• Client export list is empty on v 2.3.2

    14
    0 Votes
    14 Posts
    4k Views
    J
    OK, my bad. What I am trying to do is set up openVPN for access from iPhone (ios) I had it working but with a bunch of questionable errors in the log. I had created my .conf by hand.  I recently read here that the wizard needed to be used to make sure all was properly done. So started over and blew it by choosing peer/peer.  Lesson - don't do this stuff late at night.  :P My mistake was: setting up server for peer/peer tls instead of remote tls. creating a client, not necessary cause export creates it.  Changing server to 'remote tls' and going directly to client export gives me the missing part of the puzzle. Thanks for pointing me in the right direction.
  • Server A from VPN Client side cannot ping VPN Server IP.

    6
    0 Votes
    6 Posts
    4k Views
    7
    It looks like I might be having a more basic problem.  Attempting to create a basic interface bridge is failing.  Posted on the General category to get help on that. Did you have a procedure you followed for creating the VPN bridge?
  • [Worked Around] Limiting which users can connect to an OpenVPN Instance?

    13
    0 Votes
    13 Posts
    5k Views
    U
    I think the bottom line is that for some use cases we need to be able to manage groups at the VPN server level. The preferred solution is to use LDAP but LDAP is not a accessible for everyone. Having a LDAP to manage VPN permission is for a lot of us overkill. It adds complexity, cost, single point of failure etc … A simple workaround would be to install (package) a local LDAP instance on as a Local LDAP. Ideally this would be sync with the backup instance as well.
  • Selective routing and selective internet routing

    6
    0 Votes
    6 Posts
    1k Views
    DerelictD
    Yeah. Outbound NAT on WAN. Good deal.
  • Remote Access SSL/TLS OpenVPN without CA on pfSense

    15
    0 Votes
    15 Posts
    10k Views
    DerelictD
    A server certificate has this attribute: Netscape Cert Type:                 SSL Server The following extensions are non standard, Netscape specific and largely obsolete. Their use in new applications is discouraged. idk. See Also: man x509v3_config I am not 100% sure exactly what needs that to be present, but it's not pfSense. Maybe strongswan and openvpn. You will probably find it easier to keep the certificates on pfSense so you can use the client export utility but there is no requirement to do so. You do have to have the CA certificate installed on the firewall so openvpn can validate client certificates against it but you don't need the private key there unless you are going to generate/sign client certificates there. You will need to import the certificate and key parts as the server cert but they do not have to be generated on pfSense.
  • OpenVPN Server Service showing offline but can still connect.

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • How to let ONLY ONE interface use VPN?

    32
    0 Votes
    32 Posts
    13k Views
    P
    Fixed it, I had an old firewall rule from something I was experimenting with that was messing it all up. Works great as you suggested I configure it, thank you! If anyone's interested I was able to figure out the DNS leak issue and patch it by reading this thread: https://forum.pfsense.org/index.php?topic=66305.15
  • [Solved] OpenVPN Client to Access Subnet Behind OpenVPN Server

    11
    0 Votes
    11 Posts
    6k Views
    G
    Pfsense 2.3.2-p1
  • Can't delete OpenVPN client [BUG]

    3
    0 Votes
    3 Posts
    921 Views
    N
    @jimp: It shouldn't matter if you stopped/killed it. When you delete a client it is automatically stopped and removed. So nothing shows up at all under VPN > OpenVPN on the Clients tab now? There has to be something there or the status page couldn't see an entry to print in that way. VPN > OpenVPN > Clients is compleltly empyt no clients there. I will take a closer look when I get home.
  • [SOLVED] Site to site with vps server

    5
    0 Votes
    5 Posts
    2k Views
    D
    Thanks for the support! After your advice routing was ok, but clients that are behind pfsense respond only to the ping… no http, no ssh, nothing!!!! I thought it was some sort of firewall rule, but the problem was that pfsense is on a VM (kvm on very old proxmox1.9): solved with this https://doc.pfsense.org/index.php/VirtIO_Driver_Support Tanks
  • 0 Votes
    4 Posts
    4k Views
    jimpJ
    @vtulin: @jimp: On 2.3.3 we now have an option "No Preference and Adaptive Compression Disabled" which helps when dealing with picky clients. Which will remove accurance of this option in config? Thank you for response. When this option is selected, "comp-lzo" is not in the config, and it adds "comp-noadapt" to disable adaptive compression. OpenVPN can be picky in how the client and server interact across versions and when LZO is not compiled in. If you have no compression options in the configuration at all, it still enables it with adaptive compression because that's the current OpenVPN default (it wasn't always). And if you use "comp-lzo no" the far side won't understand that if it does not have LZO compiled in.
  • VPN issue 2 pfSenses in 1 network

    4
    0 Votes
    4 Posts
    990 Views
    V
    Yes, correct. The outbound NAT translate the packets source IP from origin VPN clients address to the FW2s LAN IP. So when the packets reach your LAN host, it seems the come from FW2 and it will response to FW2 where the destination address of the packets is translated to the VPN clients IP. We've discussed this yesterday here: https://forum.pfsense.org/index.php?topic=120328.0 To use the same VPN tunnel subnet for both connections is definitively not a good idea. But that doesn't matter if you do NAT. Access from a VPN1 client to the FW2 management interface can also be enabled by an outbound NAT rule at FW1. Here you just need to enter the FW2s LAN address at destination.
  • OpenVPN firewall - blocking traffic

    2
    0 Votes
    2 Posts
    2k Views
    DerelictD
    Firewall rules are generally used to block connections coming into the firewall on an interface. If you want to stop hosts on LAN from making certain connections, then you place those block rules on LAN. If you want to block connections coming in from remote OpenVPN sites, you put those rules on OpenVPN. If you want to block connections going to a remote OpenVPN site, then either block them on the incoming interface (like LAN) or block them at the remote side inbound on OpenVPN. They are the ones "locking their door" against incoming connections. It's possible to block in the outbound direction using floating rules. If you think about the security aspects of what the firewall is supposed to be doing, this is really the only model that makes any sense. https://doc.pfsense.org/index.php/Firewall_Rule_Basics https://doc.pfsense.org/index.php/Firewall_Rule_Troubleshooting
  • Client IPs translated to LAN IPs

    7
    0 Votes
    7 Posts
    1k Views
    K
    Thanks so much viragomann for the explanation and kpa for the solution. It works as expected now.  :)
  • OpenVPN 2.3.2 and 2.2.6 differences TUNNEL SETTING

    5
    0 Votes
    5 Posts
    1k Views
    DerelictD
    You have to set Remote Networks on each side if you use shared key. The new CSS is more adept at hiding fields when they are not appropriate. Even if you could set them they would not work.
  • OpenVPN failover to WAN - And then back

    1
    0 Votes
    1 Posts
    490 Views
    No one has replied
  • IP Address Assignment

    3
    0 Votes
    3 Posts
    972 Views
    F
    Yes, thanks. Completely blew past that setting/working now
  • NordVPN question

    2
    0 Votes
    2 Posts
    2k Views
    U
    NVM I figure it out.
  • 0 Votes
    8 Posts
    1k Views
    P
    This is a lab VM inside my LAN so bogus IPs but same concept. http://imgur.com/a/nP8jc  Nat and Rules tabs. Have it setup like this in lab environment: OpenVPN (server) >> pfSense >> OpenVPN (client) Server and Client are Ubuntu. Is that what you were looking for?
  • OpenVPN client and MAC OS X losing local settings on Disco

    4
    0 Votes
    4 Posts
    808 Views
    DerelictD
    I don't see that with Viscosity.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.