The IPSEC connection should be transparent and allowed once connected to the first LAN segment by openvpn. There have been a few instances of proper rules not working when crossing subnets, especially interested.
The local IPFire initiates a connection to a partner’s remote system. The remote endpoint is not ipfire (don’t know what exactly) but capable of handling multiple subnets with one connection.
Problem: The tunnel is established, and I can ping a host on the first subnet, but not on the second subnet. This used to work right after the connection had been configured in IPFire, but not anymore after we updated to Core 141 and restarted yesterday.
I doubt it has something to do with the update as o…
Hi,
i’ve have two Offices with IpFire, both IpFire’s connected with IPsec. All works fine without any issues on Green.
My Issue: When a device is connected on Blue on Office2 i could not reach a device on Green in Office1.
Think a solutuon could be IPSec N2N Blue to VPN connectivity but i don’t know what handle the two entrys.
What have i todo? Or is there an other way?
Thanks for help.
Best Regards
Nick
Red > Internet, Green > Internal, Blue > WiFi
I would file a bug report.