Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Access form WLAN to VPN Network, both different Networks

    Scheduled Pinned Locked Moved NAT
    18 Posts 4 Posters 3.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann
      last edited by

      There is no need to bridge network interfaces to reach your goals. Bridging OpenVPN can only be done by using virtual tap devices and there are much troubles with that.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        " cause many howtos and guide have bridging…"

        For what a vpn connection??  That makes NO Sense at all - please link to such a guide or howto..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • M
          markoweber
          last edited by

          i did a ago because:

          …on the remote machine where multiple virtual machines. all had 192.168.17.x  at example
          did a bridge with 192.168.17.1 , bind openvpn in bridging mode to the bridge, and all vms to the bride.
          so all vm´s where reachable over the bridge.....

          maybe this is wrong way. i will try your suggested way.

          1 Reply Last reply Reply Quote 0
          • M
            markoweber
            last edited by

            ok, viragoman / johnpoz

            i reset box to new.
            Now i interface re2 as LAN talking with cable modem, can ping addresses outside in www.

            i have added both openvpn connections, and they are shown as "up".

            On Interface re1 ( i labeled it LAN2 ) i connected one of the wlan access points.
            I dont get it work, that the accesspoint get in contact with openvpn connection #1

            i am not really sure how to do this. On "assign interafces" i can put the openvpn connections to interface OPT1… do i have to do this?
            And, do i have to use "add a route" or NAT to get my goal?

            thanks for any help

            marko

            1 Reply Last reply Reply Quote 0
            • V
              viragomann
              last edited by

              Does your WLAN work basically?
              pfSense do DHCP for the WLAN and is the default gateway?

              If so, there is no need for adding further routes. You just need a firewall rule on the interface where the AP is connected to to permit access.

              Can you ping the VMs from pfSense?

              1 Reply Last reply Reply Quote 0
              • M
                markoweber
                last edited by

                Hi,
                yes the wlan access point works. with the bridged setup it was able to reach the vpn net.
                (the accesspoint is doing dhcp for the client, not the pfsense)

                the accesspoint is on LAN2 ( re1) , do i have to set an ip on the interface? (re1)
                or do i set "none"?

                it dont work for me, shall i do screenshots from settings?

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  "Now i interface re2 as LAN talking with cable modem"

                  Again WTF… Lan interfaces do not talk to your ISP device...

                  Pfsense WAN!! is what should connect to your isp, cable modem, router, etc..  Lan interfaces are where your wifi would go..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • V
                    viragomann
                    last edited by

                    @markoweber:

                    (the accesspoint is doing dhcp for the client, not the pfsense)

                    The AP does DHCP in AP mode  :o  That means it doesn't care if there is another DHCP working in the network?
                    Maybe, I don't know.

                    @markoweber:

                    the accesspoint is on LAN2 ( re1) , do i have to set an ip on the interface? (re1)
                    or do i set "none"?

                    Of course there must be assigned an IP to the interface and this IP has to be the (default) gateway for the WLAN clients and has to be entered in the DHCP config.

                    1 Reply Last reply Reply Quote 0
                    • M
                      markoweber
                      last edited by

                      hi johnpoz,

                      it would be much easier if you stop bashing me as professional.
                      IT DOESNT MATTER how i name re1 re2 re0 i could also name ding dong dang… ok?
                      Maybe its easier for you if i name them re1 (ding) re2 (dong) re0 (dang).......

                      and yes!!!  the FritzBOX talks with the ISP!  It´s a MUST.
                      at the LAN Ports (ok, Lan is a bad word for you i noticed)....... , at the Ethernet Ports i connected the pfsense alix board to.

                      Its ALL ok, maybe i choose bad interface names out of your sight....maybe, sorry that.
                      hints how i get this working would help me more.....

                      i thought to find help in this forum here.............

                      maybe you are now in mood to help constructive to solve this.....would be great, seems you are more pro in network.

                      in old pfsense config all worked. with the bridged setup. you told me, boy its wrong do it other way.
                      help me to do it correct way, i would like to learn and do it right.

                      ok ?

                      hope it´s ok for you

                      1 Reply Last reply Reply Quote 0
                      • M
                        markoweber
                        last edited by

                        hey viragoman,

                        it did now your way…..
                        the one port of pfsense alix board, i set 192.168.17.5,  the wlan access point is 192.168.17.150,  -> with gateway 192.168.17.5
                        the AP do dhcp 192.168.17.100 - 192.168.17.110 to clients, with gateway 192.168.17.5

                        BUT, in "status systemlogs > FIREWALL" i dont see anything blocked i can set as "pass" rule.
                        when i connect to AP i get 192.168.17.110 as client, BUT cant ping anything in the world, also NOT an existing VM (192.168.17.17).....

                        do you have google hangouts? i cant shorten the way of help maybe

                        marko

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          There is one huge language barrier here.. I would suggest you get help in your language..

                          AP do not do dhcp…  Do you have a wifi router double nattting??

                          What exactly are you trying to do??  I can not even understand what you want from your drawing any use of the same network everywhere.. And 1 big giant bridge???

                          So you have two network behind pfsense?  And you want pfsense to connect to vpn as a client..  And you want either of your networks behind pfsense to connect to these vpns via policy based routing??

                          Is that what you want...  What does it matter what the vpn tunnel networks are as long as they are different than your local networks behind pfsense?  Or your setting up site to site?? And your trying to reflect what their networks are not the tunnel networks?

                          What I would suggest you do is get your network behind pfsense working correclty no freaking bridging.. your to local networks with your wifi.  Using the internet, and then we will throw vpn into the mix..

                          So do you have this working?  See attached.  Your "cablemodem" is natting even..That on some 192.168.2 network it seems.. This is basic 2 segment setup.  Whatever your using for your "AP" are not the gateway to any devices, and do not do dhcp.  If they are repurposed old wifi routers then give them an IP on the network your connecting them to.  Turn off their dhcp servers and connect them to that network via 1 of their lan ports.

                          Your devices on both of these networks should be able to talk to each other and use the internet.  The actual networks do not matter, in my example I used first 3 in 192.168 range.  Do you have this setup and working??  Once you have this then we can get your vpn working.. But this is basic setup that needs to be working first..

                          basicnetwork.jpg
                          basicnetwork.jpg_thumb

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • K
                            kpa
                            last edited by

                            AP do not do dhcp…

                            Well, manufacturers tend to confuse terminology here. There are devices that are clearly access points with just one ethernet port but they still have an option to turn them to NATing routers with DHCP server for the wireless LAN side.

                            1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator
                              last edited by

                              Sorry but if it does natting its not an AP… No matter what the manf might call it.. I agree they don't use the right terms.. calling shit modems that also do nat..  Its either a modem, a router or a gateway.  If its a gateway use assume its a modem/router combo.

                              Need to understand what the OP is wanting to do..  I doubt he wants to double nat to his wifi clients..  From what it looks like that would be a triple nat to the internet.

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.