• Route UK On Demand TV addresses through WAN instead of OpenVPN PIA

    1
    0 Votes
    1 Posts
    586 Views
    No one has replied
  • OpenVPN configuration with VLANs problem

    1
    0 Votes
    1 Posts
    488 Views
    No one has replied
  • 0 Votes
    2 Posts
    699 Views
    V
    https://forum.pfsense.org/index.php?topic=130407.msg718680#msg718680
  • OpenVPN Client Export updated to 1.4.5 for OpenVPN 2.4.2

    3
    0 Votes
    3 Posts
    1k Views
    jimpJ
    Uninstall your package and then reinstall it – don't just do a reinstall/upgrade. If you were coming from a much older version there was a bug a couple revs back that could delete the template files, so the template pkg needs reinstalled, which would only happen if you removed it completely then reinstalled it.
  • [SOLVED] OpenVPN Client Export - Empty link in Version 2.3.4 ?

    5
    0 Votes
    5 Posts
    3k Views
    L
    Well, reinstalling the openvpn-client-export package added back the Export tabs, but I found out it also changed our client export files. I downloaded a new config file & found that the two bottom lines in the old version's client config file:       tls-auth pfSense-udp-<port>-<username>-tls.key 1       ns-cert-type server Were replaced with the following line:       remote-cert-tls server I updated my config file (instead of right-clicking and selecting "Connect", select "Edit Config") and now VPN connects like normal. I updated the package to 1.4.5 this morning, and it still connects fine after making the change above.  Now I just have to update the config file on the other laptops.</username></port>
  • Site to Site VPN

    2
    0 Votes
    2 Posts
    890 Views
    B
    Yep. Just create a * * * rule on the OpenVPN interface (or limit it however you want.) Until you do, no traffic will pass on it.
  • Client-side Network Isolation with OpenVPN Client for Windows

    1
    0 Votes
    1 Posts
    660 Views
    No one has replied
  • RADIUS authentication for OpenVPN

    2
    0 Votes
    2 Posts
    729 Views
    jimpJ
    It's not simple to have the firewall do that, you have to use a somewhat redundant gateway+route as described here: https://doc.pfsense.org/index.php/Why_can%27t_I_query_SNMP,_use_syslog,_NTP,_or_other_services_initiated_by_the_firewall_itself_over_IPsec_VPN
  • Can't access all services

    8
    0 Votes
    8 Posts
    2k Views
    R
    Hi all Still no have access to file server nor server mail. I have on openvpn rules * * * * and also in lan rules I have * * * * but if i go on diagnostic/ping and try to ping my file server from my vpn server, i can't
  • OpenVPN - messaging services

    1
    0 Votes
    1 Posts
    625 Views
    No one has replied
  • Inspecting OpenVPN traffic on the VPN head-end pfSense appliance.

    1
    0 Votes
    1 Posts
    537 Views
    No one has replied
  • 0 Votes
    5 Posts
    1k Views
    johnpozJ
    ^ good example, if your not using user certs to validate user as 2FA then there is really nothing that can not be publicly published. And you don't have to worry about the certs because your using a different OTP as your 2FA..
  • OpenVpn with hide.me vpn service

    4
    0 Votes
    4 Posts
    2k Views
    M
    I would imagine that you could follow the guide to setting up a Private Internet Access (PIA) VPN, and just replace anything in the guide that is specific to PIA with the information from hide.me.  Maybe combine a tutorial for PIA with the hide.me tutorial for setting up a client on an DD-WRT Router?  The hide.me DD-WRT guide on their site for an OpenVPN configuration should give you what you need to swap out with PIA when following the PIA guide. DDWRT Guide: https://hide.me/en/vpnsetup/ddwrt/openvpn/ PIA Guide for pfSense: https://forum.pfsense.org/index.php?topic=76015.0
  • Netflix; static route or firewall rule?

    2
    0 Votes
    2 Posts
    872 Views
    I
    the rule looks good.
  • OpenVPN running but no client can connect unless I manually save.

    3
    0 Votes
    3 Posts
    605 Views
    M
    @jameswebb: Can you try disabling TLS-Auth - then we can try and pick out the problem further if this works. James Alright. So I disabled TLS-auth for the remote OpenVPN. And rebooted a few times, to test. After each reboot, I can connect from my client w/o problems (deleted the tls auth in the config). BUT it seems OpenVPN server 2 (p2p) got somehow affects as now the pfsense cannot tracert nor ping the branch office pfsense (not even the tunnel IP) but the branch office pfsense can successfully ping the headquarter pfsense. (that worked before, I even tested a anything-open-for-anything rule for LAN just in case) After that I enabled TLS-auth again, with the original key. My client was still able to connect successfully. After that I rebooted once again and it remains working. So the bug seems to be fixed, which is great. The pfsense can still not ping the branch office pfsense (yes the BOpfsense has a rule on OpenVPN to allow anything for the HQpfsense and as written it was working before). I'd like to get that working again, too. But as long as both OpenVPN are working again without flaw also after reboots I'm quite happy again. Thanks for the hint.
  • [SOLVED] Packet Loss on WAN when OpenVPN Speed is High

    4
    0 Votes
    4 Posts
    4k Views
    0
    I actually have the issue on all UDP ports. My VPN provider says to use UDP 2000 or something like that and if that doesn't work try UDP 53. I get the same speed issues on both. But not on TCP 443.
  • PIA speeds and connection drops

    11
    0 Votes
    11 Posts
    3k Views
    M
    When I created my PIA Interface it let me leave it as none for the IPv4 Configuration Type setting.
  • Possible bug in setup of openvpn server

    1
    0 Votes
    1 Posts
    605 Views
    No one has replied
  • OpenVPN for remote acces

    7
    0 Votes
    7 Posts
    1k Views
    K
    The PFsense is connected both to WAN ISP provider and network Lan, yes it's just a handful of users (2-3 max). What you mean with asymetrical routing isues?, I already have a site-to-site OpenVPN that links 2 lans located in different places and works great.
  • OpenVPN: cannot reach local network

    5
    0 Votes
    5 Posts
    1k Views
    S
    @viragomann: You can achieve it with NAT. Go to Firewall > NAT > Outbound If the rule generation mode is set to Automatic set it to Hybrid and save the settings. Then add a new rule: Interface LAN Source: 10.5.0.0/24 (the VPN tunnel subnet) The other settings should stay on their defaults, enter a description and save it. perfect! Thanks a lot
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.