I am trying to forward ports through an OpenVPN AS server to a pfSense router that is connected as a client. I want to do this because my home internet connection is a LTE/4G connection that is NATed at the ISP’S end as well. This means I do not get a public ip and instead get the ISP’s local LAN address. This is a problem because I cannot forward any ports from the outside.
In the OpenVPN AS server config User Permissions > More Settings > DMZ I have put in the address as instructed by https://openvpn.net/vpn-server-resource ... ss-server/
The Open VPN AS server has been set up in AWS form the OpenVPN market AMI.
So the setup I am aiming for should look something like :
18.104.22.168 (AWS public IP/OVPNAS server)
(NAT)->172.16.16.2 (pfSense ovpn client IP)
(NAT)->192.168.1.10 (Plex server or whatever)
The router has connected to the OpenVPN AS server and right now all internet traffic is going through the OpenVPN AS server.
My issue is that while the OpenVPN AS is receiving the packets they are not being forwarded to the client.
The OpenVPN AS is getting packets and this has been confirmed via sudo tcpdump -i eth0 tcp port 32400
The pfsense router is not getting packets confirmed via cpdump -i ovpnc3 tcp port 32400
Ask questions about your Access Server configuration here.
1 post • Page 1 of 1
- OpenVpn Newbie
- Posts: 1
- Joined: Sun Nov 18, 2018 11:32 pm