@jimp:
That outbound NAT rule goes on WAN, not OPT2.
Thank you; it's transferring data now! I'll put on a packet sniffer so I can see with my own eyes that data and DNS are both encrypted, but at this juncture I'm quite pleased.
I do appreciate your very quick and entirely correct response; I'm sorry I wasted your time. Is there a wiki I can document this at, so others can find the right information more easily?
For anyone else going through this, the final configuration:
Current major setup:
Client: Windows XP, OpenVPN 2.1.1 with OpenVPN GUI 1.0.3
Netgate ALIX board with pfSense 1.2.3-RELEASE installed.
LAN (192.168.1.13/27) ethernet goes nowhere, or to a computer for logging into the web interface.
WAN (xxx.yyy.zzz.qqq/24) ethernet goes to the cablemodem (which is set for static IP use)
WAN gateway xxx.yyy.zzz.nnn
OPT1 (192.168.1.113/27) goes to wireless
OPT1 is not bridged
OPT1 gateway is blank
OPT1 is set as an Access Point, WPA2 only, Pre-shared-key, Open System Auth, and works fine right now.
OPT2 (192.168.2.1/24) goes to tun0, the OpenVPN
OPT2 general config is Type Static
OPT2 is not bridged
OPT2 gateway is blank
VPN OpenVPN is set up as "Server"
VPN Protocol UDP
VPN Dynamic IP unchecked
VPN Local Port 1194
VPN Address Pool 192.168.2.0/24
VPN Use Static IPs is not checked
VPN Local Network is blank
VPN Authentication method is PKI
VPN Custom Options:
push "redirect-gateway def1"
Firewall - based on a forum search here, I set:
NAT - Outbound to Manual mode, and added
NAT Outbound Interface WAN Source 192.168.2.0/24 * * * * * NO
NAT Outbound Interface WAN Source 192.168.1.0/27 * * * * * NO - Auto created rule for LAN (matches .13/27)
*** nothing for 192.168.1.96/27, the OPT1 Wireless IP range, because I deliberately want to force all wireless to use VPN.
Rules - OPT2
Block TCP/UDP * * to destination (all firewall IP's, ports 80 and 443 - to prevent vpn clients form accessing WebGUI)
ALLOW TCP from * * to destination * ports 80 and 443 gateway *