Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Bridge OpenVPN network to LAN

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    13 Posts 3 Posters 5.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bwoodruff
      last edited by

      Any other suggestions?

      I'm kind of surprised this isn't a more common setup…

      1 Reply Last reply Reply Quote 0
      • AhnHELA
        AhnHEL
        last edited by

        I assume you're using Advanced Outbound NAT.

        Also 2.0 requires pass rules on the OpenVPN interface under Firewall/Rules/OpenVPN, have you done this?  Do you see any firewall blocks in your System Logs?

        AhnHEL (Angel)

        1 Reply Last reply Reply Quote 0
        • B
          bwoodruff
          last edited by

          Advanced Outbound NAT?

          ID Proto Source Port Destination Port Gateway Queue Schedule Description
          [add new rule]
          [click to toggle enabled/disabled status] * * * * * * none   OpenVPN neurospark wizard

          This is the rule setup under the specified tab.

          I don't see anything in the firewall log, but it only has the most recent 50 entries so it is difficult to tell.

          1 Reply Last reply Reply Quote 0
          • AhnHELA
            AhnHEL
            last edited by

            Advanced Outbound NAT:

            In the web GUI, go to Firewall/NAT/Outbound and Select Manual Outbound NAT rule generation.  It should auto create a nat rule for your LAN.  Select the + symbol where your LAN nat rule is which will create a Nat rule based on your LAN.  Now edit this new rule you created and type 172.31.32.0/27 for the Source Network and change the Description name.  You should now have 2 rules.

            WAN          172.31.31.0/27    *    *    *    *    *    NO    LAN AON
            WAN          172.31.32.0/27    *    *    *    *    *    NO    OVPN AON

            From the Random Knowledge of pfSense Sticky under OpenVPN:

            You cannot access windows shares via the "My network places" because windows shares work with UDP-broadcasts.
            The VPN is routed and will block broadcasts.
            If you want to access a windows share you have to access it directly by IP
            ie: start–>run: \IPofServer

            AhnHEL (Angel)

            1 Reply Last reply Reply Quote 0
            • B
              bwoodruff
              last edited by

              @onhel:

              Advanced Outbound NAT:

              In the web GUI, go to Firewall/NAT/Outbound and Select Manual Outbound NAT rule generation.  It should auto create a nat rule for your LAN.  Select the + symbol where your LAN nat rule is which will create a Nat rule based on your LAN.  Now edit this new rule you created and type 172.31.32.0/27 for the Source Network and change the Description name.  You should now have 2 rules.

              WAN           172.31.31.0/27     *     *     *     *     *     NO     LAN AON
              WAN           172.31.32.0/27     *     *     *     *     *     NO     OVPN AON

              From the Random Knowledge of pfSense Sticky under OpenVPN:

              You cannot access windows shares via the "My network places" because windows shares work with UDP-broadcasts.
              The VPN is routed and will block broadcasts.
              If you want to access a windows share you have to access it directly by IP
              ie: start–>run: \IPofServer

              I don't have Windows machines on my network, but I do need Bonjour to work properly, and from everything I'm reading it was possible to do so under older versions I'm just trying to find out how to do it in 2.0

              Here is the Firewall/NAT/Outbound screen after making the changes you suggested. Note the last rule is the one you had me create but it seems redundant.

              Mappings:
              
               	 	Interface	Source	Source Port	Destination	Destination Port	NAT Address	NAT Port	Static Port	Description	
              
              		 WAN  	 172.31.31.0/27	 *	 *	 500	 *	 *	
              YES
              Auto created rule for ISAKMP - LAN to WAN 	
              
              		 WAN  	 172.31.31.0/27	 *	 *	 *	 *	 *	
              NO
              Auto created rule for LAN to WAN 	
              
              		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
              NO
              Auto created rule for OpenVPN server 	
              
              		 WAN  	 192.168.1.1/32	 *	 *	 500	 *	 *	
              YES
              Auto created rule for ISAKMP - HOUSE to WAN 	
              
              		 WAN  	 192.168.1.1/32	 *	 *	 *	 *	 *	
              NO
              Auto created rule for HOUSE to WAN 	
              
              		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
              NO
              Auto created rule for OpenVPN server 	
              
              		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
              NO
              Manual created rule for OVPN to WAN 	
              
              
              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                You don't need to bridge to use Bonjour, if you have a router on both ends, just use Avahi on both sides. It's available as a package for pfSense. Not sure if that would work for a remote mobile client though.

                As for bridging OpenVPN, I don't know that anyone has made that work on 2.0 yet to write a howto. I have done an IPsec+GIF bridge (and could even browse windows shares across it) but that was also site-to-site and not a mobile client.

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • B
                  bwoodruff
                  last edited by

                  Yeah, this is for mobile clients (OS X). No router on the other end.

                  1 Reply Last reply Reply Quote 0
                  • AhnHELA
                    AhnHEL
                    last edited by

                    @bwoodruff:

                    Mappings:
                     
                     	 	Interface	Source	Source Port	Destination	Destination Port	NAT Address	NAT Port	Static Port	Description	
                    
                    		 WAN  	 172.31.31.0/27	 *	 *	 500	 *	 *	
                    YES
                    Auto created rule for ISAKMP - LAN to WAN 	
                    
                    	
                    		 WAN  	 172.31.31.0/27	 *	 *	 *	 *	 *	
                    NO
                    Auto created rule for LAN to WAN 	
                    
                    	
                    		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
                    NO
                    Auto created rule for OpenVPN server 	
                    
                    	
                    		 WAN  	 192.168.1.1/32	 *	 *	 500	 *	 *	
                    YES
                    Auto created rule for ISAKMP - HOUSE to WAN 	
                    
                    	
                    		 WAN  	 192.168.1.1/32	 *	 *	 *	 *	 *	
                    NO
                    Auto created rule for HOUSE to WAN 	
                    
                    	
                    		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
                    NO
                    Auto created rule for OpenVPN server 	
                    
                    	
                    		 WAN  	 172.31.32.0/27	 *	 *	 *	 *	 *	
                    NO
                    Manual created rule for OVPN to WAN 	
                    
                    	
                    

                    Yes, looks like you do have 3 entries for you OpenVPN AON.  Remove 2 of them, only 1 is necessary.

                    AhnHEL (Angel)

                    1 Reply Last reply Reply Quote 0
                    • B
                      bwoodruff
                      last edited by

                      Is manual advanced outbound NAT really necessary? It was automatic before. When I turned it and Avahi on my internet stopped working (LAN connectivity was still fine). Switching back to automatic and disabling Avahi restored connectivity.

                      1 Reply Last reply Reply Quote 0
                      • B
                        bwoodruff
                        last edited by

                        I found this post which says the author accomplished exactly what I'm trying to do but unfortunately doesn't go into much detail:
                        http://quintinsmits.com/2009/09/14/bonjour-mdns-via-openvpn-on-linux-with-avahi-deamon

                        I tried switching from tun to tap but was still unable to view bonjour services.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.