• PFSense PC after shutdown OpenVPN Client error 10054

    1
    0 Votes
    1 Posts
    835 Views
    No one has replied
  • PIA / OpenVPN warnings

    4
    0 Votes
    4 Posts
    2k Views
    H
    take a look here https://helpdesk.privateinternetaccess.com/hc/en-us/articles/225274288-Which-encryption-auth-settings-should-I-use-for-ports-on-your-gateways-
  • Packet Inspection

    3
    0 Votes
    3 Posts
    658 Views
    T
    I've looked into the meaning of this header and as far as I can tell, the 02 00 00 00 header is used by BSD on the loopback interface in order to indicate the type of package transmitted. 02 00 00 00 indicates an IPv4 package. However, when directly piping onto the virtual interface used for OpenVPN, the family seems get changed. Looking at the Wireshark dump of my OpenVPN tunnel, I can see the four header bytes, you are talking about.  However, I do not know, why the manual redirection of packages should cause a change. The only thing I could find, is the following from http://www.tcpdump.org/linktypes.html BSD loopback encapsulation; the link layer header is a 4-byte field, in host byte order, containing a value of 2 for IPv4 packets, a value of either 24, 28, or 30 for IPv6 packets, a value of 7 for OSI packets, or a value of 23 for IPX packets. All of the IPv6 values correspond to IPv6 packets; code reading files should check for all of them. Note that host byte order'' is the byte order of the machine on which the packets are captured; if a live capture is being done, host byte order'' is the byte order of the machine capturing the packets, but if a ``savefile'' is being read, the byte order is not necessarily that of the machine reading the capture file. Maybe, this gives you a starting point.
  • 0 Votes
    6 Posts
    2k Views
    2
    I'm also new to pfsense and openvpn and did everything with the help of this topic. https://forum.pfsense.org/index.php?topic=93432.0
  • 1 user on multiple devices with the same IP

    4
    0 Votes
    4 Posts
    684 Views
    D
    @viragomann: Presumably you are using TLS authentication and connect from both devices using the same user cert, so go to the server settings and check "Duplicate Connection" in the "Tunnel Settings" section. Thank you! This is what I was looking for.
  • 0 Votes
    11 Posts
    4k Views
    K
    I guess they could make the button colors red for xp, yellow for win6 and green for Vista or later…  For us slow non-readers!  haha
  • Setting up OpenVPN client for NordVPN

    15
    0 Votes
    15 Posts
    11k Views
    R
    FYI, it appears that NordVPN has addressed whatever issue was causing random ping timeouts after TLS renegotiation. I haven't seen it happen in the past two weeks, which is by far the longest stretch ever.
  • VPN almost there..

    1
    0 Votes
    1 Posts
    471 Views
    No one has replied
  • OpenVPN and TorGuard

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • OpenVPN Having Trouble with VPN Gateway (Revised)

    19
    0 Votes
    19 Posts
    2k Views
    DerelictD
    dpinger works fine. You are seeing an OpenVPN issue. You have to monitor something that will actually respond to pings. The gateway address is automatically inserted. There is no mechanism to "automatically" choose something else. You can place whatever monitor IP address in there you think is better than the gateway address. This has nothing to do with dpinger.
  • OpenVPN Gotchas for upgrade to 2.4?

    13
    0 Votes
    13 Posts
    2k Views
    H
    @HeMaN: I have some issues with openvpn clients on the firewall itself as well after upgrading to 2.4 The configuration I have is based on the 2.3 version of this guide (he has it now updated to 2.4): https://nguvu.org/pfsense/pfsense-multi-vpn-wan/ I use two client connections to AirVPN combined in a Gatewaygroup, and it was wording fine on 2.3 In 2.4 I can see the connection with AirVPN is setup ok, but it seems the creation of the interface is giving issues: /sbin/ifconfig ovpnc1 10.4.94.253 10.4.0.1 mtu 1500 netmask 255.255.0.0 up ifconfig: ioctl (SIOCAIFADDR): File exists "Solved" it for this moment by disabling one of the clients, then it seems to work agin for that one client. I found the solution for my problem :) In the 2.3 version of the guide I mentioned there was a monitor IP configured for each VPN GW. Comparing them with the 2.4 version of the guide he published now, there was no GW monitor IP. After removing them both stay active. It is either this or the fact I updated pfblockerng to the latest version because of the infamous 502 bad gateway issue, which I changed first before I changed the VPN GW configuration.
  • Site to site openvpn

    1
    0 Votes
    1 Posts
    446 Views
    No one has replied
  • OpenVPN 2.4 Artificial speed limit @ 6 Mbps

    3
    0 Votes
    3 Posts
    918 Views
    C
    Thanks Room 7609! Tried it but alas same result :( Good idear though, I did say that mentioned a few times… Will keep you posted. CP
  • OpenVPN Connection Timeout

    1
    0 Votes
    1 Posts
    750 Views
    No one has replied
  • WebGui 400 Bad Request

    1
    0 Votes
    1 Posts
    662 Views
    No one has replied
  • OpenVPN on pfsense 2.4 no longer run script on link-up

    9
    0 Votes
    9 Posts
    3k Views
    H
    Thank you jimp and kpa for taking time to reply to my post. I think this script has to wait for the vpn to be up and running before it launches. Anyway I have found the solution to launching the script correct over at https://forum.pfsense.org/index.php?topic=71725.msg756541#msg756541
  • OpenVPN as WAN - Port Forwarding

    8
    0 Votes
    8 Posts
    4k Views
    DerelictD
    Glad it's working. There is another reason you have to have the rules not match the OpenVPN tab and only match the assigned interface tab. When they come in passed by the assigned interface rule, the resulting states get flagged with reply-to so the reply traffic gets sent out the interface on which it arrived - back out the OpenVPN tunnel in this case. If the traffic is passed by the OpenVPN interface group tab, there is no way for the system to know which interface it arrived on (it could be any interface in the group) so you don't get reply-to. The reply traffic will be sent according to the routing table which probably means it will be sent out WAN (and die there being out-of-state).
  • 2-factor authentication with OpenVPN

    5
    0 Votes
    5 Posts
    2k Views
    A
    My RADIUS and AD is running from windows server 2008. There's no Google Authenticator package that can integrate with windows machine as far as i know. Thanks, I'll look into the freerad package for pfsense. If I do this, will I be able to configure freerad through commandline and use apt-get to install additional packages for the freerad?
  • Openvpn Bridge / IPSEC

    1
    0 Votes
    1 Posts
    551 Views
    No one has replied
  • Rmote bridge between openVPN and IPsec VPN

    1
    0 Votes
    1 Posts
    335 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.