• PFSense 2.3.X - OpenVPN Site to Site VPN Setup Question

    2
    0 Votes
    2 Posts
    1k Views
    V
    @mark1210: unable to ping the server. The OpenVPN server? From where? Have you added proper firewall rules to the OpenVPN rule tab?
  • PfSense OpenVPN Server and Tomato OpenVPN Client

    37
    0 Votes
    37 Posts
    19k Views
    Y
    @PGalati: I was able to solve this scenario and soon hope to create a how-to to help others that specifically use pfsense and Tomato.  This link pushed me in the right direction: https://doc.pfsense.org/index.php/Why_won't_OpenVPN_push_routes Click on this link to get some additional info about the correct way to configure the openvpn server on pfsense: https://doc.pfsense.org/index.php/OpenVPN_Site-to-Site_PKI_%28SSL%29 To the point, once I changed the pfsense openvpn server mode from Remote Access (SSL+User Auth) to Peer to Peer (SSL/TLS), made the appropriate adjustments on the Tomato side, I started getting ping responses from clients from the server side.  Our Cisco voip phones work both ways now too. Finally! Hi , i'm trying to do the same thing. can you please tell me what your tomato side config is? have you enabled TLS Authentication? did you enable Extra HMAC authorization (tls-auth)? i'm getting TLS Error: incoming packet authentication failed from [AF_INET]
  • VPN CLIENT CANT PING TO WINDOWS SERVER

    3
    0 Votes
    3 Posts
    777 Views
    D
    If the interface you are pinging on the server isn't its primary interface, ensure the server has a valid route for return traffic on the interface that you are pinging. Examin "route print" on the server to see where traffic from your OpenVPN subnet will end up.
  • PfSense 2.3.2 OpenVPN Bridge Interface not selectable.

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    junicastJ
    Well I did not hijack anything, because the problem I'm having is exactly what this thread is about. Since it hadn't been answered it was the most conclusive thing to attach me to it. I'm not sorry for speculating.
  • Openvpn tap between two pfsense

    2
    0 Votes
    2 Posts
    538 Views
    M
    So, configure an implicit deny firewall rule and only allow what you want.
  • CA & Certificate Import for Server and Client Side of OpenVPN

    5
    0 Votes
    5 Posts
    4k Views
    johnpozJ
    With Derelict on this - I can see zero reasons why your vpn used by your clients would need to use public CA certs..  The only time public certs need to be used is when you would have uses accessing it that need to trust the CA that you do not control their devices used to access and can not add your CA to their trust list.
  • Static IP addresses for OpenVPN clients

    4
    0 Votes
    4 Posts
    6k Views
    F
    HINT: Don't forget to reload / restart your OpenVPN server, after chancing CCD / User specific config.
  • OpenVPN Mobile-One-Time-Password freeradius2 startup bug

    6
    0 Votes
    6 Posts
    1k Views
    Z
    I was able to fix my mOTP issue using pfsense 2.2.6, however I was able to replicate this issue of yours. Is it possible to upgrade freeradius2 version on a pfsense 2.2.6? Current version is freeradius2 1.6.19.
  • (Solved)No connection through dynamic dns

    6
    0 Votes
    6 Posts
    1k Views
    S
    @Derelict: Then your dyndns isn't bring properly updated. Thanks,Derelict, it was something with the freeDns client update, I changed service to DuckDNS and now everything working smoothly.
  • PSK OpenVPN setup, but routing not quite working right. Any ideas?

    10
    0 Votes
    10 Posts
    2k Views
    D
    Nothing obvious jumps out at me unfortunately. Any time I've had an OpenVPN tunnel blocking in one direction but not the other it's been a firewall rule issue on one of the two pfSense boxes or a firewall in one of the endpoint devices (you're not hitting a Windows firewall issue?) The only other thing different I see from my typical setups is the use of PSK, I typically use PKI. Perhaps you could try to rebuild the link with defined certificates for the server and client? Might be worth a shot to try something different instead of banging your head against the same thing expecting different results (been there…...)
  • OpenVPN Server to OpenVPN Client on same box

    7
    0 Votes
    7 Posts
    2k Views
    V
    Off course you may change the name of the interface. You have  also to add appropriate firewall rule to the new VPN servers interface. Maybe you just want an allow anything to any rule.
  • Multiple, balanced OpenVPN client connections, one WAN

    7
    0 Votes
    7 Posts
    4k Views
    G
    thanks bookmarked  :) really clear and useful guides
  • Problem with openvpn i cant use nore than 1 user

    10
    0 Votes
    10 Posts
    2k Views
    D
    you mean for every user i must create Server Certificate  . i'm sorry i'm new to this You don't need a "Server Certificate" for every user, you need a ….. "User" certificate for every user. The general use of these SSL certificates needs: a Certificate of Authority (CA) usually created on the OpenVPN Server a Server Certificate created using the CA in 1) a User Certificate (NOT another Server Certificate) created using the CA in 1) Repeat 3 for as many users as you need. If you go into the Certificate Manager in pfSense you should be able to see all these pieces and verify that the OpenVPN Server cerificate is type "Server=YES" and the User certificate is type "Server=NO". As marvosa suggested, if this gets messed up from your various attempts it may be simpler to start clean and work through the steps. It really shouldn't be too tough to setup.
  • User portal

    2
    0 Votes
    2 Posts
    827 Views
    W
    this is exactly what I am working on right now. I have it even working more or less, but as I am new to developing with php and also with pfsense, I am not sure how to implement it the correct way to be sure, that with the next official release it won't get overwritten. My user portal page which I made now is kompletely based on the export-module (due the lack of php and pfsense development knowledge, i'd probably broke more than I invented). Sadly I did not understand 100% yet how the access model for the files works in pfsense. Users can login with android, and due to the right mime type, the openvpn connect app will directly open the file after it was downloaded. (No anoying "Import from SD card" anymore) The user portal is done in a cloned version of the vpn-openvpn-export.php. Sadly, in order to make the download button in the users profile working, I have to allow access to the regular export page too. May be someone can give me some hint, how I can get this in production with a good feeling? many thanks in advance [image: pf_userexp.png] [image: pf_userexp.png_thumb]
  • Load Balancing and Failover with 2 pfSense and 2 OpenVPN servers

    19
    0 Votes
    19 Posts
    18k Views
    P
    I found the same problem in one of the posts here in the forum. However it had not been solved: https://forum.pfsense.org/index.php?topic=40672.0
  • OpenVPN IPv6 tunnel issue…

    3
    0 Votes
    3 Posts
    1k Views
    D
    Thanks!  I will wait for 2.4 then…
  • Strange WAN Gateway Packet Loss Issue

    3
    0 Votes
    3 Posts
    1k Views
    J
    I fixed this, I upgraded my server to an Intel Xeon E31270 and moved from VMware to bare metal which gave me more constant throughput via openVPN, but the thing that really helped was setting the MTU and MSS in the openvpn client manual options and on the openvpn WAN interfaces as this needed to be lower for my OpenVPN connection.
  • How do i change ownership of: "'/var/etc/openvpn/client1.up'"

    4
    0 Votes
    4 Posts
    3k Views
    G
    Have you tried  Diagnostics -> Command Prompt ls -la /var/etc/openvpn chmod 0600 /var/etc/openvpn/client1.up
  • Client to Client Openvpn connects but no traffic (Solved)

    25
    0 Votes
    25 Posts
    12k Views
    B
    Viragomann, thank you very much for your help to Shaddoh and I.  Ended up fixing it by deleting the server and client setup and doing it step by step according to this article – https://doc.pfsense.org/index.php/OpenVPN_Site_To_Site.  Previously we'd been trying to make it work based on the steps in this article -- https://doc.pfsense.org/index.php/OpenVPN_Site-to-Site_PKI_(SSL).  I'm sure either ought to work, and I know for sure that I've gotten a 4-site setup doing the steps in the PKI/SSL article, but I don't have access to that setup to do testing, and I think the way we ended up doing it ought to work plenty well enough for what we're trying to do right now. Thanks again, we appreciate the help stepping through the debugging process.
  • Guidance needed on OpenVPN setup

    4
    0 Votes
    4 Posts
    3k Views
    D
    Is it possible to upload the configuration setting that worked for you  ?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.