Green bridge means that the OpenVPN interface is bridged to GREEN, it means nothing about the subnets behind the VPN clients.
How OpenVPN works on Endian:
-1 EFW must be the OpenVPN server, the rest are clients. Each role is configured in a different tab, so the server is configured on OpenVPN server and the rest of Endian firewalls must be clients and therefore will be configured from OpenVPN client (gw2gw)
-On OpenVPN server->Accounts create as many OpenVPN accounts as remote endians you have, and define the subnets behind that client.
I.e. to create a network of 4 endians, 1 should be the server and 3 will be the clients. On server create 3 accounts and each one define the "Networks behind client".
-On OpenVPN Server->Advanced block the DHCP responses from the tunnel, and push the desired local subnets to clients. Remember, only put local subnets (like the subnet in Orange, in BLUE, etc..). Push nameservers and your domain name.
-Restart the OpenVPN server. Now your main EFW is accepting OpenVPN connections.
-Download the OpenVPN server certificate, you'll need it on each client
-On Firewall->VPN define the rules you want to control the VPN traffic. If you don't want to block anything, don't disable the firewall, just create an allow all rule.
On each client (slave Endian):
-Go to OpenVPN Client and add a tunnel configuration. It's very straightforward. Add your server certificate, server IP address, user, pass, etc...
-On Firewall->VPN define the rules you want to control the VPN traffic. If you don't want to block anything, don't disable the firewall, just create an allow all rule.
-And done! the system should connect automagically.
On each client (windows client):
-Install OpenVPN client.
-On OpenVPN's config dir, add your server certificate
-create this config file:
client
float
dev tap
proto udp
port 1194
remote AA.BB.CC.DD
remote FA.IL.OV.ER
resolv-retry infinite
nobind
persist-key
persist-tun
ca Firewall.pem
auth-user-pass
pull
comp-lzo