<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[PfSense OpenVPN Servers (Shared Key) to multiple dd-wrt clients]]></title><description><![CDATA[<p dir="auto">This is all in a test environment pre putting it into the field….</p>
<p dir="auto">pfSense is 2.2.5<br />
All OpenVPN's are configured with peer to peer share key<br />
Firewall rules on the WAN are allowing the multiple ports of each openvpn server<br />
pfSense firewall OpenVPN tab has a default allow all rule<br />
All OpenVPN's "Initialization Sequence Completed"</p>
<p dir="auto">dd-wrt v24<br />
script based setup based on this topic --&gt; https://forum.pfsense.org/index.php?topic=56458.0</p>
<p dir="auto">dd-wrt firewall script:</p>
<h1><a class="anchor-offset" name="open-firewall-holes"></a>Open firewall holes</h1>
<p dir="auto"><strong>iptables -I FORWARD -i tun0 -o br0 -j ACCEPT<br />
iptables -I FORWARD -i br0 -o tun0 -j ACCEPT</strong><br />
iptables -I INPUT 2 -p udp –dport 5511 -j ACCEPT<br />
iptables -I INPUT 1 -i tun0 -p icmp -j ACCEPT<br />
iptables -I INPUT 1 -i tun0 -p tcp --dport 80 -j ACCEPT<br />
iptables -I INPUT 1 -i tun0 -p tcp --dport 22 -j ACCEPT<br />
iptables -I INPUT 1 -i tun0 -p tcp --dport 23 -j ACCEPT<br />
iptables -I INPUT 1 -i tun0 -p udp --dport 161 -j ACCEPT</p>
<p dir="auto">pfSense LAN IP 10.100.51.0/24<br />
remote network 10.11.53.0/24<br />
openvpn network 10.254.254.4/30</p>
<p dir="auto">This is my pfsense routing table:<br />
IPv4<br />
Destination Gateway Flags Use Mtu Netif Expire<br />
default 192.168.51.1 UGS 9636 1500 sk0<br />
<strong>10.11.53.0/24 10.254.254.6 UGS 3138 1500 ovpns2</strong><br />
10.12.53.0/24 10.254.254.10 UGS 0 1500 ovpns3<br />
10.13.53.0/24 10.254.254.14 UGS 0 1500 ovpns4<br />
10.14.53.0/24 10.254.254.18 UGS 0 1500 ovpns5<br />
10.15.53.0/24 10.254.254.22 UGS 0 1500 ovpns6<br />
10.100.50.0/24 link#8 U 80688 1500 sk3<br />
10.100.50.1 link#8 UHS 178 16384 lo0<br />
10.100.51.0/24 link#1 U 0 1500 msk0<br />
10.100.51.1 link#1 UHS 0 16384 lo0<br />
10.100.52.0/24 link#2 U 0 1500 msk1<br />
10.100.52.1 link#2 UHS 0 16384 lo0<br />
10.100.53.0/24 link#3 U 0 1500 msk2<br />
10.100.53.1 link#3 UHS 0 16384 lo0<br />
10.100.54.0/24 link#4 U 0 1500 msk3<br />
10.100.54.1 link#4 UHS 0 16384 lo0<br />
10.254.254.1 link#13 UHS 0 16384 lo0<br />
10.254.254.2 link#13 UH 0 1500 ovpns1<br />
10.254.254.5 link#14 UHS 0 16384 lo0<br />
10.254.254.6 link#14 UH 0 1500 ovpns2<br />
10.254.254.9 link#15 UHS 0 16384 lo0<br />
10.254.254.10 link#15 UH 0 1500 ovpns3<br />
10.254.254.13 link#16 UHS 0 16384 lo0<br />
10.254.254.14 link#16 UH 0 1500 ovpns4<br />
10.254.254.17 link#17 UHS 0 16384 lo0<br />
10.254.254.18 link#17 UH 0 1500 ovpns5<br />
10.254.254.21 link#18 UHS 0 16384 lo0<br />
10.254.254.22 link#18 UH 0 1500 ovpns6<br />
127.0.0.1 link#11 UH 602592 16384 lo0<br />
192.168.51.0/24 link#5 U 13153 1500 sk0<br />
192.168.51.106 link#5 UHS 0 16384 lo0</p>
<p dir="auto">This is my dd-wrt remote site routing table:<br />
Destination LAN NET Subnet Mask Gateway Flags Metric Interface<br />
0.0.0.0 0.0.0.0 192.168.51.1 UG 0 WAN<br />
10.10.53.0 255.255.255.0 10.254.254.5 UG 0 tun0<br />
10.11.53.0 255.255.255.0 0.0.0.0 U 0 LAN &amp; WLAN<br />
10.12.53.0 255.255.255.0 10.254.254.5 UG 0 tun0<br />
10.13.53.0 255.255.255.0 10.254.254.5 UG 0 tun0<br />
10.14.53.0 255.255.255.0 10.254.254.5 UG 0 tun0<br />
10.15.53.0 255.255.255.0 10.254.254.5 UG 0 tun0<br />
<strong>10.100.51.0 255.255.255.0 10.254.254.5 UG 0 tun0</strong><br />
10.254.254.4 255.255.255.252 0.0.0.0 U 0 tun0<br />
169.254.0.0 255.255.0.0 0.0.0.0 U 0 LAN &amp; WLAN<br />
192.168.51.0 255.255.255.0 0.0.0.0 U 0 WAN</p>
<p dir="auto">Now this is where I believe there is a problem…<br />
-From a device on the remote site I can ping my pfsense lan ip. <em>good</em><br />
-From a device on my pfsense lan say 10.100.51.10 I can not ping remote ip 10.11.53.1<br />
-If I SSH into the pfsense box I can ping remote ip 10.11.53.1</p>
<p dir="auto">I am at a loss with the firewalls on either end set to allow traffic flow, as well as routing tables on both end correct why only the pfsense machine can route traffic to the remote site, and not all equipment on the pfsense lan. Is anyone able to shed some light on this? I am loosing hair at an absurd rate on this one.</p>
<p dir="auto">-I've only quoted as per 1 client site.<br />
-All clients are behaving in the same manor as described.<br />
-This is setup as a hub and spoke type topology</p>
<p dir="auto">Thanks in advance.</p>
]]></description><link>https://forum.netgate.com/topic/92764/pfsense-openvpn-servers-shared-key-to-multiple-dd-wrt-clients</link><generator>RSS for Node</generator><lastBuildDate>Sun, 19 Apr 2026 04:52:56 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/92764.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 09 Dec 2015 06:52:22 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to PfSense OpenVPN Servers (Shared Key) to multiple dd-wrt clients on Thu, 10 Dec 2015 04:55:09 GMT]]></title><description><![CDATA[<p dir="auto">DDWRT is ok, it can just be a pain in routing traffic correctly across site to site VPNs. It seems to always want to NAT things in that context.</p>
<p dir="auto">I didn't notice the DDWRT routing table. That looks correct as well. The iptables rule should allow pings through.</p>
<p dir="auto">Run a constant ping from the pfSense LAN to the DDWRT LAN. Go to Diag&gt;Packet Capture, pick the OpenVPN interface, and start the capture. Let it run for a handful of seconds and stop it. If you see the pings leaving there, that'll confirm the issue's on the DDWRT side.</p>
<p dir="auto">The only thing that'd prevent traffic from LAN getting routed across in that config is if you have a gateway specified on your LAN firewall rule(s), that'll force traffic to that gateway.</p>
]]></description><link>https://forum.netgate.com/post/589757</link><guid isPermaLink="true">https://forum.netgate.com/post/589757</guid><dc:creator><![CDATA[cmb]]></dc:creator><pubDate>Thu, 10 Dec 2015 04:55:09 GMT</pubDate></item><item><title><![CDATA[Reply to PfSense OpenVPN Servers (Shared Key) to multiple dd-wrt clients on Wed, 09 Dec 2015 23:32:46 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/cmb">@<bdi>cmb</bdi></a>:</p>
<blockquote>
<p dir="auto">Likely the routing is wrong/missing on the DDWRT side. The routes are correct there, when you ping from the firewall itself it uses the tun IP, and DDWRT tends to be screwy with its routes. Given all that, almost certainly missing/wrong routes on DDWRT. Otherwise it's blocking the traffic from the LAN subnet on DDWRT.</p>
</blockquote>
<p dir="auto">When you say "the routes are correct there", are you referring to the routes located on pfsense, or the dd-wrt routers?</p>
<p dir="auto">I supplied the routing table for both pfsense, and a dd-wrt remote client. I am fairly new to routing tables. Is there anything obviously wrong?</p>
<p dir="auto">And If I am reading your reply correctly, I am getting the jist that dd-wrt is something to stay away from… is that correct?</p>
<p dir="auto">Thanks for your help!!!</p>
]]></description><link>https://forum.netgate.com/post/589708</link><guid isPermaLink="true">https://forum.netgate.com/post/589708</guid><dc:creator><![CDATA[toyotahead]]></dc:creator><pubDate>Wed, 09 Dec 2015 23:32:46 GMT</pubDate></item><item><title><![CDATA[Reply to PfSense OpenVPN Servers (Shared Key) to multiple dd-wrt clients on Wed, 09 Dec 2015 20:32:13 GMT]]></title><description><![CDATA[<p dir="auto">Likely the routing is wrong/missing on the DDWRT side. The routes are correct there, when you ping from the firewall itself it uses the tun IP, and DDWRT tends to be screwy with its routes. Given all that, almost certainly missing/wrong routes on DDWRT. Otherwise it's blocking the traffic from the LAN subnet on DDWRT.</p>
]]></description><link>https://forum.netgate.com/post/589675</link><guid isPermaLink="true">https://forum.netgate.com/post/589675</guid><dc:creator><![CDATA[cmb]]></dc:creator><pubDate>Wed, 09 Dec 2015 20:32:13 GMT</pubDate></item><item><title><![CDATA[Reply to PfSense OpenVPN Servers (Shared Key) to multiple dd-wrt clients on Wed, 09 Dec 2015 17:34:05 GMT]]></title><description><![CDATA[<p dir="auto">Forgot to mention the firewall on the pfsense box, lan, also has a default allow all rule.</p>
<p dir="auto">I am thinking this is a routing issue on the pfSense box because I can ping and access remote network services when I am SSH'd into the pfsense box. It's just a matter of clients attached to the pfSense lan are unable to get packets forwarded to the remote site.</p>
<p dir="auto">Anyone have any thoughts?</p>
]]></description><link>https://forum.netgate.com/post/589625</link><guid isPermaLink="true">https://forum.netgate.com/post/589625</guid><dc:creator><![CDATA[toyotahead]]></dc:creator><pubDate>Wed, 09 Dec 2015 17:34:05 GMT</pubDate></item></channel></rss>