• 0 Votes
    6 Posts
    2k Views
    2
    I'm also new to pfsense and openvpn and did everything with the help of this topic. https://forum.pfsense.org/index.php?topic=93432.0
  • 1 user on multiple devices with the same IP

    4
    0 Votes
    4 Posts
    683 Views
    D
    @viragomann: Presumably you are using TLS authentication and connect from both devices using the same user cert, so go to the server settings and check "Duplicate Connection" in the "Tunnel Settings" section. Thank you! This is what I was looking for.
  • 0 Votes
    11 Posts
    4k Views
    K
    I guess they could make the button colors red for xp, yellow for win6 and green for Vista or later…  For us slow non-readers!  haha
  • Setting up OpenVPN client for NordVPN

    15
    0 Votes
    15 Posts
    11k Views
    R
    FYI, it appears that NordVPN has addressed whatever issue was causing random ping timeouts after TLS renegotiation. I haven't seen it happen in the past two weeks, which is by far the longest stretch ever.
  • VPN almost there..

    1
    0 Votes
    1 Posts
    469 Views
    No one has replied
  • OpenVPN and TorGuard

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • OpenVPN Having Trouble with VPN Gateway (Revised)

    19
    0 Votes
    19 Posts
    2k Views
    DerelictD
    dpinger works fine. You are seeing an OpenVPN issue. You have to monitor something that will actually respond to pings. The gateway address is automatically inserted. There is no mechanism to "automatically" choose something else. You can place whatever monitor IP address in there you think is better than the gateway address. This has nothing to do with dpinger.
  • OpenVPN Gotchas for upgrade to 2.4?

    13
    0 Votes
    13 Posts
    2k Views
    H
    @HeMaN: I have some issues with openvpn clients on the firewall itself as well after upgrading to 2.4 The configuration I have is based on the 2.3 version of this guide (he has it now updated to 2.4): https://nguvu.org/pfsense/pfsense-multi-vpn-wan/ I use two client connections to AirVPN combined in a Gatewaygroup, and it was wording fine on 2.3 In 2.4 I can see the connection with AirVPN is setup ok, but it seems the creation of the interface is giving issues: /sbin/ifconfig ovpnc1 10.4.94.253 10.4.0.1 mtu 1500 netmask 255.255.0.0 up ifconfig: ioctl (SIOCAIFADDR): File exists "Solved" it for this moment by disabling one of the clients, then it seems to work agin for that one client. I found the solution for my problem :) In the 2.3 version of the guide I mentioned there was a monitor IP configured for each VPN GW. Comparing them with the 2.4 version of the guide he published now, there was no GW monitor IP. After removing them both stay active. It is either this or the fact I updated pfblockerng to the latest version because of the infamous 502 bad gateway issue, which I changed first before I changed the VPN GW configuration.
  • Site to site openvpn

    1
    0 Votes
    1 Posts
    446 Views
    No one has replied
  • OpenVPN 2.4 Artificial speed limit @ 6 Mbps

    3
    0 Votes
    3 Posts
    917 Views
    C
    Thanks Room 7609! Tried it but alas same result :( Good idear though, I did say that mentioned a few times… Will keep you posted. CP
  • OpenVPN Connection Timeout

    1
    0 Votes
    1 Posts
    749 Views
    No one has replied
  • WebGui 400 Bad Request

    1
    0 Votes
    1 Posts
    662 Views
    No one has replied
  • OpenVPN on pfsense 2.4 no longer run script on link-up

    9
    0 Votes
    9 Posts
    3k Views
    H
    Thank you jimp and kpa for taking time to reply to my post. I think this script has to wait for the vpn to be up and running before it launches. Anyway I have found the solution to launching the script correct over at https://forum.pfsense.org/index.php?topic=71725.msg756541#msg756541
  • OpenVPN as WAN - Port Forwarding

    8
    0 Votes
    8 Posts
    4k Views
    DerelictD
    Glad it's working. There is another reason you have to have the rules not match the OpenVPN tab and only match the assigned interface tab. When they come in passed by the assigned interface rule, the resulting states get flagged with reply-to so the reply traffic gets sent out the interface on which it arrived - back out the OpenVPN tunnel in this case. If the traffic is passed by the OpenVPN interface group tab, there is no way for the system to know which interface it arrived on (it could be any interface in the group) so you don't get reply-to. The reply traffic will be sent according to the routing table which probably means it will be sent out WAN (and die there being out-of-state).
  • 2-factor authentication with OpenVPN

    5
    0 Votes
    5 Posts
    2k Views
    A
    My RADIUS and AD is running from windows server 2008. There's no Google Authenticator package that can integrate with windows machine as far as i know. Thanks, I'll look into the freerad package for pfsense. If I do this, will I be able to configure freerad through commandline and use apt-get to install additional packages for the freerad?
  • Openvpn Bridge / IPSEC

    1
    0 Votes
    1 Posts
    551 Views
    No one has replied
  • Rmote bridge between openVPN and IPsec VPN

    1
    0 Votes
    1 Posts
    335 Views
    No one has replied
  • OpenVPN bad routing after 2.4 upgrade

    7
    0 Votes
    7 Posts
    1k Views
    DerelictD
    Those are not placed by an OpenVPN server but by an OpenVPN client connecting to a server. Did you assign an interface? Add outbound NAT?
  • 0 Votes
    42 Posts
    11k Views
    F
    It was that damned CloudFlare rule. I re-ran the list of places that previously showed the VPN IP and they all reported the real WAN IP as expected. I really hope this consistently fixes it.  I'll update the thread if it doesn't fix it after I've pulled some hair out. (BTW, those Facebook IPs are straight from Facebook so only include their CIDR blocks and nobody else.  Back when that info was public.) Shows VPN IP TorGuard.net –> Shows real IP :) DuckDuckGo "What is my IP" --> Shows real IP :) whatismyipaddress.com --> Shows real IP :) BearsMyIP.com --> Shows real IP :) ipchicken.com --> Shows real IP :) ipaddress.pro --> Shows real IP :) Anecdotally, this also tells me just how many sites are CloudFlare customers (at least the free account).  Holy crap it's a lot.
  • OpenVPN tutorial for simple setup?

    13
    0 Votes
    13 Posts
    2k Views
    DerelictD
    What warning? The client is told what CA to use in the export file. It's not like an SSL connection to a web site. It is a VPN. If you could use a public CA for your OpenVPN server, then ANY certificate issued by that public CA would pass. And you wouldn't be in control of revocations, etc. Export the configuration for the client. That's how it works.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.