lepomin
lepomin2y ago

make a couple of open vpn client hosts accesible from open vpn server LAN

Hi everyone, i'm tring to make a couple of open vpn client hosts accesible from open vpn server LAN but i'm missing a rule of course. openVPN Server is running on a pfsense client is running on Mikrotik i'm struggling to set the right rule to reach the bridge interface network of the mikrotik. Anyways i can ping openvpn-out1 ip from pf sense with no issue. I know that's just a couple of info...
24 Replies
w33t
w33t2y ago
I'm not entirely sure of your network architecture but you may need to setup a static route between the two. So, you're saying LAN, meaning it's all locally routed, right? It doesn't go out over the internet?
lepomin
lepomin2y ago
not directly connected to the internet....basically i think i have to set a rule in pfsense telling that the traffic destinated to that ip must go inside openvpn server and should be redirected to the client and then to the final open vpn client network...hehe i'l draw something with some minus signs and a couple of >< that's better i set a couple of static routes in the client that's the mikrotik
w33t
w33t2y ago
Yeah, you'll definitely need to draw that out for me lol. It almost sounds like it's being overcomplicated but I'm not entirely sure. You may need to do some level of port forwarding. It's been a minute since I've used a pfSense FW, so I don't remember specifically how to do that but @DirtyJ has one and might be able to help if you can't figure out that specific part. But by default, it's going to reach out over its known port, so if that's getting blocked, the routing may be fine but the port traffic may be getting blocked.
lepomin
lepomin2y ago
what port?
w33t
w33t2y ago
So, I just saw that diagram and I think you may be over complicating this. What you can do is setup a point to point VPN between your two edge firewalls Lets say you have site A with a private range of 192.168.0.1/24 and site B with a private range of 192.168.1.1/24. Notice how they're different subnets. That's important, as you're gonna have a bad time if you have two identical LANs. Both site A and B will negotiate the site to site connection and maintain the connection. If you're at site A and you try to connect to 192.168.1.5, it'll hit the edge router and it will know "alright, I have a point to point (p2p) connection with a route over that tunnel to reach 192.168.1.5 and it will forward the traffic. With this setup, the individual clients on your LAN don't need the openvpn client because you've got a persistent p2p connection going. Now, that leads me to OpenVPN. If you're able to, I recommend WireGuard. It's faster and just overall better than OpenVPN https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-s2s-psk.html This is technically deprecated but you can get the general gist of things If you're not familiar with certificates, you might wanna go the PSK route
lepomin
lepomin2y ago
everything is already setup.. i just cannot ping the lan2 of the diagram from the server of course
w33t
w33t2y ago
I'd do a pcap and see where it is failing tbh. Probably the best way to narrow it down source: pinging machine's IP service/protocol: ICMP
DirtyJ
DirtyJ2y ago
Totally wasn't asleep @weet :P Can't think of any other obvious things outside of the example you gave. Pcap should get you headed in the right direction.
lepomin
lepomin2y ago
would you configure a static route in my pfsense in order to forward the packets to openvpn server interface? i still haven't succed in doing that. But for me it's pretty obvious pcs in the lan behind the pfsense have the pfsense as gateway and then they reach the internet through the router.
w33t
w33t2y ago
I think you'd need to, yeah. I know I need to on FortiGates. I have to make a static route that says "if you're trying to reach x network, go out over this interface".
lepomin
lepomin2y ago
i added psh route "LANipofclient subnetmask" in custom options of my pfsense openvpn server, then i opened whireshark after the installation of npcap and i ping some host on the client network. It seems the client is trying to send back a icmp package
w33t
w33t2y ago
Ahh, so it's at least reaching it. You need to have the same rules in reverse, basically, so maybe that's where the problem lies? I wish you had some FortiGates, they're so much easier, in my experience And they look cool bigkek
lepomin
lepomin2y ago
it says Destination unreachable (port unreachable)
w33t
w33t2y ago
You may need to allow the ICMP protocol through in the firewall(s) But also ICMP doesn't run over any ports
lepomin
lepomin2y ago
i see also a packet from the external ip of the client trying to reach the host i used for pinging shouldn't that work inside the tunnel so that i dont't need any other firewall rule? in that case i read network unreachable should i configure any firewall on the client side? I found a nice diagram about openvpn flow
w33t
w33t2y ago
Probably so, yeah
lepomin
lepomin2y ago
any news? i'm reasy for some serious tests.
w33t
w33t2y ago
I'm still confused, news on what? And what tests?
lepomin
lepomin2y ago
you should see the entire conversation here am i right?
w33t
w33t2y ago
Yes, I see it but I'm confused as to what news you're waiting for.
lepomin
lepomin2y ago
i think i'm missing some routes
w33t
w33t2y ago
I mean sure, probably but it's kind of hard to help here when I can't see your configuration lol. Your routes should basically say "if you're trying to get to this subnet, go over this interface"
lepomin
lepomin2y ago
we must do some tests to troubleshoot the issue... for example: i'm on the private network LAN behind my openvpn server that is on my pfsense... i want to ping from LAN the network my mikrotik is giving to the clients on the other side... i can do the other way instead...without any issue we have to check routing options...because pfsense must know if an host is trying to reach the network of the client on the other side...it should reach it through the openvpn server virtual adapter...