• 0 Votes
    5 Posts
    1k Views
    N
    @kiokoman thanks for the tip, I have configured a bridge with linux tools (brctl) and I'm using virt-io and I thought that would be enough but it is in fact very reasonable that it would actually introduce limitations and weird behaviors like what I'm seeing, I will dig further the issue
  • Authentication fails for only some users

    4
    0 Votes
    4 Posts
    843 Views
    sullivasS
    I just wanted to post a follow-up in case someone in the future has the same problem and comes across this thread. We were able to determine that the service account we were using to bind to AD was unable to properly access the entire directory structure (still not sure why not, but that doesn't matter). I could see it make a connection to the domain controller and then attempt to check each of the containers defined in the pfSense authentication server, but it would return "0 users found" in the LDAP query even though the account to be authenticated was there in that container. What fixed it was to add that account we use for directory binding to the Built-In "Account Operators" group. After that everything has worked perfectly.
  • Accessing OPT1 network

    2
    0 Votes
    2 Posts
    448 Views
    R
    Okay, I believe all is working now. When you write things out as I did in this post, you realize what you're missing. I needed the gateway on my OPT1 interface to the 192.168.1.1 router we have. Now, I can see all.
  • OpenVPN Client IP Issue

    1
    0 Votes
    1 Posts
    182 Views
    No one has replied
  • Force some hosts through OpenVPN

    1
    0 Votes
    1 Posts
    225 Views
    No one has replied
  • Bundle OpenVPN Connect Client for MAC with the configs

    1
    0 Votes
    1 Posts
    127 Views
    No one has replied
  • 0 Votes
    4 Posts
    576 Views
    RicoR
    https://www.netgate.com/resources/videos/openvpn-as-a-wan-on-pfsense.html -Rico
  • Correct setup for pfSense + VPN + Pi-Hole ?

    2
    0 Votes
    2 Posts
    1k Views
    Z
    Bumping this and adding more specifics... According a post on the Pi-hole forum, the correct config is: Add the Pi-Hole IP address to pfSense > Services > DHCP Server > DNS Servers. Do not enable DNS Forwarder. Do not enable DNS Resolver. Do not add a DNS entry in the System > General Setup > DNS Server Settings. The last setting seems to be causing an issue -- the router is unable to connect to my VPN provider if no entry is made in System > General Setup > DNS Server Settings. It's also unable to connect if the Pi-Hole IP address is entered there. Specifying a public DNS, such as Clouldflare, does work -- but then I am not sure if all DNS queries are going through the Pi-hole?
  • OpenVPN not resolving internal DNS names

    6
    0 Votes
    6 Posts
    569 Views
    johnpozJ
    Well the only thing that can talk over the tunnel - is your vpn clients.. But sure you can limit what your vpn clients can access if you want/desire to do so. The automatic acls should prob be updated to auto allow tunnel networks to be honest.. But anyone that understands how the acls work, would know that they need to adjust them, etc. Glad you got it sorted..
  • Unknown "OpenVPN" interface tab in my Firewall rules

    2
    0 Votes
    2 Posts
    301 Views
    jimpJ
    That is a tab created when the firewall as any OpenVPN clients or servers defined. It's an interface group tab for firewall rules which apply to all OpenVPN interfaces. If you have assigned your OpenVPN instance(s) and use rules on the per-interface tabs then you won't need to do anything with the OpenVPN tab. Some people don't assign the OpenVPN clients or servers as interfaces and just manage rules on the OpenVPN tab.
  • OpenVPN setting max number of authentication retries

    2
    0 Votes
    2 Posts
    376 Views
    bingo600B
    I'd look at using Freeradius as external auth (Radius) server, if needing something like that /Bingo
  • OpenVPN Server-Client access problems

    9
    0 Votes
    9 Posts
    1k Views
    RicoR
    Glad you have it working now. -Rico
  • Indefinite openvpn session

    3
    0 Votes
    3 Posts
    405 Views
    S
    No, I have PFSense server on one side. My server connects as OpenVPN user cert/user/pass. I gave it static IP via push ifconfig, then on firewall i have made rules that cover this communication. So, my server connects as a OpenVPN user.
  • Q: OpenVPN RoadWarrior Certificate Expired , what to do

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ
    @bingo600 said in Q: OpenVPN RoadWarrior Certificate Expired , what to do: 1: Delete the expired certificate 2: Under user manager , edit user -> "User Cartificates" -> "+Add" , create a new certificate with the same CA name ? That would be easier if working. That should be fine Though strictly speaking you probably want to setup a separate VPN for vendors than for your typical remote access users, to be sure they can be isolated more strictly. So a different CA, server cert, OpenVPN server, etc. I actually made 3 servers : ADM + INT + EXT , and made "interfaces" for all 3. All 3 have separate CA-Roots + Server /24. That way i can do firewalling based on the Client types. Sounds good
  • OpenVPN Client-Server - Disconnect clients after some time

    1
    0 Votes
    1 Posts
    151 Views
    No one has replied
  • How can I optimize Ubuntu 16.04 performance

    2
    0 Votes
    2 Posts
    361 Views
    RicoR
    Hmm...you realize this is the pfSense forum? -Rico
  • 0 Votes
    1 Posts
    415 Views
    No one has replied
  • VPN and routeur

    8
    0 Votes
    8 Posts
    874 Views
    JKnottJ
    @splinny Is that 192.168.1.0 actually from your ISP? If so, then you are behind NAT and a VPN will never work.
  • 0 Votes
    1 Posts
    164 Views
    No one has replied
  • Latest OpenVPN client tls ca certificate is undefined openvpn error!

    6
    0 Votes
    6 Posts
    2k Views
    PippinP
    OpenVPN Connect for Windows is beta and aimed at OpenVPN Access Server. Either download from pfSense GUI or use the download from @Rico
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.