Tim Nelson wrote:
----- "Curtis Maurand" <[email protected]> wrote:
> have a public IP on em1
> I have a private IP on em2 (10.0.1.10/24)
> I have a private ip on OPT1 (10.201.17.1/28)
>
> Normally I would have the OPT interface in a DMZ, but constraints aren't allowing me to do that so the OPT1 interface is also plugged in on the local LAN as well.
>
>
> I've assigned a secondary address on a linux machine on the same subnet as OPT1 (10.201.17.3/28). The primary address on the linux machine is 10.0.1.210/24
>
> I have a VPN set up via the WAN interface to the subnet on OPT1 interface.
>
> the tunnel comes up perfectly.
>
> The linux machine can ping the primary interface on the pfsense machine.
> The linux machine can ping a host on the other end of the tunnel reliably. > The linux machine can ping the OPT1 interface, but it is not reliable. Huge packet loss numbers. > I can ping the host on the other end of the tunnel via the OPT1 interface.
>
> I've tried all sorts of different rules, but I'm allowing Any traffic and protocol from the OPT1 subnet to the OPT1 interface and vice-verse. I've allowed all traffic from anywhere and to anywhere on the opt one interface. I'm at my wits end. I need two different subnets on my LAN and I need to tunnel one of them.
>
> How do I make this happen?
>

What happens if you take the VPN out of the mix... does the 'pingability' of OPT1 still perform the same? What kind of VPN are you using... IPSEC/OpenVPN? Did you assign two gateways to the Linux machine? Can you verify with a traceroute/tracepath that your traffic to the remote side of the tunnel is in fact passing via OPT1?

--Tim
It got worse after I wrote. I'm going home for the weekend and I'm going to deal with it on Monday.

--Curtis

Reply via email to