Hi all, I'm looking at installing OpenVPN to service some "road warrior" clients. The pfSense installation has multiple external IP's, and the "road warriors" need to access a few internal services, as well as a few external services that do IP checking - so they need to go back out to the internet after coming in using the tunnel.
I've had a few problems setting this up so far, so here goes a couple questions: Can I control what IP OpenVPN is listening on? (Multiple external IPs, and I would like to run the OpenVPN server on one of the "virtual" IPs. Possibly even running several servers - one on each IP, and preferably all on the standard port) So far I have been unable to make OpenVPN accept connections on anything but the primary WAN IP. What side of the firewall will the OpenVPN clients appear on? The rule to allow VPN connections in should be on the WAN port, but is "any" destination right? Can I use the external IP/VirtualIP as the destination? What parts of my network will clients get access to? I do not want to make the entire private network available to them. Do I need to add rules to allow them access to the LAN/DMZ/WAN? If I want to allow the OpenVPN clients to be able to access the internet via the tunnel, what entries do I add in NAT/Rules to allow that? (Since I'm not sure what "interface" they are on, I'm not sure how I should do this.) Regards, -Jeppe --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
