• VPN with different firewalling per user

    1
    0 Votes
    1 Posts
    524 Views
    No one has replied
  • OpenVPN Certs

    5
    0 Votes
    5 Posts
    1k Views
    C
    You can delete them once they're expired or revoked. Might want to only delete the expired certs just in case the CRL gets messed up at some point so it's easy to add them back to the CRL/to a new CRL. Of course could always restore from backup as well in that case.
  • PfSense 2.3 OpenVPN peer to peer not passing traffic to LAN

    9
    0 Votes
    9 Posts
    4k Views
    D
    Might be the difference, I gave up on shared key rather early on in my switch from IpCop to pfSense (early 2000's). As l mentioned, all the site-site connections I've done (including a half-dozen or so DD-WRT) were PKI and worked just fine. Once you get your head wrapped around what you need for certificates (the Certficate Manager makes it pretty easy) it no big deal.
  • [SOLVED] Another lame OpenVPN client <-> LAN no access thread

    15
    0 Votes
    15 Posts
    3k Views
    D
    Being in the same local lan is a lot easier for my tasks, which don't require any road warrior worker setup  8)
  • Guess what??? I can't connect. OpenVPN Tap instance

    1
    0 Votes
    1 Posts
    674 Views
    No one has replied
  • 1000 pfSense <-> 1 pfSense VPN Tunnels

    8
    0 Votes
    8 Posts
    2k Views
    S
    @alfredo: ad pan_2. Haven't had time to test you Single CPU question on our 'big' server. https://forum.pfsense.org/index.php?topic=113167.0 Why do you find on big server questionable? It is fully configured with all thinkable redundancies. It is still only one server. Need to reboot? No connection. Need to upgrade? No connection. Something broke along the way? No connection. (and to continue - need to update FW on host server? No connection for a hour. ESX PSODed? No connection. And so on..) So I would push for redundant setup anyway, even if you have only one host server - more room to maneveur. And it is simpler to utilize VM Host resources by running multiple instances. More so - I doubt pfsense team ever tested OpenVPN WebGUI with so much VPN server definitions, there could be some hidden rocks in it.
  • OpenVPN - poor performance 2.3.1 p1

    6
    0 Votes
    6 Posts
    5k Views
    H
    i've read that KVM & freebsd don't mix well, performance wise. have you browsed this? https://forum.pfsense.org/index.php?topic=88467.0
  • Very poor OpenVPN performance

    7
    0 Votes
    7 Posts
    4k Views
    M
    @0x10C in the OpenVPN Client you could try to increase the TCP/UDP socket send and receive buffers size, adding at bottom of the "Custom options" these two lines: sndbuf 524288; rcvbuf 524288 About the OpenVPN capability of the CPU you could run the simple OpenVPN benchmark formula referenced here: https://forum.pfsense.org/index.php?topic=105238.msg616743#msg616743 in the Reply #9 message If I execute the command on my router with a Celeron N3150 I get 27.41 real        25.62 user        1.77 sys (3200 / 27.41) = 117 Mbps OpenVPN performance (estimate) This value perfectly fits to the result of the speed test [image: speedt1.png] [image: speedt1.png_thumb]
  • Assigning clients tunnel IP a subnet of the server tunnel net

    3
    0 Votes
    3 Posts
    2k Views
    P
    Hello, First thank you for responding, it's a tricky subject and I appreciate all the help I can get. Now onto the topic : First of all, the OpenVPN tunnel is not only a site-to-site server but a remote access one too (meaning sometimes I only want to connect to the OVPN IP, not the private subnets this machine has access to). The tunnels are on a /20 but the LANs are on another, so no risk of collision. Our network plnning has been made to be a little future proof hence the /20. On the PKI, good idea but no, maintaining it properly would cost more of my time than I can allocate to it, automating the renewal of a shared key is no big deal. I was looking for a list of advanced options I can give to OpenVPN to assign a specific client-side tunnel IP belonging to the /20 in accordance to our naming scheme without letting the OpenVPN server choose it.
  • OpenVPN client static ip CSO not working

    4
    0 Votes
    4 Posts
    1k Views
    E
    ok, thanx, but i decided degrade to 2.2.4 version (stable).
  • OpenVPN default route overriding WAN default route

    3
    0 Votes
    3 Posts
    926 Views
    R
    Ok, that's solved but ive followed almost every tutorial I can find and i cannot get traffic through this VPN. I've tried the Alias route, traffic leaves apparently but it looks like it dosent know how to get back. Infact every method I try looks that way. Traffic leaves the pipe and never comes back. I created the manual nat rules. I currently have the Alias setup. What am I Missing?
  • Force interface through vpn?

    1
    0 Votes
    1 Posts
    535 Views
    No one has replied
  • OpenVPN: Client Export Utility blank

    17
    0 Votes
    17 Posts
    7k Views
    johnpozJ
    hehe divsys seems to be more than from time to time ;)  I would say that is the vast majority of user problems is wrong cert..  What I don't get is the wizard as you stated takes you by the hand and its really pretty freaking impossible to mess it up. My guess is they are not using the wizard..  Which makes no sense to me either.. Maybe their needs to be a wizard for creating the user certs as well?  So they show up in the export util..
  • [Solved]Cannot connect to second LAN OpenVPN Peer-toPeer Shared

    5
    0 Votes
    5 Posts
    1k Views
    M
    Yes, 172.16.30.0/26 and 172.16.30.0/24 are different networks. Glad it's working.
  • OpenVPN: block some IPs From the VPN interface Outbound traffic

    14
    0 Votes
    14 Posts
    3k Views
    D
    That's a good thing to do when using a VPN I have seen DNS leaks when using ipv6- think its UDP related but not sure
  • How to fix a DNS leak?

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • SOLVED OpenVPN, Routing and NAT rules - Single WAN, Dual LAN

    8
    0 Votes
    8 Posts
    17k Views
    V
    In the firewall logs you only you the origin source IP, that's the VPN clients IP. You can do a packet capture (in Diagnostic menu) on LAN interface. There you will see the translated address.
  • Remote access connect to site to site vpn

    4
    0 Votes
    4 Posts
    1k Views
    M
    I know site 2 site must define remote side lan networks Technically this statement is true, but that's not what I said to do.  I said the remote sites need to define the tunnel network of HQ's remote access server I'm using public IP(4g) remote access connect to HQ I'm not sure why this matters.  Please provide a network map and elaborate.
  • Open VPN on Virtual IP'S

    15
    0 Votes
    15 Posts
    3k Views
    N
    Better try to draw a diagram with you hw config maybe I understand something wrong with what you want to achieve…
  • OPENVPN DONT SEE LAN

    9
    0 Votes
    9 Posts
    2k Views
    M
    The OP hasn't posted his config and responded in 5 days.  I guess we'll assume he figured it out.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.