Still not much further forward, I am guessing I need rules to send traffic to the WAN rather than the VPN but as to the specifics of such rules I am not quite sure.
Try again with a new snapshot. If it still fails, odds are you had the Site-To-Site (SSL/TLS) connection configured improperly, it isn't addressed like a shared key setup, and there was a bug in the code earlier that wasn't correctly setting up the configuration.
Do the devices in the 164 range have a default gateway other than the pfSense?
Do you have the OpenVPN instance assigned as interface?
If yes, might you have a rule not allowing access?
The same on the remote side: Might you have a rule not allowing access?
Do you see anything in the firewall log?
It might not be too hard to implement, but as with everything, it does take some time.
It would just require adding another checkbox to unhide a custom options box, something like the password box does now, and then some extra code to get the options into the client config.
Had to wait a while to be able to upgrade the remote side, but I am happy to say that it is working just fine after updating to the latest snapshot on both sides.
i have modified the network like this 10.0.8.24/29 instead of 10.0.8.25/24 and now it is working. Probably the issue was the first time when i have defined the VPN … and now because some thinks are verified it's not working like in the past .
Anyway i have understand where was the problem f I was careful from the beginning in defining correctly the whole discussion would not have made sense.
Great work guys ,
Thanks.
Best Regards,
Daniel
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.