For your information, in our case, we have 2 machines in our company, as well as 2 subnets.
If you try to access the pfSense LAN IP address from your remote client connected via the OpenVPN client, you will see that you can access it without problems.
As you can see, in our case the IP address "10.0.0.1" corresponds to the LAN IP address of pfSense and we are connected from a remote PC (via OpenVPN Client) which has the virtual IP address "10.0 .10.2".
As a reminder, the IP address "10.0.10.2" is part of the network used for the OpenVPN tunnel (via the "Tunnel Network" option).
On your remote computer, if you look at your network connections, you will see that 2 OpenVPN network cards have been added.
As you can see, in our case:
On this remote computer, open a command prompt and view the configured routes:
Batch
route print
As you can see :
To see where network packets are going through, you can use the Windows "tracert" command to attempt to communicate with a machine on the company's LAN network, a machine on the DMZ network (if applicable), as well as a server on Internet (like Google's web server).
As you can see, when you try to communicate with a machine or server on the pfSense LAN or DMZ network (known by the OpenVPN server via the "Local Network" setting), your computer goes through the OpenVPN tunnel (whose network used internally is "10.0.10.0/24").
Batch
tracert 10.0.0.10 tracert 10.10.0.10
If you try to contact the Google website via IPv4 (using the "-4" parameter of "tracert"), you will see that your computer will use your Internet Box to access it instead of going through the VPN.
Hence the appearance of the name of your Internet service provider (ISP or ISP in English) on the path of network packets sent over the Internet.
Batch
tracert -4 google.com
Note: the domain "1e1000.net" belongs to Google. You can easily verify this using the WHOIS of this domain.
The domain change is simply because the domain "google.com" uses an alias of the domain "ams15s42-in-f14.1e100.net" and these point to the same IP address.
Except that reverse DNS will only display the real domain name (ams15s42...).
To check the status of OpenVPN, go to: Status -> OpenVPN.
On the "Status / OpenVPN" page that appears, you will see a section "OpenVPN server for remote access UDP 4:1194 Client Connections" with the list of connected OpenVPN clients:
To view the current OpenVPN routing table, click the "Show Routing Table" button.
In the case of a VPN configured in "remote access" mode, you will see almost the same information as in the list above.
In the event of a problem with OpenVPN, consult the OpenVPN logs via the "Status -> System Logs" menu, then go to the "OpenVPN" tab of the page that will appear.
Otherwise, from the OpenVPN status page, you can also click on the penultimate red icon to go directly to the right place.
In both cases, you will arrive on the "Status / System Logs / OpenVPN" page.
Sort the list by date/time (Time) and try to find interesting information that would explain the cause of the problem.
Finally, you can display OpenVPN information on the pfSense dashboard by clicking on the pfSense logo.
Next, click the "+" icon at the top right of the page.
In the "Available Widgets" section that appears, click on: OpenVPN.
The "OpenVPN" widget appears with the "OpenVPN server for remote access UDP4:1194" section in which you will find:
Firewall 8/8/2025
Firewall 7/25/2025
Firewall 8/27/2025
Firewall 7/23/2025
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment