• Communication between OpenVPN clients. Problem…

    3
    0 Votes
    3 Posts
    1k Views
    M
    Thank your ! After I added 192.168.101.0/24 to remote networks in branch office,  all working fine! 102 addres - it was my error while i write this message.
  • OpenVPN bridge (peer to peer) connection problem

    10
    0 Votes
    10 Posts
    6k Views
    X
    For a working solution, have a look at reply #3 from phil.davis on this thread: http://forum.pfsense.org/index.php/topic,70066.0.html
  • Set one IP to use OpenVPN gateway

    2
    0 Votes
    2 Posts
    855 Views
    jimpJ
    Interfaces > (assign), assign the VPN and then enable it with an IP type of "none", then go back and edit/save the VPN to make sure it's started back up OK. After that you should see a gateway for the VPN in System > Routing, and you can use that gateway in firewall rules to make traffic exit that path. Depending on the other side you might also need to setup manual outbound NAT rules to do NAT as the traffic leaves the VPN
  • Filtering rules with multiple OpenVPN servers

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    The most likely cause in this scenario is that your per-interface rules are not being matched as you expect. If the VPNs are assigned with an IP type of "none" as they should be, make sure you are not using the macros for things like "VPN_1 subnet" and similar. With an IP type of "none" those are really blank/null. If you specify the actual subnets there, the traffic can be matched.
  • Site to site on two pfsense

    14
    0 Votes
    14 Posts
    7k Views
    C
    Well… (feeling kinda stupid) :P I got as far as step 2 and it started working like expected. I haven't had to reboot PFSense devices in ages and didn't occur to me. In my defense, they were also in production use so was not convenient at the time. Problem solved IPSec had something left over after disabling tunnels that a reboot resolved. Thanks Marvosa...
  • 0 Votes
    3 Posts
    1k Views
    J
    @marvosa: Need to clarify some info: Your diagram shows "OpenVPN Tunnel Network: 10.0.10.0/24" and "Subnet to pfSense3: 10.0.10.8/30".  Please clarify what you meant because those networks overlap. When you say "I have a remote site connected with OpenVPN Peer to Peer (SSL/TLS) working" you never specified what was connected. I can only assume from your diagram that you meant PFsense 1 and PFsense 3 are connected and that each side can communicate with the other side's LAN, but please verify my assumption is correct. On PFsense 2, is there a typo or is 172.16.10.1/26 really a WAN interface? Why isn't it a LAN interface?  I would imagine 172.16.20.0/26 cannot communicate with 172.16.10.0/26 because there is no return route back to 172.16.20.0/26 on PFsense 2.  Although, I'm not even sure that's possible because it's a WAN interface and being NAT'd… someone else chime in if they know for sure you need a return route to 172.16.20.0/26 on the cisco. Remember Post your server1.conf from PFsense 1 and client1.conf from PFsense 3. pfSense1 Site2Site (PKI) dev ovpns2 dev-type tun tun-ipv6 dev-node /dev/tun2 writepid /var/run/openvpn_server2.pid #user nobody #group nobody script-security 3 daemon keepalive 10 60 ping-timer-rem persist-tun persist-key proto udp cipher AES-256-CBC up /usr/local/sbin/ovpn-linkup down /usr/local/sbin/ovpn-linkdown local TRIMMED-PUBLIC-IP tls-server server 10.0.10.0 255.255.255.0 client-config-dir /var/etc/openvpn-csc ifconfig 10.0.10.1 10.0.10.2 tls-verify /var/etc/openvpn/server2.tls-verify.php lport 1195 management /var/etc/openvpn/server2.sock unix ca /var/etc/openvpn/server2.ca cert /var/etc/openvpn/server2.cert key /var/etc/openvpn/server2.key dh /etc/dh-parameters.1024 tls-auth /var/etc/openvpn/server2.tls-auth 0 route 172.16.20.0 255.255.255.192 route 172.16.20.64 255.255.255.192 route 192.168.0.0 255.255.255.0 push "route 172.16.0.0 255.255.248.0" push "route 172.16.10.0 255.255.255.192" push "route 10.2.6.0 255.255.255.0" push "route 10.2.31.0 255.255.255.0" push "route 10.31.10.0 255.255.255.0" push "route 10.31.112.0 255.255.255.0" push "route 10.31.253.0 255.255.255.0" push "route 10.32.253.0 255.255.255.0" push "route 10.252.130.0 255.255.255.0" push "route 10.252.144.0 255.255.255.0" push "route 10.252.252.0 255.255.255.0" push "route 10.253.1.192 255.255.255.255" push "route 10.253.252.0 255.255.255.0" pfSense3 (Client) dev ovpnc1 dev-type tun dev-node /dev/tun1 writepid /var/run/openvpn_client1.pid #user nobody #group nobody script-security 3 daemon keepalive 10 60 ping-timer-rem persist-tun persist-key proto udp cipher AES-256-CBC up /usr/local/sbin/ovpn-linkup down /usr/local/sbin/ovpn-linkdown local TRIMMED-PUBLIC-IP tls-client client lport 0 management /var/etc/openvpn/client1.sock unix remote TRIMMED-REMOTE-IP 1195 ifconfig 10.0.10.2 10.0.10.1 ca /var/etc/openvpn/client1.ca cert /var/etc/openvpn/client1.cert key /var/etc/openvpn/client1.key tls-auth /var/etc/openvpn/client1.tls-auth 1 Also here is the CSO (-csc) file for that client ifconfig-push 10.0.10.10 10.0.10.9 iroute 172.16.20.0 255.255.255.192 USING Site2Site 12:00:41.556303 IP 192.168.0.47.38007 > 10.31.10.89.33438: UDP, length 24 12:00:41.628250 IP 192.168.0.47.38007 > 10.31.10.89.33439: UDP, length 24 12:00:41.699052 IP 192.168.0.47.38007 > 10.31.10.89.33440: UDP, length 24 12:00:41.770609 IP 192.168.0.47.38007 > 10.31.10.89.33441: UDP, length 24 12:01:55.579807 IP 192.168.0.47.38022 > 10.31.10.89.33441: UDP, length 24 12:02:00.580990 IP 192.168.0.47.38022 > 10.31.10.89.33442: UDP, length 24 12:02:05.581638 IP 192.168.0.47.38022 > 10.31.10.89.33443: UDP, length 24 12:02:10.582314 IP 192.168.0.47.38022 > 10.31.10.89.33444: UDP, length 24 USING RoadWarrior 11:35:41.019829 IP 10.0.8.202.37905 > 10.31.10.89.33435: UDP, length 24 11:35:41.182282 IP 10.0.8.202.37905 > 10.31.10.89.33436: UDP, length 24 11:35:41.253157 IP 10.0.8.202.37905 > 10.31.10.89.33437: UDP, length 24 11:35:41.324107 IP 10.0.8.202.37905 > 10.31.10.89.33438: UDP, length 24 11:37:07.139149 IP 10.31.253.2.46027 > 10.31.10.89.33438: UDP, length 24 11:37:07.281083 IP 10.31.253.2.15414 > 10.31.10.89.33439: UDP, length 24 11:37:07.351882 IP 10.31.253.2.3381 > 10.31.10.89.33440: UDP, length 24 11:37:07.422730 IP 10.31.253.2.23474 > 10.31.10.89.33441: UDP, length 24
  • Nerd in need - OpenVPN add route errors?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    I've fixed the issue by removing the following from my VPN provider's config: [route-delay 1 10;] [route-metric 512]                     and [route-method exe] Also, removing the quad zero route from the config, prevented the add route error as my VPN provider was pushing the [redirect-gateway] option anyway.
  • MOVED: server openvpn non si avvia

    Locked
    1
    0 Votes
    1 Posts
    763 Views
    No one has replied
  • 0 Votes
    1 Posts
    2k Views
    No one has replied
  • VPN Client cannot connect to servers on VPN network…

    4
    0 Votes
    4 Posts
    2k Views
    T
    This mysteriously started working.  The only thing I can think of is that I a reboot of my Ubuntu Laptop or pfSense server fixed the issue.
  • OpenVPN failover and DynDNS update

    1
    0 Votes
    1 Posts
    910 Views
    No one has replied
  • Sanity check for openvpn clients accessing LAN

    6
    0 Votes
    6 Posts
    2k Views
    D
    Fair enough.  Like I said, though, I am literally the only person who has access to this VPN.  Thanks, I think I will figure out how to secure access from the VPN subnet just to be safe, and remove the NAT rule…
  • PortForward NAT to S2S

    1
    0 Votes
    1 Posts
    910 Views
    No one has replied
  • Accessing IPsec branch office from an OpenVPN client

    14
    0 Votes
    14 Posts
    4k Views
    C
    It worked! Thank you for your patience! I didn't even think to change the "LAN" part of that config. I was kind of assuming that once you're VPN'd in, you're part of the LAN.
  • MOVED: le service openvpn et tjr "stopped"

    Locked
    1
    0 Votes
    1 Posts
    622 Views
    No one has replied
  • System: Certificate Revocation List Manager => Export missing?

    7
    0 Votes
    7 Posts
    3k Views
    R
    ah yes… I have later forgot/overseen the 1st change which calls the update routine... --- /usr/local/www/system_crlmanager.php.orig 2013-04-12 16:31:46.000000000 +0200 +++ /usr/local/www/system_crlmanager.php 2013-11-29 23:21:22.000000000 +0100 @@ -107,6 +107,7 @@ } if ($act == "exp") { + crl_update($thiscrl); $exp_name = urlencode("{$thiscrl['descr']}.crl"); $exp_data = base64_decode($thiscrl['text']); $exp_size = strlen($exp_data); @@ -580,11 +581,9 @@ - [![](/themes/<?= $g['theme'];?>/images/icons/icon_down.gif "<?=gettext(")" alt="" width="17" height="17" border="0" />](system_crlmanager.php?act=exp&id=<?=$tmpcrl['refid'];?>) - [![](/themes/<?= $g['theme'];?>/images/icons/icon_e.gif "<?=gettext(")" alt="" width="17" height="17" border="0" />](system_crlmanager.php?act=edit&id=<?=$tmpcrl['refid'];?>)
  • OpenVPN Tunnel with Intermediate certificate(s)

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • CPU-upgrade + can I do this?

    4
    0 Votes
    4 Posts
    1k Views
    dotOneD
    Unless you instruct OpenVPN to push a default gateway, only the network you specify when you setup the tunnel will be accessible through the VPN. Since I'm with XS4all I have WebTV and native IPv6. So I'm pushing routes to the webtv network in addition to the local network. All other traffic remains outside the tunnel. Since you want to send all traffic through the tunnel you have to push a IPv4 default gsteway. You can do this in the tunnel setup. To have IPv6 everywhere I push a IPv6 default gateway always. But as you do not have IPv6, don't worry about it. The only thing you have to do on the PFS box is to make sure that all traffic is forwarded through the other OpenVPN tunnel. In my ignorence I assumed it was an IPsec tunnel. As said, with an Atom processor without HW encryption I get 60Mbps.
  • Windows 7 OpenVPN client can't reach the LAN

    14
    0 Votes
    14 Posts
    7k Views
    R
    Completely reinstalled pfSense and what do you know?  It's working. Hypotheses: Corruption of original installation and/or Using older version of OpenVPN Client Export pacakge and/or Some other installed package caused a problem (have installed this fairly lean on this occasion). Thanks to all for your help.  I'm going to snapshot this virtual machine while it's working!!!
  • Intermittent VPN client issues

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.