• OPENVPN Drops connection

    3
    0 Votes
    3 Posts
    2k Views
    C
    Sorry for the late reply.  I have been bogged down with work. So here are my answers: a) What is the server end? (another pfSense, an OpenVPN provider…) OpenVPN provider b) How do you specify the server end? (a DNS name, a static IP address…) DNS name c) What sort of failures do you see? (is it trying to reconnect every minute, but not succeeding, or has the OpenVPN client process died completely… - OpenVN logs) openvpn[12214]: RESOLVE: Cannot resolve host address: d) OpenVPN client conf file [color] <openvpn><openvpn-client><vpnid>1</vpnid> <protocol>UDP</protocol> <dev_mode>tun</dev_mode> <ipaddr><interface>wan</interface> <local_port><server_addr>vpn.myvpnprovider.com</server_addr> <server_port>1194</server_port> <resolve_retry><proxy_addr><proxy_port><proxy_authtype>none</proxy_authtype> <proxy_user><proxy_passwd><mode>p2p_tls</mode> <custom_options>auth-user-pass /etc/openvpn-passwd.txt;persist-tun;keepalive 10 60;</custom_options> <caref>5186a2372a50b</caref> <certref>5186a29ecfa1d</certref> <crypto>BF-CBC</crypto> <engine>none</engine> <tunnel_network><remote_network><use_shaper><compression>yes</compression> <passtos></passtos></use_shaper></remote_network></tunnel_network></proxy_passwd></proxy_user></proxy_port></proxy_addr></resolve_retry></local_port></ipaddr></openvpn-client> [/color]</openvpn> e) What type of physical internet connection do you have? and do you see any packet loss (e.g. on gateway monitor)? ADSL2 and no packet loss f) Anything else you think might be interesting about your setup. I have an interface setup as VPN and the routes setup accordingly.  Also I am using NAT to pass all LAN traffic through the VPN interface
  • Open VPN Communitcation issue - ping request time out

    4
    0 Votes
    4 Posts
    5k Views
    T
    @Linuxdump: Thanks ! But I already tried this no use still the same. I can see that I am missing something very small which I am unable to figure out. What could be the reason. Firewall rules are automatically created by the pfsense oprn vpn configuration wizard. Help me to resolve this issue! two additional things, 1. if you configured the VPN server and exported vpn client , and right after it made small change to vpn server like for example  added Compress tunnel packets using the LZO algorithm. you either make the change in the vpn client to adjust it or reexport it again to the user. 2. If your clients are win7 , make sure they are right click when they execute Openvpn client run as administrator other wisw they want be able to push routes
  • OpenVPN setup with bridging (tap)

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN HowTo for Yealink IP phones

    Locked
    9
    0 Votes
    9 Posts
    21k Views
    H
    @jimp: The OpenVPN client export package can export Yealink (and snom) format configs automatically now. Also most of the first steps can be avoided by simply using the wizard and at the end, change it from SSL/TLS+User Auth to just SSL/TLS. You don't need to create users, you can just create certificates for the phones under the cert manager (Cert tab, click +, "Create internal…" and select the right CA, then just fill in the cn and descr.) Is there a manual for your solution or do i have to stick to the one posted by sscardefield ? I'm kind of new to the whole vpn stuff and have 6 Yealink phones sitting on my desk waiting to get used via OpenVPN.
  • Remote Client (RoadWarrior) passwordless

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    S
    Thanks! It worked!
  • Existing setup/config confusion - NAT hiding while on OpenVPN

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Android Client

    Locked
    6
    0 Votes
    6 Posts
    2k Views
    A
    Interesting - but confused. Changed the mobile network to 10.0.8.0 so as to be VERY different to all other networks - and it works! No entries in firewall for blocked packets (as you would expect) Only slight funny is on Status/Openvpn - if you click the routing button it shows the connection details but it says that there should be a "C"  if currently connected - there is not - is this a funny from the 2.1 snapshot (using yesterday morning version) At this time I have only included etails of the local lan, defaut domain name and a DNS server together with the push route - is the general advice to inculde netbios/wins etc or just leave well alone? Andrew
  • Openvpn client redirect gateway for 1 network

    Locked
    6
    0 Votes
    6 Posts
    4k Views
    S
    Well… I did get it working, so for anyone wanting to try this out, here's how: 1/ make sure you get an OpenVPN client connection working 2/ assign an interface to this connection via Interfaces->Assign->click the + symbol->assign the interface to your OpenVPN client connection (typically ovpnc1) 3/ configure the interface: click Interfaces-><your_new_interface>->enable it & give it a sensible name (let's call it "MYVPN" for this example), choose "None" for IPv4 & IPv6, leave all other fields blank 4/ assign another interface to one of your physical ethernet ports (call this one "SECURELAN" for this example, and let's assume the physical interface is called re1) 5/ configure it again by enabling it and giving it a static IP (192.168.100.1 for this example) 6/ enable DHCP for this last new interface so your clients can get an IP address: Services->DHCP Server->SECURELAN->enable the interface & specify a DHCP-range (range  192.168.100.2 to 192.168.100.5 for this example) 7/ click Firewall->NAT->Outbound tab and add a new rule: select "MYVPN" for the interface, source = network 192.168.100.0/24, destination = any, translation = interface address 8/ choose "Manual Outbound NAT rule generation" (IMPORTANT!) & hit save & apply changes 9/ click Firewall->Rules, pick the "SECURELAN" tab and hit the + symbol to create a new rule: interface = SECURELAN, protocol = any, source = any, destination = any, gateway = choose MYVPN And you're done  8) Test that everything is working fine by connecting a client to your re1 interface with a LAN cable and doing a traceroute to a url of your choice. I'm going to be finetuning this a little more to check for DNS leaks & such, will post again when I've verified this. Hope this may help anyone wanting to route some traffic over their OpenVPN client connections. \m/</your_new_interface>
  • Issues with OpenVPN-Client

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Can I do something like this?

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    It is possible but the IPsec tunnel needs a Phase 2 entry that covers the path from the OpenVPN client network to the Server network.
  • Routing problem - Newbee question

    Locked
    22
    0 Votes
    22 Posts
    7k Views
    R
    Hi Guys, seems that the problem is solved. The main problem was to have the tunnel network inside the LAN which does not work. Reducing the LAN network and placing the tunnel network outside was the main fix. All other problems where a result of not having consequently changed all netmasks to the reduced LAN network on my guest operating systems. The two name servers had 255.255.0.0 as netmask, thats why they answered ping requests through the tunnel. The other boxes still had 255.0.0.0. All have now 255.128.0.0 and everything works fine. So many thanks again to all who helped me! Great work! Rumpi
  • Routing issue with multiple OpenVPN connections

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    M
    Post a network map, your server.conf's, your routing table and firewall rules and lets take a look.
  • Site 2 Site (S2S) tunnel up, but no traffic

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    M
    You shouldn't of had to create any rules… especially on the WAN side... the wizard should've taken care of that.  Do this on both sides: On the wan tab, pick a protocol, don't add both (unless you have a specific need for TCP, use UDP)... and the destination should be "WAN address": UDP|*| *| WAN address | 1194 (OpenVPN)| * On the OpenVPN tab, change your protocol to any: *| *| *| *| *| *
  • Open VPN TLS Error

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    M
    Just out of curiosity, what's with the funky port?
  • Connection errors when AD domain controller is off

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN client does not see IPSEC network

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    M
    Don't know if this is related or not but I was setting up OpenVPN due to my issues with speed with IPsec tunnels, you can read about them here http://forum.pfsense.org/index.php/topic,62457.0.html. Anyway I setup the OpenVPN and I was not getting communication from site to site even though I was absolutely sure I set it up correctly. After further inspection I was that I still had the IPsec configuration still setup for the remote site. This got me thinking, and I would love some clarification from anyone who knows for sure: IPsec has a lower cost than OpenVPN, in other words IPsec routes are preferred over OpenVPN? How about other VPN technologies that Pfsense supports, what are the order in which they will be used? Maybe this is your problem? Once you add the OpenVPN interface to your IPsec, you may then need to add a static route to use the IPsec tunnel? I know that it's not a good idea to have multiple tunnels going to the same site, but this is just good to know in the future for trouble shooting purposes.
  • OpenVPN - iOS 6 - VPN on demand with Custom SSL and IPCU

    Locked
    4
    0 Votes
    4 Posts
    5k Views
    N
    Hi again, I found some posts on the internet on which they say that apple disabled "VPN on demand" on newer versions of iOS or newley shiped devices. I found out that there is an iPhone Configuration Utility (IPCU) which can be directly downloaded on the apple webpage which allows the to create and set profiles on an iPhone. Setting such a profile works but I had problems to get "Custom SSL with VPN on demand" to get working with my pfsense OpenVPN server. The intention is that I setup the domains from my intranet as the e-mail server and when the e-mail app tries to connect to this URL the VPN connection will start. Instead of using "Push Mail" I would try to use automatic check by the mail app every 15min - hopefully the vPN will start when "VPN on demand" is configured correctly. Perhaps someone can help me to configure this with the help of the following tutorial: http://simonguest.com/2013/03/22/on-demand-vpn-using-openvpn-for-ios/ This is my iOS inline config from the pfsense export utility: persist-tun persist-key cipher AES-256-CBC tls-client client remote xx.yy.xx.yy 443 tcp comp-lzo nobind keepalive 5 30 <ca>-----BEGIN CERTIFICATE----- ..... -----END CERTIFICATE----- <key>-----BEGIN RSA PRIVATE KEY----- ..... -----END RSA PRIVATE KEY-----</key> <tls-auth># # 2048 bit OpenVPN static key # -----BEGIN OpenVPN Static key V1----- .... -----END OpenVPN Static key V1-----</tls-auth> key-direction 1</ca> Thank you for your help! –-- edit ---- I got it. My iPhone starts the OpenVPN connection to my pfsense OpenVPN server. The config I posted above is the one the OpenVPN Export utlity created. Follow the instructions on the URL I posted above - they are correct. I just had to modify some parameters on the config to get it working (Custom options with "key" and "Value": Export the CA.crt to your computer and replace every newline with  \n  to make it one line. (As described on the URL above) You need a password protected .p12 of the client certificate which contains .key and .crt. pfsense itself cannot do that from GUI. I exported the .crt and .key to pfsense /tmp. Then I ran the command on the webpage ( openssl pkcs12 -export -in client1.crt -inkey client1.key -out client1.p12 ) and set a password. I imported that new password protected .p12 into the IPCU. On the .ovpn config I exported from pfsense there is a part "tls-auth". I created this key in the custom options of IPCU and as value I did the same as for the "ca". everything in one line and every newline as   \n ca     –---BEGIN CERTIFICATE-----\nABCDEF112312.........\n-----END CERTIFICATE----- tls-auth     –---BEGIN OpenVPN Static key V1-----\nABCDEF112312.........\n-----END OpenVPN Static key V1----- comp-lzo     value persist-tun     value persist-key     value cipher     AES-256-CBC tls-client     value client     value key-direction     1 Push-Mail seems not to work with OpenVPN - probably because the VPN connection is in standby and will only be established if the iPhone app starts to check the E-Mails every 15min and so is using "VPN on demand". Will do some more tests with bigger delays to make sure iPhone awakes froms sleep with VPN and hopefully same will happen when disconnection the iphone from the USB data cable which I still have connected to view what is happening on my iphone in the IPCU cosole.
  • PfSense as OpenVPN-AS Client

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    V
    Well, I've done quite a bit of searching and I feel that I am getting closer. I am receiving this in my logs when trying to connect. Looks like an issue with the passwords, I've already checked that those are correct… May 18 20:30:32 openvpn[58267]: OpenVPN 2.2.2 i386-portbld-freebsd8.1 [SSL] [LZO2] [eurephia] built on Apr 2 2013 May 18 20:30:32 openvpn[58267]: MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1.sock May 18 20:30:32 openvpn[58267]: WARNING: file '/conf/openvpn-server2.pas' is group or others accessible May 18 20:30:32 openvpn[58267]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts May 18 20:30:32 openvpn[58267]: Control Channel Authentication: using '/var/etc/openvpn/client1.tls-auth' as a OpenVPN static key file May 18 20:30:32 openvpn[58267]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication May 18 20:30:32 openvpn[58267]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication May 18 20:30:32 openvpn[58267]: Control Channel MTU parms [ L:1557 D:166 EF:66 EB:0 ET:0 EL:0 ] May 18 20:30:32 openvpn[58267]: Socket Buffers: R=[42080->65536] S=[57344->65536] May 18 20:30:32 openvpn[58267]: Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:4 ET:0 EL:0 ] May 18 20:30:32 openvpn[58267]: Local Options hash (VER=V4): '0f816d6e' May 18 20:30:32 openvpn[58267]: Expected Remote Options hash (VER=V4): '2f3e190a' May 18 20:30:32 openvpn[58379]: UDPv4 link local (bound): 192.168.1.175 May 18 20:30:32 openvpn[58379]: UDPv4 link remote: My.IP.Address.123:1194 May 18 20:30:33 openvpn[58379]: TLS: Initial packet from My.IP.Address.123:1194, sid=a388832d cb9b06e6 May 18 20:30:33 openvpn[58379]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this May 18 20:30:33 openvpn[58379]: VERIFY OK: depth=1, /CN=OpenVPN_CA May 18 20:30:33 openvpn[58379]: VERIFY OK: nsCertType=SERVER May 18 20:30:33 openvpn[58379]: VERIFY OK: depth=0, /CN=OpenVPN_Server May 18 20:30:34 openvpn[58379]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1557', remote='link-mtu 1542' May 18 20:30:34 openvpn[58379]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC' May 18 20:30:34 openvpn[58379]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' May 18 20:30:34 openvpn[58379]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key May 18 20:30:34 openvpn[58379]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication May 18 20:30:34 openvpn[58379]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key May 18 20:30:34 openvpn[58379]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication May 18 20:30:34 openvpn[58379]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA May 18 20:30:34 openvpn[58379]: [OpenVPN_Server] Peer Connection Initiated with My.IP.Address.123:1194 May 18 20:30:36 openvpn[58379]: SENT CONTROL [OpenVPN_Server]: 'PUSH_REQUEST' (status=1) May 18 20:30:36 openvpn[58379]: AUTH: Received AUTH_FAILED control message May 18 20:30:36 openvpn[58379]: SIGTERM received, sending exit notification to peer May 18 20:30:38 openvpn[58379]: TCP/UDP: Closing socket May 18 20:30:38 openvpn[58379]: SIGTERM[soft,exit-with-notification] received, process exiting
  • Need help setting up VPN for my laptop

    Locked
    9
    0 Votes
    9 Posts
    3k Views
    S
    As long as you're using an OpenVPN that supports it. Some clients (on phones/tablets?) might not support it.
  • Openvpn tunnel between openwrt and pfsense

    Locked
    5
    0 Votes
    5 Posts
    9k Views
    K
    Hi, good to hear you get it working… i was struggling on same thing couple month ago.... I think your problem was in routes (if openwrt didnt route your request back from pfsense when pinging behind openwrt to pfsense) did you set remote lan 192.168.4/24 (openvpn settings "route 192.168.4/24") (what pfsense routing table shows ? does it know 192.168.4/24 network ? did you use peer-to-peer or remote access ? Set pfsense "Manual outbound nat" -> wan interface NAT all outbound traffic its public interface ip. (thats the way i allways do it, 1 NAT in network everything else is fully routed between routers..) Make sure DNS request goes also to tunnel (dns queries coming from openwrt / openwrt connected networks(lan).. If you use own dns resolver(at endpoint pfsense) you need to set openwrt to allow dns queries coming from private network(from pfsense). br. .k @cgu29: it's solved the problem came from the nat rules on the pfsense server i had to enable manual nat and add a mapping between the remote LAN and the natted IP (PFsense wan interface) hope it helps now time to quit and go to the pub (in France)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.