Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OVPN route to 0.0.0.0/0 via a static route with LAN GW

    Scheduled Pinned Locked Moved Routing and Multi WAN
    17 Posts 2 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @andrewr_net
      last edited by

      @andrewr_net
      So you have to policy route the traffic to that gateway.

      A 1 Reply Last reply Reply Quote 0
      • A
        andrewr_net @andrewr_net
        last edited by

        @andrewr_net

        ?-->!

        1 Reply Last reply Reply Quote 0
        • A
          andrewr_net @viragomann
          last edited by

          @viragomann
          Can you tell me more, can you show a screenshot?

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @andrewr_net
            last edited by

            @andrewr_net
            You have to add 10.0.0.1 as the gateway first (System > Routing > Gateways) if you haven't done this already.

            In the settings of the respective OpenVPN server you need to check "Redirect gateway" to push the default route to the clients.

            Then on the OpenVPN tab add a pass rule for the concerned tunnel network as source, destination any, open the Advanced options, go down to gateway and select that one you have added above.
            Put this rule to the top of the OpenVPN rule set.

            If there is no route back to the OpenVPN tunnel network behind pfSense (on the LAN gateway) you need also an outbound NAT rule for masquerading:
            The Outbound NAT must be set to hybrid mode. Then add a rule:
            interface: LAN
            source: the respective VPN tunnel pool
            dest: any
            translation: interface address

            Think, it should work with these settings.

            A 2 Replies Last reply Reply Quote 1
            • A
              andrewr_net @viragomann
              last edited by

              @viragomann said in OVPN route to 0.0.0.0/0 via a static route with LAN GW:

              You have to add 10.0.0.1 as the gateway first (System > Routing > Gateways) if you haven't done this already.
              In the settings of the respective OpenVPN server you need to check "Redirect gateway" to push the default route to the clients.
              Then on the OpenVPN tab add a pass rule for the concerned tunnel network as source, destination any, open the Advanced options, go down to gateway and select that one you have added above.
              Put this rule to the top of the OpenVPN rule set.
              If there is no route back to the OpenVPN tunnel network behind pfSense (on the LAN gateway) you need also an outbound NAT rule for masquerading:
              The Outbound NAT must be set to hybrid mode. Then add a rule:
              interface: LAN
              source: the respective VPN tunnel pool
              dest: any
              translation: interface address
              Think, it should work with these settings.

              6a380251-af13-4039-bb5b-6b6807a58612-изображение.png

              here is the magic line i needed, thank you so much

              I will check and let you know

              V 1 Reply Last reply Reply Quote 0
              • A
                andrewr_net @viragomann
                last edited by

                @viragomann

                all work fine!

                1 Reply Last reply Reply Quote 0
                • V
                  viragomann @andrewr_net
                  last edited by

                  @andrewr_net
                  That’s what we call “policy routing“.

                  A 1 Reply Last reply Reply Quote 0
                  • A
                    andrewr_net @viragomann
                    last edited by

                    @viragomann

                    Hi
                    May I add a subtask to this topic? I added a second WAN2 provider. Now I have

                    WAN 1.1.1.10/24
                    GW 1.1.1.1

                    WAN2 2.2.2.10/24
                    GW2 2.2.2.2

                    Can you tell in one picture how to make any incoming traffic to the WAN interface go through GW, and any incoming traffic to WAN2 go through GW2

                    Should I tag (TAG) incoming traffic and wrap the response to this traffic through the appropriate GW?

                    A 1 Reply Last reply Reply Quote 0
                    • A
                      andrewr_net @andrewr_net
                      last edited by

                      @andrewr_net
                      Everything worked, it turns out that in the Rules --WAN(1,2) -- Advanced ---GateWate settings, you had to leave Default. Before that, I changed it to the corresponding to WAN (1,2) GW (1,2)

                      V 1 Reply Last reply Reply Quote 0
                      • V
                        viragomann @andrewr_net
                        last edited by

                        @andrewr_net
                        Also you have to ensure that a pass rule on WAN1/2 is applied to the incoming traffic, but not one on an interface group (in case you plan to create one) and not a floating rule.

                        With the rules on the WAN interface tabs, pfSense tags incoming connections automatically with "reply-to" (gateway). This is not the case for the other rules, since these rule could be applied to multiple interfaces.

                        1 Reply Last reply Reply Quote 0
                        • A
                          andrewr_net
                          last edited by

                          @viragomann
                          One more question please. VLANs. What is the general concept if I want VLANs to work through PFSENSE? In this case, PFSENSE, as the core of the network, has OVPN and IPSEC clients. Should I want VLAN111 on the OVPN1 client to see VLAN111 on the OVPN2 client, or even more VLAN111 to see on the IPSEC1 client?

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.