• 0 Votes
    3 Posts
    353 Views
    K
    @viragomann Here is the OpenVPN tab: [image: 1695075529041-d73061bc-c188-4aca-951e-d2acca9f8847-image.png]
  • pfSense 2.7.0 FW Rules ignores Aliases? (Yes, but it shouldn't)

    3
    0 Votes
    3 Posts
    246 Views
    V
    [image: 1695058346462-7a56e8a4-1c89-45ec-9987-edb7bd193813-image.png] another interface WAN, it is working... so, this BUG on OpenVPN?
  • Repeating connect & disconnect in logs.

    5
    0 Votes
    5 Posts
    614 Views
    GertjanG
    @petrt3522 Didn't know you were using a OpenVPN client. I used the wrong reply button - should have replied to @pwood999 @pwood999 522 was talking about a OpenVPN server process. /var/etc/openvpn/server1/sock These lines : Jul 18 13:12:55 pfSense-MX80 openvpn[5843]: MANAGEMENT: CMD 'state 1' Jul 18 13:12:55 pfSense-MX80 openvpn[5843]: MANAGEMENT: CMD 'status 2' is the widget questioning for the list with connected users. The 'socket' (file based) is only available locally. I'm not using the pfSense OpenVPN as a client myself, so, in that case, I can't tell, but I presume the widget can also connect to the openvpn client service socket and collect data about the Openvpn link. Again : presuming here. Btw : no intended. @petrt3522 the subject is wrong : Repeating connect & disconnect in logs. These log lines do not show any "OpenVPN" reconnections.
  • Migrating from Shared Key to SSL/TLS

    9
    0 Votes
    9 Posts
    1k Views
    A
    Anyone else struggeling with OTP after 2.7.0 update?
  • OpenVPN Restarting more than it should

    1
    0 Votes
    1 Posts
    215 Views
    No one has replied
  • OpenVPN connection issue

    13
    0 Votes
    13 Posts
    2k Views
    J
    @Stef93 It gets stranger. When I use the client export utility to get the IOS config and then import it into the OpenVPN app on my iPad, it DOES connect, although I still cannot see anything on the permitted subnet. The iPad was just a test, I don't plan on using this via a mobile device.
  • Cannot pre-load keyfile - PFSense 2.7.0 / openvpn-client-export 1.9_1

    1
    0 Votes
    1 Posts
    454 Views
    No one has replied
  • Selective VPN Routing

    11
    0 Votes
    11 Posts
    1k Views
    V
    @Hudson-1 So I expect, that pings to public IPs are working. However, 8.8.8.4 is not a good advice. The server doesn't respond to ping requests obviously. Try 8.8.8.8 instead.
  • Unable to Route Traffic over OPENVPN Gateway NORDVPN Client Setup

    20
    0 Votes
    20 Posts
    2k Views
    A
    @viragomann After the latest patch Fix OpenVPN selecting wrong interface address when VIPs are present (Redmine #14646) https://redmine.pfsense.org/issues/14646 I could be able to route out my traffic and the OPENVPN client works as it is requested.
  • sned specific LAN IP through the OPT1 interface?

    3
    0 Votes
    3 Posts
    380 Views
    B
    @viragomann thank you, I'll check that out
  • New OpenVPN Server Instance - No access to DFS Namespace/shares

    8
    0 Votes
    8 Posts
    1k Views
    J
    Fixed !! ... I am so used to working on smaller 100% fibre based networks with min 1Gbe connectivity. I forget this is more complex. And takes longer to replicate. When you try and resolve the namespace it comes up with the primary DNS being the one furthest away that did not have a valid replication. Thanks John!
  • 0 Votes
    1 Posts
    361 Views
    No one has replied
  • openvpn client export deprecated

    3
    0 Votes
    3 Posts
    791 Views
    jimpJ
    Also, even if your client is up-to-date, if your certs use a weak hash like SHA1, then builds of OpenVPN based on OpenSSL 3 will refuse those certificates as well. Nothing the client or server can do about that, you have to issue new certificates that don't use weak hashes. If it's the encryption on the PKCS#12 bundle that isn't being read by the OS, you can always install the client manually and then export an inline configuration with the certs inside rather than using PKCS#12, or you can export a PKCS#12 bundle separately from the certificate manager using a higher level of encryption. Any version of the export package newer than 1.9 should be capable of exporting a stronger PKCS#12 bundle directly in the export package: https://redmine.pfsense.org/issues/13255
  • Bypassing the OpenVPN Tunnel NAT

    6
    0 Votes
    6 Posts
    801 Views
    I
    Hi @Stef93 Thanks for the suggestion! However it looks like the client end of the tunnel (10.10.10.2) is NAT'ing the traffic prior to putting it in the tunnel. So by the time it reaches the pfSense OpenVPN NAT Policy it is already NAT'd. I was able to solve the issue by creating a similar NAT Bypass rule using the the GL-iNet NAT interface. And that seems to be working. I appreciate your feedback!
  • VPN tunnel up but no traffic get routed

    6
    0 Votes
    6 Posts
    759 Views
    H
    @Stef93 Turned out that I have missed to add a Client Specific Override, but couldn't get it to work anyway. Reading a bit more on Client Specific Override I found out that changing the tunnel network from /24 to /30 didn't need any override and then I got it working. Thanks, you lead me to the solution!
  • Solved - Firewall WAN - Blocking packets destined for a "working OpenVPN"

    1
    0 Votes
    1 Posts
    295 Views
    No one has replied
  • Bridge Openvpn

    1
    0 Votes
    1 Posts
    196 Views
    No one has replied
  • IPv6 with prefix delegation for OpenVPN remote users

    6
    0 Votes
    6 Posts
    1k Views
    JKnottJ
    @kohenkatz I've had the same prefix for a few years. It's even survived replacing both the computer I run pfSense on and the cable modem. The IPv4 lease wouldn't survive either. IPv6 uses something called DUID, which is supposed to tell the ISP what your prefix is. I understand some ISPs ignore it. I have no idea what Verizon does. Maybe someone else here knows.
  • Remote access Layer 2 works, Layer 3 no

    33
    0 Votes
    33 Posts
    2k Views
    S
    Looking at Logs can see these error too: ovpn.client/WANPFSENSE:26059 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_9EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:957 0:956 t=1693552393[0] r=[0,64,15,1,1] sl=[3,64,64,528] I've switched the ovpn.server to TCP protocol, now samba access works fine, also the http://SITEA/login can be loaded!
  • openVPN client on PFSense, no routing to openVPN

    2
    0 Votes
    2 Posts
    380 Views
    S
    @big_blue [image: 1693540125080-ae3ff397-8c96-487f-91a7-41e3f0e4d517-image.png] [image: 1693540466886-656be457-7cc3-44aa-8035-74c9c894412a-image.png] and rules vlan19 [image: 1693540497808-5d5ee4cb-f017-44cb-8853-360f2360003c-image.png] be sure to put the first in the list of rules in vlan19 [image: 1693540719304-fe53de4a-6bd8-4ff1-bc48-3ae6fd435e30-image.png] [image: 1693540860293-6769f515-7213-4b90-9757-b759ee9a4896-image.png]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.