• Two OpenVPN Services, site2site and client

    7
    0 Votes
    7 Posts
    1k Views
    M
    MontanaIce, Glad it's working!  Just wanted to point out that no manual advanced settings or static routes were required though…. if you put the relevant info into the GUI, the correct openvpn configuration statements are automatically generated.  e.g.: Push 10.5.0.0/16 to your clients This can be added to the server config in the GUI under "IPv4 Local Network/s" Add a return route for the road warrior tunnel network (172.16.4.0/24) to Site A This can be added to the client config in the GUI under "IPv4 Remote Network/s" This will keep everything "cleaner" and within the openvpn config.  It will also be helpful if you ever need to analyse your .conf files and/or GUI options.  Also, while it's working, I don't think you want a static route to the external IP…  I would add the relevant info to the GUI and let PFsense generate the correct directives.
  • S2S Tunnel not Routing

    4
    0 Votes
    4 Posts
    2k Views
    M
    Okay, this makes no sense to me.  On a whim, I changed the tunnel network from a /30 to a /29 and now both ends are routing.  I had it as a /30 because the documentation I read said that no matter what size you make your tunnel network, it will chop it into /30s for each client.  Since I only had one client, I just made it a /30.
  • Revoking user SSL certificate blocks all other users

    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    How exactly did you create your certificates? If you generated them all with the same serial number, that would explain why revoking one blocks them all. CRLs work by certificate serial, and if your certificate generation script or system did not give each certificate a unique serial number, then they all will be revoked if you revoke one of them. Look at the full cert details from a few of your certs and compare the serials.
  • OpenVPN: Client Export Utility issue

    3
    0 Votes
    3 Posts
    1k Views
    K
    Problem solved, user certificates was missing.
  • Route all traffic across openvpn tunnel

    2
    0 Votes
    2 Posts
    6k Views
    V
    In the server settings check "Redirect Gateway". This should push the default route to the client. Remember that you run OpenVPN on Windows with admin privileges. On the pfSense server go to Firewall > NAT > Outbound and check if there is a rule for WAN interface, with source = your vpn tunnel network and NAT Address = WAN address. If it isn't there, add it manually.
  • [How to] pfSense Selective Routing via VPN and WAN Interfaces

    14
    0 Votes
    14 Posts
    30k Views
    S
    Success! I accomplished this with two LAN rules, which I forgot to move to the top, duh. One for Hulu/PC routing to WAN, another for Server routing to PIAVPN. Marked the latter one as NO_WAN_EGRESS. Created then a floating rule. Question: PIA has a few US servers. Can I create multiple interfaces and use them for failover? E.g. PIA1 US-EAST, PIA2 US-NY, if PIA1 goes down, pfSense will try to bring up PIA2. Action: Reject Quick: Checked Interface: WAN (you can also select multiple WAN interfaces or an interface group here) Direction: out Protocol: any Source: any Destination: any Description: Reject outbound traffic marked NO_WAN_EGRESS Advanced: You can match packet on a mark placed before on another rule: NO_WAN_EGRESS
  • Some port filtered from client

    2
    0 Votes
    2 Posts
    750 Views
    R
    Replying to myself, I found the solution thanks to this post: https://forum.pfsense.org/index.php?topic=88467.msg504596#msg504596 Go to "System->Advance Networking" and disable: Hardware Checksum Offloading Hardware TCP Segmentation Offloading Hardware Large Receive Offloading and reboot.
  • OpenVPN: only grant access to LAN?

    2
    0 Votes
    2 Posts
    650 Views
    DerelictD
    Don't push a default route and put rules on your OpenVPN tab only allowing access to LAN.
  • Openvpn config is only partially successful

    10
    0 Votes
    10 Posts
    2k Views
    johnpozJ
    do you allow ping to your wan?  If not then ping would fail.. Is the site using a proxy?  If so you have to tell the openvpn client to use a proxy. So your saying the tcp openvpn works at hotspot location #1 but not at this #2 site?  Or is your tcp vpn not working anywhere?
  • Site-to-Site Tunnel: Moved Office, now can't connect

    4
    0 Votes
    4 Posts
    1k Views
    D
    Glad you worked it out. Perhaps you could update the title of your first post with "[Solved]".
  • OpenVPN with transparent bridge, connects but has routing issues

    8
    0 Votes
    8 Posts
    4k Views
    M
    Everything I've read seems to indicate that my choices are bridged or routed+NAT For a simple remote access setup, you don't need NAT.  There are situations where NAT is a workaround or puts a band-aid on certain issues, but none of them apply to your situation. I've searched and could not find a post or any documentation for running openvpn with an external dhcp server unless you setup a bridged solution.  Even if you could, it might mess with tracking on your dashboard. Configure a road warrior, routed solution where your clients get their IP from the OpenVPN server.  Problem solved…. and you can monitor your connected clients from the dashboard. Pretty straight forward -> https://doc.pfsense.org/index.php/OpenVPN_Remote_Access_Server
  • OpenVPN Bridge

    1
    0 Votes
    1 Posts
    963 Views
    No one has replied
  • Unable to ping backup unit in CARP setup - solved.

    1
    0 Votes
    1 Posts
    511 Views
    No one has replied
  • OpenVPN: Can't access GUIs via browser?

    1
    0 Votes
    1 Posts
    624 Views
    No one has replied
  • OpenVPN: Only Forward Traffic Within VPN

    2
    0 Votes
    2 Posts
    698 Views
    kesawiK
    Have a look at /index.php?topic=105810.0. You may be able to adapt the details there to your requirements.
  • 0 Votes
    2 Posts
    1k Views
    S
    I apologize as I do not have an answer to your question, but am seeking an answer to my own.  I am also using PFSense and OpenVPN and I am attempting to configure the firewall to allow only the VPN traffic and block everything else.  So, if/when the OpenVPN connection drops, so does all other traffic.  I accomplished this on a linux router previously using the following IPtables rules, but can not how to conceptually do the same with pfsense, as there is not a "source port" option in the GUI.  Any help would be awesome! :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] -A INPUT -p udp -m udp –sport 53 -j ACCEPT -A INPUT -p udp -m udp --sport 67:68 --dport 67:68 -j ACCEPT -A INPUT -j DROP -A FORWARD -j DROP -A OUTPUT -p udp -m udp --dport 53 -j ACCEPT -A OUTPUT -p udp -m udp --sport 67:68 --dport 67:68 -j ACCEPT -A OUTPUT -j DROP COMMIT Completed on Thu Jan 14 11:13:06 2016 Generated by iptables-save v1.4.7 on Thu Jan 14 11:13:06 2016 *nat :PREROUTING ACCEPT [0:0] :POSTROUTING ACCEPT [0:0] :OUTPUT ACCEPT [0:0] -A POSTROUTING -s 192.168.2.2/32 -o tun0 -j MASQUERADE COMMIT
  • Port sharing squid reverse proxy & openvpn

    5
    0 Votes
    5 Posts
    3k Views
    U
    Hi stanthewizard, thanks four your explanation. I got it up and running as described below. installed OpenVPN with the Wizard to listen on the WAN interface, port 443, TCP, tun mode in "Advanced" I inserted the following "port-share 192.168.0.1 4443" and added a NAT Port Forward rule as following: | If | Proto | Src. addr | Src. ports | Dest. addr | Dest. ports | NAT IP | NAT Ports | | WAN | TCP | * | * | WAN address | 443(HTTPS) | 192.168.0.1 | 443(HTTPS) | as expected, the firewall rule was created automatically, which is why the following rules are defined for the WAN interface: | ID | Proto | Source | Port | Destination | Port | Gateway | Queue | Schedule | | IPv4 TCP | * | * | WAN address | 443(HTTPS) | * | none | | | IPv4 TCP | * | * | 192.168.0.1 | 443(HTTPS) | * | none | | squid3 reverse is listening on the WAN interface, port 4443 In my case the IP "127.0.0.1" did not work. The problem was that the pfsense is located behind the ISP's router which forwards the port 443 to the pfsense box. Instead, I had to use the WAN interface's IP address "192.168.0.1" of my pfsense box. Thanks again.
  • OpenVPN: View clients on the network?

    2
    0 Votes
    2 Posts
    821 Views
    M
    You can either add 'OpenVPN" to the dashboard or go to Status -> OpenVPN.
  • OpenVPN: One user per computer or per person?

    3
    0 Votes
    3 Posts
    742 Views
    A
    I usually create a user account for each device - that way, if one gets lost/stolen, you can just revoke the account for that device, rather than having to put new configs on everything else that shared the same profile.
  • Please help me switch from Tomato OpenVPN Server to PFSEnse OpenVPN

    3
    0 Votes
    3 Posts
    1k Views
    O
    @mudmanc4: Here is a very good video to setup openvpn server and client on pfsense. https://youtu.be/VdAHVSTl1ys This will get the VPN server / client up and running. +1 to that video. I am a total noobie to VPN and PFsense and I got it up and running on my iOS devices and my Macbook within an hour or so.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.