• 0 Votes
    2 Posts
    367 Views
    A
    Regression #13613 sounds like a valid explaination: "It looks like the problem is that we send a SIGTERM to openvpn, but don't wait until it actually exits before destroying the interface. That it turn causes it to not actually exit, breaking the subsequent openvpn instance." Though this was for 23.01, it may have been introduced with 2.7 as well, as i did not have any such issues as long as we were on 2.6.
  • OpenVPN client for only one physical pfSense port

    9
    0 Votes
    9 Posts
    2k Views
    T
    @CyberMinion Worked like a charm. I had tried creating the deny rule but didnt know about the 'Do not create rules when gateway is down' setting. Thank you!
  • Site to Site with Shared key gateway bug

    3
    0 Votes
    3 Posts
    537 Views
    C
    @Bambos viragomann just refereed me to your post. Did you ever switch to Peer to Peer SSL/TLS instead of Shared Key? And if you did, did it help? Here's my finding so far - https://forum.netgate.com/topic/183854/open-vpn-2-7-site-to-site-odd-routing-issue/11
  • pfSense 2.7.0 CE loses randomly routes for OpenVPN clients

    1
    0 Votes
    1 Posts
    233 Views
    No one has replied
  • Can a remote access VPN be used when onsite

    3
    0 Votes
    3 Posts
    416 Views
    C
    @viragomann Thank you, sir! I will be implementing next week.
  • 2.7.0-CE not working when more than one openVPN server is configured

    3
    0 Votes
    3 Posts
    499 Views
    L
    Ha, that did it :-) Thanks a lot. We created a new server cert, installed it and were bitten by the 'VERIFY KU ERROR' bug when restarting the openVPN :-( The certificate had been used on both servers ..... We got that fixed and updated to 2.7.0 without a problem :-) Now considering getting a paid licence ;-)
  • Advanced config > Custom options > LINE FEED not saved.

    2
    0 Votes
    2 Posts
    328 Views
    S
    The solution to this issue is: read the fine print. "Enter any additional options to add to the OpenVPN server configuration here, separated by semicolon." So I made the following changes: push "route 172.31.4.0 255.255.255.0"; push "route 172.31.40.0 255.255.255.0" Mind the semicolon at the end of the first line. Thank you for letting me use this forum as a Rubber Duck
  • 2.7.0-RELEASE (amd64) Static IP configuration for OpenVPN clients

    2
    0 Votes
    2 Posts
    227 Views
    marcelobeckmannM
    @rustem To assign a specific IP address to a VPN client, I use the "Client Specific Overrides" tab, it's where you can select a client by its "Common Name" (the client certificate name, ou the username for VPNs utilizing password authentication), select the VPN server in the Server List, and can use the ifconfig-push directive at the end of the page, in Advanced field. Also, the netmask that you put in ifconfig-push seems wrong, you put 255.255.255.255 instead of 255.255.255.0 (the netmaks of your tunnel network).
  • asterisk/issabel mute voice

    4
    0 Votes
    4 Posts
    573 Views
    W
    [image: 1698781168109-8bd9b26d-a50f-441e-8a69-9367336b8157-image.png] Resolved! I added the VPN range (Add Local Network Field).
  • 0 Votes
    1 Posts
    533 Views
    No one has replied
  • NordVPN and pfsense 23.05.1 on 1100 (tunneling)

    5
    0 Votes
    5 Posts
    632 Views
    D
    @CyberMinion That was just a manual ping from ssh. The 1100 is a little underpowered (CPU-wise), so I've noticed it can take several minutes, but sometimes it will start working. Other times, it gets hung up and won't connect. So, I believe maybe my settings are correct, but it is just a little slow to get going, plus sometimes it just has trouble and reloading the process or rebooting fixes it, but it's not very quick, so it's just difficult to troubleshoot....? My 4100 is instantaneous and works every time. I recently also reflashed/upgraded my 1100 to see if that would help, but again, I think part of the problem is that it is underpowered. Just switching between tabs/pages is a little slow, not terrible, but an indication of it's low resources. I'm not trying to be critical, the 1100 works fine once you get everything set, but troubleshooting is a little tedious.
  • Network Disconnection in Client Machine after 1 hour

    6
    0 Votes
    6 Posts
    4k Views
    DerelictD
    There have been updates to this strategy. Since this was posted, OpenVPN has introduced the --auth-gen-token option. All that is necessary is to add auth-gen-token; to the server's custom options. No client reconfiguration is necessary. Here is the section from the OpenVPN documentation: --auth-gen-token [lifetime] After successful user/password authentication, the OpenVPN server will with this option generate a temporary authentication token and push that to client. On the following renegotiations, the OpenVPN client will pass this token instead of the users password. On the server side the server will do the token authentication internally and it will NOT do any additional authentications against configured external user/password authentication mechanisms.The lifetime argument defines how long the generated token is valid. The lifetime is defined in seconds. If lifetime is not set or it is set to 0, the token will never expire. This feature is useful for environments which is configured to use One Time Passwords (OTP) as part of the user/password authentications and that authentication mechanism does not implement any auth-token support.
  • openvpn causing resolver performance issue?

    9
    0 Votes
    9 Posts
    998 Views
    M
    @johnpoz @johnpoz said in openvpn causing resolver performance issue?: its possible your vpn is causing pain as well with trying to resolve, maybe they filter other dns?? confirmed they do not filter anything I can find. pretty much just pass whatever traffic you send on through. @johnpoz said in openvpn causing resolver performance issue?: I would let unbound either just use your normal isp connection to resolve, or if you set on using it through your vpn. Set unbound to only use that interface for its outbound, or just set it to forward to your vpn services dns server. ISP direct resolution would present a dns leak scenario on the vpn. not an optimal configuration. I tried changing the resolver interface binding, and it had no effect on the behavior. @johnpoz said in openvpn causing resolver performance issue?: But the fact of just running a vpn service on your wan would/should/could not have any effect on unbound resolving.. That don't have anything to do with each other. I rebuilt everything from factory default last night. only difference is i setup the vpn server before i defined and configured the clients for my vpn service. everything functioning exactly as before with all dns traversing the vpn service. (no forwarding, so using root servers still) The issue went away. Don't really understand what was happening but would like to. I have a backup of the broken configuration. I might bring it up on a vm and investigate further. What you describe about a timeout scenario, seems to make a lot of sense. Just have no clue what would be timing out at the moment.
  • Firewall OpenVPN Peer-to-Peer Networking with same IP Address sub-network

    5
    0 Votes
    5 Posts
    826 Views
    planedropP
    @Bot I personally would say go with IPsec when you can, OpenVPN is cool and all but IMO just not the same vs IPsec or WireGuard, which are my two go to options. OpenVPN certainly is overall more configurable (not to be confused with capable) than the other 2 but it ends up being harder to setup, slower, and more complex. But yeah this should be doable either way by using NAT, it's basically the only way to get two identical subnets talking over a VPN.
  • Routing Internet Traffic via s2s client

    3
    0 Votes
    3 Posts
    380 Views
    V
    @alkisg You need to configure a VPN > OpenVPN > Client Specific Override for this client to route traffic to it. In the CSO state a certain tunnel IP for this client and set the whole network range at "Remote Network/s". For IPv4 enter "0.0.0.0/0". Also in the server settings enter "0.0.0.0/0" at "IPv4 Remote network(s)".
  • OpenVPN Traffic not blocked anymore on default setting

    2
    0 Votes
    2 Posts
    343 Views
    V
    @w-hackl Rules have to be defined on the incoming interface in pfSense. Traffic from a client side LAN device enters the LAN interface, goes out on the OpenVPN and enters the VPN interface at the server side. So you can either block it on the clients LAN or on the server VPN interface.
  • ExpressVPN Doesn't Work in The Latest Version

    1
    0 Votes
    1 Posts
    219 Views
    No one has replied
  • OpenVPN Client and remote network

    5
    0 Votes
    5 Posts
    660 Views
    J
    @viragomann ok, the subnet is the only parameter that I can change on the OVPN Server, I will set a /30 and I will let you know
  • OpenVPN PHP Wizard

    4
    0 Votes
    4 Posts
    829 Views
    S
    @johnpoz Looks like 23.09 is going to be out soon. https://docs.netgate.com/pfsense/en/latest/releases/23-09.html
  • site to site not working loc to loc

    11
    0 Votes
    11 Posts
    1k Views
    M
    @viragomann hi, your solution work! thanks!
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.