
Under the Destination section, ensure Destination is set to WAN address.Under the Source section, ensure Source field is set to any.Ensure the Protocol field is set to TCP.Ensure the Address Family field is set to IPv4.Ensure the Interface field is set to WAN.n the Edit Firewall Rule page set the following:.Back in the Settings tab, click on the Apply Changes button ( Figure 6).Click the Save button on the bottom of the page ( Figure 5).In the General Settings -> Maximum Connections field, enter the number of connections per process Ex: 1000.Under General Settings -> Enable HAProxy field is checked.Click on Services -> HAProxy -> Settings.In the Condition acl names field, enter the ACL name you set for the Webserver ACL Ex: WebserverACL ( Figure 4).In the Action field, ensure Use Backend is selected and ensure the Webserver backend we created earlier is selected.Again, click the down arrow icon to add an action for the Webserver ACL we created above.In the Condition acl names field, enter the ACL name you set for the Softether ACL Ex: SoftetherACL.In the Action field, ensure Use Backend is selected and ensure the SoftetherVPN backend we created earlier is selected.Under the Default backend, access control lists and actions -> Actions section, click the down arrow icon to add an action for the SoftEther VPN ACL we created above.In the Value field, enter the FQDN to reach your Webserver Ex:.In the Name field enter a name for this ACL Ex: WebserverACL.Again, click the down arrow icon to add an ACL entry for the Webserver.In the Value field, enter the FQDN to reach your SoftEther VPN server Ex:.In the Expression field ensure Server Name Indication TLS extension matches is selected.In the Name field enter a name for this ACL Ex: SoftetherACL.

#Softether vpn client manager mega install
Locate the haproxy package, click on the Install button and wait for the installation to complete.In the PfSense Web GUI, click on System -> Package Manager -> Available Packages.HAProxy Version 17-1.7.11_1 for PfSense.

In actuality, any SSL VPN server will suffice, however SoftEther VPN is the server of choice in this example. This guide was written in order to assist in setting up HAProxy in PfSense in order to route SSL (443) traffic to either a SoftEther SSL VPN server or a webserver listening on port 443 based on SNI.
