Hi all,

I'm looking at installing OpenVPN to service some "road warrior" clients.
The pfSense installation has multiple external IP's, and the "road
warriors" need to access a few internal services, as well as a few
external services that do IP checking - so they need to go back out to
the internet after coming in using the tunnel.

I've had a few problems setting this up so far, so here goes a couple questions:

Can I control what IP OpenVPN is listening on?
(Multiple external IPs, and I would like to run the OpenVPN server on
one of the "virtual" IPs. Possibly even running several servers - one
on each IP, and preferably all on the standard port)
So far I have been unable to make OpenVPN accept connections on
anything but the primary WAN IP.

What side of the firewall will the OpenVPN clients appear on?
The rule to allow VPN connections in should be on the WAN port, but is
"any" destination right? Can I use the external IP/VirtualIP as the
destination?

What parts of my network will clients get access to?
I do not want to make the entire private network available to them.
Do I need to add rules to allow them access to the LAN/DMZ/WAN?

If I want to allow the OpenVPN clients to be able to access the
internet via the tunnel, what entries do I add in NAT/Rules to allow
that?
(Since I'm not sure what "interface" they are on, I'm not sure how I
should do this.)

Regards,
-Jeppe

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to