

The remote access VPN users will get their IP address from 192.168.16.0/24 block. The sample VPN FQDN that I am going to be using in this post is. The FreeIPA server that I am using has an IP address of 192.168.7.25.

Just to paint a picture before we get started. End-user(s) that is member of the VPN group.A service account that will be used as a bind user.If you are interested, here is the link to the post Installing FreeIPA on Rocky Linux. Therefore, another way to utilize the FreeIPA is to use it as the identity source for the OpenVPN remote access. I have been using FreeIPA as my LDAP server. I really don’t want to generate a WireGuard key for each user because it is not scalable. What this means is I will be implementing a full-tunnel VPN and not a split-tunnel VPN. I have been using WireGuard VPN and recently I want my folks to browse the Internet safely via the OPNsense firewall.
