Office1 LAN: 192.168.0.0/24
Office2 LAN: 192.168.1.0/24
We have to configure the PFSense server to connect this two networks.
One office will be the VPN server, the other will be the VPN client
NB: if you also have a VPN access for road warriors configured, don't change the existing configuration but add a new tunnel. Office1 configuration
Let's configure Office1 as server.
From “VPN à OpenVPN” menu, select “Server” tab and click on “+”.
“Address pool” must be an independent subnetwork, diffrent from both subnetwork in Office1 and Office2.
In “Remote network” area set the subnet of Office2.
Now we have to generate the “Shared key”. Log into the PfSense server of Office1 via SSH, type “
This command creates a new shared key for this OpenVPN server. Then copy the content of shared.key file into the Shared Key WebInterface box and press “Save”.
We have to copy this shared key to use it later on the Office2 server.
Let's configure Office2 as client.
From “VPN à OpenVPN” menu, select the “Client” tab and click on “+”.
“Server address” must be the public IP of Office1.
“Server port” is the connection port for the VPN set on the Office1 PfSense (in this example 1193.)
“Interface IP” must be the IP address of local LAN.
“Remote network” must be the IP address of the Office1 LAN dell’Ufficio1.
Paste the previous generated shared key into the shared key box and then click on “Save”.
Now the VPN tunnel between this two offices should be “up and running”.