Seeing my other posts where unanswered I'll try again from the start.
Got two sites where a VLAN needs to communicate with eachother but multicast needs to pass and clients need to reside within the same subnet. Seeing multicast and single subnet all I can do is use OPENVPN TAP? or GRE within IPSEC?
Set up is like this
VOIPVLAN100 int ip 172.18.100.33/24
OXO on that VOIPVLAN100 with IP 172.18.100.40/24 and GW PFSENSE IP
VOIPVLAN100 int ip 172.18.100.97/24
Client IP 172.18.100.98/24 which needs to connect to OXO
Server side config:
keepalive 10 60
local "Outside IP of Server OPENVPN PFSENSE"
server 10.10.10.0 255.255.255.0
ifconfig 10.10.10.1 255.255.255.0
management /var/etc/openvpn/server1.sock unix
tls-auth /var/etc/openvpn/server1.tls-auth 0
client side config:
keepalive 10 60
local "Outside IP of client OPENVPN PFSENSE"
management /var/etc/openvpn/client1.sock unix
remote "Outside IP of Server OPENVPN PFSENSE" 1194
ifconfig 10.10.10.2 255.255.255.0
tls-auth /var/etc/openvpn/client1.tls-auth 1
On both sides I created an interface called OPENVPNBRIDGEVOIP which has the "ovpnc1" interface and I bridged this interface with the VLANVOIP interface.
Pings from client network to main network fail although firewall rules exist to allow all to all traffic.
Should I under the created bridge set a PTP selected interface?
I've been looking into this issue quit some time now and I can't seem to find a solution.
When I ping from one network to the other (pfsense ping) over the bridged interface I can reach other clients, but I can't reach the VLAN ip on the pfsense.
Nor can I ping from the VLAN interface to the other VLAN interface….
Is there nobody who can help me out? :-[