• CREATE RULE NAT OVER OPEN VPN SITE TO SITE TUNNEL

    14
    0 Votes
    14 Posts
    2k Views
    C
    Thanks to this fantastic forum I was able to solve my problem. Thanks a lot to everyone and especially to @ viragomann
  • CREATE RULE NAT OVER OPEN VPN CLIENT.

    3
    0 Votes
    3 Posts
    732 Views
    C
    @viragomann Thanks very much for your support. Now I have been able to understand well how nat outbound works and how to set the rules. The passage to the rule works perfectly through the openvpn and my problem was related to the insertion of the door in the translation part. The pfsense forum is the place where thanks to very competent people you can find all the solutions. THANK YOU
  • pfsense Virtualbox guest openvpn server cannot reach Virtualbox host

    3
    0 Votes
    3 Posts
    724 Views
    R
    @viragomann The Ubuntu previously a NAT gateway + Virtualbox host + file server + others. Now I replaced the gateway role with pfsense VM. Maybe I can't restore the network setting of the Ubuntu. If so it is out of this forum. Thank you for your reply.
  • Public IP pass thru to vpn client

    11
    0 Votes
    11 Posts
    1k Views
    C
    @viragomann Ok thanks for the help I will try it out. Really appreciate all this info.
  • ISP - OpenVPN server with netgate 2100 behind and ISP router

    openvpn
    6
    0 Votes
    6 Posts
    1k Views
    S
    Thank you @bingo600 for your help, advice and clear information. I will implement it like you advice and give you a feedback :-) Thank you
  • PfSense OpenVPN Client to OpenVPN Access Server

    openvpn client
    1
    0 Votes
    1 Posts
    587 Views
    No one has replied
  • Site-to-Site VPN Tunnel Flagges in PCI Scan

    12
    0 Votes
    12 Posts
    2k Views
    P
    @parkerask_centuryci I had to remove the line to bring up my secure tunnels again today. Right now I have removed it till we can find a way to have the tunnels come back after the Firewall reboots in the morning. I do not want to have to do an hours work for it to come back for the day.
  • OpenVPM woes and hard crash

    3
    0 Votes
    3 Posts
    479 Views
    P
    @viragomann Nothing unusual AFAIK... (note that I grabbed the raw log so its chronological order (oldest lines first) May 29 07:43:34 pfsense openvpn[73684]: Validating certificate extended key usage May 29 07:43:34 pfsense openvpn[73684]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication May 29 07:43:34 pfsense openvpn[73684]: VERIFY EKU OK May 29 07:43:34 pfsense openvpn[73684]: VERIFY OK: depth=0, CN=gateway1.nordvpn.com May 29 07:43:34 pfsense openvpn[40473]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634' May 29 07:43:34 pfsense openvpn[40473]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' May 29 07:43:34 pfsense openvpn[40473]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key May 29 07:43:34 pfsense openvpn[40473]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key May 29 07:43:34 pfsense openvpn[40473]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 May 29 07:43:34 pfsense openvpn[73684]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634' May 29 07:43:34 pfsense openvpn[73684]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' May 29 07:43:34 pfsense openvpn[73684]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key May 29 07:43:34 pfsense openvpn[73684]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key May 29 07:43:34 pfsense openvpn[73684]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 May 29 07:46:45 pfsense openvpn[56921]: VERIFY WARNING: depth=0, unable to get certificate CRL: CN=gateway2.nordvpn.com May 29 07:46:45 pfsense openvpn[56921]: VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7 May 29 07:46:45 pfsense openvpn[56921]: VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA May 29 07:46:45 pfsense openvpn[56921]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA May 29 07:46:45 pfsense openvpn[56921]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 May 29 07:46:45 pfsense openvpn[56921]: VERIFY KU OK May 29 07:46:45 pfsense openvpn[56921]: Validating certificate extended key usage May 29 07:46:45 pfsense openvpn[56921]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication May 29 07:46:45 pfsense openvpn[56921]: VERIFY EKU OK May 29 07:46:45 pfsense openvpn[56921]: VERIFY OK: depth=0, CN=gateway3.nordvpn.com May 29 07:46:45 pfsense openvpn[56921]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key May 29 07:46:45 pfsense openvpn[56921]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key May 29 07:46:45 pfsense openvpn[56921]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 May 29 08:38:45 pfsense openvpn[56921]: write UDPv4: No route to host (code=65) May 29 08:38:45 pfsense openvpn[73684]: write UDPv4: No route to host (code=65) May 29 08:38:45 pfsense openvpn[40473]: write UDPv4: No route to host (code=65) May 29 08:38:46 pfsense openvpn[73684]: write UDPv4: No route to host (code=65) May 29 08:38:46 pfsense openvpn[40473]: write UDPv4: No route to host (code=65) May 29 08:38:46 pfsense openvpn[56921]: write UDPv4: No route to host (code=65) May 29 08:38:46 pfsense openvpn[40473]: write UDPv4: No route to host (code=65) May 29 08:38:46 pfsense openvpn[73684]: write UDPv4: No route to host (code=65) May 29 08:38:46 pfsense openvpn[56921]: write UDPv4: No route to host (code=65) May 29 08:38:47 pfsense openvpn[40473]: write UDPv4: No route to host (code=65) May 29 08:38:47 pfsense openvpn[73684]: write UDPv4: No route to host (code=65) The internet was down during that time because the VPN ceased to function.... Other than that, I dont think I had an outage, and the WAN was still up and connecting fine.... There's an ISP cable modem upstream of pfsense but its in dumb mode (bridge mode) and has been for many years without issues....
  • Look for support...

    3
    0 Votes
    3 Posts
    690 Views
    R
    @lasouris Our documentation has plenty of recipes: IPsec IPsec Site-to-Site VPN Example with Pre-Shared Keys IPsec Site-to-Site VPN Example with Certificate Authentication IPsec Remote Access VPN Example Using IKEv2 with EAP-MSCHAPv2 IPsec Remote Access VPN Example Using IKEv2 with EAP-RADIUS IPsec Remote Access VPN Example Using IKEv2 with EAP-TLS Configuring IPsec IKEv2 Remote Access VPN Clients IPsec Remote Access VPN Example Using IKEv1 with Xauth IPsec Remote Access VPN Example Using IKEv1 with Pre-Shared Keys Routing Internet Traffic Through a Site-to-Site IPsec Tunnel OpenVPN OpenVPN Site-to-Site Configuration Example with SSL/TLS OpenVPN Site-to-Site Configuration Example with Shared Key OpenVPN Remote Access Configuration Example Adding OpenVPN Remote Access Users Installing OpenVPN Remote Access Clients Authenticating OpenVPN Users with FreeRADIUS Authenticating OpenVPN Users with RADIUS via Active Directory Connecting OpenVPN Sites with Conflicting IP Subnets Routing Internet Traffic Through A Site-To-Site OpenVPN Tunnel Bridging OpenVPN Connections to Local Networks OpenVPN Site-to-Site with Multi-WAN and OSPF
  • Ipfire (server) peer to peer Pfsense (client)

    1
    0 Votes
    1 Posts
    340 Views
    No one has replied
  • Site to Site VPN same subnet

    5
    0 Votes
    5 Posts
    1k Views
    J
    @chrisjmuk Not too difficult to do. Use OpenVPN tap tunnel and do not assign a tunnel address. I do this with a trunk port because I needed 3 vlans going over to the second server. Follow this guide: https://docs.netgate.com/pfsense/en/latest/recipes/openvpn-bridged.html
  • Some warnings on OpenVPN client connections

    1
    0 Votes
    1 Posts
    421 Views
    No one has replied
  • Can't connect more than one airvpn client ...

    4
    0 Votes
    4 Posts
    816 Views
    M
    it was on a pc build. My mistake was to not choose a "tls-crypt, tls1.2" airvpn server. only those works on pfsense.
  • Restart openvpn service using Cron

    1
    0 Votes
    1 Posts
    373 Views
    No one has replied
  • Any AirVPN users?

    3
    0 Votes
    3 Posts
    1k Views
    N
    @jimphreak Is your pfSense an ARM Box or PC Build? I can't get it working on my SG-2100. My AirVPN posting How To Set Up pfSense+ for AirVPN.
  • Problems with airVPN and pfsense

    4
    0 Votes
    4 Posts
    2k Views
    N
    @apollo17 Is your pfSense an ARM Box or PC Build? I can't get it working on my SG-2100. My AirVPN posting How To Set Up pfSense+ for AirVPN.
  • How To Set Up pfSense 2.1 for AirVPN

    5
    0 Votes
    5 Posts
    2k Views
    N
    Is your pfSense an ARM Box or PC Build? I can't get ii working on my SG-2100. My AirVPN posting How To Set Up pfSense+ for AirVPN.
  • Different instances using different internal interfaces

    5
    0 Votes
    5 Posts
    764 Views
    J
    @hidepp Not really. I have no idea what you want to allow or deny, only you do. But to start, set both OpenVPN interfaces to allow all, then trim them down as needed. Always the easiest way to start.
  • VPN user auth with SSL./TLS + MFA

    1
    0 Votes
    1 Posts
    352 Views
    No one has replied
  • States killed when VPN user disconnects

    1
    0 Votes
    1 Posts
    360 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.