• T-mobile 5G home internet connecting with Openvpn

    1
    0 Votes
    1 Posts
    399 Views
    No one has replied
  • block access from certain countries or IPs

    3
    0 Votes
    3 Posts
    354 Views
    johnpozJ
    @frog yeah you can create aliases with pfblocker and then only allow what is in the alias to connect. I would go more for allow vs block, because normally this is a much smaller list vs trying to block the planet. But if you just want to block a couple of countries and allow the rest then sure block vs allow. For example - I currently allow only the US and a few specific IP ranges that might not be US to access any of my services I expose. But if you wanted to allow everyone other than say mexico ;) then that list would be smaller and would be better to block vs allow.
  • pfSense as OpenVPN client cannot ping remote network hosts

    10
    0 Votes
    10 Posts
    2k Views
    P
    I have a TP-Link Archer as VPN server at my Dad's old house. Can ping & connect to everything in the remote LAN, but can only ping the TP-Link. The TP seems to block it's web access via the VPN, but I think that's a router limitation. Not really a problem for me, but will check the config & let you know on Sunday when I'm there in case it helps. No special routes, etc. in the client config. Local = 192.168.123.0/24 and remote = 192.168.2.0/24
  • 0 Votes
    12 Posts
    2k Views
    8
    @NightlyShark said in OpenVPN and PIA Errors | Reconnecting (Auth Failure | Authenticating | Pulling configuration from server: @8ayM Does it support AES-NI? Yes https://www.intel.com/content/www/us/en/products/sku/97926/intel-atom-processor-c3758-16m-cache-up-to-2-20-ghz/specifications.html
  • MAX site to site open VPN

    5
    0 Votes
    5 Posts
    503 Views
    M
    @kistudent some general guidelines then.. https://docs.netgate.com/pfsense/en/latest/vpn/performance.html#general-advice
  • Cipher missing from server post Server Certificate renewal

    28
    0 Votes
    28 Posts
    3k Views
    P
    @Gertjan @NightlyShark Thanks for your support and advice. Post version upgrade the issue was resolved. Things are in control now and working well... Once again thank you everyone.....
  • Can't connect after switch from Shared Certificate to TLS

    2
    0 Votes
    2 Posts
    177 Views
    No one has replied
  • 0 Votes
    1 Posts
    181 Views
    No one has replied
  • Package installer failed (openvpn-export)

    9
    0 Votes
    9 Posts
    909 Views
    GertjanG
    @Alessio-Zatta said in Package installer failed (openvpn-export): So its running on an old PC That was my initial pfSense experience ! A desktop PC has a build in NIC, so add one more and you're good. Still today, you should make use of some common knowledge : Make live easy on yourself. So, these are "the rules" : If the motherboard has Realtek chipset : pay it a visit in the PC's bios, and select Realtek's most useful option : set it to "Off". Disable it. You just raised the chance of having a perfect "home build router" experience by a lot. Next rule : No, don't take that USB to NIC adapter. Don't fall into that trap. Do what needs to be done : get that one or dual Intel NIC, and slap in in your PC. If you're above average, you check upfront that the card you buy is supported by "FreeBSD". If the card is Intel branded, you'll be good. Using these rules and pfSense is up on running in .... 5 minutes ? Later on, you can always activate the Realtek NIC again, and see if it plays nicely. Not all of them are bad. And again : Wile installing pfSense, you have to assign networks, as a router needs a WAN and a LAN. You also have to create your own password. And here it comes : if you use or see a wizard that talks about 'DNS' do not touch your keyboard. Use the mouse, if possible, and enter nothing. Just click on 'Next'. Next has been chosen by Netgate as the perfect DNS setting. pfSense will work out of the box. Up can now see the available package list. and install what you want. And as "realtek", later on, you can adapt your DNS settings if you want to. "It will break" but now you can "step back" and it works again. After the wtf phase, the conclusions that you will make at that moment are very important.
  • OpenVPN tunnels require restart after WAN failover

    2
    0 Votes
    2 Posts
    274 Views
    W
    I managed to mitigate this somewhat by changing the configuration of the offending interface to static address assignment. That didn't prevent it from going down, but it did at least keep OpenVPN tunnels not bound to that interface from needing a restart. The WAN interface in question is passed through from an AT&T residential fiber gateway / ONT. It's an Intel I-225 for what that's worth. I'm not convinced the interface isn't at fault, so I switched over from the igc0 interface to a vlan on my main NIC, which is ix0. That wastes a NBASE-T switch port but works ok so far.
  • Client Specific Overrides Security

    4
    0 Votes
    4 Posts
    484 Views
    V
    @McMurphy said in Client Specific Overrides Security: but if all users on on the same VPN server how best to differentiate between users to firewall some and not others? With firewall rules. In the CSO you can state a unique virtual IP (tunnel network) for each client. Then you can use this in firewall rules as source to allow certain accesses.
  • OpenVPN Client Crashes Randomly Only With Some Users

    5
    0 Votes
    5 Posts
    426 Views
    K
    @slu OK, thanks for the suggestions, I will investigate when user is available.
  • 0 Votes
    3 Posts
    1k Views
    B
    I just also found it on the Tunnelblick website. https://tunnelblick.net/cTunnelblick4.html
  • Multiple OVPN Clients on 1194

    8
    0 Votes
    8 Posts
    783 Views
    M
    @viragomann Thank you. Long day and was not thinking. I was thinking outbound traffic was on port 1194
  • How to NAT a WAN port to a SiteToSite LAN Address

    10
    0 Votes
    10 Posts
    780 Views
    V
    @labu73 pfSense uses the reply-to tag to route response traffic to public sources back to a non-default gateway. Otherwise it would be routed out on WAN. The reply-to tag is added by the filter rule, which allows the incoming request packets. So this rule has to be defined on an unique interface. However, OpenVPN is an interface group including all OpenVPN instances, which are running on pfSense AND rule on interface groups as well as floating rules have precedence over rules on member interfaces. That's why this rule got hits, while the rule in the interface didn't.
  • OpenVPN Multiple WAN Failover Question

    9
    0 Votes
    9 Posts
    1k Views
    V
    @tman222 I don't expect, that any Radius traffic going out of pfSense. I don't use it, but as I understand it, it's just a local authentication server. So if the reply-to tags are applied properly to the VPN connection, I'd expect it to work.
  • How to invalidate existing server certificates?

    2
    0 Votes
    2 Posts
    306 Views
    V
    @pyite You can revoke the client certificate to prevent using it to connect. To do so, you have to create revocation lists for the used CAs in System > Certificates > Revocation, as long as you didn't this already. Then assign it your VPN servers.
  • 0 Votes
    2 Posts
    232 Views
    R
    The reason was (a), the username was not matching Common Name. One needs to enable "Username as Common Name" for the server for this to work properly.
  • Setup OpenVPN with allowed IP list

    3
    0 Votes
    3 Posts
    253 Views
    W
    If you don't know a remote source beforehand you can't firewall it in advance. My approach would be to make sure you're using TLS keys in addition to client certificates and also usernames and passwords. That's three levels of authentication where if any one of them is not present, the connection won't establish. Yes, you can use the cloud provider approach but then you're relying on your connections first establishing to that provider and then to you. All that is doing IMO is moving the "noise" elsewhere. I'd just use good security and live with the noise. TLS key, client certificate (which can be revoked), associated private key are something the user has. The username and password are something the user knows. That's not terrible in my book. edit: you can also cut down on the noise by using a different port on the server. The usual port of 1194 UDP is going to get probed a lot. Pick something else and you'll likely have less noise in your logging. second edit: the response about using dynamic DNS didn't make any sense to me at first as I was thinking of this as supporting a fleet of remote users but that could work. However, I tend not to trust dns resolution in critical aliases as I've seen empty alias tables too many times.
  • Just sharing (no help needed)

    1
    0 Votes
    1 Posts
    232 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.