• Site to Site OpenVPN - Unable to ping remote subnet from local LAN

    2
    0 Votes
    2 Posts
    332 Views
    V
    @Sebastian_IT said in Site to Site OpenVPN - Unable to ping remote subnet from local LAN: Local network Range - 10.0.1.1/24 Remote network Range - 10.1.0.1/24 Tunnel network range - 10.2.0.1/24 No one of these is a network address! These are IP addresses. So edit you firewall rules and set correct network addresses as source and destination. BTW: In you firewall rule on server and client you have exactly the same address in source and destination. That doesn't make in sense at all.
  • Same ip subnet for two VPN

    openvpn
    10
    0 Votes
    10 Posts
    1k Views
    JKnottJ
    @johnpoz said in Same ip subnet for two VPN: Some other advice 192.168.1 is not a good choice to be honest.. This is very very common - say your at a starbucks or something needing to vpn in to your site and they are using 192.168.1 locally.. Now you have a problem.. Client thinks that your server 192.168.1.100 for example is just local - and won't send it down the tunnel to get to it. Yep, I had that problem years ago when I was staying at hotels. That's why I moved my LAN to 172.16.0.0. I have only seen that used elsewhere once.
  • OpenVPN not hitting Radius server

    2
    0 Votes
    2 Posts
    664 Views
    C
    I resolved the issues.... To start with, Windows Firewall was blocking the creation of the log file. When I disabled it, the file was created. What's odd is that I eventually enabled the Firewall and logging continued to work. Once there was a log file, I used IASViewer to sort out the log file. It showed me that the error was: "Did not match connection request policy". I checked the policy and found that for "Type of network access server" I had selected "Remote Access Server(VPN-Dial up)". Changing it to "Unspecified" resolved the issue.
  • Access device connected to 2nd router behind pfsense

    12
    0 Votes
    12 Posts
    1k Views
    D
    @johnpoz FML thanks for your help. I didn't click the enable check box on the port forward on the wrt.
  • Allow remote access vpn clients to connect across site to site vpn

    4
    0 Votes
    4 Posts
    448 Views
    V
    @jarrod1024 said in Allow remote access vpn clients to connect across site to site vpn: I dont see an option to add remote networks on the site B site to site config, only local networks. Never seen that! The "Remote Networks" box is available on all sort of site2site OpenVPNs, if its server or client, shared key or TLS.
  • OpenVPN - connected; can ping FW; no lan access

    12
    0 Votes
    12 Posts
    2k Views
    F
    @johnpoz Had a moment of weakness. Confused it with pinging TO localhost in terminal. Rookie booboo like we all do at times.
  • LAN Clients received IP from OpenVPN Remote Access Server

    1
    0 Votes
    1 Posts
    126 Views
    No one has replied
  • 0 Votes
    2 Posts
    381 Views
    JKnottJ
    @Rezoyen LIke any VPN, OpenVPN provides an encrypted tunnel over the Internet. This means the traffic cannot be read by unauthorized people. It can be used between offices, between a mobile device and home and some people use them to cover their tracks. There are commercial services for the last one.
  • OpenVPN + PiHole = Unknown Host

    1
    0 Votes
    1 Posts
    422 Views
    No one has replied
  • Custom Routing Options Conflict - OpenVPN stop run

    5
    0 Votes
    5 Posts
    593 Views
    jimpJ
    Show the exact entries you have in custom options, the errors you receive in the OpenVPN log, and the resulting OpenVPN config file from /var/etc/openvpn. Without knowing the exact input or what OpenVPN is claiming the error is, nobody can say for sure what the problem may be.
  • How do I circumvent my OpenVPN settings on certain devices?

    2
    0 Votes
    2 Posts
    306 Views
    KOMK
    You use firewall rules on LAN to control which gateway traffic from specified IPs/ports goes out. Make sure you place it above your Allow All rule.
  • local firewall

    4
    0 Votes
    4 Posts
    470 Views
    RicoR
    Welcome, glad you have it working now. -Rico
  • OVPN Ubuntu Compression

    1
    0 Votes
    1 Posts
    171 Views
    No one has replied
  • VPN subnet can't communicate LAN via HTTP

    3
    0 Votes
    3 Posts
    367 Views
    ?
    @Rico Since ping is working between pfSense and the VM, I believe routing is fine. But if you could let me know the way to check, I will do that and post the result here. Thanks.
  • All traffic passing through OpenVPN even if redirect gateway unchecked

    3
    0 Votes
    3 Posts
    267 Views
    P
    Please find below the result of netstat -rn4 : [image: 1572508771800-pfsense-openvpn-nat.png]
  • OpenVPN client access other network though IPSec site to site network

    5
    0 Votes
    5 Posts
    565 Views
    A
    @JKnott Thank you so much, finally fixed with the IPSec tunner phase 2 need a extra entry with the openvpn tunnel network (e.g 10.0.1.0/24) in site A an B, now the ipsec tunnel have two phase 2 entry one is local network and one is the openvpn tunnel network address.
  • Optimizing P2P (Shared key) VPN speed

    7
    0 Votes
    7 Posts
    917 Views
    KOMK
    @BlazeStar Install the iperf package on both pfSense nodes. Run one as client and the other as server. This will test the throughput from WAN to WAN. https://www.youtube.com/watch?v=D4KVh5sId54
  • Dynamic public IP and OpenVPN

    6
    0 Votes
    6 Posts
    2k Views
    V
    As already mentioned, how to configure WAN interface, depends on your ISP. However, as you stated above, your WAN is already working. So there is nothing to change for DynDNS. Get an account from a dynamic DNS provider. Then you can choce a hostname in given domains like yourhost.dyndns.com. Configure the Dynamic DNS service in pfSense (Services > Dynamic DNS > Dynamic DNS Clients). If it is set up properly it will update the dynamic DNS at provider every time your WAN IP changes. So you can configure you openVPN clients to connect to yourhost.dyndns.com. The hostname is ever the same, the IP behind may change.
  • 0 Votes
    2 Posts
    694 Views
    jwsiJ
    Are you using NAT to map OpenVPN clients to an outbound WAN address? If you're not using NAT for clients to access the LAN network, you may need a route in place on pfSense to direct traffic back to the OpenVPN clients... If you can be more specific with subnets in use and also show a copy of the routing table on pfSense that would be a good place to start...
  • Is this OpenVPN configuration possible?

    3
    0 Votes
    3 Posts
    409 Views
    jimpJ
    The most secure way is also the most convenient way: Use a separate OpenVPN server. Any time you need different levels of access, it's best to setup an isolated VPN structure (different CA & server cert, different server, different subnet, etc)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.