui.

        so, basically, set up this way causes lots and lots of problems.

        1 Reply Last reply Reply Quote 0
        • M
          marvosa
          last edited by

          • Post a network map with IP's

          • Post your openvpn config (server1.conf).

          • Verify the devices on your LAN are using PFsense as the default gateway

          • Verify the network the client is connecting from is not on the same subnet as your LAN.

          • If you need access to other VLANs, add those subnets along with your LAN subnet to the "IPv4 Local Network/s" box

          1 Reply Last reply Reply Quote 0
          • D
            dhendriksen
            last edited by

            @marvosa:

            • Post a network map with IP's

            • Post your openvpn config (server1.conf).

            • Verify the devices on your LAN are using PFsense as the default gateway

            • Verify the network the client is connecting from is not on the same subnet as your LAN.

            • If you need access to other VLANs, add those subnets along with your LAN subnet to the "IPv4 Local Network/s" box

            Thank you for the reply. I don't know how to post a "network map". Here's what I have.

            Main network is 192.168.1.2 - 192.168.1.199 for DHCP. Gateway is 192.168.1.1. I have a bunch of devices with DHCP reservations in between 192.168.1.200 and .254. All that works perfect.

            I have a guest network that is 192.168.2.1 that is captive portal.

            I have a kids network that is 192.168.3.1 that is for the kids devices and only have access to the web, and a white list of sites at that.

            I'm happy to post that OpenVPN file, but I have no idea where to find it. Can you instruct me where I can download that from, please?

            All devices are using 192.168.1.1 as the gateway.

            I don't need access to VLAN's from the VPN.

            I don't know what this means or how to do this: Verify the network the client is connecting from is not on the same subnet as your LAN.

            1 Reply Last reply Reply Quote 0
            • D
              dhendriksen
              last edited by

              As of right now the tunnel network is 192.168.79.0/24.

              I can see the device is connected, but I am not able to ping or communicate with any of the devices on the LAN. NONE OF THEM.

              1 Reply Last reply Reply Quote 0
              • P
                phil.davis
                last edited by

                I don't know what this means or how to do this: Verify the network the client is connecting from is not on the same subnet as your LAN.

                For example, someone on a laptop is sitting in a cafe connected to the cafe WiFi. Get them to check the IP address that the cafe WiFi gave them. On Windows:

                ipconfig
                

                They might have been given:

                Wireless LAN adapter Wi-Fi:
                
                   Connection-specific DNS Suffix  . : example.org
                   IPv4 Address. . . . . . . . . . . : 192.168.1.42
                   Subnet Mask . . . . . . . . . . . : 255.255.255.0
                   Default Gateway . . . . . . . . . : 192.168.1.1
                

                If the cafe is using 192.168.1.* then there will be trouble for them to also reach 192.168.1.* across the OpenVPN that they start.

                As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                1 Reply Last reply Reply Quote 0
                • T
                  tsolrm
                  last edited by

                  Post the following details.

                  Your LAN SUBNET (not dhcp). This can be found Services -> DHCP server -> LAN tab

                  Your OpenVPN server details. In particular is it operating in 'tap' or 'tun' and what tunnel network you have selected and which local network.

                  1 Reply Last reply Reply Quote 0
                  • D
                    dhendriksen
                    last edited by

                    @phil.davis:

                    I don't know what this means or how to do this: Verify the network the client is connecting from is not on the same subnet as your LAN.

                    For example, someone on a laptop is sitting in a cafe connected to the cafe WiFi. Get them to check the IP address that the cafe WiFi gave them. On Windows:

                    ipconfig
                    

                    They might have been given:

                    Wireless LAN adapter Wi-Fi:
                    
                       Connection-specific DNS Suffix  . : example.org
                       IPv4 Address. . . . . . . . . . . : 192.168.1.42
                       Subnet Mask . . . . . . . . . . . : 255.255.255.0
                       Default Gateway . . . . . . . . . : 192.168.1.1
                    

                    If the cafe is using 192.168.1.* then there will be trouble for them to also reach 192.168.1.* across the OpenVPN that they start.

                    I did verify this. One example is just using my cell phone over an LTE connection. It has a crazy IP address, and not anything in this range.

                    Furthermore, the VPN is now set to 192.168.79.0/24.

                    1 Reply Last reply Reply Quote 0
                    • D
                      dhendriksen
                      last edited by

                      @tsolrm:

                      Post the following details.

                      Your LAN SUBNET (not dhcp). This can be found Services -> DHCP server -> LAN tab

                      Your OpenVPN server details. In particular is it operating in 'tap' or 'tun' and what tunnel network you have selected and which local network.

                      Thank you for pointing out where I can find those things. I'm at my office right now, but as soon as I get home I'll give it a look and post back.

                      Dan

                      1 Reply Last reply Reply Quote 0
                      • M
                        marvosa
                        last edited by

                        Thank you for the reply. I don't know how to post a "network map". Here's what I have.

                        An example would be…..  "Internet -> PFsense -> Switch -> LAN".  We need to know how things are physically connected

                        Main network is 192.168.1.2 - 192.168.1.199 for DHCP. Gateway is 192.168.1.1. I have a bunch of devices with DHCP reservations in between 192.168.1.200 and .254. All that works perfect.

                        I have a guest network that is 192.168.2.1 that is captive portal.

                        I have a kids network that is 192.168.3.1 that is for the kids devices and only have access to the web, and a white list of sites at that.

                        So, your PFsense LAN IP is 192.168.1.1 and your scope is 192.168.1.0/24?  Or is your scope wider than that?
                        Also, just out of curiosity, are the 2.x and 3.x ranges actual VLANs, subnets on different physical interfaces, subnets that communicate via an IP alias or just reserved ranges within a /22?

                        I'm happy to post that OpenVPN file, but I have no idea where to find it. Can you instruct me where I can download that from, please?

                        • Diagnostics -> Edit file

                        • Navigate to "/var/etc/openvpn" and post the contents of "server1.conf"

                        I don't know what this means or how to do this: Verify the network the client is connecting from is not on the same subnet as your LAN.

                        I believe this has already been mentioned, but if you're using a routed tunnel, the client's LAN can not be in the same subnet as your LAN.  i.e. check the client's IP and make sure it's not in 192.168.1.0/24 or you will have to change it on one side or the other.

                        1 Reply Last reply Reply Quote 0
                        • D
                          dhendriksen
                          last edited by

                          @tsolrm:

                          Post the following details.

                          Your LAN SUBNET (not dhcp). This can be found Services -> DHCP server -> LAN tab

                          Your OpenVPN server details. In particular is it operating in 'tap' or 'tun' and what tunnel network you have selected and which local network.

                          My LAN SUBNET is: 192.168.1.0

                          RE: the OpenVPN server details, The "Device Mode" is "tun". The IPV4 tunnel network is: 192.168.79.0/24. The local network/s is: 192.168.1.0/24, 192.168.79.0/24

                          I didn't have the 192.168.79.0/24 listed there, but I added in hopes that it would make a difference. It has not.

                          1 Reply Last reply Reply Quote 0
                          • D
                            dhendriksen
                            last edited by

                            @marvosa:

                            Thank you for the reply. I don't know how to post a "network map". Here's what I have.

                            An example would be…..  "Internet -> PFsense -> Switch -> LAN".  We need to know how things are physically connected

                            Main network is 192.168.1.2 - 192.168.1.199 for DHCP. Gateway is 192.168.1.1. I have a bunch of devices with DHCP reservations in between 192.168.1.200 and .254. All that works perfect.

                            I have a guest network that is 192.168.2.1 that is captive portal.

                            I have a kids network that is 192.168.3.1 that is for the kids devices and only have access to the web, and a white list of sites at that.

                            So, your PFsense LAN IP is 192.168.1.1 and your scope is 192.168.1.0/24?  Or is your scope wider than that?
                            Also, just out of curiosity, are the 2.x and 3.x ranges actual VLANs, subnets on different physical interfaces, subnets that communicate via an IP alias or just reserved ranges within a /22?

                            I'm happy to post that OpenVPN file, but I have no idea where to find it. Can you instruct me where I can download that from, please?

                            • Diagnostics -> Edit file

                            • Navigate to "/var/etc/openvpn" and post the contents of "server1.conf"

                            I don't know what this means or how to do this: Verify the network the client is connecting from is not on the same subnet as your LAN.

                            I believe this has already been mentioned, but if you're using a routed tunnel, the client's LAN can not be in the same subnet as your LAN.  i.e. check the client's IP and make sure it's not in 192.168.1.0/24 or you will have to change it on one side or the other.

                            You are correct in that it's INTERNET -> PFSENSE -> SWITCH/LAN <- Ubiquiti UniFi.

                            The 2.x and 3.x VLAN's are actual VLAN's. They are configured in PFSense, and there are different SSID's that are broadcast and tagged by the Ubiquiti. The Dell Powerconnect switch tags the ports that are connected to the PFSense and Ubiquiti with VLAN's 1, 2 and 3. I don't really understand the rest of your questions except those VLAN's are 192.168.2.1/24 and 192.168.3.1/24. One has a captive portal and the other not. They just have web access. Those are working exactly as I'd like them to.

                            When you talk about the scope of my PFSense LAN, it looks like you've got it exactly correct.

                            Here are the contents of the "server1.conf" document:

                            
                            dev ovpns1
                            verb 1
                            dev-type tun
                            tun-ipv6
                            dev-node /dev/tun1
                            writepid /var/run/openvpn_server1.pid
                            #user nobody
                            #group nobody
                            script-security 3
                            daemon
                            keepalive 10 60
                            ping-timer-rem
                            persist-tun
                            persist-key
                            proto udp
                            cipher AES-256-CBC
                            auth SHA1
                            up /usr/local/sbin/ovpn-linkup
                            down /usr/local/sbin/ovpn-linkdown
                            client-connect /usr/local/sbin/openvpn.attributes.sh
                            client-disconnect /usr/local/sbin/openvpn.attributes.sh
                            local 76.23.10.226
                            tls-server
                            server 192.168.79.0 255.255.255.0
                            client-config-dir /var/etc/openvpn-csc
                            username-as-common-name
                            auth-user-pass-verify "/usr/local/sbin/ovpn_auth_verify user 'Local Database' false server1" via-env
                            tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'HendriksenHomeVPN' 1"
                            lport 1194
                            management /var/etc/openvpn/server1.sock unix
                            max-clients 2
                            push "route 192.168.1.0 255.255.255.0"
                            push "route 192.168.79.0 255.255.255.0"
                            push "dhcp-option DNS 75.75.76.76"
                            push "dhcp-option DNS 75.75.75.75"
                            ca /var/etc/openvpn/server1.ca 
                            cert /var/etc/openvpn/server1.cert 
                            key /var/etc/openvpn/server1.key 
                            dh /etc/dh-parameters.2048
                            tls-auth /var/etc/openvpn/server1.tls-auth 0
                            persist-remote-ip
                            float
                            
                            

                            I appreciate each of you taking a few minutes to help me resolve this. I'm sure it's something simple, but I really need to get it worked out tonight and working. Like I said, I'm leaving the country and need things functioning properly while I'm gone so I can access things. I'm home all night tonight and will watch this thread.

                            1 Reply Last reply Reply Quote 0
                            • D
                              dhendriksen
                              last edited by

                              I checked the "redirect gateway" box (Force all client generated traffic through the tunnel.) and it appears to be working…but I need to do more testing.

                              1 Reply Last reply Reply Quote 0
                              • D
                                dhendriksen
                                last edited by

                                Still not quite working as it should. I'm going to reboot everything and see if that makes a difference.

                                1 Reply Last reply Reply Quote 0
                                • D
                                  dhendriksen
                                  last edited by

                                  No difference guys. I need all the help I can get here.

                                  1 Reply Last reply Reply Quote 0
                                  • K
                                    kejianshi
                                    last edited by

                                    did you change your pfsense IP from 192.168.1.1 yet?

                                    I usually don't like wasting time on people who won't make basic changes to improve things.

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      dhendriksen
                                      last edited by

                                      @kejianshi:

                                      did you change your pfsense IP from 192.168.1.1 yet?

                                      I usually don't like wasting time on people who won't make basic changes to improve things.

                                      Will that require me to reset every DHCP reservation and reboot every single device? That's an awful lot of work, and I can certainly do it but I'd rather not go through all that work the day before I leave the country for two weeks.

                                      1 Reply Last reply Reply Quote 0
                                      • K
                                        kejianshi
                                        last edited by

                                        Well - If you like it broken, leave it as is.

                                        Probably what will happen if you modify pfsense set up and reboot it is all your clients will re-start their connections automatically and all will be fine.

                                        1 Reply Last reply Reply Quote 0
                                        • P
                                          phil.davis
                                          last edited by

                                          I have my gateway setup as 192.168.1.1, and that is the IP of PFSense. I had the VPN initially working in the range of 192.168.79.1/24, but have since change it to 192.168.1.0/24 in an attempt to get it to work. It connects…in fact I'm connected right now. I can see the connection in PFSense, and the device (in this case my Android phone) has an IP address of 192.168.1.6. However, it can't see any of the local devices.

                                          This is your initial issue. I do not understand how your Android phone had 192.168.1.6 IP address. When doing that testing it should (must) be disconnected from your home WiFi and connect to some 3G/4G/LTE whatever mobile phone data service it has. Otherwise it is not a real test, and probably the OpenVPN is connecting through the local home WiFi to pfSense and then pfSense tries to loop back that comms into the local home LAN, where you already are.

                                          Then later you say:

                                          One example is just using my cell phone over an LTE connection. It has a crazy IP address, and not anything in this range.

                                          That is a good thing, and should work to connect VPN back to home pfSense and LAN.

                                          You definitely do not need 192.168.79.0/24 in LOcal Netowrk/s box in the OpenVPN Server GUI settings page, as you have noticed.

                                          Can you connect to home LAN devices by IP address, like "ping 192.168.1.2" or whatever is the IP address of a LAN client?

                                          push "dhcp-option DNS 75.75.76.76"
                                          push "dhcp-option DNS 75.75.75.75"
                                          

                                          That is a bit odd that the OpenVPN server is providing those public DNS servers. That means that the client will not be able to resolve names of devices in your home LAN network. It needs to have the pfSense LAN IP there, so it can ask pfSense about names. Look in the OpenVPN Sevrer GUI settings page for "Provide a DNS server list to clients".
                                          If it is just access by name that is a problem, then fixing up the DNS server will help a lot.

                                          As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                                          If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                                          1 Reply Last reply Reply Quote 0
                                          • D
                                            dhendriksen
                                            last edited by

                                            phil.davis, thanks so much!

                                            So, to clarify, I'm doing testing using my Android phone over LTE connection. As of right now the settings are as follows. In the IPV4 Tunnel Network I have 192.168.79.0/24.

                                            In the IPV4 Local Network/s I have 192.168.1.0/24.

                                            I UNCHECKED the "DNS Servers - Provide a DNS server list to clients" box. That was checked, and is now unchecked.

                                            When I go to OpenVPN status, I can see the Android phone connected. It has a virtual address of 192.168.79.6. The REAL Address is listed as 172.56.xx.9:53825.

                                            Here's what is weird (to me). From my phone, while connected via VPN, I can browse to SOME of my devices. In fact, every single one that I've tried, with the exception of PFSense. I cannot browse to 192.168.1.1.

                                            Here's the real head scratcher, to me. I have a Control4 control system. The main controller has an IP address of 192.168.1.206. I can ping it just fine. But, the app(s) that I have on my phone that need to connect to it, cannot see it. They can't find the system. But if I hit that IP address in the web browser, I get the Control4 splash screen (which is exactly what I get while on the LAN). So the real head scratcher for me is, why can't these apps on my phone connect to devices on the LAN?

                                            I'm going to grab a laptop, hotspot my phone, and connect the laptop to the VPN via the phone hotspot. I'll see what that yields.

                                            I'm all ears on any suggestions.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.