Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OVPN route to 0.0.0.0/0 via a static route with LAN GW

    Scheduled Pinned Locked Moved Routing and Multi WAN
    17 Posts 2 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @andrewr_net
      last edited by

      @andrewr_net
      And you want to route the clients to a certain gateway, which is connected to pfSense LAN?
      Or is 10.0.0.1 the LAN IP of pfSense?

      A 1 Reply Last reply Reply Quote 0
      • A
        andrewr_net @viragomann
        last edited by

        @viragomann
        yes
        route the clients to a certain gateway, which is connected to pfSense LAN?
        10.0.0.1 the IP of another gateway not PF

        V A 2 Replies Last reply Reply Quote 0
        • V
          viragomann @andrewr_net
          last edited by

          @andrewr_net
          So you have to policy route the traffic to that gateway.

          A 1 Reply Last reply Reply Quote 0
          • A
            andrewr_net @andrewr_net
            last edited by

            @andrewr_net

            ?-->!

            1 Reply Last reply Reply Quote 0
            • A
              andrewr_net @viragomann
              last edited by

              @viragomann
              Can you tell me more, can you show a screenshot?

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @andrewr_net
                last edited by

                @andrewr_net
                You have to add 10.0.0.1 as the gateway first (System > Routing > Gateways) if you haven't done this already.

                In the settings of the respective OpenVPN server you need to check "Redirect gateway" to push the default route to the clients.

                Then on the OpenVPN tab add a pass rule for the concerned tunnel network as source, destination any, open the Advanced options, go down to gateway and select that one you have added above.
                Put this rule to the top of the OpenVPN rule set.

                If there is no route back to the OpenVPN tunnel network behind pfSense (on the LAN gateway) you need also an outbound NAT rule for masquerading:
                The Outbound NAT must be set to hybrid mode. Then add a rule:
                interface: LAN
                source: the respective VPN tunnel pool
                dest: any
                translation: interface address

                Think, it should work with these settings.

                A 2 Replies Last reply Reply Quote 1
                • A
                  andrewr_net @viragomann
                  last edited by

                  @viragomann said in OVPN route to 0.0.0.0/0 via a static route with LAN GW:

                  You have to add 10.0.0.1 as the gateway first (System > Routing > Gateways) if you haven't done this already.
                  In the settings of the respective OpenVPN server you need to check "Redirect gateway" to push the default route to the clients.
                  Then on the OpenVPN tab add a pass rule for the concerned tunnel network as source, destination any, open the Advanced options, go down to gateway and select that one you have added above.
                  Put this rule to the top of the OpenVPN rule set.
                  If there is no route back to the OpenVPN tunnel network behind pfSense (on the LAN gateway) you need also an outbound NAT rule for masquerading:
                  The Outbound NAT must be set to hybrid mode. Then add a rule:
                  interface: LAN
                  source: the respective VPN tunnel pool
                  dest: any
                  translation: interface address
                  Think, it should work with these settings.

                  6a380251-af13-4039-bb5b-6b6807a58612-изображение.png

                  here is the magic line i needed, thank you so much

                  I will check and let you know

                  V 1 Reply Last reply Reply Quote 0
                  • A
                    andrewr_net @viragomann
                    last edited by

                    @viragomann

                    all work fine!

                    1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @andrewr_net
                      last edited by

                      @andrewr_net
                      That’s what we call “policy routing“.

                      A 1 Reply Last reply Reply Quote 0
                      • A
                        andrewr_net @viragomann
                        last edited by

                        @viragomann

                        Hi
                        May I add a subtask to this topic? I added a second WAN2 provider. Now I have

                        WAN 1.1.1.10/24
                        GW 1.1.1.1

                        WAN2 2.2.2.10/24
                        GW2 2.2.2.2

                        Can you tell in one picture how to make any incoming traffic to the WAN interface go through GW, and any incoming traffic to WAN2 go through GW2

                        Should I tag (TAG) incoming traffic and wrap the response to this traffic through the appropriate GW?

                        A 1 Reply Last reply Reply Quote 0
                        • A
                          andrewr_net @andrewr_net
                          last edited by

                          @andrewr_net
                          Everything worked, it turns out that in the Rules --WAN(1,2) -- Advanced ---GateWate settings, you had to leave Default. Before that, I changed it to the corresponding to WAN (1,2) GW (1,2)

                          V 1 Reply Last reply Reply Quote 0
                          • V
                            viragomann @andrewr_net
                            last edited by

                            @andrewr_net
                            Also you have to ensure that a pass rule on WAN1/2 is applied to the incoming traffic, but not one on an interface group (in case you plan to create one) and not a floating rule.

                            With the rules on the WAN interface tabs, pfSense tags incoming connections automatically with "reply-to" (gateway). This is not the case for the other rules, since these rule could be applied to multiple interfaces.

                            1 Reply Last reply Reply Quote 0
                            • A
                              andrewr_net
                              last edited by

                              @viragomann
                              One more question please. VLANs. What is the general concept if I want VLANs to work through PFSENSE? In this case, PFSENSE, as the core of the network, has OVPN and IPSEC clients. Should I want VLAN111 on the OVPN1 client to see VLAN111 on the OVPN2 client, or even more VLAN111 to see on the IPSEC1 client?

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.