• Slow throughput when using Windows OpenVPN clients vs Linux

    1
    0 Votes
    1 Posts
    174 Views
    No one has replied
  • Accesssing a local subnet defined as an alias over LAN from OpenVPN

    1
    0 Votes
    1 Posts
    171 Views
    No one has replied
  • Upgrade 2.6 to 2.7 Open VPN broken

    Moved
    5
    0 Votes
    5 Posts
    661 Views
    V
    @stephenw10 Yes you are correct, I misunderstood myself. After my box crashed doing the 2.6.0 to 2.7.0 upgrade and eventually after getting 2.7.0 to work, I compared both xml backup files and only saw differences in time stamps, but now realise it's the import of updated packages that caused my problem. I'm running ZFS and will look at taking an image snap once I work out how to get from Pfsense to FreeBSD, out and back via a USB3 port. That suggests I need an external monitor, keyboard, and mouse on the box, unless it can be done through Pfsense GUI, but that won't work for recovery if the GUI has crashed. I've met these situations before and an image snap can only be trusted to work if you've actually used it successfully to recover. In the PC world I've trusted and used Acronis for years. Thanks for the link. I've always created bootable flash sticks and created matching config XMLs. Once the box crashes, I'm offline with no internet access to download anything or get help asking questions. I still keep an ISP Thomson box handy just in case. Thanks for your help - regards - Vox
  • SiteToSite only oneway

    5
    0 Votes
    5 Posts
    601 Views
    G
    Solved, since i'm using azure vm i'd to add route on azure portal. Thanks to all
  • 0 Votes
    1 Posts
    195 Views
    No one has replied
  • 0 Votes
    2 Posts
    312 Views
    B
    Update: I had the same issue today, configuring another client with the same topology. This time i had another pfsense 2.7.2 needed the extra routing on CSO when i created a remote access open VPN Server on the same pfSense. I lost access suddenly during configuration, and then i had to use again Client specific override for the VPN Tunnel in order to communicate again. Based on above, it seems that Open VPN inter-routing acting strangely. Is this a miss-configuration from my side, and i should always have that extra routing for the remote access tunnel ? or is a bug in the OpenVPN implementation on pfSense ?? Still i'm wondering why some instances working and some not. Please, awaiting for any comments and if someone faced that again in the past.
  • 0 Votes
    6 Posts
    750 Views
    V
    @Martek said in NAT from internet host through WAN to VPN connected host on specific tcp port: My posibility is to use "Client Specific Overrides" to adjust that end of the VPN tunnel. Yeah, the CSO is needed on the server to route the traffic to the proper client. But it doesn't do anything on the client side. However using "Client Specific Overrides" with "Redirect Gateway: Force all client generated traffic through the tunnel" to be set, doesn't change the result. I'd expect, that it would work with this option, presumed the route on the client is really added. This would route any upstream traffic from the client over the VPN, however, but not only responses on the forwarded requests. Is this, what you want? If so the outbound NAT rule on WAN for LAN2, you mentioned above, is needed to get internet access. For testing the routing, on pfSense try to ping the host in LAN2 from the LAN1 IP. Ensure that the firewall of the host itself doesn't block access from outside. Also check if the upstream traffic is routed over the VPN by accessing whatismyipaddress.com or something else showing you source IP.
  • monitoring certificate & CRL expirations

    1
    0 Votes
    1 Posts
    180 Views
    No one has replied
  • Can connect to OVPN Server and that's about it

    ovpn server firewall log
    15
    0 Votes
    15 Posts
    1k Views
    GertjanG
    @pfsblah said in Can connect to OVPN Server and that's about it: I can't give thumbs up Gave you one
  • open VPN with server internet

    2
    0 Votes
    2 Posts
    302 Views
    J
    It sounds like your VPN is successfully connecting, but it’s only routing traffic for internal access—not tunneling all internet traffic through the VPN server. To make sure all traffic, including public browsing, uses the VPN’s location/IP, you need to enable full tunnel routing. Here’s what you should check and configure: Server Configuration (server.conf or openvpn.conf) Add this line: push "redirect-gateway def1 bypass-dhcp" This tells the client to route all internet traffic through the VPN. Enable IP Forwarding on the VPN Server On Linux: echo 1 > /proc/sys/net/ipv4/ip_forward Or permanently in /etc/sysctl.conf: net.ipv4.ip_forward = 1 Configure NAT on the Server (iptables example) iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE Replace 10.8.0.0/24 with your VPN subnet and eth0 with your actual network interface. Client Configuration Make sure the client doesn’t override the redirect: Remove any pull-filter ignore "redirect-gateway" line Allow the server-pushed route If you're planning to serve multiple clients or rotate egress IPs, consider integrating proxy rotation on the VPN server side. This can be done with tools like a rotating outbound proxy pool or IPtables-based policy routing, especially useful for web scraping, testing, or anonymization scenarios.
  • OpenVPN PacketLoss

    1
    0 Votes
    1 Posts
    204 Views
    No one has replied
  • OpenVPN TOTP - 50X error on RADIUS authentication

    1
    0 Votes
    1 Posts
    215 Views
    No one has replied
  • OpenVPN connection stability issue

    1
    0 Votes
    1 Posts
    253 Views
    No one has replied
  • set up pfSense as additional gateway into VPNs

    37
    0 Votes
    37 Posts
    3k Views
    S
    The CSC seems to work when assigning a specific tunnel IP to the client. But it seems not to work for setting (all) the routes, and for limiting the access: The wish would be to set only one IP for the client to be routed etc I solved it for now by adding fw-rules on the OpenVPN-interface on the server side: allow traffic from tunnel-IP x.y to server-VM a.b.c reject traffic from tunnel-subnet to rest of server-LAN Seems to work right now, suggestions welcome ;-)
  • All flow should pass through VPN but IP conflict!

    5
    0 Votes
    5 Posts
    538 Views
    E
    @JKnott Yes your are right I am on vacation and it is not possible to change the local network. Changing my local network I will do it (but when I will be back at home) So I was trying to find a temporary bypass :-)
  • ssh home or ssh home.mydomain.net over OpenVPN

    3
    0 Votes
    3 Posts
    343 Views
    E
    @viragomann Thanks for help yes I set : DNS Default Domain "check valid" Provide a default domain name to clients DNS Default Domain "with" mydomain.net
  • OpenVPN doesn't start Multi WAN IPs

    7
    0 Votes
    7 Posts
    589 Views
    V
    @VioletDragon How did you configure the WAN IPs? I cannot think of any reason, why a OpenVPN server should not work on localhost with port 1194 forwarded from the WAN IP. Still waiting on the logs to see, what's the server complaining.
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    10 Views
    No one has replied
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    10 Views
    No one has replied
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    9 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.