PFSense OpenVPN push route problem

Can somebody please explain whats going wrong with my push route command. Setup is fairly simple. WAN = x.x.x.x LAN = and I used for the OpenVPN subnet. I then did a push route for the subnet. The OpenVPN clients can connect and get an IP address in the .40 subnet but they cannot ping address in the local (.10) subnet.

Here is my server config

writepid /var/run/
#user nobody
#group nobody
keepalive 10 60
dev tun
proto udp
cipher AES-256-CBC
up /etc/rc.filter_configure
down /etc/rc.filter_configure
client-config-dir /var/etc/openvpn_csc
push "route"
lport 1194
ca /var/etc/
cert /var/etc/openvpn_server0.cert
key /var/etc/openvpn_server0.key
dh /var/etc/openvpn_server0.dh

Any thoughts?
Who is Participating?
See the warnings in the client log. Your link-mtu, cipher and keysize are wrong. You must correct this. Everything else seems to be OK.
What's you client SO ? Can you please show me the routing table ?

To show the routing table on windows do:

route print

To show the routing table on linux do:

route -n
nccguysAuthor Commented:
Shouldn't be a firewall issue. Since this is in a test environment, both the WAN and LAN interfaces are completely open. (any any any etc) Just to summarize:

WAN:                        X.X.X.X             Currently its a private address in a test environment but I tested on a WAN address with same results. (ie, fear of NAT and routing issues with private addresses)
LAN:                   Local network on LAN port.
OpenVPN subnet    The empty subnet used for OpenVPN clients connecting in.

What seems different with OpenVPN as compared to an IPSec or PPTP in PFSense is there is no interface associated with OpenVPN so I have no way of doing any firewall rules for the .40.0/24 OpenVPN subnet.

Here are several externally hosted screenshots that should really help out with troubleshooting:             (Shows the OpenVPN server front page)             (Shows the OpenVPN detailed configurations)             (Shows the LAN firewall rules)             (Shows the WAN firewall rules()             (Shows an IP config command on the client computer that is connected to the OpenVPN server)             (Shows the OpenVPN client log window upon successful connection)             (Shows the routing table on the Client computer)             (Shows the routing table on the OpenVPN server)             (Shows IP address assigned to the Client upon successful connection)
nccguysAuthor Commented:
Cryptography mis-configured

Push route command is successful. Layer 3 communication now successful. Thank you everyone for helping.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.