Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - NFKhalaychidi

#1
Virtual private networks / Re: 3 Sites OpenVPN
April 22, 2025, 03:47:53 PM
Quote from: viragomann on April 22, 2025, 02:19:33 PMOn the OpenVPN interface you have to open the source for the remote sites LAN.
Just allow all traffic at Firewall:Rules:OpenVPN for testing
#2
Virtual private networks / Re: 3 Sites OpenVPN
April 22, 2025, 09:12:01 AM
Quote from: tivoti on April 21, 2025, 08:58:17 PMCan you show me your configuration?
Maybe I made a mistake somewhere

Attached

Looks like it's not a configuration error
Check firewalls on all devices
#3
Virtual private networks / Re: 3 Sites OpenVPN
February 27, 2025, 02:34:25 PM
Quote from: viragomann on February 27, 2025, 02:17:01 PMYou just need to set the "Remote Networks" properly to route the traffic for the respectively other site over the VPN.
It's always so simple, but I often can't find the answer because I always think that it must be hard.
Thanks a lot!
#4
Virtual private networks / 3 Sites OpenVPN
February 27, 2025, 11:04:36 AM
Please help me in solving the problem.
There is a network shown in the attached diagram.
There are three OPNsense routers in it.
There is an OpenVPN tunnel (172.16.1.0/24) between routers site1-gw and site2-gw, and the same tunnel between routers site1-gw and site3-gw (172.16.2.0/24).
What should I configure so that the computer in Site 2 can access the computer in Site 3 and vice versa?
At the same time we can't set up another VPN tunnel between Site2 and Site3 for administrative reasons.
#5
Thanks,
but still have no idea how can I add route here
Also, it's a big problem to add CSO for every user
#6
Quote from: elvinmammadov on October 05, 2023, 03:44:22 PM
Hello,

We have updated our Opnsense to v23.7.5 yesterday. We have noticed that the configuration in OpenVPN Client Specific Overrides is lost. We are using fixed ip and routing for our vpn clients.
How can we do it in v23.7.5? Because advanced section is missing.

Hello,
did you find a solution?
#7
Quote from: autone on December 09, 2021, 04:41:54 AM
Create a firewall ALIAS. Put those IPs for WAN2 in the ALIAS and use a firewall rule to forward that ALIAS to WAN2.
It works too! Thanks for this way
#9
Quote from: chemlud on December 08, 2021, 01:19:40 PM
10.0.0.7/32

maybe?

Yes. So simple. I thought "10.0.0.0/16" is subnet, and "10.0.0.7/16" is single host, but OPNsense doesn't think so
#10
У меня есть устройство Traffic Inspector Next Generation на базе OPNsense. На борту три порта, один использую для LAN, еще два для WAN1 и WAN2 от двух разных провайдеров.
Задача такая:
Все компьютеры в сети должны использовать для выхода в Интернет шлюз WAN1, но некоторые - WAN2.
Я настроил следующее правило:

Interface: LAN
Direction: in
Protocol: any
Source: Single host 10.0.0.7/16
Destination: any
Gateway: WAN2_Gateway


Когда я активирую это правило - ВСЕ начинают ходить в интернет через WAN2, но через WAN1 никто не ходит
И наоборот, когда я его отключаю - все ходят через WAN1
Что я делаю не так?
#11
I have a device with OPNSense with 3 ports, one is for LAN, other two are for WAN1 and WAN2 from different providers
I have to do the following:
(1) All clients are using WAN1 to go to the Internet
(2) Some IP's have to use WAN2 instead
By default all clients are using WAN1 and (1) is working
How can I configure OPNsense to make (2) working?
I tried to configure the following firewall rule:

Interface: LAN
Direction: in
Protocol: any
Source: Single host 10.0.0.7/16
Destination: any
Gateway: WAN2_Gateway


When I enable this rule ALL computers are using WAN2, and nobody uses WAN1.
Any suggestions to fix it?