Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Openvpn through ipsec

    Scheduled Pinned Locked Moved OpenVPN
    7 Posts 4 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mesro09
      last edited by

      hi everybody
      is there anyone could send config screen photos please
      i am trying to do as same as that
      i have ipsec tunnel from 192.168.30.0/24(pfsense) to 192.168.10.0/24 (tplink)
      i have  openvpn tunnel 192.168.14.0/28 on the side of 192.168.30.0/24 (here i have pfsense)
      so i when i connect with openvpn i can comunicate all of the network of 192.168.30.0/24 but i want to comunicate also with remote network of ipsec is is posible ?
      many thanks for everybody to helping me to solve this

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Posting the same question 6 times will not get you an answer any faster, friend. In fact it will only irritaqte people who might otherwise take time to help.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • M
          mesro09
          last edited by

          thanks,
          i aldrready see on forum similiar question but anyone gave clearly explaination
          you can already check it
          i put same post where i see similiar question but it is too old for that reason

          1 Reply Last reply Reply Quote 0
          • A
            andra.pocherebox
            last edited by

            I'm in the same situation…

            Site-to-site IPSec (pfsense both side);
            Remote access ovpn to the first pfsense box.
            Cannot route the remote client through the remote IPSec subnet...

            Any advise?

            Thanks

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              I can see simply explaining it is not going to be enough.

              So, referencing this diagram, you want Remote Access OpenVPN clients (172.25.230.0/24) to be able to access Host C1, etc (172.25.234.0/24)?

              Do you have Redirect Gateway checked in the remote access VPN server or not?

              pfSense+VPN.png
              pfSense+VPN.png_thumb

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • A
                andra.pocherebox
                last edited by

                Hi Derelict,

                Yes you got the point! However I managed to make it myself.

                I was paying attention to the routing table of the OpenVPN connection (with was correct anyhow); instead I had to modify the phase 2 in the IPSec tunnel by including the OpenVPN subnet (in a new Phase2 instance).
                In the server OpenVPN, I had to push the route to the destination subnet I want to reach and that's all.
                Now I have a remote gateway entry-point from which I can access all the shared network.

                Thanks anyway for your time!

                @mesro09: Hope this could be clear, if you still have problem feel free to contact me in PM.

                Best

                1 Reply Last reply Reply Quote 0
                • L
                  leftbrake
                  last edited by

                  I manged to resolve the original(!) problem (i.e. openvpn - >pfsense <- ipsec tunnel -> tp-link) by adding a P2 entry declaring the openvn network as local AND (!) on the TP-Link device added a new IPsec Policy (under IPsecVPN/IPsec) using the same IKE Policy as the Tunnel connecting the two LANs.

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.