To resolve the issue, simply add a rule in the firewall of this pfSense machine (where the OpenVPN client is installed).
To do this, go to: Firewall -> Rules.
Select the "LAN" interface (visible above in the firewall logs) and click: Add.
Note that it is not possible to create rules in the firewall for a network bridge and therefore these rules must be created on the appropriate interface that is a member of that network bridge.
In this case, the "LAN" interface.
Source : Bridging Two Internal Networks - DHCP and Internal Bridges | pfSense Documentation.
Configure this firewall rule like this:
Then, click Save.
Once the rule is created, click: Apply Changes.
Now, broadcast type DHCP traffic is allowed.
On your PC at site 2 (Paris), reset its network card, then request a new IP address by executing these commands:
Batch
ipconfig /release ipconfig /renew
If you view the details of your network connection, you will see that this machine physically located at site 2 (Paris) received an IP address from the DHCP server at site 1 (Brussels) whose IP address is "10.0.0.1".
Note: as a reminder, in our case, the IP address "10.0.0.1" corresponds to the IP address of the LAN interface of the pfSense machine on site 1 (Brussels).
To check current DHCP leases, go to the pfSense machine at site 1 (Brussels) which is the only one to have a DHCP server enabled.
Go to: Status -> DHCP Leases.
As you can see, the DHCP server of site 1 (Brussels) distributed IP addresses to our 2 machines:
As you can see, the LAN interface of this pfSense machine was used for both DHCP leases.
Indeed, the DHCP request sent by the machine on site 2 (Paris) was sent to the DHCP server on site 1 (Brussels) via the network bridges (between LAN and VPN) and via the OpenVPN tunnel in layer 2 (L2).
As expected, the "brux-win10-pc" machine from site 1 (Brussels) can still communicate without problem with the "paris-win10-pc" machine from site 2 (Paris).
And vice versa.
Note: if this doesn't work in your case, make sure you have allowed ping (ICMP) for traffic entering the firewall of your Windows machines.
To go further, we installed a web server on a Windows Server installed on each physical site.
To do this, open the Add Roles and Features Wizard.
Install the "Web Server (IIS)" role.
Same on the other server (this time located in Paris).
As you can see, from site 1 (Brussels), you can access the web server of site 2 (Paris) by typing its name like this "http://[NETBIOS name of the web server]/".
If necessary, type its IP address instead.
In the other direction, you can easily access the web server of site 1 (Brussels) from site 2 (Paris).
Same by typing your IP address.
Finally, note that you can add the "OpenVPN" widget to the pfSense dashboard if you wish.
To do this, go to the pfSense dashboard and click on the "+" icon located at the top right.
Click: OpenVPN.
The "OpenVPN" block appears with the address of the remote OpenVPN client in the case of the machine where the OpenVPN server is installed.
In the case of the pfSense machine having the OpenVPN client, you will see the IP address of the OpenVPN server to which the client is connected.
Firewall 7/25/2025
Firewall 5/28/2025
Firewall 6/6/2025
Firewall 8/29/2025
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment