Firewall > Rules > WANClick on the "+" to add a rule. Add this rule:Action: allowSource: anyDestination: WAN addressDestination port: 443That's should be it. I would also go to Firewall > Settings > Advanced and check "Disable anti-lockout". I don't like "magic" things going on without explicit configuration.Also please start to read the documentation.
External WAN address of your OPNsense ...
IPv4 of WAN address should be a public IP. Isn't it? If it isn't, why?
Sorry, this will not work since I am sure you do not have a public routable IP for your VPN interface... whatever this public IP is (VPN server IP???), it will not allow you to connect to your sense.Behind CGNAT you can only gain direct access via v6.
Do you mean tha IPV6 can avoid this problem?
Quote from: novel on December 04, 2023, 09:59:09 pmDo you mean tha IPV6 can avoid this problem?You can use ipv6 instead of v4 to reach your sense or home nework, yes.Even with CGNAT you should get a public v6. I am also behind CGNAT using v6 to connect via VPN to gain access to my whole LAN (even via internal v4 addresses).
Sorry, I don't understand how exactly this should work...Can you provide a detailed network diagram (devices, addresses, routes, ...) of your old setup where this worked?Are there any other services in this setting like portmapper? What is the exact role of your VPS (Now i remember this, but it is not mentioned in this thread!)?As said in other threads: Details are missing! You cannot assume that everyone knows your setup or that Patrick or me will always remember details posted across 3-5 threads.