Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Partial LAN Access over OpenVPN - Cameras

    Scheduled Pinned Locked Moved OpenVPN
    2 Posts 2 Posters 465 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      jbs148
      last edited by

      Hello,

      Searched the forum, haven't found a post that addresses my issue, hopefully I'll get some insight here…

      LAN is standard 192.168.1.0/24 with DHCP pool of 192.168.1.120-.199
      OpenVPN address pool is within 10.8.0.0/24
      Connecting an Android device to the LAN via the VPN

      Connection establishes, I have access to resources that are statically assigned outside of the DHCP pool (e.g. NAS, home automation server, etc.). I don't have access to a set of Foscam cameras that are also statically assigned IPs by pfSense. I can't get to their web interface or their feed using IPCam Viewer app on the Android device. They are all statically addressed with a distinct port per camera (i.e. 192.168.1.201:1201 and so on).

      As a test I established port forwarding to the and have no issues connecting to the cameras from the WAN using my domain and the unique port. I'm having no luck accessing via the VPN.

      Are default rules blocking the ports used for the cameras? 1201-12XX?
      Do I have to port forward to 10.8.0.0/24? Doesn't seem right since I can gain access to other resources on my LAN...

      Thanks for your help!

      1 Reply Last reply Reply Quote 0
      • D Offline
        divsys
        last edited by

        You may have to set the cameras to permit access the 10.8.0.0/24 subnet.
        When connected, your Android device will be appearing as a device on that network trying to get to your cameras.
        I don't know if your cameras automatically deny devices outside their base 192.168.1.0/24 subnet.

        -jfp

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.