• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Openvpn through ipsec

Scheduled Pinned Locked Moved OpenVPN
7 Posts 4 Posters 1.7k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    mesro09
    last edited by Sep 2, 2016, 2:47 AM

    hi everybody
    is there anyone could send config screen photos please
    i am trying to do as same as that
    i have ipsec tunnel from 192.168.30.0/24(pfsense) to 192.168.10.0/24 (tplink)
    i have  openvpn tunnel 192.168.14.0/28 on the side of 192.168.30.0/24 (here i have pfsense)
    so i when i connect with openvpn i can comunicate all of the network of 192.168.30.0/24 but i want to comunicate also with remote network of ipsec is is posible ?
    many thanks for everybody to helping me to solve this

    1 Reply Last reply Reply Quote 0
    • D
      Derelict LAYER 8 Netgate
      last edited by Sep 2, 2016, 2:50 AM

      Posting the same question 6 times will not get you an answer any faster, friend. In fact it will only irritaqte people who might otherwise take time to help.

      Chattanooga, Tennessee, USA
      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
      Do Not Chat For Help! NO_WAN_EGRESS(TM)

      1 Reply Last reply Reply Quote 0
      • M
        mesro09
        last edited by Sep 2, 2016, 1:24 PM Sep 2, 2016, 1:16 PM

        thanks,
        i aldrready see on forum similiar question but anyone gave clearly explaination
        you can already check it
        i put same post where i see similiar question but it is too old for that reason

        1 Reply Last reply Reply Quote 0
        • A
          andra.pocherebox
          last edited by Sep 3, 2016, 8:00 AM

          I'm in the same situation…

          Site-to-site IPSec (pfsense both side);
          Remote access ovpn to the first pfsense box.
          Cannot route the remote client through the remote IPSec subnet...

          Any advise?

          Thanks

          1 Reply Last reply Reply Quote 0
          • D
            Derelict LAYER 8 Netgate
            last edited by Sep 3, 2016, 5:12 PM Sep 3, 2016, 5:08 PM

            I can see simply explaining it is not going to be enough.

            So, referencing this diagram, you want Remote Access OpenVPN clients (172.25.230.0/24) to be able to access Host C1, etc (172.25.234.0/24)?

            Do you have Redirect Gateway checked in the remote access VPN server or not?

            pfSense+VPN.png
            pfSense+VPN.png_thumb

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • A
              andra.pocherebox
              last edited by Sep 3, 2016, 5:18 PM

              Hi Derelict,

              Yes you got the point! However I managed to make it myself.

              I was paying attention to the routing table of the OpenVPN connection (with was correct anyhow); instead I had to modify the phase 2 in the IPSec tunnel by including the OpenVPN subnet (in a new Phase2 instance).
              In the server OpenVPN, I had to push the route to the destination subnet I want to reach and that's all.
              Now I have a remote gateway entry-point from which I can access all the shared network.

              Thanks anyway for your time!

              @mesro09: Hope this could be clear, if you still have problem feel free to contact me in PM.

              Best

              1 Reply Last reply Reply Quote 0
              • L
                leftbrake
                last edited by May 4, 2018, 7:37 AM

                I manged to resolve the original(!) problem (i.e. openvpn - >pfsense <- ipsec tunnel -> tp-link) by adding a P2 entry declaring the openvn network as local AND (!) on the TP-Link device added a new IPsec Policy (under IPsecVPN/IPsec) using the same IKE Policy as the Tunnel connecting the two LANs.

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                  This community forum collects and processes your personal information.
                  consent.not_received