OPNsense as a VPN server and access to another local network - how to configure?

Started by domel45, May 20, 2020, 11:58:02 PM

Previous topic - Next topic
Hello all,

I currently have a Linksys router with a firewall,DHCP on which there's a OpenSSL VPN server through which users have access to internal network. Default installed OpenSSL VPN server on the router is limited to 5 simultaneous connections. I can't install DD-WRT software and I'm thinking about using OPNsense as an additional firewall with VPN server and access through this VPN to the local network  192.168.0.1/24.

WAN OPNsense port would be connected to LAN from Linksys (192.168.0.1/24).
In what way should the OPNsense be configured to allow access to 192.168.0.1/24 network (speaking only about the VPN as there will be no computers in LAN OPNsense network).
Is that possible? How would the OPNsense have to be configured?

Kind of a weird configuration.  Having never done this and since you aren't using OPNsense for an actual firewall, you might want to disable the packet filter completely (Firewall: Settings: Advanced) which will turn the OPNsense device into a router only.  With this configured I imagine you could then have a single NIC in your OPNsense device assigned to the LAN.  Turn off DHCP and other services that are being serviced by the Linksys router.  Forward the OpenVPN port (1194 UDP default) to the OPNsense appliance and profit!

I guess you could leave the firewall enabled which could provide additional security/control over the VPN clients if that is needed.

Thank you utahbmxer.
I test tomorrow afternoon and let you know.
I don't have any previous experience with OPNsense and that's why I preferred to ask.