Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Virtual PFsense behind physical router

    Scheduled Pinned Locked Moved NAT
    openvpnopenvpn clientroutevirtual router
    2 Posts 1 Posters 280 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      Dante4
      last edited by Dante4

      Greetings. I believe that's NAT problem, but maybe someone will advise me what exactly it is, because I do not understand what exactly wrong.

      I have a need in such network, i.e. virtual PFsense behind physical router. The scheme is below (yes, that is network of my homelab)
      b473588b-f785-4b52-a58a-90ca77a393f3-image.png
      The routing in House-1 is fine, i.e. LAN and OpenVPN network are routed between each other.
      The virtual PFsense have IP:

      • 192.168.5.1 for Pfsense LAN
      • 192.168.0.2 for PFsense WAN with gateway on 192.168.0.1
      • 10.0.240.2 for PFsense OpenVPN (client)

      Host management interface is 192.168.5.2 and I have NATted it over 443 port for OpenVPN and it works.

      Now the problem 1.
      The LAN clients can't get access to the internet. Even if I disable VPN and return their Gateway to default.

      Now the problem 2.
      Separate issue from problem 1.
      The virtual PFsense LAN doesn't have access to ether OpenVPN network or to the ethernet. Only to House-2 LAN segment. And I wanna to have all VMs behind PFsense to go via OpenVPN. I can ping House-1 IPs from PFsense console. But can't from LAN clients of PFsense
      I.e. I need to force LAN clients of Virtual PFsense to OpenVPN tunnel.
      I have read
      https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-s2s-route-internet-traffic.html#assign-openvpn-interfaces
      But that didn't help

      Below is my firewall rules
      WAN:
      efd5d1cb-bfe4-4921-bd83-1a8e5db2ab13-image.png

      LAN:
      2183c84a-5821-4218-b4de-6b45d7a87905-image.png

      OPT2:
      400bd418-f198-4c67-a82f-b50cf39ace2f-image.png

      OpenVPN:
      539ba3a1-f511-4ce5-954d-69bd6fed7854-image.png

      And routes, I have added 192.168.1.0/24 to the Remote IPs:
      470f4d37-074c-43ff-a9d3-0e0acaccdd8f-image.png

      D 1 Reply Last reply Reply Quote 0
      • D
        Dante4 @Dante4
        last edited by

        Problem 2 fixed by adding route to 192.168.5.0/24 on Mikrotik side

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.