OpenVPN on pfSense+ AWS
-
I am trying to configure pfsense+ on AWS.
I have an elastic IP in a VPC attached to it.
I m trying to configure OpenVPN on that.however, having an issue with setting it up.
I m not sure how do I assign the public IP to the WAN address it is showing private IP on the WAN interface -
https://docs.netgate.com/pfsense/en/latest/solutions/aws-vpn-appliance/launching-a-vpc-instance.html
In order to reach the instance from the Internet, associate an Elastic IP with the WAN interface of the instance. In the VPC Management Console, go to the Elastic IPs view by clicking on Elastic IPs on the left side of the page. Click on the Allocate New Address button. Select that you want the EIP used in VPC and click on the Yes, Allocate button in the box that pops up. After the Elastic IP address is allocated, associate the address with the WAN interface of the Netgate appliance by clicking on the Associate Address button.
A box will pop up that will either let you specify the instance and Private IP address of the interface or the Network Interface and the Private IP Address of the interface. Use one of these methods to select the correct interface and click on the Yes, Associate button. The instance should now be reachable via ssh or https.
-
@johnpoz Thanks.
Actually I do not have experience with AWS.However, I was able to access the web GUI using the Elastic IP.
My issue is.
On the pfSense WAN interface it is showing the Private IP of the VPC and when I configure OpenVPN on the WAN interface it is will never route to it as on configuration file the remote server point to the WAN interface IP and not elastic IP. (Manually changing config file does help either) -
I was able to resolve it.
By making Minute Changes on the VPN CLient Profile.remote <Elastic_IP> 1194 udp //Change WAN IP with elastic IP #verify-x509-name "Netgate VPN Server" name //Comment this Line