Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN Server Setup, need internet access for clients (through VPN)

    Scheduled Pinned Locked Moved OpenVPN
    14 Posts 6 Posters 12.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann
      last edited by

      Check "Redirect gateway" in the OVPN server settings.

      1 Reply Last reply Reply Quote 0
      • P
        pfBasic Banned
        last edited by

        Redirect Gateway is already checked. My understanding of that option was that it will tell all of my ovpn servers clients to use the VPN connection for all traffic, and they are doing that, and the LAN connections work fine but when my remote clients try to access the Internet they can't get out.

        So how can I get that Internet connection to work?

        1 Reply Last reply Reply Quote 0
        • P
          pfBasic Banned
          last edited by

          So I added some rules and got almost exactly what I was hoping for, I'm not sure if my ideal outcome is possible?

          I added a pair of NAT outbound rules on my WAN and OpenVPN client interfaces: Source = My OpenVPN Servers Tunnel Network, Source Port, Destination & Destination Port All = ANY, NAT Address/Translation>Address = Interface Address (so for the WAN rule this = WAN ), Static Port = NO.

          I left the OpenVPN Server firewall rule Gateway at Default, changing this to either my VPN Client or WAN Interface allowed internet access on the VPN but killed the LAN connection and exposed my IP address.

          The end result is that if I disconnect my phone from wifi and connect to the VPN I can still access services that are LAN only (IP Cam, Media Center, etc. and LAN Scanner reveals my other LAN devices. I can browse the internet and if I check whatsmyip or dnsleakcheck they both check out for my VPN settings. So bottom line, when I VPN in to my network it is almost the same as using the internet from within my LAN, which is what I wanted.

          The only thing missing is that my traffic is not filtered through squid or squidguard.
          I have squid configured as a NON-transparent proxy and it works great on the actual LAN but nothing when connected via the VPN.

          I'm not sure if it is possible to get this to work? Any guidance?

          1 Reply Last reply Reply Quote 1
          • 8
            8ayM
            last edited by

            How did you make out with this project?

            I'm looking to do similar. I'm hoping to be able to use my OpenVPN as a sort of proxy as well to get around local filters and to ensure my traffic is being routed via a trusted connection.

            1 Reply Last reply Reply Quote 0
            • P
              pfBasic Banned
              last edited by

              It ended up working great. I've left it as is since the last post and use it occasionally and it always works as I want it to. Very handy!

              1 Reply Last reply Reply Quote 0
              • S
                stuck
                last edited by

                @pfBasic:

                It ended up working great. I've left it as is since the last post and use it occasionally and it always works as I want it to. Very handy!

                @pfBasic
                Would you be able to C/P or screenshot the 2 rules that you're referring to, which enabled you to access internet through the VPN server?
                TIA

                1 Reply Last reply Reply Quote 0
                • P
                  pfBasic Banned
                  last edited by

                  Sure, here are my NAT outbound rules pertaining to this. All is still working great as is.

                  Untitled.png
                  Untitled.png_thumb

                  1 Reply Last reply Reply Quote 0
                  • S
                    stuck
                    last edited by

                    @pfBasic:

                    Sure, here are my NAT outbound rules pertaining to this. All is still working great as is.

                    Thank you for posting.
                    I'm still stuck.  I have created 2 rules similar to your rules. But I'm still unable to connect the the internet through the tunnel.
                    I wonder if it is because I use a Torguard VPN on my pfsense?
                    These are my rules:
                    Oops, see the second one

                    NATout.jpg
                    NATout.jpg_thumb
                    NATout.jpg
                    NATout.jpg_thumb

                    1 Reply Last reply Reply Quote 0
                    • S
                      stuck
                      last edited by

                      Tried it like this…  Still doesn't work

                      Untitled.png
                      Untitled.png_thumb

                      1 Reply Last reply Reply Quote 0
                      • S
                        stuck
                        last edited by

                        I think my problem was these 2 check boxes.  I unchecked it and now it seems to work…

                        Untitled.png
                        Untitled.png_thumb

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          You need outbound NAT rules that match whatever the tunnel network is on the VPN the clients connect to. No idea from the screen shots if that is the case. The comments there say "LAN"

                          https://doc.pfsense.org/index.php/Outbound_NAT

                          You can determine if you are having a DNS issue by pinging something by IP address.

                          https://doc.pfsense.org/index.php/Connectivity_Troubleshooting

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.