<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Open vpn and static routing]]></title><description><![CDATA[<p dir="auto">Hi as we all know PPTP is now deprecated in Pfsense<br />
I use open vpn to connect with my iphone now.<br />
The openvpn client network is 192.168.5.0/24<br />
the pfsense router  is 10.10.10.55/26<br />
there is a mikrotik router 10.10.10.1/26 that routes to 10.0.0.0/8 and a static route 10.0.0.0/8 at pfsense to 10.10.10.1<br />
When I connected to pptp I was able to reach networks over the mikrotik route but with openvpn I can only ping 10.10.10.55/26 network.<br />
Any idea which field I am missing that needs to be configured?The openvpn logs on iphone show 192.168.5.1 as default gateway but I think that pfsense 10.10.10.55 should be the default gateway but how can I change that.<br />
Any help will be appreciated.</p>
]]></description><link>https://forum.netgate.com/topic/99960/open-vpn-and-static-routing</link><generator>RSS for Node</generator><lastBuildDate>Sun, 19 Apr 2026 05:15:06 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/99960.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 15 May 2016 18:24:17 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Open vpn and static routing on Wed, 25 May 2016 20:02:12 GMT]]></title><description><![CDATA[<p dir="auto">Thanks Viragomann I appreciate it this concludes my 2 week search for the masquarade or outbound NAT as u call it in pfsense.<br />
When I did that and logged to mikrotik from my iphone the ip was that of pfsense therefore I can see all 10.0 networks on the miktrotik.<br />
Thanks again I hope I can help others who experience issues in this transition from PPTP to Openvpn.I had no idea that the interface address meant the pfsense IP so I was putting my ip as a /32 subnet and didnt work.Also I used source nat openvpn interface instead of LAN so it was 2 mistakes I did.<br />
Now all that remains is to fix the 2 broken packages that remain on the menus after the upgrade and make me nuts!!!!nut and BandwidthD that return 404 error.<br />
Yes I know I should have uninstalled them before the upgrade but who reads the fine print right?Especially in Greece!</p>
<p dir="auto"><img src="/public/_imported_attachments_/1/openvpnNAT.PNG" alt="openvpnNAT.PNG" class=" img-fluid img-markdown" /><br />
<img src="/public/_imported_attachments_/1/openvpnNAT.PNG_thumb" alt="openvpnNAT.PNG_thumb" class=" img-fluid img-markdown" /></p>
]]></description><link>https://forum.netgate.com/post/627309</link><guid isPermaLink="true">https://forum.netgate.com/post/627309</guid><dc:creator><![CDATA[commandoathens]]></dc:creator><pubDate>Wed, 25 May 2016 20:02:12 GMT</pubDate></item><item><title><![CDATA[Reply to Open vpn and static routing on Sun, 22 May 2016 13:25:47 GMT]]></title><description><![CDATA[<p dir="auto">Yes, the outbound NAT does the masquerading in pfSense. It also can be resolved that way.<br />
You have to switch your outbound NAT rule generation mode to "hyprid" (or manual if you like), then add an outbound NAT rule like:<br />
Interface: &lt;this one="" which="" is="" in="" common="" subnet="" with="" the="" microtik.="" i="" assume="" it's="" lan=""&gt;Source: 192.168.5.0/24 (your vpn tunnel)<br />
Destination: &lt;the networks="" behind="" the="" microtik.="" you="" can="" also="" use="" any="" here,="" if="" don't="" care=""&gt;Translation: Interface address<br />
Any other options can be left at their defaults.&lt;/the&gt;&lt;/this&gt;</p>
]]></description><link>https://forum.netgate.com/post/626492</link><guid isPermaLink="true">https://forum.netgate.com/post/626492</guid><dc:creator><![CDATA[viragomann]]></dc:creator><pubDate>Sun, 22 May 2016 13:25:47 GMT</pubDate></item><item><title><![CDATA[Reply to Open vpn and static routing on Sun, 22 May 2016 12:10:07 GMT]]></title><description><![CDATA[<p dir="auto">Thanks a lot my friend yes that is an answer I managed to get to the mikrotik but actually the solution is to masquarade all the openvpn subnet to have the ip of pfsense because mikrotik is routing a 10.0 ip range<br />
Can you tell me how to mask the openvpn addresses to have the pfsense or another ip in the lan range?<br />
I tried the outbound NAT but cant seem to make it work.Maybe I am missing something.</p>
]]></description><link>https://forum.netgate.com/post/626483</link><guid isPermaLink="true">https://forum.netgate.com/post/626483</guid><dc:creator><![CDATA[commandoathens]]></dc:creator><pubDate>Sun, 22 May 2016 12:10:07 GMT</pubDate></item><item><title><![CDATA[Reply to Open vpn and static routing on Mon, 16 May 2016 18:13:44 GMT]]></title><description><![CDATA[<p dir="auto">No, the OpenVPN server has to be the default gateway if you route any traffic over VPN. So 192.168.5.1 is okay.</p>
<p dir="auto">It seems like responses from microtik and networks behind it aren’t routed back to pfSense. So you'll have to add a static route to the microtik router to direct the VPN subnet 192.168.5.0/24 to pfSense.</p>
]]></description><link>https://forum.netgate.com/post/625169</link><guid isPermaLink="true">https://forum.netgate.com/post/625169</guid><dc:creator><![CDATA[viragomann]]></dc:creator><pubDate>Mon, 16 May 2016 18:13:44 GMT</pubDate></item></channel></rss>