As for site 1, if a private (local) IP address is assigned to the pfSense WAN interface on site 2, then go to "Interfaces -> WAN" and disable the "Block private networks and loopback addresses" option. at the bottom of the page.
Next, click "Save", then "Apply Changes" at the top of the page.
To add an OpenVPN client on pfSense, go to: VPN -> OpenVPN.
Go to the "Clients" tab of the "VPN / OpenVPN" page that appears and click on: Add.
Configure your OpenVPN client like this:
For the "Endpoint Configuration" section, enter the same parameters as for the VPN server.
The only information that changes is the IP address of the OpenVPN server to contact.
Important : in the "Cryptographic Settings" section, uncheck the "Automatically generate a shared key" box.
Which will display the "Shared Key" box where you can indicate the shared key of the OpenVPN server to contact.
On site 1 where you created your OpenVPN server, go to "VPN -> OpenVPN -> Servers" and modify the configuration of your VPN server.
On the page that appears, locate the "Cryptographic Settings" section and copy the displayed Shared Key.
Then, paste this shared key into the "Shared Key" box of your future OpenVPN client.
In the "Tunnel Settings" section, indicate:
At the bottom of the page, click Save.
Your OpenVPN client is created on site 2 (Paris).
So that the machines (computers / servers) of site 1 (Brussels) can access the resources of site 2 (Paris) via the OpenVPN tunnel, you must add an additional rule in the firewall of site 2 (Paris).
To do this, go to: Firewall -> Rules.
Next, go to the "OpenVPN" tab and click: Add.
On the page that appears, configure this rule like this:
For simplicity, allow all network traffic in this OpenVPN tunnel. It does not matter the source and destination which will necessarily be an internal IP address of the source or destination network.
Next, enter "Network traffic from site 1 (Brussels) over OpenVPN tunnel" as the description and click Save.
Click: Apply Changes.
Your rule was created for network traffic passing through the OpenVPN tunnel.
Firewall 6/6/2025
Firewall 5/9/2025
Firewall 5/17/2025
Firewall 7/16/2025
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment