I’m fairly new back to mikrotik after about a 5+ year stint of using other devices. So I’m relearning all over again. I have a openvpn site to site going from a hex (client) to pfsense (server). Both on newest versions.
I can ping the pfsense from terminal on the hex.
I cannot ping the pfsense from a pc behind the hex.
Nothing on the pfsense side can ping anything on the hex side.
PC (192.168.1.9) → hex (192.168.1.1) → INTERNET ← Pfsense (192.168.140.1)
Trace route from PC side shows it going thru router.lan 192.168.1.1 and then that’s it.
For the most part this hex is mostly default except the openvpn, and basic quick setup. I’ve set a firewall rule to allow all just for testing purposes. I’m wondering if I need to setup nat or mangle with something.
I need to be able to ping all devices on the clients side from the systems on the pfsense’s subnet.
If you were on the same subnet, I would say you are missing arp-proxy on your LAN interface - very typical situation.
However, you are saying that there is different subnet on each side. That suggest you don’t have correct routes and/or firewall is blocking the communication.
Could you share more info about your setup? e.g. interfaces, IP addresses (including netmask) and routes on both hex and pfsense? Also firewall config (both filter and NAT) could help with pointing out the issue.
this one is BIG security issue. Your first rule literary say “accept any packet from everywhere, including wan”.
This is unnecessary, because there is no “drop” rule on output. Implicitly, every output will be allowed anyway.
Since you don’t have explicit “drop all” forwarding rule, I guess it is not firewall-filter issue on hex.
I assume you don’t have a route on PFSense, which would lead to 192.168.1.0/24 and pfsense is aware only of its WAN, LAN (192.168.140.0/24) and OVPN (172.16.32.0/24).
If that is true, you can either manually add this route to PFSense (that might be challenging if hEX gets someday different IP on OVPN interface) or you can add masquerade rule to your hEX:
Without complete set of info from both devices as asked previously, I can’t guess much more (and obviously my assumption may be wrong).
In overall, you can easily debug this with packet sniffer and a bit of network knowledge. All you need to do is figure out where the packet gets lost by looking at different interfaces/links. (and that is typical use-case for packet sniffer)
I don’t know whether you use a src-nat or masquerade rule in /ip firewall nat referring to the /interface ovpn-client, but lets’s suppose you don’t.
In general, there is a hidden surprise in openvpn - to access subnets on client side, it is not enough to set up, at server side, the corresponding routes with the client’s own address assigned by openvpn as gateway; on top of that, you have to tell that separately also the openvpn server process using the iroute directive in openvpn.conf. See further details here.