Feb 22, 2019
OpenVPN on pFSense: Enable access to the LAN resources If you followed my pFSense OpenVPN tutorial then you have Firewall and NAT setup correctly. Firewall for WAN interface should look like this: Under OpenVPN there should be also one firewall rule . That is it for the firewall – we don`t need custom rules for OpenVPN under LAN or OPT1 interface. Install OpenVPN on a NAT Server - Knowledgebase - QuadHost In this guide we will cover how to install OpenVPN on a NAT based VPS. Now we have a new NAT VPS, details listed below: Product: LDN-128 Hypervisor: ldn6-uk OS: CentOS 6 x64 Minimal Hostname: ldnNATinstance Main IP: 192.168.43.243 Shared IP: (see above) IP Addresses Assigned: 2a06:8ec0:0000:068e:0000:0000:0000:0001 Connect to your VM and Update Site-to-Site VPN behind NAT : UNIFI
I assume, the LAN behind pfSense is entered in the "Locale Network/s" box in the OpenVPN server settings, to get the route to this LAN pushed to the client. I also assume that pfSense isn't the default gateway for the LAN machines. If it isn't you should do NAT at LAN interface. To do so you have to add an outbound NAT rule: Firewall > NAT
For a VPN connection to a remote Firebox behind a NAT device, specify the static public IP address of the NAT device in the VPN connection settings. For example, you have two Fireboxes A and B. Firebox B is behind a NAT device that has a static public IP address of 192.0.2.1.
Linksys Official Support - OpenVPN server behind NAT
Ubuntu Open VPN Server setup behind NAT using tun Aug 15, 2014