Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN on pfSense in Azure NATing issue

    Scheduled Pinned Locked Moved OpenVPN
    2 Posts 1 Posters 491 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      Erik10206
      last edited by

      I am using pfSense in the Azure cloud and trying to get OpenVPN setup properly. I have a server configured and am able to connect but when accessing internal resources, the source address shows the WAN interface of the pfSense box. In order for audit tracking to work properly, I need the source address to appear as the address assigned to the client VPN interface.

      Environment:

      | Type | Interface | Assigned IP | Notes |
      | WAN | INT0 | 10.8.0.254 | public IP is NAT'd to her from Azure |
      | LAN | INT1 | 10.8.1.254 | |
      | OPENVPN | ovpns1() | 10.8.2.1 | |

      I have tried NAT the source subnet (10.8.2.0/24) on the OPENVPN interface using the interface IP (most forums say this should work) but no change. I have set the outbound rules to manual and changed the rules with the openvpn subnet to ANY other interface and as a result, I can only ping interfaces on the router, nothing internal.

      I am not new to pfSense itself but I am new to using it in an environment like Azure. Any suggestions would be greatly appreciated. I am also comfortable with shell so if there is a manual solution outside of the GUI, I am all ears.

      Erik

      1 Reply Last reply Reply Quote 0
      • E
        Erik10206
        last edited by

        bump

        Any thoughts?

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.