
You can certainly run AD DC (Zentyal or Windows) behind a VPN but just be aware that, specifically domain members, are going to need the DC as their primary (preferably only) DNS server.I don’t want to discourage you from using Zentyal in the manner you describe, just to be aware of some of the hurdles you’ll encounter:.I have the ability to access the server on my pfSense native vLAN1 throught my entire network behind pfSense BUT I am unable to access the 192.168.30.0/24 network from the remote site.īlock/Allow Prorocol Source Port Destination Port Gateway.I have a server that I need to access the vLAN30 range behind pfSense.WireGuard setup and established between pfSense and Mikrotik.The remote site is running a Mikrotik router. I am running pfSense in my own enviroment. pings to my local network still succeed.I wonder if you would perhaps assist me. Here’s what the Manjaro (client) system says: sudo wg show ✔īut not able to pass traffic to either the remote network, or the interwebs…pings to the router on the target network fail, pings to 8.8.8.8 fail. Transfer: 16.54 KiB received, 11.34 KiB sent Latest handshake: 1 minute, 32 seconds ago Here’s what the server says: ~$ sudo wg show

It appears the pivpn config includes a preshared key for the peer that networkmanager doesn’t have after starting the VPN entry from the exported file, so I added that manually. NM (and wg show) indicate the tunnel is connected and even passing small amounts of traffic, but I can’t access anything - not the normal internet nor on my (target) private network. I’m able to connect and get traffic across this link from iOS, MacOS, and Windows clients, but so far with Manjaro it’s no dice.


I’ve got a new pivpn VM running as a wireguard server behind a Mikrotik firewall, with the selected UDP port passed through to the VM. I’ve got Manjaro on a little test VM on my laptop I’ve run Manjaro in the past on my main rig and I like it a lot, thanks for all the work you all do.
