<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[OpenVPN IPSEC ISOLATION]]></title><description><![CDATA[<p dir="auto">Hello all,</p>
<p dir="auto">I have a IPSEC connexion beetwen two pfsense as below.</p>
<p dir="auto">LAN1 (192.168.17.0/24)–---pFsense1 ----ipsec------ pFsense2--------LAN2 (10.3.4.0/20).</p>
<p dir="auto">I added a OpenVPN connexion to my first LAN1, in the network (192.168.18.0/24).<br />
My topology works well, with my mobile I can reach the 10.3.4.X devices through the OpenVPN and IPSEC tunnel.</p>
<p dir="auto">My question is about to isolate the OpenVPN client.<br />
For exemple, toto1 get a Ip adress on the OpenVPN and can reach only the 10.3.4.Y devices...<br />
At long term, I will have more than 300 users, and I cannot juste use firewall rules...I need a scalable solution to do that.<br />
Moreover, the users cannot ping others users even in the same subnet</p>
<p dir="auto">So my questions :</p>
<p dir="auto">How to isolate OpenVPN networks ? Iptables ?<br />
How can I log the users ? LDAP ? VLAN ?</p>
<p dir="auto">Thanks you for your time, your reflexion and your proposition.</p>
<p dir="auto">Sorry for my english.</p>
<p dir="auto">A+</p>
]]></description><link>https://forum.netgate.com/topic/125633/openvpn-ipsec-isolation</link><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 18:13:45 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/125633.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 11 Jan 2018 15:58:41 GMT</pubDate><ttl>60</ttl></channel></rss>