Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 Jun 2009 20:47:05 +0100
From:      "Torsten Kersandt" <torsten@cnc-london.net>
To:        <freebsd-pf@freebsd.org>
Subject:   OpenVPN Client Nat question?
Message-ID:  <014901c9f504$8dfbe620$a9f3b260$@net>
In-Reply-To: <b61774460906241233y495262d1me2fc9327c107af17@mail.gmail.com>
References:  <b61774460906240852s547e38aj8cee05533e7bf416@mail.gmail.com>	<014301c9f4fb$bb7893e0$3269bba0$@net> <b61774460906241233y495262d1me2fc9327c107af17@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
> -----Original Message-----
> From: owner-freebsd-pf@freebsd.org [mailto:owner-freebsd-pf@freebsd.org]
> On
> Behalf Of Fire walls
> Sent: 24 June 2009 16:53
> To: freebsd-pf@freebsd.org
> Subject: OpenVPN Client Nat question?
>
>  Hi people.
>
>  Working with pf, every day I'm understanding more pf.
>
>   I have openvpn at work running on gentoo, I add my openvpn in my home FW
> with freebsd 7.2, I setup everything and is working, I can reach my work
> network.
>
>   I read some sites on internet about this setup and they say something
> about NAT the openvpn network but doesn't explain if this must be done
just
> in the server side or both sides, I mean server + client.
>
>   In my case I'm a client, I have to NAT my vpn network?
>
> nat on $ext_if from $vpn_network to any -> ($ext_if)
>
>   Or just need to play with the pass/block rules?
>
>  Thanks all for your time!!!
>
> --
> :-)
> _______________________________________________
> freebsd-pf@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-pf
> To unsubscribe, send any mail to "freebsd-pf-unsubscribe@freebsd.org"
>
> This is what I have got on my boxes
> Openvpn.conf:
> server 10.12.215.0 255.255.255.0
> ifconfig-pool-persist /usr/local/etc/openvpn/ipp.txt
>
> # Certificates for VPN Authentication
> ca /usr/local/etc/openvpn/keys/soundnet/ca.crt
> cert /usr/local/etc/openvpn/keys/soundnet/ca.crt
> key /usr/local/etc/openvpn/keys/soundnet/ca.key
> dh /usr/local/etc/openvpn/keys/soundnet/dh1024.pem
>
> # Routes to push to the client
> push "route 192.168.100.0 255.255.255.0"
> push "dhcp-option WINS 192.168.100.12"
> push "dhcp-option DNS 192.168.100.12"
> push "dhcp-option DNS 192.168.100.12"
> push "dhcp-option DOMAIN home"
>
> pf.conf
>        vpn_if="tun0"
>        vpn_network="10.12.215.0/24"
>
>      nat on $ext_if from $vpn_network to any -> ($ext_if)
>       nat on $int_if from $vpn_network to $int_net -> ($int_if)
>
>        pass in quick on $vpn_if
>        pass out quick
>
> regards
> Torsten
>
>
>
  Hi Torsten.

  Hey but this config is for the server side right?

  What questions is, if I have have to NAT to in the client side?

  Thanks for your quick answer!!!


-- 
:-)
_______________________________________________
freebsd-pf@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "freebsd-pf-unsubscribe@freebsd.org"

The client side only needs to which route to which network to take.
In this case my internal network is 192.168.100.0/24 and fully accessible by
all openvpn connections.

If you want your computer to fully become part (of the other sites network
bi directional and fully accessible as in a common Micros..t Network),
You may have to go down the bridging way , meaning tun0<-->ext_if, never
done that and can't help on this.
But as much as have been reading about it not a impossible thing to do

Regards T






Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?014901c9f504$8dfbe620$a9f3b260$>