• How to specify a pool of IPs to use in client specific overrides?

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    @Kei: Could someone suggest a working solution for this problem? The correct answer is: Three different machine accounts or certificates. There isn't a good way (or perhaps any way) to accommodate one client with three static addresses in the way you describe. It's far easier and far more secure to configure them one account per device if they must use them simultaneously.
  • OpenVPN and Dual WAN Failover

    9
    0 Votes
    9 Posts
    6k Views
    A
    @jimp: If it's for an OpenVPN client, a gateway group should work OK, provided that it's a failover group (only one gateway per tier), though you might have an issue if the group prefers a WAN that isn't your default gateway. Could you elaborate on why this is (and possible workarounds)? I have exactly this set up and I'm running into issues with the client ending up on the default gateway even though it's using a gateway group that prefers a different WAN interface before failover to the default.
  • One of the stickies doesn't work :(

    1
    0 Votes
    1 Posts
    729 Views
    No one has replied
  • Trying to set up pfSense with OpenVPN and only Tor works

    1
    0 Votes
    1 Posts
    940 Views
    No one has replied
  • OpenVPN performance boost observation

    3
    0 Votes
    3 Posts
    3k Views
    R
    Well, site-to-site connections provided by OpenVPN on pfSense certainly qualify for that option. Plus, the option can be used on pfSense as server, while Windows clients can stay as they are (without this option).
  • OpenVPN with LDAP: questions

    2
    0 Votes
    2 Posts
    1k Views
    A
    Hi, I think I found the answers to my questions and probably someone will find it helpful. On the OpenVPN Server's setup page there is an option to force to check if the user name = certificate's Common Name. If I leave it unchecked the exported client can be used by any user given the user is in AD. I have not tested this scenario but I think it will work. In our case as we have 5-6 users of VPN I preferred to use the local database. The confusion on how to attach an existing user certificate to a particular user is due to the fact that in order to attach an existing certificate to a user first it is required to create and save the user then edit the user and attach the existing certificate. It is also possible to create a user and generate a corresponding attached certificate by checking that option at the time of creating a user. The problem with this option is you can't edit the details in the certificate (for example the email address) and the details of the CA will be used for the certificate.
  • LAN access to VPN clients

    5
    0 Votes
    5 Posts
    5k Views
    johnpozJ
    I went over some of the bad things with it in your other thread where you mentioned it.  But for another one with tap as you mention you get the same network.  This can be a problem if the remote location your at happens to use the same network which is very common with 192.168.0 and 192.168.1/24 etc. As to openvpn being blocked, that would have nothing to do with if using tap or tun.
  • Site to site problem

    5
    0 Votes
    5 Posts
    1k Views
    J
    I've ran Wireshark on my system and the "expert" information shows reassembly error protocol tcp Attached some screenshots Also, packet capture between the two freepbx shows bad checksum only from remote site to head office. 192.168.185.8.4569 > 192.168.175.21.4569: [bad udp cksum 0xe996 -> 0xb1ab!] UDP, length 14 192.168.175.21.4569 > 192.168.185.8.4569: [udp sum ok] UDP, length 14 ![Wireshark capture.png](/public/imported_attachments/1/Wireshark capture.png) ![Wireshark capture.png_thumb](/public/imported_attachments/1/Wireshark capture.png_thumb) [image: Expert.png] [image: Expert.png_thumb]
  • Access to LAN behind pfSense OpenVPN client from OpenVPN server

    9
    0 Votes
    9 Posts
    3k Views
    D
    After carefully reading the site-to-site example, I decided that the best thing to do would be to re-vamp my server configuration and see if I can establish a site-to-site connection. I am going to try this at some point today, I'll report back with issues. Edit 1: I believe I have created a site-to-site VPN between my pfSense router and my Debian VPS; the VPN tunnel will connect, but I am still unable to ping the LAN behind the pfSense router from the Debian VPS. When I reviewed the pfSense logs, I located the following error message:``` ERROR: FreeBSD route add command failed: external program exited with error status: 1 Here is the server configuration: Server listening port and protocol local 80.1.1.1 port 10000 proto udp dev tun Set the OpenVPN subnet mode server tls-server topology subnet server 10.30.0.0 255.255.255.0 ifconfig 10.30.0.1 10.30.0.2 route 10.0.1.0 255.255.255.0 client-to-client Misc. IP and security settings script-security 3 persist-key persist-tun Server certificates ca ca.crt cert server.crt key server.key dh dh1024.pem Encryption and compression settings cipher BF-CBC comp-lzo adaptive Used for setting static IP addresses on connected clients client-config-dir /etc/openvpn/static_clients OpenVPN server logging settings keepalive 10 120 status openvpn-tunnel-status.log verb 3 And here is the pfSense client configuration: dev ovpnc3 verb 1 dev-type tun dev-node /dev/tun3 writepid /var/run/openvpn_client3.pid #user nobody #group nobody script-security 3 daemon keepalive 10 60 ping-timer-rem persist-tun persist-key proto udp cipher BF-CBC auth SHA1 up /usr/local/sbin/ovpn-linkup down /usr/local/sbin/ovpn-linkdown local 90.1.1.1 tls-client client lport 0 management /var/etc/openvpn/client3.sock unix remote 80.1.1.1 10000 ifconfig 10.30.0.2 10.30.0.1 route 10.0.1.0 255.255.255.0 ca /var/etc/openvpn/client3.ca cert /var/etc/openvpn/client3.cert key /var/etc/openvpn/client3.key comp-lzo adaptive resolv-retry infinite topology subnet Edit 2: I removed the``` route 10.0.1.0 255.255.255.0 ```command from the pfSense client configuration and re-enabled the``` iroute 10.0.1.0 255.255.255.0 ```command on the server in the client-specific overrides section. I reconnected the pfSense router to the Debian server after restarting the OpenVPN service and then connected to the Debian OpenVPN server from another machine. From the other machine, I was able to ping devices on my LAN [10.0.1.X] through the tunnel, but I am still unable to ping the LAN devices from the Debian server itself. Maybe I am missing an iptables rule…? Edit 3: I finally found that the issue has something to do with when the iptables command is passed. I found that if I remove the iptables command``` iptables -t nat -A POSTROUTING  -s 10.30.0.0/24 -o venet0 -j SNAT --to-source 80.1.1.1 ```after the pfSense client is connected and then re-issue the same command, I am able to ping the LAN behind the pfSense router without issue.
  • Routing between VPN client and LAN client

    6
    0 Votes
    6 Posts
    2k Views
    C
    Thanks , I found the problem I change the GW of 192.168.1.20 from 192.168.1.23 to 192.168.1.1 and permit firewall rules allow on WAN from any to 192.168.1.20 (specfic port). And now I can ping 192.168.1.20 from vpn client. But , I have another question , why I can not add static route , like "add net 172.16.0.0/26 192.168.1.1" to  achive my gole . It seems like it is the only way to change the default GW , if the clint build the connection with me , it should be "in firewall subnet" , am I right ? some client's GW with 192.168.1.247 have same situation.
  • Site to Site TCP Port 135 just will not pass

    10
    0 Votes
    10 Posts
    3k Views
    F
    @johnpoz: "I don't care how it works" Well how and the F do you expect to troubleshoot it then??  Clearly your seeing two traffic when talking to 135 in your sniffs.  Your seeing a connection and then an answer. 20:45:22.634883 IP 10.1.2.26.50351 > 10.1.1.15.135: tcp 0 20:45:22.635303 IP 10.1.1.15.135 > 10.1.2.26.50351: tcp 0 So your replication issue looks to me like you can not resolve fs01 which is what domain techlink.local I would suggest you run dcdiag on your DC and validate your dns is all good.  your portquery isn't even going to fs01, etc. Ok Johnpoz please move on to other threads. I have troubleshot it down to the issue. You are poking down other avenues that are unneeded. BTW, DUH. That prtqry was for the other server on the other side of the vpn. Anyone else please help. Thanks.
  • OpenVPN does not work

    2
    0 Votes
    2 Posts
    2k Views
    G
    your interface is correct in the OpenVPN config ? No routing issue ?
  • Can't SSH without '-o MACs=hmac-md5' option for SSH

    4
    0 Votes
    4 Posts
    2k Views
    johnpozJ
    Good catch, I took it pfsense was the server - but yeah now that I reread it, it could be a server behind pfsense that he is sshing too.  If that is the case then pfsense has nothing to do with it.
  • OpenVPN subnet topology routes

    9
    0 Votes
    9 Posts
    2k Views
    J
    Thanks for your help, seems the client didn't like being converted to tap, I recreated a new client config with the exact same data and it worked.
  • Port forwarding to clients of pfSense Remote Access Server

    4
    0 Votes
    4 Posts
    2k Views
    V
    Okay, I see one additional possible reason for this behaviour: the client uses another upstream gateway. So requests come through the vpn to the client, but responses are sent to its default gateway and will be blocked there. You can resolve this either by checking "Redirect gateway" in the server settings to direct the whole client traffic over the vpn (you can also do this just for this one client with client specific overrides) or you do outbound NAT for the traffic forwarded to this client and translate the source address to the interface IP. The latter has the disadvantage that the client doesn't see the original IP address.
  • Pfsense working with IPVanish over OpenVPN?

    1
    0 Votes
    1 Posts
    890 Views
    No one has replied
  • Internal NAT (from WAN to LAN)

    1
    0 Votes
    1 Posts
    561 Views
    No one has replied
  • Open VPN on CARP IP

    4
    0 Votes
    4 Posts
    916 Views
    S
    Many thanks for your replies.
  • Bypass Router VPN for certain IPs

    2
    0 Votes
    2 Posts
    1k Views
    T
    I just see this recently posted here: https://forum.pfsense.org/index.php?topic=118196.0 Will try that and post back if it does not work. Thanks. Tom. EDIT: That worked perfectly for me. I did just need to also disable the default LAN rule.
  • VPN port forwarding.

    7
    0 Votes
    7 Posts
    3k Views
    DerelictD
    When you test from your inside host it is connecting out WAN so that is the IP address it will be testing. You need to create a rule on LAN that policy routes that test traffic out OPT1 so that is the interface the test is done on.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.