• Vpn VS ssh

    4
    0 Votes
    4 Posts
    1k Views
    johnpozJ
    "But I use this vm for business use and this request is for my personal use" So you want to route your personal traffic through your business box?  And you don't want to even reboot it, etc.  Why don't you just get a lowend vps, install the simple openvpn access server package on it and be done? https://openvpn.net/index.php/access-server/download-openvpn-as-sw.html  You say this is personal use, it comes with 2 connection license for free. I have started a doc/howto in connecting to this and using policy routing, etc.  But have gotten side tracked and have not finished it yet, etc. I have multiple lowend vps for play, they are $15 a YEAR ;)  route your personal vpn traffic through one of those - my plan has 500GB a month, etc. If you want I could post a link to the plan I am using.. But there are plenty of low end vps to play with out there..  Why you would even think of touching a business box for personal use, not sure thinking would be the word I would use ;)  Be it over or under.. Unless not was the term you were looking for..
  • StrongVPN Client alternatives to pfSense?

    3
    0 Votes
    3 Posts
    1k Views
    D
    Thanks for the reply macboy6.  I do already have Tomato on an Asus router to do this, but I want to route the VPN through a computer with a faster processor to get better download speeds.  And I do like having pfSense on an old desktop.  It has worked great for several weeks now for the local network. May I ask how you were able to get it to work with pfSense?  I've followed the tutorials in the sticky link on this, but I can't seem to make it work. Thanks for any words of wisdom you may have!
  • Openvpn s2s automatic reconnection after link loss?

    6
    0 Votes
    6 Posts
    2k Views
    K
    ok. thanks, now I understand, /32 has to put in the list. I have one more concern: currently we are using  2.1.2-RELEASE of pfsense. and quagga we are using: 0.99.22.3 v0.6.1. With my previous setup where I turned on accept filter in OSPF interface config on openvpn interfaces and setup /28 filter subnets in quagga OSPF main page we had the problem when a link went down and ospf neighbour has gone the Quagga Zebra service stopped. So all routes via OSPF have gone. I was not able to manually start Quagga Zebra daemon, till I remove the accept filter setting on openvpn interface in Quagga interface configuration section. Did you experience something similar? I can reproduce this error anytime. Thanks for help, klajosh2
  • Wan ICMP not reaching Inside LAn

    1
    0 Votes
    1 Posts
    682 Views
    No one has replied
  • All tap-windows adapters on this system are currently in use

    3
    0 Votes
    3 Posts
    4k Views
    T
    I used the client export utility on pfsense's web management page, and yeah I think it installed the adapter.  I uninstalled OpenVPN and reinstalled it and its working, for now.  Not sure what happened.  I installed it exactly the same way the first time around.  Hopefully it continues to work.
  • Unable to access LAN machines over OpenVPN

    13
    0 Votes
    13 Posts
    4k Views
    P
    Marvosa, you're right I very well may be using the wrong solution.  If there is a better way to go about it I am completely open to it, and in fact if there's a way to have anything that connects to my VPN just be directly on the same subnet that's what I want but haven't found a way to do so yet.  Thanks again, and here is the server1.conf. (I removed my public IP, but everything else is untouched.) Edit:  After looking into what you said, I'm pretty sure I do just want it bridged.  I don't want them to be segregated in any way.  I'm tinkering with it trying to set the "Device Mode" to "tap" without much luck yet. dev ovpns1 dev-type tun tun-ipv6 dev-node /dev/tun1 writepid /var/run/openvpn_server1.pid #user nobody #group nobody script-security 3 daemon keepalive 10 60 ping-timer-rem persist-tun persist-key proto udp cipher AES-128-CBC up /usr/local/sbin/ovpn-linkup down /usr/local/sbin/ovpn-linkdown client-connect /usr/local/sbin/openvpn.attributes.sh client-disconnect /usr/local/sbin/openvpn.attributes.sh local <my public="" ip="" is="" here="">tls-server server 192.168.2.0 255.255.255.0 client-config-dir /var/etc/openvpn-csc username-as-common-name auth-user-pass-verify /var/etc/openvpn/server1.php via-env tls-verify /var/etc/openvpn/server1.tls-verify.php lport 443 management /var/etc/openvpn/server1.sock unix max-clients 10 push "route 192.168.1.0 255.255.255.0" ca /var/etc/openvpn/server1.ca cert /var/etc/openvpn/server1.cert key /var/etc/openvpn/server1.key dh /etc/dh-parameters.1024 tls-auth /var/etc/openvpn/server1.tls-auth 0 comp-lzo</my>
  • OpenVPN Range of IPs Assigned

    9
    0 Votes
    9 Posts
    3k Views
    E
    By the way, you mentioned that allow dup connections wasn't that great because if one connection was compromised it would mean re-issuing all….  I would only be using the dups for classroom work then probably deleting and making a new ones after class (a day to two) anyway so it doesn't matter...  The ones that will be persistent will be unique. Make sense?
  • 0 Votes
    3 Posts
    929 Views
    V
    What you mean by " setup route on the box to point to pfsense". I'll describe better the topology: I have some computers with 192.168.0.x subnet and the DG 192.168.0.254. This DG routes to another subnet inside another LAN so i also cannot touch it. Pfsense has internal interface 192.168.0.253 and the external one connects it outside. I setup VPN in order to access 192.168.0.x subnet but because Pfsense is not their DG I cannot access them. Any ideas how I can do it? Thanks.
  • OpenVPN best practices

    4
    0 Votes
    4 Posts
    3k Views
    V
    I'm also running on an Atom D525 with 4GB memory. My Internet connection is only 30mbit down so I am not pushing it by a long shot. Look around on this board or in the hardware section for what other people are running. I am however waiting on a supermicro board with a E3-1220v3 to replace it with. Traffic shaping completely kills the Atom processor. Also the Realtek nics cause high interrupts. Time to get a real server. :) So unless you have a 100mbit connection or want to do traffic shaping you'll be fine with the Atom. You already have the hardware so try it for yourself. Regarding PIA,  I am extremely satisfied with them. I am using them for over 6 months now and I have always been able to saturate my connection. There is some extra lag because of the VPN but not much.  There is someone in my house playing online shooters and he doesn't know he is playing through a VPN.  :p I'm also streaming Netflix over the VPN and it has never failed on me.  On really busy moments like Friday night it might reduce stream quality but I ask myself if that would happen without a VPN too. Please use the latest release of pfsense, there was some bug in versions prior to 2.1.2 where the webgui lost track of the openvpn proces. The tunnel was still working it just showed as down in the webconfigurator.
  • Official, Up-to-Date Method for Extending Subnet?

    1
    0 Votes
    1 Posts
    699 Views
    No one has replied
  • Openvpn manager update

    3
    0 Votes
    3 Posts
    1k Views
    R
    so is there a way in the current version that comes with pfsense to run scripts when the tunnel is as map network drives automatically when the connection is live and disconnect them when the connection is disconnected pls? I know you can do that with the normal openvpn-gui which works like a charme on xp but I am using wi 7 and do not want to have to click run as everytime  :-( Cheers, Raj
  • Duel VPN - In and Out

    8
    0 Votes
    8 Posts
    1k Views
    B
    @kpa: I think that I know what is happening with your problem. When the VPN client is active on your server it overrides the default gateway but does not replace it, this is where the 0.0.0.0/1 and 128.0.0.0/1 entries in your routing table come from. When you try to connect to your own VPN service the packets come in via the WAN interface but the replies are not sent back via the same WAN interface because of the two routes installed by the VPN client connection, the two routes are more specific than the actual default route so they will be selected for all traffic sent out from the system instead of the default route. This means the replies to connection requests to your VPN service are routed via this VPN client connection and don't make back to the source. I'm not yet sure how to fix it but at least that's what I think is happening. Edit: You have the firewall rule on WAN interface that allows the incoming OpenVPN connections to WAN interface, UDP port 11194. Change the gateway option on that rule to be the gateway of the WAN network instead of the system default. Thanks, that's pretty much what I thought was going on, I just wasn't sure how to address it. @heper: try to add this to your ovpn-client advanced field: route-nopull assign the ovpn-client as an interface, configure the necessary rules. It should automagically create a gateway for it. This gateway could then be used in your firewall rules on LAN/ovpn-server/… this should disable the default-gateway override. Don't do this remotely … you will probably lock yourself out once or twice ;) I think that is exactly what I was missing.  I added that code to the advanced options, disabled my default LAN route, added a new LAN route specifying the VPN as the gateway and now it seems to work as desired.  I'll have to test it out some more, but initially I believe this has done it.  Thank you very much!!
  • 0 Votes
    9 Posts
    2k Views
    S
    nb, update. my vpn tunnels have not lost connectivity in over 24 hours. not sure why. thanks, Sean
  • Can't access Radius server on LAN

    3
    0 Votes
    3 Posts
    2k Views
    R
    corp network         |         | pfsense (192.168.60.10) WAN (additional fully external ip resolves to here)         |         | pfsense lan interface (192168.1.1)         |         | Windows radius server (192.168.1.10) OpenVPN Config: Server Mode: Remote Access (SSL/TLS + User Auth) Backend for Authentication: RADIUS Protocol: tcp Device Mode: tun Interface: WAN Local Port: 443 System: Authentication Servers Settings: Hostname or ip: 192.168.60.10 Shared Secret: pasted over from radius server Auth Port: 1812 Accounting Port: 1813 Auth Timeout: 500 Before when I would manually enter a bad password it would show up in the radius server logs.  This time using wireshark, I can't detect that any traffic is even making it to radius.  I can verify with captures that it is reaching the openvpn server.  I think somehow openvpn can't reach the radius server and it is timing out and failing. Like I said I have all rules down trying to figure out why, any help is appreciated.  Pretty sure its something really simple I am just not seeing. Also forgot to add, I didn't change anything about the NPS config from the working connection to the non-working connection.  Still have it set to receive requests from 192.168.60.10. OpenVPN Log: May 21 11:33:38 openvpn: user 'clarkdori' could not authenticate. May 21 11:33:38 openvpn[52966]: 64.134.31.222:63010 WARNING: Failed running command (–auth-user-pass-verify): external program exited with error status: 255 May 21 11:33:38 openvpn[52966]: 64.134.31.222:63010 TLS Auth Error: Auth Username/Password verification failed for peer May 21 11:33:38 openvpn[52966]: 64.134.31.222:63010 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) May 21 11:33:38 openvpn[52966]: 64.134.31.222:63010 TLS Error: TLS handshake failed May 21 11:33:38 openvpn[52966]: 64.134.31.222:63010 Fatal TLS error (check_tls_errors_co), restarting May 21 11:33:38 openvpn[52966]: TCP connection established with [AF_INET]64.134.31.222:63012 IPV4 Tunnel 192.168.2.0/24 IPV4 Local 192.168.1.0/24
  • Yealink T22P + OpenVPN: Can't hear the remote phone user

    8
    0 Votes
    8 Posts
    3k Views
    A
    Hi all, OpenVPN tunnel is working. After 20 sec. the communication is cut by the PBX because it has no answer to some of its packets. I suspect that pakets sent to 10.0.2.10 (the phone at the other end of the tunnel) are not handled properly (either when sent or received). Is there a firewall rule I'm missing for any kind of packets sent from our local network to the remote phone in the VPN tunnel? As for the packets that looks like they are coming from the external WAN/public IP of the remote phone instead of its tunnel IP address, I simply by-passed by adding rules to accept all WAN traffic. But this is not the solution I expected. Thank you for any help. Best regards, Alexandre Leclerc
  • OpenVPN won't start.

    3
    0 Votes
    3 Posts
    2k Views
    M
    look: https://redmine.pfsense.org/issues/282 perhals helps
  • OVPN over TCP - tcp-nodelay

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Can't access pfSense over VPN

    6
    0 Votes
    6 Posts
    3k Views
    A
    Ok, this was a silly problem.  I have a multi-wan gateway and a firewall rule that directs anything that is destined for port 80 or 443 and is NOT destined to one of my local subnets to use the mult-wan gateway.  I had forgot to add the VPN remote network to my local subnet alias so it was going out the multi-wan gateway and getting lost.  All is working perfectly now.
  • Help with setting up pfSense as OpenVPN Gateway

    2
    0 Votes
    2 Posts
    2k Views
    M
    Well it looks like it was a routing issue. Lesson here is to ensure that you put all the options provided by your VPN provider from the ovpn file into the advanced section pfSense OpenVPN cleint configuration.  Is was only when I attempted a traceroute from pfsense that I realized there was an issue with routing.  This is of course on top of following all the published guides on this. Once I put the following, based on the ovpn config file, it resolved the routing issues. SAMPLE ONLY (You will need to use whatever setting is provided) persist-key;persist-tun;verb 4;reneg-sec 86400;tun-mtu 1500;route-method exe;route-delay 2 redirect-gateway def1;comp-lzo no;explicit-exit-notify 2;fragment 1390;mssfix 1390;hand-window 30 Thanks, Marco
  • Route all Internet Traffic through OpenVPN

    4
    0 Votes
    4 Posts
    2k Views
    M
    I am confused, i dont see that option. I am setting a firewall rule on site b on LAN side. But in gateway all i see is WAN
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.