Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN and dual WAN

    Scheduled Pinned Locked Moved Routing and Multi WAN
    8 Posts 2 Posters 162 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      hillblock
      last edited by

      Hi eveyone;
      I am trying to enable access to my LAN resources via OpenVPN connecting via the non default gateway.

      I have searched the forum and found

      This post

      I either need to
      a) Put the route in the gateway
      b) Add NAT on the LAN

      Can someone assist

      LAN 10.10.10.0/24
      OVPN subnet 10.10.11/24
      WIP (Default WAN)
      OPT1 (WAN2)

      Do I add a custom option in the ovpn Advanced config ?

      Thanks in advance

      Ian

      V 1 Reply Last reply Reply Quote 0
      • V
        viragomann @hillblock
        last edited by

        @hillblock
        All you need is a firewall pass rule on the incoming interface allowing the OpenVPN traffic and to ensure that it is applied to the OpenVPN packets.

        Remember that floating rules and interface group rules have precedence over interface rules. So if there is any pass matching the OpenVPN traffic, you have to remove it or change it, so that it isn't applied to it.

        H 1 Reply Last reply Reply Quote 0
        • H
          hillblock @viragomann
          last edited by hillblock

          @viragomann
          QUick check of my floating rules......OVPN interface was in a floating rule (PFblockerNG)

          Tested still no access (especially PFsense gui) to LAN

          Ian

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @hillblock
            last edited by

            @hillblock
            But the client is connected successfully and the connection is stable?
            So this might not be an issue due to multi WAN.

            Did you state 10.10.10.0/24 at "Local networks" in the server settings?

            Is there a rule in place on the OpenVPN interface allowing access to the LAN?
            At least with this you should be able to access the pfSense GUI using the LAN IP.

            H 1 Reply Last reply Reply Quote 0
            • H
              hillblock @viragomann
              last edited by

              @viragomann
              Yes client connects and is stable

              10.10.10.0/24 is in the VPN server settings

              OVPN rules in the screenshot attached

              OVPN Firewall settings.jpg

              RE: MultiWAN

              Default (WIP) and Backup (OPT1) gateways are in a Gateway group called Failover (WIP) is tier 2 and OPT1 tier 5

              Thanks for your help
              Ian

              V 1 Reply Last reply Reply Quote 0
              • V
                viragomann @hillblock
                last edited by

                @hillblock
                You LAN address is policy routed to a gateway (group).
                This will never pass access to the GUI.

                1 Reply Last reply Reply Quote 0
                • H
                  hillblock
                  last edited by

                  No outbound NAT??

                  as per this old link

                  Ian

                  V 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @hillblock
                    last edited by

                    @hillblock
                    The problem in this thread is that the VPN endpoint is not the default gateway. In this case an outbound NAT rule enables you to access the local network.
                    But the NAT has no impact on accessing the web GUI of pfSense, since this traffic doesn't doesn't go out on an interface.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.