Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFSense only for OpenVPN to Fileshare

    Scheduled Pinned Locked Moved OpenVPN
    9 Posts 2 Posters 908 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C Offline
      CantConfigureaVPN
      last edited by

      I've followed this guide ( https://chrislazari.com/pfsense-setting-up-openvpn-on-pfsense-2-4/ ) to setup OpenVpn for workers to remotely access only a single fileshare on our internal network. My question is what other firewall rules will I need to add to the PFSense to ensure that it is secure. I know on my WAN interface I enter my public IP and I can do seperate firewall rules for OpenVPN. If i'm ONLY using PFSense for OpenVPN, do I need to add other firewall rules to the regular table or just the OpenVPN table? Any point in the right direction would help a lot as I'm new to PFSense.

      1 Reply Last reply Reply Quote 0
      • N Online
        netblues
        last edited by

        Firewalls control access oto network resources. So if you allow smb access to the server holding the fileshare, then all available fileshares are theoretically accesible.
        its the fileshare server job to allow more granular access.

        Aparf from that, since you are inside a vpn, I guess you have created a rule to allow traffic on openvpn interface. This ruleset can be narrowed down as you wish to limit access to internal network resources.

        C 1 Reply Last reply Reply Quote 1
        • C Offline
          CantConfigureaVPN @netblues
          last edited by

          @netblues Okay, that makes more sense. My main question is would I need to do that configuration on the WAN Interface as well as the OpenVPN rule set under firewall? The WAN Interface just has the default rules made when setting up OpenVPN, but I've limited port access on the OpenVPN interface so clients can only do fileshare and basic office work like http/https.

          1 Reply Last reply Reply Quote 0
          • N Online
            netblues
            last edited by

            wan interface deals with general Internet incoming traffic.
            Vpn traffic bypasses this , and yes this is the correct way to do it.

            1 Reply Last reply Reply Quote 1
            • C Offline
              CantConfigureaVPN
              last edited by

              Okay, so I could block everything except for the default OpenVPN traffic on the WAN Rules and the VPN Clients can still get to files shares?

              N 1 Reply Last reply Reply Quote 0
              • N Online
                netblues @CantConfigureaVPN
                last edited by

                @CantConfigureaVPN Yes. By default nothing is enabled on the wan anyways.

                C 1 Reply Last reply Reply Quote 1
                • C Offline
                  CantConfigureaVPN @netblues
                  last edited by

                  @netblues Okay, final question. Do I need an outbound NAT rule for the VPN clients to get to LAN resources or is that automatic?

                  N 1 Reply Last reply Reply Quote 0
                  • N Online
                    netblues @CantConfigureaVPN
                    last edited by netblues

                    @CantConfigureaVPN In general you don't need any nat while on vpn.
                    As long as all devices have pf as their default gateway everything is hanled via routing.
                    The 4g modem, (and modems in general) either need static routes which is difficult or impossible to administer, or just the hack with nat above.
                    It is based on the principle that connected networks don't need any routing

                    1 Reply Last reply Reply Quote 1
                    • C Offline
                      CantConfigureaVPN
                      last edited by

                      Got it, thanks for all the help!

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.