Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bridge OpenVPN network to LAN

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    13 Posts 3 Posters 5.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • AhnHELA
      AhnHEL
      last edited by

      @bwoodruff:

      DNS Servers: Check (172.31.31.1 - the router)

      Try 172.31.32.1 for DNS and check the Redirect Gateway Button, see if that helps.

      AhnHEL (Angel)

      1 Reply Last reply Reply Quote 0
      • B
        bwoodruff
        last edited by

        @onhel:

        @bwoodruff:

        DNS Servers: Check (172.31.31.1 - the router)

        Try 172.31.32.1 for DNS and check the Redirect Gateway Button, see if that helps.

        Thanks for the suggestion but that didn't seem to help.

        1 Reply Last reply Reply Quote 0
        • B
          bwoodruff
          last edited by

          Any other suggestions?

          I'm kind of surprised this isn't a more common setup…

          1 Reply Last reply Reply Quote 0
          • AhnHELA
            AhnHEL
            last edited by

            I assume you're using Advanced Outbound NAT.

            Also 2.0 requires pass rules on the OpenVPN interface under Firewall/Rules/OpenVPN, have you done this?  Do you see any firewall blocks in your System Logs?

            AhnHEL (Angel)

            1 Reply Last reply Reply Quote 0
            • B
              bwoodruff
              last edited by

              Advanced Outbound NAT?

              ID Proto Source Port Destination Port Gateway Queue Schedule Description
              [add new rule]
              [click to toggle enabled/disabled status] * * * * * * none   OpenVPN neurospark wizard

              This is the rule setup under the specified tab.

              I don't see anything in the firewall log, but it only has the most recent 50 entries so it is difficult to tell.

              1 Reply Last reply Reply Quote 0
              • AhnHELA
                AhnHEL
                last edited by

                Advanced Outbound NAT:

                In the web GUI, go to Firewall/NAT/Outbound and Select Manual Outbound NAT rule generation.  It should auto create a nat rule for your LAN.  Select the + symbol where your LAN nat rule is which will create a Nat rule based on your LAN.  Now edit this new rule you created and type 172.31.32.0/27 for the Source Network and change the Description name.  You should now have 2 rules.

                WAN          172.31.31.0/27    *    *    *    *    *    NO    LAN AON
                WAN          172.31.32.0/27    *    *    *    *    *    NO    OVPN AON

                From the Random Knowledge of pfSense Sticky under OpenVPN:

                You cannot access windows shares via the "My network places" because windows shares work with UDP-broadcasts.
                The VPN is routed and will block broadcasts.
                If you want to access a windows share you have to access it directly by IP
                ie: start–>run: \IPofServer

                AhnHEL (Angel)

                1 Reply Last reply Reply Quote 0
                • B
                  bwoodruff
                  last edited by

                  @onhel:

                  Advanced Outbound NAT:

                  In the web GUI, go to Firewall/NAT/Outbound and Select Manual Outbound NAT rule generation.  It should auto create a nat rule for your LAN.  Select the + symbol where your LAN nat rule is which will create a Nat rule based on your LAN.  Now edit this new rule you created and type 172.31.32.0/27 for the Source Network and change the Description name.  You should now have 2 rules.

                  WAN           172.31.31.0/27     *     *     *     *     *     NO     LAN AON
                  WAN           172.31.32.0/27     *     *     *     *     *     NO     OVPN AON

                  From the Random Knowledge of pfSense Sticky under OpenVPN:

                  You cannot access windows shares via the "My network places" because windows shares work with UDP-broadcasts.
                  The VPN is routed and will block broadcasts.
                  If you want to access a windows share you have to access it directly by IP
                  ie: start–>run: \IPofServer

                  I don't have Windows machines on my network, but I do need Bonjour to work properly, and from everything I'm reading it was possible to do so under older versions I'm just trying to find out how to do it in 2.0

                  Here is the Firewall/NAT/Outbound screen after making the changes you suggested. Note the last rule is the one you had me create but it seems redundant.

                  Mappings:
                  
                   	 	Interface	Source	Source Port	Destination	Destination Port	NAT Address	NAT Port	Static Port	Description	
                  
                  		 WAN  	 172.31.31.0/27	 *	 *	 500	 *	 *	
                  YES
                  Auto created rule for ISAKMP - LAN to WAN 	
                  
                  		 WAN  	 172.31.31.0/27	 *	 *	 *	 *	 *	
                  NO
                  Auto created rule for LAN to WAN 	
                  
                  		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
                  NO
                  Auto created rule for OpenVPN server 	
                  
                  		 WAN  	 192.168.1.1/32	 *	 *	 500	 *	 *	
                  YES
                  Auto created rule for ISAKMP - HOUSE to WAN 	
                  
                  		 WAN  	 192.168.1.1/32	 *	 *	 *	 *	 *	
                  NO
                  Auto created rule for HOUSE to WAN 	
                  
                  		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
                  NO
                  Auto created rule for OpenVPN server 	
                  
                  		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
                  NO
                  Manual created rule for OVPN to WAN 	
                  
                  
                  1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    You don't need to bridge to use Bonjour, if you have a router on both ends, just use Avahi on both sides. It's available as a package for pfSense. Not sure if that would work for a remote mobile client though.

                    As for bridging OpenVPN, I don't know that anyone has made that work on 2.0 yet to write a howto. I have done an IPsec+GIF bridge (and could even browse windows shares across it) but that was also site-to-site and not a mobile client.

                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • B
                      bwoodruff
                      last edited by

                      Yeah, this is for mobile clients (OS X). No router on the other end.

                      1 Reply Last reply Reply Quote 0
                      • AhnHELA
                        AhnHEL
                        last edited by

                        @bwoodruff:

                        Mappings:
                         
                         	 	Interface	Source	Source Port	Destination	Destination Port	NAT Address	NAT Port	Static Port	Description	
                        
                        		 WAN  	 172.31.31.0/27	 *	 *	 500	 *	 *	
                        YES
                        Auto created rule for ISAKMP - LAN to WAN 	
                        
                        	
                        		 WAN  	 172.31.31.0/27	 *	 *	 *	 *	 *	
                        NO
                        Auto created rule for LAN to WAN 	
                        
                        	
                        		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
                        NO
                        Auto created rule for OpenVPN server 	
                        
                        	
                        		 WAN  	 192.168.1.1/32	 *	 *	 500	 *	 *	
                        YES
                        Auto created rule for ISAKMP - HOUSE to WAN 	
                        
                        	
                        		 WAN  	 192.168.1.1/32	 *	 *	 *	 *	 *	
                        NO
                        Auto created rule for HOUSE to WAN 	
                        
                        	
                        		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
                        NO
                        Auto created rule for OpenVPN server 	
                        
                        	
                        		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
                        NO
                        Manual created rule for OVPN to WAN 	
                        
                        	
                        

                        Yes, looks like you do have 3 entries for you OpenVPN AON.  Remove 2 of them, only 1 is necessary.

                        AhnHEL (Angel)

                        1 Reply Last reply Reply Quote 0
                        • B
                          bwoodruff
                          last edited by

                          Is manual advanced outbound NAT really necessary? It was automatic before. When I turned it and Avahi on my internet stopped working (LAN connectivity was still fine). Switching back to automatic and disabling Avahi restored connectivity.

                          1 Reply Last reply Reply Quote 0
                          • B
                            bwoodruff
                            last edited by

                            I found this post which says the author accomplished exactly what I'm trying to do but unfortunately doesn't go into much detail:
                            http://quintinsmits.com/2009/09/14/bonjour-mdns-via-openvpn-on-linux-with-avahi-deamon

                            I tried switching from tun to tap but was still unable to view bonjour services.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.