• Cannot Access LAN using OVPN

    10
    0 Votes
    10 Posts
    2k Views
    P
    Yes, it should be easy to change LAN subnet: a) Change pfSense LAN IP b) Change pfSense LAN DHCP range c) Change OpenVPN server Local Network/s list - that cannot have things like LANnet specified, so it has a redundant 192.168.1.0/24 in it  :( d) Check your aliases in case you have any that included specific addresses in 192.168.1.0/24 and fix as needed e) Check your firewall rules for any specific uses of addresses in 192.168.1.0/24 (hopefully your rules all use aliases and/or the pre-defined LANnet and LANaddress - which will apply automagically) f) Diagnostics->Edit File, /cf/conf/config.xml, search for "192.168.1" and see what other stuff is left behind g) Change anything on LAN that has a static IP set (file server, print server, WiFi AP management interface…) h) Get all LAN clients to renew DHCP
  • 0 Votes
    3 Posts
    1k Views
    P
    I have multiple times with no success.
  • Routing problem on site-to-site connection

    9
    0 Votes
    9 Posts
    3k Views
    P
    It is normal - whatever address you NAT the site A subnet to, that needs to be an address that site C knows how to route back to. So you probably might want it to be some address in site B, which site C already knows how to reach.
  • Set –tun-mtu 1500 (currently it is 1532)?

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Unable to Communicate to anything within LAN connections

    4
    0 Votes
    4 Posts
    936 Views
    M
    Post a physical network map with IP's.  Post your openvpn config (server1.conf).
  • Cannot connect to LAN from VPN

    8
    0 Votes
    8 Posts
    2k Views
    M
    Post your server1.conf. Looking at what you've posted so far, it appears the tunnel is routing and allowing traffic as expected.  I'm betting your packets are making it to their destination, but getting blocked at the endpoint.  A couple things: Verify the device you are trying to ping is using PFsense as the default gateway Assuming you're trying to connect to a windows machine, remember the Windows Firewall blocks ICMP echo requests by default unless the traffic is sourced from the firewall's local subnet.  On Win 7/8 you have to either disable the windows firewall or add an explicit rule allowing ICMP echo from all IP's.  e.g. -> http://www.sysprobs.com/enable-ping-reply-windows-7 On Server 2008/2012, you can enable this inbound rule -> "File and Printer Sharing (Echo Request - ICMPv4-In)"
  • OPENVPN Server dies after 2.1.2 update, logs enclosed

    23
    0 Votes
    23 Posts
    9k Views
    C
    @deltix: I just had the same problem There are at least 2 if not 3 completely different and unrelated problems described by others in this thread. At least one where Snort was blocking the VPN, at least one other that's probably from delayed DNS resolution and the client getting started multiple times (which is fixed in 2.2), and probably different unrelated ones for others. Please start a new thread with specifics on what you're seeing happen, and what OpenVPN logs you're getting at the time.
  • Connected tunnel does not show up in the status page

    4
    0 Votes
    4 Posts
    1k Views
    M
    @kejianshi: Which version of pfsense? 2.2. I might have found the problem but don't know how to solve it cleanly. The problem is that the OpenVPN server lets the peer connect with the new IP address but changes to WAIT state (echo 'states' | nc -U /var/etc/openvpn/server1.sock shows it). I looked at the OpenVPN management interface documentation and the WAIT state should only happen in the client. To solve the problem for now I put 'keepalive 1 10' in both and this will restart the server 10 secs after the client stops responding. I've did some tests and after the PPPoE connection reset the client takes 15 secs before initiating a new connection to the OpenVPN server and, by then, the server already expired the connection. A peer-to-peer OpenVPN tunnel should only allow one peer IP address and not more. Anything wrong in my theory? Thanks!
  • Cannot reach LAN network via OpenVPN tun

    38
    0 Votes
    38 Posts
    16k Views
    K
    haha - Don't mention it.  Anything for you buddy (-; (No seriously - Don't mention it…  To anyone)
  • No Internet through VPN, LAN works

    19
    0 Votes
    19 Posts
    3k Views
    A
    Yes!  That works!  Thank You! :)  Im not sure if that entry got deleted somehow or what happened because I know at some point or another it did work just fine! Sweet!
  • OpenVPN Site to Site to Client issues

    2
    0 Votes
    2 Posts
    775 Views
    P
    Does the 10.0.6.0 site to site network need to be pushed to the client? No, the road warrior clients do not need to know about site-to-site tunnels, there is nothing in the tunnel that they need to reach specifically. I would tell the road warrior clients about the whole of 10.255.10.0/24 rather than tell them each individual IP with a /32. Do not use the advanced box any more to push routes, just put 192.168.0.0/24,10.255.10.0/24 in the IPv4 Local Network/s box in the road warrior server GUI settings page. Make sure the OpenVPN Firewall Rules tabs at either end are allowing traffic arriving from all the subnets at the other end. traceroute is your friend - you can quickly traceroute from a client to a server and see what hops the packet took, and where it stops. That will give you a clue if there is a routing issue or firewall block somewhere along the path.
  • OpenVPN passing DNS queries to BIND

    6
    0 Votes
    6 Posts
    3k Views
    ?
    I got this working in the end. I had to change the zone files to look at the new ACL as well as the View. I figured I was doing something daft. Thanks for pointing me in the right direction.
  • OpenVPN connection problem

    8
    0 Votes
    8 Posts
    6k Views
    M
    OK. I finaly made this work. My client config look like this: dev tun persist-tun persist-key cipher AES-256-CBC auth SHA1 tls-client client resolv-retry infinite remote openvpn-server.org 443 tcp-client http-proxy proxy-dns-or-ip.org 8080 proxy-uyser-and-pass.txt basic lport 0 verify-x509-name "pfSenseOpenVPN" name auth-user-pass pkcs12 mirceass-TCP-443-SSL_VPN.p12 tls-auth mirceass-TCP-443-SSL_VPN-tls.key 1 ns-cert-type server comp-lzo And "proxy-uyser-and-pass.txt" is in the C:\Program Files\OpenVPN\Config. On the first line is username, and on seccond line is password, for proxy Now it's working and I'm pretty happy. Thanks all and have a good day!
  • Incomming connection issue when using openvpn

    17
    0 Votes
    17 Posts
    3k Views
    A
    @Derelict: Note my first post on this thread. Thank you, I dont know how I missed that all the when ever I checked, that rule should of cause have a limited source address range, adding that it works perfect , thank you again
  • 0 Votes
    6 Posts
    2k Views
    M
    Im getting this error message when Im trying to install 1.5 liveCD. Any ideas why Im getting this error message? Im using a download from http://files.nyi.pfsense.org/mirror/downloads/ [image: IMG_0330.JPG] [image: IMG_0330.JPG_thumb]
  • OpenVPN client export utility on 2.2

    2
    0 Votes
    2 Posts
    1k Views
    D
    No. Wipe your browser cache. Frankly, not even clear what are you doing where. There are no buttons. Use the links in the export column. [image: 2ZSCevd.png]
  • OpenVPN Server not routing local websites

    23
    0 Votes
    23 Posts
    6k Views
    L
    Thanks for all the help.  I'll diagnose again in a bit.  Had an issue last night where my pfsense box froze and lost a few settings so i will have to go back in and fix everything up again. Should have configured autobackup…
  • Question about traffic routing through VPN

    3
    0 Votes
    3 Posts
    910 Views
    P
    Perfect thank you, not sure why that didn't come up when I did a search for PIA.
  • OpenVPN benchmarks for 7551?

    6
    0 Votes
    6 Posts
    1k Views
    E
    Hi Jimp: I have two FW-7551 devices set up, with an Ethernet cable directly connecting the WAN ports. They came pre-loaded with PFSense 2.2 and AES-NI is enabled in the BIOS on both devices. AES hardware support is also enabled in the System>Advanced>Miscellaneous section. I successfully built an OpenVPN tunnel through the devices using AES-128-CBC, SHA1 and the BSD Cryptodev engine. Oddly, the maximum transfer rate I can achieve with an encrypted tunnel is 100 Mb/s. The AES-NI support makes no difference in throughput. If I turn encryption off, the rate increases to 200 Mb/s. I changed many parameters in the Open VPN setup and turned AES-NI support in PFSense on and off, but the peak transfer rate stayed at 100 Mb/s. I do not have any explicit traffic shaping defined. I used two Windows laptops (one at each end of the tunnel) to exercise the link. When the computers were connected directly to the Ethernet switch, I saw transfer rates approaching wire speed (800-850 Mb/s). When connected via the tunnel, the rate was the previously mentioned 100 Mb/s. At this point I'm a little mystified, since I would have expected the transfer rate to be a little higher, especially with encryption turned off. Cheers, Ed
  • [SOLVED] Remote Access Clients not able to access remote S2S hosts

    12
    0 Votes
    12 Posts
    2k Views
    P
    @doktornotor: @phil.davis: If you use pre-shared key (PSK) then you can only have 1 client for 1 server and they authenticate by having a matching PSK. In that mode there is no way to tell the difference between multiple clients. One more reason to avoid PSK configs. ;) Ok, now I remember why… I followed a s2s guide that was using PSK... In my case it would have been better to use SSL/TLS and manage all with certs on one server ... next time will do better :) thanks anyone for the feedback (learnt something more today) now I have a much clearer view on the pfsense OpenVPN settings
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.