• OpenVPN service not running v2.5.2

    3
    0 Votes
    3 Posts
    455 Views
    R

    see extract from log
    ug 18 12:03:17 openvpn 61300 OpenVPN 2.5.2 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 24 2021
    Aug 18 12:03:17 openvpn 61300 library versions: OpenSSL 1.1.1k-freebsd 25 Mar 2021, LZO 2.10
    Aug 18 12:03:17 openvpn 61612 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    Aug 18 12:03:17 openvpn 61612 WARNING: experimental option --capath /var/etc/openvpn/server1/ca
    Aug 18 12:03:17 openvpn 61612 TUN/TAP device ovpns1 exists previously, keep at program end
    Aug 18 12:03:17 openvpn 61612 TUN/TAP device /dev/tun1 opened
    Aug 18 12:03:17 openvpn 61612 ioctl(TUNSIFMODE): Device busy (errno=16)
    Aug 18 12:03:17 openvpn 61612 /sbin/ifconfig ovpns1 10.0.1.1 10.0.1.2 mtu 1500 netmask 255.255.255.0 up
    Aug 18 12:03:17 openvpn 61612 /usr/local/sbin/ovpn-linkup ovpns1 1500 1621 10.0.1.1 255.255.255.0 init
    Aug 18 12:03:17 openvpn 61612 UDPv4 link local (bound): [AF_INET]51.75.92.46:1194
    Aug 18 12:03:17 openvpn 61612 UDPv4 link remote: [AF_UNSPEC]
    Aug 18 12:03:17 openvpn 61612 Initialization Sequence Completed
    Aug 18 12:07:06 openvpn 61612 event_wait : Interrupted system call (code=4)
    Aug 18 12:07:08 openvpn 61612 /usr/local/sbin/ovpn-linkdown ovpns1 1500 1621 10.0.1.1 255.255.255.0 init
    Aug 18 12:07:09 openvpn 61612 SIGTERM[hard,] received, process exiting
    Aug 18 12:10:20 openvpn 35855 Options error: --server directive network/netmask combination is invalid
    Aug 18 12:10:20 openvpn 35855 Use --help for more information.
    Aug 18 13:28:10 openvpn 28137 DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
    Aug 18 13:28:10 openvpn 28137 Options error: --server directive network/netmask combination is invalid
    Aug 18 13:28:10 openvpn 28137 Use --help for more information.
    Aug 18 14:18:46 openvpn 80616 DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
    Aug 18 14:18:46 openvpn 80616 Options error: --server directive network/netmask combination is invalid
    Aug 18 14:18:46 openvpn 80616 Use --help for more information.
    Aug 18 14:51:33 openvpn 16749 DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
    Aug 18 14:51:33 openvpn 16749 Options error: --server directive network/netmask combination is invalid
    Aug 18 14:51:33 openvpn 16749 Use --help for more information.
    Aug 18 14:56:40 openvpn 16513 DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
    Aug 18 14:56:40 openvpn 16513 Options error: --server directive network/netmask combination is invalid
    Aug 18 14:56:40 openvpn 16513 Use --help for more information.
    Aug 18 14:57:22 openvpn 33554 DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
    Aug 18 14:57:22 openvpn 33554 Options error: --server directive network/netmask combination is invalid
    Aug 18 14:57:22 openvpn 33554 Use --help for more information.
    Aug 18 14:58:31 openvpn 40653 Options error: --server directive network/netmask combination is invalid
    Aug 18 14:58:31 openvpn 40653 Use --help for more information.
    Aug 18 15:08:15 openvpn 31653 Options error: --server directive network/netmask combination is invalid
    Aug 18 15:08:15 openvpn 31653 Use --help for more information.
    Aug 18 15:12:39 openvpn 98194 Options error: --server directive network/netmask combination is invalid
    Aug 18 15:12:39 openvpn 98194 Use --help for more information.
    Aug 18 15:12:58 openvpn 55110 Options error: --server directive network/netmask combination is invalid
    Aug 18 15:12:58 openvpn 55110 Use --help for more information.
    Aug 18 15:21:13 openvpn 23712 Options error: --server directive network/netmask combination is invalid
    Aug 18 15:21:13 openvpn 23712 Use --help for more information.
    Aug 18 15:22:13 openvpn 71847 Options error: --server directive network/netmask combination is invalid
    Aug 18 15:22:13 openvpn 71847 Use --help for more information.

  • Host Name Resolution via Dynamic DNS Clients

    12
    0 Votes
    12 Posts
    2k Views
    C

    @viragomann I guess my question was how can we setup a ddns without exposing the real wan ISP IP. But i dont think that is possible as the vpn profile file will need a remote url that points to your wan ip

  • Adding additional route to OpenVPN Client

    5
    0 Votes
    5 Posts
    696 Views
    A

    @viragomann said in Adding additional route to OpenVPN Client:

    So this network is on another location connected to the office network via IPSec?

    Yes, correct.

    I have figured it out already, basically I just need to add another Phase 2 entry on the IPsec tunnel.
    Phase2-Entry.png

    So now I can reach the remote site over OpenVPN.

    Thanks @viragomann @marvosa

  • SSH/RDP not working over OpenVPN in a Bridged LAN

    13
    0 Votes
    13 Posts
    2k Views
    johnpozJ

    If they are different interfaces and not switch ports - then no there is no way to put them on the same network without bridging them.

    But the only reason you need for them to be on the same network is broadcast traffic.. They could be on different networks and still access everything on the other network. Just create any any rules.

    Do these devices use some broadcast/multicast discovery or protocol that is required that they are required to be on the same network..

    If want to leverage your ports for individual devices - ok... But why do you need to bridge them.. Just use 192.168.1/24 on 1 and 192.168.2/24 on 2.. And use an any any rule - there you go these devices can talk to each other for anything other than broadcast traffic.

    Bridge is only going to complex up the config, and more overhead for what? Are you doing something that requires broadcast to work? Then get a switch... Really the only time it makes sense to leverage a bridge is media conversion...

    Or I had something that required the devices to be in the same broadcast domain, ie the same L2 network.. But I also wanted to be able to firewall between them for some stuff. In that case you would use a bridge (transparent firewall) and be able to do such a thing. But just wanting to leverage the ports on your pfsense box.. I don't see the point of trying to bridge them?

  • Connected to OpenVPN server but Public IP address remains the same

    6
    0 Votes
    6 Posts
    771 Views
    L

    @viragomann Thank you Sir.
    The redirect IPv4 Gateway option in PfSense OPENVPN did the trick.

  • 0 Votes
    3 Posts
    537 Views
    bingo600B

    @bp81

    I'm distributing the "Client Export set of files" in a password protected zip file.

    /Bingo

  • Route to a secondary firewall from openvpn

    1
    0 Votes
    1 Posts
    229 Views
    No one has replied
  • How Extend CA's on OpenVPN

    4
    0 Votes
    4 Posts
    612 Views
    A

    @viragomann

    Thanks for replying. I created a new CA and generate new client configuration.

  • OpenVPN speedtest issue

    1
    0 Votes
    1 Posts
    421 Views
    No one has replied
  • OpenVPN Client Port Forward Mullvad

    1
    0 Votes
    1 Posts
    158 Views
    No one has replied
  • OpenVPN Bridge Problem

    2
    0 Votes
    2 Posts
    500 Views
    S

    @stefan1

    I hate to be the one replying to my own topic, but I discovered the problem was the firewall on Client Netgate Box:

    65308152-4aa0-434b-98dd-85894a86220d-image.png

    The default firewall rule for the LAN assigned ports out-of-the-box is accept Source: LAN net.

    When bridging with layer 2, the client will receive an IP from the remote DHCP. The IP assigned to the client will be not known to this interface. I needed to change this to Source: any and now its working.

  • Setup SG-1100 with NordVPN

    1
    0 Votes
    1 Posts
    506 Views
    No one has replied
  • Open VPN clients unable to connect to IPSec site-to-site resources

    18
    0 Votes
    18 Posts
    1k Views
    V

    @kwriley87 said in Open VPN clients unable to connect to IPSec site-to-site resources:

    To be clear, if I look at my IPSec tunnels on Site A, there is only 1 Phase 1 tunnel set up, but 2 Phase 2 tunnels (one for Site A LAN to Site B LAN and one for OVPN LAN to Site B LAN):
    https://pasteboard.co/KfhG7AH.png

    Yes, this is ok. And at B you should have the same, but with inverted networks.

    The tunnel might go down if it's idle. You have to initiate traffic to get it up.
    If not, check the IPSec log for hints.

  • remote client & Web traffic

    16
    0 Votes
    16 Posts
    1k Views
    V

    @sasa1
    When you are running OpenVPN on pfSense itself, you have only to check "Redirect gateway" on the OpenVPN server settings and add an outbound NAT rule to WAN for the VPN tunnel network.
    You have to switch the outbound NAT into hybrid mode and save it. Then add a rule:
    interface: WAN
    source: <OpenVPN tunnel network>

    All other options may stay on default values. Save it.

  • OpenVPN clients disconnecting

    2
    0 Votes
    2 Posts
    567 Views
    D

    @tman I started seeing the same issues myself, and I also can't find any obvious culprits. I would expect that the connection would attempt to restore itself, but that's not the case. When I remote in to the server side of the VPN, the OpenVPN daemon isn't running, which leads me to believe it crashed somehow, but I'm not seeing anything obvious in the logs. Does this match your findings, and did you find a solution for this?

  • Sharing a Port with OpenVPN and a Web Server

    16
    0 Votes
    16 Posts
    2k Views
    F

    @johnpoz
    Thanks Again. I'll play around with NAS firewall to see if that's the issue.

  • hosting website behind vpn for limited access?

    2
    0 Votes
    2 Posts
    421 Views
    V

    @pastic
    Of course you can control access by a VPN server.
    But consider that you can only control the traffic by source and destination IPs and ports. So if user A should not see the website of user B you have to put them on different IPs or at least different ports and you have to set up client specific overrides for all users to separate them on the VPN server.

    I think, it would be simpler to do that by a reverse proxy.

  • Using openVPN connect

    7
    0 Votes
    7 Posts
    808 Views
    F

    @viragomann
    to be clear , my issue is that when im connecting to my home VPN using oVPN connect
    from my PC -> DNS breaks down , and i cannot browse the internet .

    if i use oVPN GUI (downloaded from withing pfsense ) everything works .

    but i cannot use the GUI version , cos i have to have multiple profiles imported . (Home& work)

  • Routing traffic through VPN (best practice/questions)

    1
    0 Votes
    1 Posts
    326 Views
    No one has replied
  • PB interconnexion clients OpenVPNs

    2
    0 Votes
    2 Posts
    337 Views
    noplanN

    @david2121

    montre nous les règles de pfS LAN / openVPN

    est-ce un VPN site2site ?

    avez-vous défini votre route xorrect

    paramètres de ?

    bbaf2ed3-8d78-4c17-82bc-7e376d2f04a5-grafik.png

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.