Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Forcing certain public networks across vpn from client

    OpenVPN
    2
    5
    1.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      madjeff
      last edited by

      OK, I've got an odd situation at a client and trying to wrap my head around a solution. I think I may be over-analyzing and would love some feedback/help. =)

      Client has public-facing servers in Amazon AWS and connects to an admin portal that only allows access from the main office IP's. So we need to force traffic destined to those Amazon servers from OpenVPN clients through the office VPN and back out so they are hitting those amazon servers from the office network, like this:

      OpenVPN Client –> VPN Tunnel --> Office LAN --> Amazon AWS Servers

      I don't really want to force all their traffic through the VPN tunnel due to bandwidth concerns, so other traffic will run across their normal connection, with traffic destined to the internal lan as well as those Amazon servers going over the tunnel.

      How should I set this up, via push routes or some other way? I've been searching for threads of similar setup but not finding anything that is similar. Any help would be greatly appreciated. =)

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Are the IPs of the AWS servers easy to put into a firewall rule?  You could just push routes for them out to the clients.

        In the diagram in my sig you'd want the Remote Access clients to generally use their own native connections for internet but forward traffic for specific IPs to pfSense A and use pfSense A's normal WAN to access them?

        I can help you with this.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • M
          madjeff
          last edited by

          @Derelict:

          Are the IPs of the AWS servers easy to put into a firewall rule?  You could just push routes for them out to the clients.

          In the diagram in my sig you'd want the Remote Access clients to generally use their own native connections for internet but forward traffic for specific IPs to pfSense A and use pfSense A's normal WAN to access them?

          I can help you with this.

          Exactly, OpenVPN client connected to pfsense A via vpn tunnel, traffic back out the WAN on pfsense A to the AWS server. All other internet traffic going out through the client's internet gateway. I do have the AWS server IP's. I'm assuming I can just setup a push route to the ip or subnet and that will take care of it?

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            Please see: https://forum.pfsense.org/index.php?topic=82732.msg473856#msg473856

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • M
              madjeff
              last edited by

              @Derelict:

              Please see: https://forum.pfsense.org/index.php?topic=82732.msg473856#msg473856

              Derelict, that was exactly what I needed. I knew I was over analyzing the problem. :) I setup the push routes and tested and it's working perfectly. My only issue right now is the huge range of ip networks AWS uses and it's always changing, but that's a different issue altogether. =)

              Thanks for the clarification!

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.