<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (2024)

<![CDATA[Wireguard site to site vpn, lan site not accessible.]]><![CDATA[

Hi,
I'm having a problem to connect my "Site A" to"Site B" VPN connection.
I have created on pfsense a wireguard tunneling system and completed according to this youtube video :"https://www.youtube.com/watch?v=7_gLPyipFkk"

From Site A:
I'm able to ping :
Both Pfsense Lan, Both pfsense wan, Both tunnel A/B, PC-1 and PC-2, but I can't ping PC-3 which is other site of the network (SiteB).
I'm able to access same side pfsense wan but not otherside.

From Site B:
I'm able to ping:
Both Pfsense Lan, Both pfsense wan, Both tunnel A/B, PC-1 and PC-3.
I can't ping PC-2,Pc-4,Pc-5 and Managed switch.

Routing:
From site A: all IP: 192.168.3.0/24 to tunnel site B.
From site B: all ip: 192.168.2.0/24 to tunnel site A.

rules:
Site A - wan interface:
protocol: UDP, source: site b public ip, destination: port: xxxxx.
Site A - tunnel interface:
protocol: any, source: any, destination: any
Site A - Lan
protocol: any, source:any, destination:any

Site B- wan interface:
protocaol: UDP, source: site a public ip, destination: port: xxxx.
Site B tunnel interface:
protocol: any,source: any, destination: any
Site A - Lan
protocol: any, source:any, destination:any
protocol:any, source:192.168.0.0/24, destination: any

Site B - Nat Port forward
interface: tunnel, protocol: any, destination: any, redirect ip: lan address
Site A - Nat port forward : none

How can i reach both site pc's for filesharing or remote access, also I'm looking for a forest setup. I'm looking to connect my existing Domain controller with another controller from another place.

Here is my network topology:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (1)
Did I missed anything here or wrong firewall rules, I'm open for any sugestion.
Thanks.

]]>
https://forum.netgate.com/topic/185890/wireguard-site-to-site-vpn-lan-site-not-accessibleRSS for NodeSun, 11 Feb 2024 00:23:21 GMTWed, 31 Jan 2024 19:29:34 GMT60<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Wed, 07 Feb 2024 23:01:43 GMT]]><![CDATA[

@Jarhead said in Wireguard site to site vpn, lan site not accessible.:

Check the routing tables on both ends.

Also, do a packet capture on one end from the Wireguard interface, then do a constant ping from a pc on the other end. Do you see the replies going out the Wireguard interface?
With the same ping going, do a packet capture on the WG interface on the same side as the pinging PC. Do you see replies coming in?

]]>
https://forum.netgate.com/post/1151507https://forum.netgate.com/post/1151507<![CDATA[Jarhead]]>Wed, 07 Feb 2024 23:01:43 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Wed, 07 Feb 2024 21:48:13 GMT]]><![CDATA[

Thanks!
I have tried the command tracert from command prompt, it goes upto otherside tunnel 172.25.25.2(I was trying fron tunnel side 172.25.25.1)

  1. first my router
  2. tunnel ip 172.25.25.2
    • requested timed out
    • requested timed out
      and so on.

If I try the same ip from the diagnostic page from pfsense, 2 jumps only.

  1. tunnel ip 172.25.25.2
  2. pc ip 192.168.20.68

I'm sure something is blocking from the exit point of the tunnel, now I'm looking for a way how to identify this block(Pc firewall is off).

]]>
https://forum.netgate.com/post/1151489https://forum.netgate.com/post/1151489<![CDATA[sutha]]>Wed, 07 Feb 2024 21:48:13 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Wed, 07 Feb 2024 20:25:56 GMT]]><![CDATA[

@sutha pfSense is enough.
You created a link from one router to the other. No clients needed.

]]>
https://forum.netgate.com/post/1151477https://forum.netgate.com/post/1151477<![CDATA[Jarhead]]>Wed, 07 Feb 2024 20:25:56 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Wed, 07 Feb 2024 16:31:43 GMT]]><![CDATA[

Great !
Finally, something is working.
After entering the gateway, I can ping the local PC from the diagnostic page of other side pfsense. However, I'm still unable to ping from the command prompt. Do I need to install the WireGuard peer on every system from which I'd like to connect via VPN, or is this site-to-site VPN setup with pfSense is enough?

]]>
https://forum.netgate.com/post/1151431https://forum.netgate.com/post/1151431<![CDATA[sutha]]>Wed, 07 Feb 2024 16:31:43 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Wed, 07 Feb 2024 14:26:22 GMT]]><![CDATA[

@sutha pfSense LAN IP on both sides.
Side A gateway will be 10.0

Side B gateway will be 20.1.

]]>
https://forum.netgate.com/post/1151410https://forum.netgate.com/post/1151410<![CDATA[Jarhead]]>Wed, 07 Feb 2024 14:26:22 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Wed, 07 Feb 2024 10:55:50 GMT]]><![CDATA[

Just to clear my confusion.
Side A:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (2)
Pc1:192.168.10.125 (Pc with company files from side-A)
Pc2: 192.168.20.125 (This pc is to connect the side-B network)
Subnet: 255.255.255.0
Gateway: empty

Side B:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (3)
Pc1:192.168.20.68 (Pc with company files from side-B)
Pc2:192.168.10.68 (This pc is to connect the Side-A network)
Subnet: 255.255.255.0
Gateway: empty

Both sides have a different public IP from the WAN IP shown in the images above. Therefore, I have forwarded the WireGuard port to this particular machine on each side.

Are my ip setting on the pc's are correct or do I need to add the gateway, when yes what is my gateway(tunnel ip,wan IP or pfsense ip).

]]>
https://forum.netgate.com/post/1151364https://forum.netgate.com/post/1151364<![CDATA[sutha]]>Wed, 07 Feb 2024 10:55:50 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Wed, 07 Feb 2024 02:12:06 GMT]]><![CDATA[

@sutha Ok. Wireguard is setup correctly.
Whatever the problem is, it's not Wireguard.
These PC's you're trying to get to, how are they configured? DHCP? Is the gateway correct on them?
Start checking the local PC's on both sides.

Check the routing tables on both ends.

Also, do a packet capture on one end from the Wireguard interface, then do a constant ping from a pc on the other end. Do you see the replies going out the Wireguard interface?
With the same ping going, do a packet capture on the WG interface on the same side as the pinging PC. Do you see replies coming in?

]]>
https://forum.netgate.com/post/1151344https://forum.netgate.com/post/1151344<![CDATA[Jarhead]]>Wed, 07 Feb 2024 02:12:06 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Tue, 06 Feb 2024 23:45:02 GMT]]><![CDATA[

Local subnet is 192.168.10.0/24.

]]>
https://forum.netgate.com/post/1151335https://forum.netgate.com/post/1151335<![CDATA[sutha]]>Tue, 06 Feb 2024 23:45:02 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Tue, 06 Feb 2024 15:45:23 GMT]]><![CDATA[

@sutha I meant the WG interface MTU only. Bith sides should be 1420. No need to change the LAN MTU.

What is the local subnet on the side A?
I can't make the question any clearer than that. Thought that was clear enough in my last post.

(Hint, it's not x.x.x.x/24)

]]>
https://forum.netgate.com/post/1151295https://forum.netgate.com/post/1151295<![CDATA[Jarhead]]>Tue, 06 Feb 2024 15:45:23 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Tue, 06 Feb 2024 07:03:31 GMT]]><![CDATA[

I have change the lan range but the subnetting is kept according to the link you provided. I want to avoid the same IP range again to avoid any complication with previous setting.
I have change the lan Interface mtu to 1420, it did not work then tried to change tunnel mtu as well but this is also not successful.
I have revert the lan mtu back to blank, but still not working.

Final outcome not working, current lan and tunnel interface mtu status are 1420.

Still can't ping other side local pc.
Side A is one of the location and Side B is the another location.
I have marked this in description of the Tunnel configuration as (S) and (I) .
Subnet for tunnel is x.x.x.x/30 and lan x.x.x.x/24 as you can see in the above configuration(don't compare with beginning of this chat).

]]>
https://forum.netgate.com/post/1151209https://forum.netgate.com/post/1151209<![CDATA[sutha]]>Tue, 06 Feb 2024 07:03:31 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Tue, 06 Feb 2024 01:12:34 GMT]]><![CDATA[

@sutha You changed LAN subnets?
Not making this easy, are you?

Set the interface MTU to 1420 <--- DO THIS. Very important. (May fix your problem)

What you're calling Side A, what is the LAN subnet?

]]>
https://forum.netgate.com/post/1151189https://forum.netgate.com/post/1151189<![CDATA[Jarhead]]>Tue, 06 Feb 2024 01:12:34 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Mon, 05 Feb 2024 23:53:43 GMT]]><![CDATA[

Okay, here is what you're expecting.
Side A:
Tunnel:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (4)
Peer:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (5)
Tunnel Interface:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (6)
Gateway:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (7)
Routing:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (8)
LAN rule:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (9)
Wireguard rule:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (10)
Tunnel-interface rule:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (11)

Site B:
Tunnel:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (12)
Peer:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (13)
Tunnel Interface:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (14)
Gateway:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (15)
Routing:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (16)
LAN rule:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (17)
Wireguard rule:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (18)
Tunnel-interface Rule
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (19)

This is my total configuration.

]]>
https://forum.netgate.com/post/1151185https://forum.netgate.com/post/1151185<![CDATA[sutha]]>Mon, 05 Feb 2024 23:53:43 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Mon, 05 Feb 2024 21:54:48 GMT]]><![CDATA[

@sutha Listen, I asked you for pics and you only gave me the firewall rules. I know you think you "have everything correct" but no one can help by just going with what you say.
Post the pictures you were asked for if you want further help.
And if you followed the link I provided exactly (you obviously didn't or the firewall rules would've been there already), it would work.

]]>
https://forum.netgate.com/post/1151176https://forum.netgate.com/post/1151176<![CDATA[Jarhead]]>Mon, 05 Feb 2024 21:54:48 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Mon, 05 Feb 2024 20:10:58 GMT]]><![CDATA[

I have add a rule for wan as well, see bleo the image.
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (20)

I have added for both side and also tested with any protocol, but no luck. No changes after adding the wan rule.

Curiosity question:
Actually, I'm planning to connect my three locations via VPN to share files or work via remote desktop. I aim to control all PCs from one place.

I have not installed any additional software on any PCs to access my remote location, other than this pfSense site-to-site VPN setup.

]]>
https://forum.netgate.com/post/1151157https://forum.netgate.com/post/1151157<![CDATA[sutha]]>Mon, 05 Feb 2024 20:10:58 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Mon, 05 Feb 2024 14:22:05 GMT]]><![CDATA[

@sutha You have to allow the listening port through the WAN. Add an allow rule for it.

]]>
https://forum.netgate.com/post/1151044https://forum.netgate.com/post/1151044<![CDATA[Jarhead]]>Mon, 05 Feb 2024 14:22:05 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Mon, 05 Feb 2024 10:16:11 GMT]]><![CDATA[

These are the rules, which I have in pfsense firewall.
Wireguard:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (21)
Wan:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (22)
Lan:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (23)
Tunnel_WG0:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (24)

I have added the lan and wireguard rule, but lan rule make sense. After Adding lan, I'm able to ping from local pc to pfsense ip and from pfsense to local ip without any problem, but still having problem reaching other side of the tunnel.
Wireguard rule does not make any sense. I believe this is because I'm using the tunnel interface(WG0) for wireguard traffic.

My current Lan after adding the rule:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (25)

Current Status:
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (26)
Currently I'm able ping from pfsense A to pfsense B, both tunnel ip and pfsense ip.
Next I'm able to ping from pfsense A to local pc's and pfsense B to local pc's as well, Both way.
I'm unable to ping from PC-A1 to PC-B1 or PC-B2, also from PC-B1 to PC-A1 or PC-A2.

Routing -A:
Gateway,
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (27)
Static Route,
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (28)

Routing-B: Same as A , but all remote IP(192.168.10.0/24) to tunnel A (172.25.25.1).
I don't know , if I forgot to forward some rule to other side of the tunnel.

]]>
https://forum.netgate.com/post/1151019https://forum.netgate.com/post/1151019<![CDATA[sutha]]>Mon, 05 Feb 2024 10:16:11 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Sun, 04 Feb 2024 22:15:26 GMT]]><![CDATA[

@sutha If you don't have any LAN rules nothing on the LAN can talk to anything.
Do you mean you have no rules other than the default ANY rule?

Post pics.

Go to VPN/Wireguard click the edit button for the tunnel and post a screenshot. Block ONLY the the keys and endpoints.
Same with the peer.

If you followed that link, go to interfaces, click the one you're using for the tunnel and post a screenshot. No need to block anything on here.

System/Routing. Post a sceenshot.

Firewall/Rules. Post shots on LAN, Wireguard and the Wireguard interface.

]]>
https://forum.netgate.com/post/1151000https://forum.netgate.com/post/1151000<![CDATA[Jarhead]]>Sun, 04 Feb 2024 22:15:26 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Sun, 04 Feb 2024 21:35:52 GMT]]><![CDATA[

Hi, I have completed the site-to-site VPN configuration as per the provided link. Now, I'm encountering same issue as before.

I can successfully ping both sides of the tunnel and the allowed IPs from the diagnostics page of pfSense. Additionally, I can ping any PC locally on both sides. However, I'm unable to ping any PC on the other side of the VPN connection.

My Hardware connection:
Both pfSense network port 1 are connected to my router(WAN) with a local IP assigned from my router. However, my WAN IP on my pfsense is not my public IP. I'm using my second network port for LAN connection, where my PCs are connected.

I'm accessing my pfSense locally from one of the PC from on each side. But after configuring the site-to-site VPN, I can only reach up to pfSense. I'm unable to reach any PCs on the other side of network.

Am I missing any firewall rule for LAN, Currently I don't have any rule for Lan.
On wan, I'm port forwarding the wireguard port to wan address.
On tunnel interface all traffic allowed.
On LAN : None
There is a interface called wireguard, I don't have any rules in it.

I have changed my managed switch as well, so both side unmanaged switch connected on lan port.

]]>
https://forum.netgate.com/post/1150998https://forum.netgate.com/post/1150998<![CDATA[sutha]]>Sun, 04 Feb 2024 21:35:52 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Sat, 03 Feb 2024 06:36:50 GMT]]><![CDATA[

Thanks for this link!
I'm sure, I'll have the same issue again but anyway. I think, this is the only way I can train myself.

I'll update the outcome very soon.

]]>
https://forum.netgate.com/post/1150827https://forum.netgate.com/post/1150827<![CDATA[sutha]]>Sat, 03 Feb 2024 06:36:50 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Fri, 02 Feb 2024 16:27:50 GMT]]><![CDATA[

@sutha
Did you fix the allowed IP's and the tunnel?
If you're gonna have 3 sites you'll need to use a larger tunnel than the /30.

Didn't watch the video.
Follow this instead:
https://docs.netgate.com/pfsense/en/latest/recipes/wireguard-s2ms.html

]]>
https://forum.netgate.com/post/1150744https://forum.netgate.com/post/1150744<![CDATA[Jarhead]]>Fri, 02 Feb 2024 16:27:50 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Fri, 02 Feb 2024 16:08:25 GMT]]><![CDATA[

First of all, I'd like to thank you!
Recently, I have heard about pfSense, and I'm very impressed with how its site-to-site VPN works. I have people in three locations working with computers, and they use an Active Directory controller to log in to those systems. My plan is to manage all three locations from a single place, so I need to establish site-to-site VPN connections in all three places.

The scenario, which I've described here is just a testing environment. Once I have a good understanding of it, I'm going to implement it in our live environment.

Actually I have followed this youtube video: https://www.youtube.com/watch?v=7_gLPyipFkk

Simply expained:

  • Vpn tunnel is establish and handshake is success.
  • I can ping both side of tunnel ip from either side(182.35.35.1 and 182.35.35.2)
  • I can ping both side of pfsense ip from either side as well(192.168.2.1 and 192.168.3.1)
  • I'm unable to ping both side pc from opposite side:
    example: from site b to ping 192.168.2.68 or from site a to ping 192.168.3.68
  • I can ping those PC from same side. from site a to ping 192.168.2.68 or from site b to ping 192.168.3.68 is possible.

There must be some sort of routing issue, but how. I have already a routing rule for "side a" 192.160.3.0/24 to 182.35.35.2 and for "side b" 192.168.2.0/24 to 182.35.35.1.
LAN rule is any and wireguard interface (WG0) rule is also any.

]]>
https://forum.netgate.com/post/1150742https://forum.netgate.com/post/1150742<![CDATA[sutha]]>Fri, 02 Feb 2024 16:08:25 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Fri, 02 Feb 2024 14:47:59 GMT]]><![CDATA[

@sutha You did NOT correct the IP's. At all.

The site A side should be allowing the site B subnets.
The Site B side should be allowing the site A subnets.
You have the site B allowing the LAN from site B. That's incorrect.

And fix your tunnel addresses.
You show 182.35.35.1 and 182.35.35.2 in the first post. But then you have it as a /31 in the Site A Peer, so 182.35.35.2 isn't included. Then you have it as a /32 on the site B config.
What are you using?? And why not use a private IP range? What's the point of the 182.x addresses?
Make the tunnel 182.35.35.0/30.

Site A should have the tunnel network and the Site B LAN as allowed.
So 182.35.35.0/30 and 192.168.3.0/24
Site B will be the tunnel and Site A LAN.
182.35.35.0/30 and 192.168.2.0/24

]]>
https://forum.netgate.com/post/1150714https://forum.netgate.com/post/1150714<![CDATA[Jarhead]]>Fri, 02 Feb 2024 14:47:59 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Fri, 02 Feb 2024 10:56:58 GMT]]><![CDATA[

Now, I have corrected the IP range. See below the image.
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (29)
<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (30)

As I said earlier, I'm able to ping both side tunnel (182.35.35.0/31 and both side pfsense.
Also from site A /Site B, I'm able to ping the local LAN.
But, I'm able to ping from the local LAN to site A only not Site B.

I suspect the managed switch on Site-B, do I have to allow the incoming traffic on pfsense from this negear switch(GS724TPS).
If yes, how do I do it.

]]>
https://forum.netgate.com/post/1150690https://forum.netgate.com/post/1150690<![CDATA[sutha]]>Fri, 02 Feb 2024 10:56:58 GMT
<![CDATA[Reply to Wireguard site to site vpn, lan site not accessible. on Thu, 01 Feb 2024 12:53:33 GMT]]><![CDATA[

@sutha How is pc2 on the B site supposed to route anywhere??

Fix your allowed IP's.
Site A should have the IP's allowed from site B and vice versa. The site A pc's are already on that side, they don't need to be allowed to traverse the tunnel.
The tunnel allowed IP should be the subnet, so not a /32.
If you only want to allow one pc, it should be a /32 not a /24.

]]>
https://forum.netgate.com/post/1150553https://forum.netgate.com/post/1150553<![CDATA[Jarhead]]>Thu, 01 Feb 2024 12:53:33 GMT

Insights, advice, suggestions, feedback and comments from experts

Based on the information provided, it seems that you are experiencing issues with accessing the LAN site through a Wireguard site-to-site VPN connection. You have mentioned that you can successfully ping both sides of the tunnel and the respective pfSense IPs, but you are unable to ping PCs on the other side of the network.

To troubleshoot this issue, there are a few steps you can take:

  1. Check Firewall Rules: Ensure that you have the correct firewall rules in place to allow traffic between the LAN networks on both sides of the VPN connection. It's important to have rules that allow traffic from one LAN subnet to the other. Make sure that the LAN rules are properly configured to allow the necessary traffic. You can refer to the firewall rules you have set up and verify if they are correct.

  2. Verify Routing: Double-check the routing configuration on both sides of the VPN connection. Ensure that the routing tables are correctly set up to route traffic between the LAN subnets. It's important to have the correct routes configured so that traffic can flow between the two LAN networks.

  3. Check IP Addressing: Confirm that the IP addressing scheme for both LAN networks does not overlap. It's crucial to have unique IP ranges for each LAN network to avoid any conflicts. Make sure that the IP ranges you have assigned to the LAN networks on both sides of the VPN connection are different and do not overlap.

  4. Packet Capture: Perform a packet capture on one end of the Wireguard interface while doing a constant ping from a PC on the other end. This will help you determine if the replies are going out through the Wireguard interface. Similarly, perform a packet capture on the Wireguard interface on the same side as the pinging PC to check if the replies are coming in.

  5. MTU Settings: Check the Maximum Transmission Unit (MTU) settings on both sides of the VPN connection. It's recommended to set the MTU to 1420 for the Wireguard interface. This can be done in the interface settings. Ensure that the MTU settings are consistent on both sides.

  6. Managed Switch Configuration: If you suspect that the managed switch on Site B is causing the issue, you may need to allow incoming traffic on pfSense from the switch. Check the configuration of the switch and ensure that it is not blocking any traffic that needs to pass through the VPN connection.

By following these steps, you should be able to identify and resolve the issue with accessing the LAN site through the Wireguard site-to-site VPN connection. Remember to double-check your firewall rules, routing configuration, IP addressing, and perform packet captures to troubleshoot the problem effectively.

Please note that the information provided is based on the details you have shared, and it's always recommended to consult the official documentation or seek assistance from the pfSense community or support for specific troubleshooting steps related to your setup.

<![CDATA[Wireguard site to site vpn, lan site not accessible.]]> (2024)
Top Articles
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 6321

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.