@dbx said in Access Webserver on openvpn client (site-to-site):
Ive checked the DNS using the diagnostic tool on the server endpoint and it does resolve to the remote private ip
The point is what IP the browser is using.
That the DNS resolution is working, says sadly nothing. If the browser uses DoH (DNS over HTTPS) he requests a public DNS server and doesn't care about your local DNS settings.
You can check this out in the browsers debugging mode (F12) and look, which IP it is requesting.
You can also capture the traffic on pfSense on the client facing interface. Enter the clients IP into the IP filter and state port "80|443" (means OR) and try to access the web server.
Then look, which IP it is requesting. But you will see some noise there.
However, you can search for the web servers private IP and the public IP.
@dbx said in Access Webserver on openvpn client (site-to-site):
you did also mention previously that there is some special settings on the client side.
The special settings, I meant, are the firewall rules. That you have to ensure that a pass rule on the VPN interface (not group) is applied to the forwarded traffic.
My current outbound NAT rule has:
Interface: SERVER_VPNV4
Source: Client LAN Subnet
NAT Address: SERVER_VPNV4 address
Source Port, Destination, and Destination Port and NAT Port all as *
This rule makes commonly no sense for a site-to-site VPN.
Such masquerading is needed, when you configure a VPN client for a public VPN service.
In a site-to-site you route the traffic to the remote site by entering the remotes network in the VPN settings on both sites.