Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - user290920

#1
I explored that option, but decided not to go that route. Didn't like the idea of multiple HAProxy server (potentially running at different versions). And, trying to keep my OPNsense server as "clean" as possible, with only the core services running on it.

Anyone else, please?
#2
We have OPNsense sitting between our internal network and the Internet. Once allowed through OPNsense, inbound web requests coming in from the Internet to our web servers are proxied by 2x HAProxy servers. Is there a way to get OPNsense to perform regular "Healthcheck" monitors to the HAProxy servers to ensure that the servers are healthy, and prepared to serve requests? Ideally OPNsense should perform regular HTTP requests, and close the path to the faulting HAProxy server (e.g. http://ip.to.haproxy.server/I/am/healthy). But, at this point, I'll settle for a simple PING test.

Forgive me if this is obvious, but I haven't found anything after 2HRs of searching...
#3
If you are a n00bie like me, and are coming across this article... I figured it out. Below are the steps:
As for forum moderators and OPNsense developers, I think it would be helpful if within your documentation you emphasised that OpenVPN Access Server is an easy option for organisations looking to implement a MFA-protected VPN solution. IMO everything on the web points to using OpenVPN embedded into OPNsense, making organisations think that authentication via RADIUS and LDAP are the only options.

Personally, for VPN I think it is safer to limit the number of times end-users need to enter their username/password. Instead, each time they access they should complete a push/biometric challenge. Since re-authentication is so much faster, you can make your VPN disconnect after a few minutes of inactivity. And, end-users can't really complain since reconnecting is so simple. OpenVPN AS as a FREE license that allows 2 concurrent connections. After that you have to purchase a subscription, which is reasonable, all things considered.
#4
We have replaced our Fortinet FW with OPNsense. One of the outstanding things is get VPN back up and running. With the Fortinet VPN we were using SAML for Authentication, and I'd really like to continue to do that for ease of use by our end-users. It seems like we need to implement OpenVPN Access Server to have SAML authentication (source).

I've scoured the internet for the past 2HRs, no luck finding a guide for deploying OpenVPN Access Server and configuring it to work with OPNsense. Can someone please refer one for me?

Also, if we deploy OpenVPN Access Server, can we still configure an a Site-to-Site IPSec VPN *on OPNsense*? Or, does configuring the OpenVPN Access Server disable the OPNsense Site-to-Site VPN feature and offload all VPN to OpenVPN Access Server?

Ideally, I would like Site-to-Site to be done through OPNsense. And, end-users to VPN using OpenVPN Access Server, authenticating using SAML authentication.