Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN Server Setup, need internet access for clients (through VPN)

    Scheduled Pinned Locked Moved OpenVPN
    14 Posts 6 Posters 12.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pfBasic Banned
      last edited by

      How do i do this? I dont see a setting for default gateway. Do i need to set the default gateway in a firewall or nat rule? Could you please give me an example?

      1 Reply Last reply Reply Quote 0
      • V
        viragomann
        last edited by

        Check "Redirect gateway" in the OVPN server settings.

        1 Reply Last reply Reply Quote 0
        • P
          pfBasic Banned
          last edited by

          Redirect Gateway is already checked. My understanding of that option was that it will tell all of my ovpn servers clients to use the VPN connection for all traffic, and they are doing that, and the LAN connections work fine but when my remote clients try to access the Internet they can't get out.

          So how can I get that Internet connection to work?

          1 Reply Last reply Reply Quote 0
          • P
            pfBasic Banned
            last edited by

            So I added some rules and got almost exactly what I was hoping for, I'm not sure if my ideal outcome is possible?

            I added a pair of NAT outbound rules on my WAN and OpenVPN client interfaces: Source = My OpenVPN Servers Tunnel Network, Source Port, Destination & Destination Port All = ANY, NAT Address/Translation>Address = Interface Address (so for the WAN rule this = WAN ), Static Port = NO.

            I left the OpenVPN Server firewall rule Gateway at Default, changing this to either my VPN Client or WAN Interface allowed internet access on the VPN but killed the LAN connection and exposed my IP address.

            The end result is that if I disconnect my phone from wifi and connect to the VPN I can still access services that are LAN only (IP Cam, Media Center, etc. and LAN Scanner reveals my other LAN devices. I can browse the internet and if I check whatsmyip or dnsleakcheck they both check out for my VPN settings. So bottom line, when I VPN in to my network it is almost the same as using the internet from within my LAN, which is what I wanted.

            The only thing missing is that my traffic is not filtered through squid or squidguard.
            I have squid configured as a NON-transparent proxy and it works great on the actual LAN but nothing when connected via the VPN.

            I'm not sure if it is possible to get this to work? Any guidance?

            1 Reply Last reply Reply Quote 1
            • 8
              8ayM
              last edited by

              How did you make out with this project?

              I'm looking to do similar. I'm hoping to be able to use my OpenVPN as a sort of proxy as well to get around local filters and to ensure my traffic is being routed via a trusted connection.

              1 Reply Last reply Reply Quote 0
              • P
                pfBasic Banned
                last edited by

                It ended up working great. I've left it as is since the last post and use it occasionally and it always works as I want it to. Very handy!

                1 Reply Last reply Reply Quote 0
                • S
                  stuck
                  last edited by

                  @pfBasic:

                  It ended up working great. I've left it as is since the last post and use it occasionally and it always works as I want it to. Very handy!

                  @pfBasic
                  Would you be able to C/P or screenshot the 2 rules that you're referring to, which enabled you to access internet through the VPN server?
                  TIA

                  1 Reply Last reply Reply Quote 0
                  • P
                    pfBasic Banned
                    last edited by

                    Sure, here are my NAT outbound rules pertaining to this. All is still working great as is.

                    Untitled.png
                    Untitled.png_thumb

                    1 Reply Last reply Reply Quote 0
                    • S
                      stuck
                      last edited by

                      @pfBasic:

                      Sure, here are my NAT outbound rules pertaining to this. All is still working great as is.

                      Thank you for posting.
                      I'm still stuck.  I have created 2 rules similar to your rules. But I'm still unable to connect the the internet through the tunnel.
                      I wonder if it is because I use a Torguard VPN on my pfsense?
                      These are my rules:
                      Oops, see the second one

                      NATout.jpg
                      NATout.jpg_thumb
                      NATout.jpg
                      NATout.jpg_thumb

                      1 Reply Last reply Reply Quote 0
                      • S
                        stuck
                        last edited by

                        Tried it like this…  Still doesn't work

                        Untitled.png
                        Untitled.png_thumb

                        1 Reply Last reply Reply Quote 0
                        • S
                          stuck
                          last edited by

                          I think my problem was these 2 check boxes.  I unchecked it and now it seems to work…

                          Untitled.png
                          Untitled.png_thumb

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            You need outbound NAT rules that match whatever the tunnel network is on the VPN the clients connect to. No idea from the screen shots if that is the case. The comments there say "LAN"

                            https://doc.pfsense.org/index.php/Outbound_NAT

                            You can determine if you are having a DNS issue by pinging something by IP address.

                            https://doc.pfsense.org/index.php/Connectivity_Troubleshooting

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.