Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    My Virtual Lab

    Off-Topic & Non-Support Discussion
    1
    2
    118
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOM
      KOM last edited by KOM

      I got tired of recreating specific package configs when trying to help fix a user problem so I decided to spin up a collection of specific pfSense installs, each with a major package installed & configured. I have yet to make a QoS instance and a Captive Portal instance, but those are coming. I have a base install fully configured but basic, and I clone it and then add the necessary package and go from there. There are two Linux clients and one server on the LAN side for client test purposes and port forwards respectively, plus some Windows & FreeBSD systems I'm playing with. Most of the package installs are basic config. Squid is transparent with splice all for URL-filtering with squidguard. OpenVPN has both a server as well as two clients in a VPN gateway group.

      Screenshot from 2019-08-09 17-59-17.png

      1 Reply Last reply Reply Quote 0
      • KOM
        KOM last edited by

        Today I got around to creating a collection of VMs to be my VPN Site to Site config. 2 pfSense instances with WAN, LAN, DMZ, 2 clients on each LAN, 2 servers on each DMZ. I followed the Netgate guides on creating an IPSec link for the LANs and an OpenVPN link for the DMZs. It all went pretty smoothly, with the one exception of me forgetting to add the WAN rule to allow udp/1194 in.

        Configuring a Site-to-Site Static Key OpenVPN Instance

        Configuring a Site-to-Site IPsec VPN

        1 Reply Last reply Reply Quote 0
        • First post
          Last post