@jimp:
You can do that sort of NAT with OpenVPN, but not IPsec. You'd have to address the remote side IPs as though they were in a different subnet, so it doesn't really save you any convenience.
If you have no conflicting IPs at all, just the same subnet, a bridge may be possible, but never recommended.
You could save yourself a lot of headaches by just renumbering one side though.
Hi jimp,
i can confirm that with OpenVPN, nat (snat) before ovpn tunnel works perfectly.
As reported in pfSense 2.0 features and in a lot of forum's threads, NAT before IPSEC is not supported yet (maybe in 2.1 version).
Looking for a solutions for my issue, I've read your post ( http://forum.pfsense.org/index.php/topic,36119.msg186468.html#msg186468 ) and some tips speaking about multiple pfs box (one for NAT, one for IPSEC), to workaround NAT before IPSEC.
Im my scenario, I have multiple ipsec tunnel to remote sites with overlapping subnets ( i.e. 192.168.1.0/24).
MyIP: 1.1.1.1
MyLocalHost: 10.123.1.10
MyLocalSubnet: 10.123.1.0/24
|
<<ipsec tunnel1="">>
|
RemoteSite1: 2.2.2.2
RemoteSubnet1: 192.168.1.0/24
RemoteHostInSubnet: 192.168.1.10
MyIP: 1.1.1.1
MyLocalSubnet: 10.123.1.0/24
|
<<ipsec tunnel2="">>
|
RemoteSite2: 3.3.3.3
RemoteSubnet2: 192.168.1.0/24
RemoteHostInSubnet: 192.168.1.10
As you can see, subnet overlap is only in remote sites, not between local&remotesite. How to reach host in different remote sites but with the same ip&subnet from myLocalHost? Multiple pfs box can help me in this scenario?
Thank a lot
SierraBravo
</ipsec></ipsec>