• Problems with StrongVPN

    2
    0 Votes
    2 Posts
    1k Views
    B
    Ok, after several hours of fiddling around I have sort of gotten it to work. Its a bit strange but after turn on comp-lzo in the advanced config it does seems to now work, ie if i go to whatsmyip.org it now shows as the strongvpn. It does seem to be quite slow and is constantly dropping…so this will require more work I feel but at least it is now working.. I hope this will help others who have the same problem.
  • Problem with OpenVPN connecting

    7
    0 Votes
    7 Posts
    3k Views
    P
    Yes, the wizard should create some decent rules to let traffic through. Traffic from the Windoes client should have a source IP in the tunnel network, so your extra rule should be a good thing. Post a screenshot of the rules you have on OpenVPN now.
  • Transparent firewall thru OpenVPN site-to-site?

    6
    0 Votes
    6 Posts
    2k Views
    F
    Itried switching to tap but get this error: openvpn[5474]: WARNING: Since you are using –dev tap, the second argument to --ifconfig must be a netmask, for example something like 255.255.255.0. (silence this warning with --ifconfig-nowarn)
  • OPENVPN Drops connection

    3
    0 Votes
    3 Posts
    2k Views
    C
    Sorry for the late reply.  I have been bogged down with work. So here are my answers: a) What is the server end? (another pfSense, an OpenVPN provider…) OpenVPN provider b) How do you specify the server end? (a DNS name, a static IP address…) DNS name c) What sort of failures do you see? (is it trying to reconnect every minute, but not succeeding, or has the OpenVPN client process died completely… - OpenVN logs) openvpn[12214]: RESOLVE: Cannot resolve host address: d) OpenVPN client conf file [color] <openvpn><openvpn-client><vpnid>1</vpnid> <protocol>UDP</protocol> <dev_mode>tun</dev_mode> <ipaddr><interface>wan</interface> <local_port><server_addr>vpn.myvpnprovider.com</server_addr> <server_port>1194</server_port> <resolve_retry><proxy_addr><proxy_port><proxy_authtype>none</proxy_authtype> <proxy_user><proxy_passwd><mode>p2p_tls</mode> <custom_options>auth-user-pass /etc/openvpn-passwd.txt;persist-tun;keepalive 10 60;</custom_options> <caref>5186a2372a50b</caref> <certref>5186a29ecfa1d</certref> <crypto>BF-CBC</crypto> <engine>none</engine> <tunnel_network><remote_network><use_shaper><compression>yes</compression> <passtos></passtos></use_shaper></remote_network></tunnel_network></proxy_passwd></proxy_user></proxy_port></proxy_addr></resolve_retry></local_port></ipaddr></openvpn-client> [/color]</openvpn> e) What type of physical internet connection do you have? and do you see any packet loss (e.g. on gateway monitor)? ADSL2 and no packet loss f) Anything else you think might be interesting about your setup. I have an interface setup as VPN and the routes setup accordingly.  Also I am using NAT to pass all LAN traffic through the VPN interface
  • Open VPN Communitcation issue - ping request time out

    4
    0 Votes
    4 Posts
    5k Views
    T
    @Linuxdump: Thanks ! But I already tried this no use still the same. I can see that I am missing something very small which I am unable to figure out. What could be the reason. Firewall rules are automatically created by the pfsense oprn vpn configuration wizard. Help me to resolve this issue! two additional things, 1. if you configured the VPN server and exported vpn client , and right after it made small change to vpn server like for example  added Compress tunnel packets using the LZO algorithm. you either make the change in the vpn client to adjust it or reexport it again to the user. 2. If your clients are win7 , make sure they are right click when they execute Openvpn client run as administrator other wisw they want be able to push routes
  • OpenVPN setup with bridging (tap)

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN HowTo for Yealink IP phones

    Locked
    9
    0 Votes
    9 Posts
    21k Views
    H
    @jimp: The OpenVPN client export package can export Yealink (and snom) format configs automatically now. Also most of the first steps can be avoided by simply using the wizard and at the end, change it from SSL/TLS+User Auth to just SSL/TLS. You don't need to create users, you can just create certificates for the phones under the cert manager (Cert tab, click +, "Create internal…" and select the right CA, then just fill in the cn and descr.) Is there a manual for your solution or do i have to stick to the one posted by sscardefield ? I'm kind of new to the whole vpn stuff and have 6 Yealink phones sitting on my desk waiting to get used via OpenVPN.
  • Remote Client (RoadWarrior) passwordless

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    S
    Thanks! It worked!
  • Existing setup/config confusion - NAT hiding while on OpenVPN

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Android Client

    Locked
    6
    0 Votes
    6 Posts
    2k Views
    A
    Interesting - but confused. Changed the mobile network to 10.0.8.0 so as to be VERY different to all other networks - and it works! No entries in firewall for blocked packets (as you would expect) Only slight funny is on Status/Openvpn - if you click the routing button it shows the connection details but it says that there should be a "C"  if currently connected - there is not - is this a funny from the 2.1 snapshot (using yesterday morning version) At this time I have only included etails of the local lan, defaut domain name and a DNS server together with the push route - is the general advice to inculde netbios/wins etc or just leave well alone? Andrew
  • Openvpn client redirect gateway for 1 network

    Locked
    6
    0 Votes
    6 Posts
    4k Views
    S
    Well… I did get it working, so for anyone wanting to try this out, here's how: 1/ make sure you get an OpenVPN client connection working 2/ assign an interface to this connection via Interfaces->Assign->click the + symbol->assign the interface to your OpenVPN client connection (typically ovpnc1) 3/ configure the interface: click Interfaces-><your_new_interface>->enable it & give it a sensible name (let's call it "MYVPN" for this example), choose "None" for IPv4 & IPv6, leave all other fields blank 4/ assign another interface to one of your physical ethernet ports (call this one "SECURELAN" for this example, and let's assume the physical interface is called re1) 5/ configure it again by enabling it and giving it a static IP (192.168.100.1 for this example) 6/ enable DHCP for this last new interface so your clients can get an IP address: Services->DHCP Server->SECURELAN->enable the interface & specify a DHCP-range (range  192.168.100.2 to 192.168.100.5 for this example) 7/ click Firewall->NAT->Outbound tab and add a new rule: select "MYVPN" for the interface, source = network 192.168.100.0/24, destination = any, translation = interface address 8/ choose "Manual Outbound NAT rule generation" (IMPORTANT!) & hit save & apply changes 9/ click Firewall->Rules, pick the "SECURELAN" tab and hit the + symbol to create a new rule: interface = SECURELAN, protocol = any, source = any, destination = any, gateway = choose MYVPN And you're done  8) Test that everything is working fine by connecting a client to your re1 interface with a LAN cable and doing a traceroute to a url of your choice. I'm going to be finetuning this a little more to check for DNS leaks & such, will post again when I've verified this. Hope this may help anyone wanting to route some traffic over their OpenVPN client connections. \m/</your_new_interface>
  • Issues with OpenVPN-Client

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Can I do something like this?

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    It is possible but the IPsec tunnel needs a Phase 2 entry that covers the path from the OpenVPN client network to the Server network.
  • Routing problem - Newbee question

    Locked
    22
    0 Votes
    22 Posts
    7k Views
    R
    Hi Guys, seems that the problem is solved. The main problem was to have the tunnel network inside the LAN which does not work. Reducing the LAN network and placing the tunnel network outside was the main fix. All other problems where a result of not having consequently changed all netmasks to the reduced LAN network on my guest operating systems. The two name servers had 255.255.0.0 as netmask, thats why they answered ping requests through the tunnel. The other boxes still had 255.0.0.0. All have now 255.128.0.0 and everything works fine. So many thanks again to all who helped me! Great work! Rumpi
  • Routing issue with multiple OpenVPN connections

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    M
    Post a network map, your server.conf's, your routing table and firewall rules and lets take a look.
  • Site 2 Site (S2S) tunnel up, but no traffic

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    M
    You shouldn't of had to create any rules… especially on the WAN side... the wizard should've taken care of that.  Do this on both sides: On the wan tab, pick a protocol, don't add both (unless you have a specific need for TCP, use UDP)... and the destination should be "WAN address": UDP|*| *| WAN address | 1194 (OpenVPN)| * On the OpenVPN tab, change your protocol to any: *| *| *| *| *| *
  • Open VPN TLS Error

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    M
    Just out of curiosity, what's with the funky port?
  • Connection errors when AD domain controller is off

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN client does not see IPSEC network

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    M
    Don't know if this is related or not but I was setting up OpenVPN due to my issues with speed with IPsec tunnels, you can read about them here http://forum.pfsense.org/index.php/topic,62457.0.html. Anyway I setup the OpenVPN and I was not getting communication from site to site even though I was absolutely sure I set it up correctly. After further inspection I was that I still had the IPsec configuration still setup for the remote site. This got me thinking, and I would love some clarification from anyone who knows for sure: IPsec has a lower cost than OpenVPN, in other words IPsec routes are preferred over OpenVPN? How about other VPN technologies that Pfsense supports, what are the order in which they will be used? Maybe this is your problem? Once you add the OpenVPN interface to your IPsec, you may then need to add a static route to use the IPsec tunnel? I know that it's not a good idea to have multiple tunnels going to the same site, but this is just good to know in the future for trouble shooting purposes.
  • OpenVPN - iOS 6 - VPN on demand with Custom SSL and IPCU

    Locked
    4
    0 Votes
    4 Posts
    5k Views
    N
    Hi again, I found some posts on the internet on which they say that apple disabled "VPN on demand" on newer versions of iOS or newley shiped devices. I found out that there is an iPhone Configuration Utility (IPCU) which can be directly downloaded on the apple webpage which allows the to create and set profiles on an iPhone. Setting such a profile works but I had problems to get "Custom SSL with VPN on demand" to get working with my pfsense OpenVPN server. The intention is that I setup the domains from my intranet as the e-mail server and when the e-mail app tries to connect to this URL the VPN connection will start. Instead of using "Push Mail" I would try to use automatic check by the mail app every 15min - hopefully the vPN will start when "VPN on demand" is configured correctly. Perhaps someone can help me to configure this with the help of the following tutorial: http://simonguest.com/2013/03/22/on-demand-vpn-using-openvpn-for-ios/ This is my iOS inline config from the pfsense export utility: persist-tun persist-key cipher AES-256-CBC tls-client client remote xx.yy.xx.yy 443 tcp comp-lzo nobind keepalive 5 30 <ca>-----BEGIN CERTIFICATE----- ..... -----END CERTIFICATE----- <key>-----BEGIN RSA PRIVATE KEY----- ..... -----END RSA PRIVATE KEY-----</key> <tls-auth># # 2048 bit OpenVPN static key # -----BEGIN OpenVPN Static key V1----- .... -----END OpenVPN Static key V1-----</tls-auth> key-direction 1</ca> Thank you for your help! –-- edit ---- I got it. My iPhone starts the OpenVPN connection to my pfsense OpenVPN server. The config I posted above is the one the OpenVPN Export utlity created. Follow the instructions on the URL I posted above - they are correct. I just had to modify some parameters on the config to get it working (Custom options with "key" and "Value": Export the CA.crt to your computer and replace every newline with  \n  to make it one line. (As described on the URL above) You need a password protected .p12 of the client certificate which contains .key and .crt. pfsense itself cannot do that from GUI. I exported the .crt and .key to pfsense /tmp. Then I ran the command on the webpage ( openssl pkcs12 -export -in client1.crt -inkey client1.key -out client1.p12 ) and set a password. I imported that new password protected .p12 into the IPCU. On the .ovpn config I exported from pfsense there is a part "tls-auth". I created this key in the custom options of IPCU and as value I did the same as for the "ca". everything in one line and every newline as   \n ca     –---BEGIN CERTIFICATE-----\nABCDEF112312.........\n-----END CERTIFICATE----- tls-auth     –---BEGIN OpenVPN Static key V1-----\nABCDEF112312.........\n-----END OpenVPN Static key V1----- comp-lzo     value persist-tun     value persist-key     value cipher     AES-256-CBC tls-client     value client     value key-direction     1 Push-Mail seems not to work with OpenVPN - probably because the VPN connection is in standby and will only be established if the iPhone app starts to check the E-Mails every 15min and so is using "VPN on demand". Will do some more tests with bigger delays to make sure iPhone awakes froms sleep with VPN and hopefully same will happen when disconnection the iphone from the USB data cable which I still have connected to view what is happening on my iphone in the IPCU cosole.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.