Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to put router before pfsense 22.01 firewall

    Scheduled Pinned Locked Moved General pfSense Questions
    33 Posts 4 Posters 2.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rupocinski
      last edited by

      This post is deleted!
      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by stephenw10

        The most likely problem there is a subnet conflict. pfSense uses 192.168.1.0/24 as it's default LAN subnet. That's a very common subnet. If the upstream router is also using it that will break routing, one of them needs to be reconfigured not to use it.

        But as we said in the other thread it would be much better to just connect to the OpenVPN service from pfSense directly. Troubleshooting that problem is what I would be doing here.

        Steve

        R 1 Reply Last reply Reply Quote 0
        • R
          rupocinski @stephenw10
          last edited by

          This post is deleted!
          stephenw10S 1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator @rupocinski
            last edited by

            Yes, the default configuration in pfSense should work fine in that situation.
            The WAN will be DHCP so it will pull a lease from the VPN router in the 10.105.x.x subnet with the VPN router as it's gateway and default route.
            A client connected to the pfSense LAN will get an IP from the DHCP server in pfSense. By default that will be in the 192.168.1.0/24 subnet.
            Everything should work as long as the VPN router is routing traffic.

            How does it fail?

            Can clients ping 8.8.8.8?
            Can they ping google.com

            Can pfSense itself do either from Diag > Ping?

            Steve

            R 2 Replies Last reply Reply Quote 0
            • R
              rupocinski @stephenw10
              last edited by

              This post is deleted!
              1 Reply Last reply Reply Quote 0
              • R
                rupocinski @stephenw10
                last edited by

                This post is deleted!
                stephenw10S 1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator @rupocinski
                  last edited by

                  @rupocinski said in How to put router before pfsense 22.01 firewall:

                  I will set the VPN to DHCP towards the ISP and then Lan 10.105.17.1 and the firewall WAN DHCP connected to the LAN of the VPN and the LAN 10.105.17.2 will this work or no

                  No that would not work. You can't use 10.105.17.0/24 on both the WAN and LAN side of pfSense.

                  In that scenario pfSense will pull a DHCP lease from the VPN router in the 10.105.17.x subnet.
                  Then you must use a different subnet on the pfSense LAN. The default 192.168.1.1 would be fine.

                  Steve

                  R 1 Reply Last reply Reply Quote 0
                  • R
                    rupocinski @stephenw10
                    last edited by

                    This post is deleted!
                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Yes. The VPN router will be in the pfSense default route so traffic from LAN clients will be able to reach it.

                      R 1 Reply Last reply Reply Quote 0
                      • R
                        rupocinski @stephenw10
                        last edited by

                        This post is deleted!
                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by stephenw10

                          You can't screw it up too badly, you can just remove pfSense to get access to the VPN router again if you need to.
                          Basically:

                          {Public WAN IP/VPN}--[WAN VPN_Router LAN]-10.105.17.1----10.105.17.2-[WAN pfSense LAN]-192.168.1.1----192.168.1.100-[client]

                          R 1 Reply Last reply Reply Quote 0
                          • R
                            rupocinski @stephenw10
                            last edited by

                            This post is deleted!
                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Yes, you would need to change those statically configured devices to be in the same subnet.

                              Or you can use the 10.105.17.0/24 subnet on the pfSense LAN and change the VPN-router LAN to be some other subnet.

                              Clients in a 192.168.1.X subnet behind pfSense will be able to reach 10.105.17.X addresses because that is in the default route. pfSense will route between the subnets.

                              Of course it would still be better to just use the OpenVPN client in pfSense directly and not have two subnets at all. šŸ˜‰

                              Steve

                              R 1 Reply Last reply Reply Quote 0
                              • R
                                rupocinski @stephenw10
                                last edited by

                                This post is deleted!
                                GertjanG 1 Reply Last reply Reply Quote 0
                                • GertjanG
                                  Gertjan @rupocinski
                                  last edited by

                                  @rupocinski said in How to put router before pfsense 22.01 firewall:

                                  I read forums and worked with ExpressVPN techs and still could not

                                  Upfront, I use "2.6.0 CE", not "pfSnse Plus 22.0x".
                                  I'm not working for ExpressVPN (support) but I'm in the 'assisting' : I work for a hotel.

                                  In the OpenVPN forum I've posted two ( ? ) step by step OpenVPN with Express setups.

                                  I have the OpenVPN client still 'ready to go', let me start it up :

                                  dc707d92-f7ab-47c9-b9da-e7a1973b6ecc-image.png

                                  there. Connected. So pfSense 2.6.0 works with ExpressVPN.
                                  And yes, I'm using "usa-sanfrancisco-ca-version-2.expressnetw.com:1195" as the ExpressVPN other side end point. I do pay ExpressVPN every month "just to have a VPN ISP for the day I need one". Never found the reason, but that's another story.

                                  I've not set up the other second half of the needed setup, the routing part.
                                  Connecting, making the tunnel, to a VPN ISP is one thing.
                                  Having traffic, like some LAN devices, or just one LAN, or all the LAN networks being routed over this tunnel instead of the default WAN interface needs some more setup.

                                  The somewhat outdated documentation on the ExpessVPN site uses an older version of pfSense and, more important, presumes older OpenVPN "2.4.x" version.
                                  pfSense 2.6.0 (probably also 22.0x) uses OpenVPN 2.5.4.

                                  Go to to pfSense OpenVPN forum, use my name, look up all the posts that are ExpressVPN related, and you will find, I hope, useful information.

                                  Also, I have a ISP router before my pfSense, and this is IMHO the most common setup. Not that this is important when you want to use the OpenVPN client. This only matters when you want to use the OpenVPN server, as the 1194 UDP port has to be natted to pfSense in the upstream router.

                                  I'm not an ExpressVPN fan or so, and as said, I never actually used their services (yet I'm stupid enough to pay them ?!? - and they are not what I call cheap).
                                  Express proclaims to use OpenVPN on their side as the server part. So OpenVPN on the pfSense client side should work.
                                  Now you know it does. I hope I convinced you that, as you use the same software on your side as I do, pfSense, you can make it work.

                                  And yes, creating an OpenVPN connections is not easy. They never was, and never will be. It's a beast will a lot of options, as it is an open source thing and everybody (the entire planet by now ?) wanted options in it.

                                  No "help me" PM's please. Use the forum, the community will thank you.
                                  Edit : and where are the logs ??

                                  bingo600B 1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    They don't need to be in the same subnet. pfSense routes between the subnets. The same way you can reach 8.8.8.8 or any other IP that is not in your subnet. You will be able to access the VPN-router from a client on the pfSense LAN.

                                    There is no special work-around required to use pfSense as an OpenVPN client in 22.01. It just needs to be configured correctly. It will work if it is.
                                    So far we have nothing to use to diagnose whatever issue you might have been having.
                                    If you can post the OpenVPN logs with the connection error(s) then we can offer guidance.

                                    Steve

                                    R 1 Reply Last reply Reply Quote 0
                                    • R
                                      rupocinski @stephenw10
                                      last edited by

                                      This post is deleted!
                                      stephenw10S 1 Reply Last reply Reply Quote 0
                                      • bingo600B
                                        bingo600 @Gertjan
                                        last edited by bingo600

                                        Removed, as it clutters up the OP's topic

                                        /Bingo

                                        If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                                        pfSense+ 23.05.1 (ZFS)

                                        QOTOM-Q355G4 Quad Lan.
                                        CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                                        LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                                        R 1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator @rupocinski
                                          last edited by

                                          @rupocinski said in How to put router before pfsense 22.01 firewall:

                                          I got the openVPN up and running

                                          So Status > OpenVPN showed the client as UP with traffic passing?

                                          but the interface would not connect

                                          What interface? The assigned OpenVPN interface?
                                          If the OpenVPN tunnel was up that interface would show as connected.

                                          Steve

                                          1 Reply Last reply Reply Quote 0
                                          • R
                                            rupocinski @bingo600
                                            last edited by

                                            @bingo600
                                            Ok so what I want to do is have a vpn for encryption then my firewall then a the dhcp router. I just wanted to use the pfsense as the firewall so that means I would always be connected to VPN. I am worried about security. I know the firewall is good but would feel better with a vpn in place. Not really happy with expressvpn subscriptions up in sept so not renewing it. Would like another alternative to this whole configuration setup. So you use your VPN now and then not all the time. Sounds like a good setup. What advice do you have for me at this point you know what I want to do, firewall the DHCP firewall had issues dropping clients at times so I thought why not use it and put a router behind it to handle the DHCP which are all static routes anyway with MAC. Just want to be secure. I setup the pfsense as it was supposed to be and I did Pfblocker also. Will install Snort also.

                                            bingo600B 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.