• OpenVPN client (site-to-site) through a OpenVPN Scaleway InstantApp

    1
    0 Votes
    1 Posts
    263 Views
    No one has replied
  • Email Notification - OpenVPN Client Connect (Common Name)

    138
    0 Votes
    138 Posts
    45k Views
    M
    Hi all, I do not know much about pfsense command line. Wondering if someone can help me step by step ? Do I need command line access to the router or I can use the web access to the router ? Can I use the command prompt section ? So I have to create 2 executable files name notify.sh and disconnect.sh ? How I am going to create these files ? I think I got the part to set the permissions. How can I set the permissions ? by using Execute Shell Command section on the web ? What will be in those two files ? So same code in both files ? @Armstrong said in Email Notification - OpenVPN Client Connect (Common Name): #!/usr/local/bin/php -q <?php require_once("/etc/inc/notices.inc"); $local_connect_value = " user_name: " . getenv('common_name') . " vpn_client_ip: " . getenv('ifconfig_pool_remote_ip') . " from: " . getenv('trusted_ip') . " on " . date('F j, Y, g:i a'); if ( strrchr (FILE , 'disconnect') ) { $local_connect_value .= ", duration : " . getenv('time_duration') . " seconds, received : " . getenv('bytes_received') . " bytes, send : " . getenv('bytes_sent') ." bytes. DISCONNECTED."; } notify_all_remote($local_connect_value); ?> Am I coping from <?php or from #!/user ? If it is from <?php then what I have to do with first line #!/usr/local/bin/php -q Is it possible some one can help me step by step and also tell me which part of the webconfigurator I need to use to do all this please ?
  • Accessing IROUTE LANs AFTER a reconnect of associated client/router

    1
    0 Votes
    1 Posts
    234 Views
    No one has replied
  • 1 Votes
    8 Posts
    1k Views
    E
    @jimp i have the same problem but i use /30 so tunnel network should be specified right? other subnets (tried /29 and it connected but no traffic and wrong ping due to wrong subnet) and no ipv4 tunnel network work (with this obviously no IP but still connects the server) here is the thread I started
  • ovpn tunnel client stopped working after update to 2.7.0 from 2.6.0

    2
    0 Votes
    2 Posts
    440 Views
    E
    @elliopitas rolled back my client pfsense to 2.6.0 and it works. I still get the last error though so its the 2nd I guess. back on the updated version all other subnets (tried /29 and it connected but no traffic and wrong ping due to wrong subnet) and no ipv4 tunnel network work (with this obviously no IP but still connects the server) [image: 1696802888859-21c9e977-2e59-482a-86fb-08b2a832d602-image.png]
  • Netgate 6100 openvpn slower on some appliance

    4
    0 Votes
    4 Posts
    604 Views
    K
    On the slow netgate, I stop the IPsec tunnel and reboot the device. after few files transfert over openvpn, I check the interrupt with the commande : vmstat -i | grep qat the command didn't return any result. Maybe I'm wrong but it's seem that openvpn don't use QAT. after restarting the IPSec tunnel vmstat -i | grep qat return : irq170: qat0:b1 139 0 -> QAT is used by IPSec is there a reason for openvpn not using QAT ?
  • 0 Votes
    6 Posts
    721 Views
    H
    @viragomann Thanks a lot - I will try that
  • Android client works - sometimes

    1
    0 Votes
    1 Posts
    250 Views
    No one has replied
  • OVPN client unable to ping LAN other side of site to site VPN

    2
    0 Votes
    2 Posts
    352 Views
    K
    Ahh this is resolved. Would have helped to read the post directly below mine... https://forum.netgate.com/topic/183242/how-to-route-traffic-from-openvpn-remote-clients-to-subnets-through-site-to-site-tunnels Creating a P2 for the other site of the OVPN network on the LAN B firewall resolved this issue.
  • Remote Access to LAN using OpenVPN Client Specific Overrides

    3
    0 Votes
    3 Posts
    1k Views
    V
    @Alpine34 Your virtual IP seems odd. How did you configure the OpenVPN server and the CSO? Which topology does the server use? If subnet, which is default, you have to state a single IP with the proper tunnel mask in the CSO, e.g. 10.31.180.230/24. And generally it would be wise to limit the access for the whole tunnel subnet (for any users) and give more privileges to certain CSO users.
  • OpenVPN Mobile Tunnel on IPv6

    1
    0 Votes
    1 Posts
    221 Views
    No one has replied
  • OpenVPN Client Windows

    4
    0 Votes
    4 Posts
    466 Views
    D
    @alanbaker The same way you would secure access to the computer/file system. There is no way to actually secure an ovpn file, however, you can secure everything else before reaching the file like shared folders, user accounts, MFA, proper USB policies, antivirus software, etc. If you're already using LDAP with SSL Certificates, from the network perspective, you should be good.
  • Can't ping WAN2 from ouside when WAN1 is the default

    11
    0 Votes
    11 Posts
    857 Views
    F
    @viragomann Thank you for your help, it is working now.
  • OpenVPN server config changes on CE2.7

    2
    0 Votes
    2 Posts
    416 Views
    A
    I know, this isn't any exciting topic. Could at least anyone confirm the restarts of unbound caused by OpenVPN Server Changes ?
  • pfSense OpenVPN without certifcate

    1
    0 Votes
    1 Posts
    277 Views
    No one has replied
  • OpenVPN bridged to LAN stops working

    openvpn client tap bridge
    8
    1 Votes
    8 Posts
    2k Views
    B
    @m5ip25 Just wanted to say that this seems similar to the issue I'm experiencing after updating to 2.7.0. In my case it's a simple point to point tap bridged to physical interfaces on each end. Tap needed because the whole purpose of the tunnel is to pass multicast video traffic. https://forum.netgate.com/topic/183115/openvpn-client-process-fails-after-upgrade-to-2-7-0
  • Site-to Site OpenVPN - DNS problem

    1
    0 Votes
    1 Posts
    167 Views
    No one has replied
  • Questions about OpenVPN DCO limitations

    3
    0 Votes
    3 Posts
    958 Views
    S
    @sandie Switching to /29 sounds like it should work. Recently, I realized that there was already a solution to my question in the documentation link and I missed it somehow. In PFSense version 2.7, we can use a static route assignment and that should get the routing to work. DCO and Routing DCO does not currently honor internal routes from client-specific overrides (i.e. iroute) for multiple site-to-site clients on a single server, but it does honor kernel route destinations that would normally be ignored by non-DCO OpenVPN. Assign clients static addresses in overrides (after patching #13274) and then setup custom routes in OpenVPN custom options with complete destinations defined or even setup FRR and exchange routes via BGP.
  • 0 Votes
    3 Posts
    640 Views
    G
    @viragomann thank you for taking the time to take a look at my issue and provide these steps. It took me a couple of days of fiddling and reading to realize what you meant by a /30 tunnel. This documentation is key: https://docs.netgate.com/pfsense/en/latest/vpn/openvpn/configure-server-tunnel.html Once I set the subnet tunnel to /30, I also had to manually add remote subnet and tunnel subnet to the client's OpenVPN settings (this isn't required for larger subnets) everything just worked. Awesome, thanks again.
  • OpenVPN client issue after upgrading to 2.7 (Solved)

    3
    0 Votes
    3 Posts
    1k Views
    M
    So an update, I manually rebuilt my config in a Hyper-V VM and well and behold it just worked. So then I upgraded again from 2.6 to 2.7 on my physical hardware and the same issue occurred. This time though I noticed there was mention of OpenVPN (redmine #14646) in the System Patches package so I applied all of the patches, and rebooted, and again the two OpenVPN clients did not route traffic. Strange. I then went in to the two OpenVPN client configuration checked all of the settings compared to the VM and the only differences I had set on the VM compared to my bare metal upgrade install were: Exit Notify - set to Retry 1x Ping Settings - Interval - 5 Ping Settings - Timeout - 30 Compression - Disable Compression [Omit Preference] I applied the above settings to the two client VPN configurations and rebooted, and the gateways came up green. I checked the route table between 2.7 not working bare metal and 2.7 working and they were identical. Maybe something in the above OpenVPN settings or in conjunction that system patch fixed it. I don't really know. At least now it seems to be working
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.