• Openvpn conencted but not incoming traffic

    1
    0 Votes
    1 Posts
    631 Views
    No one has replied
  • Openvpn Site-to-Site not working

    3
    0 Votes
    3 Posts
    929 Views
    L
    Well i solved the problem. Rebuild the VPN using http://blog.stefcho.eu/building-site-to-site-connection-with-openvpn-on-pfsense-2-0-rc1-with-pki/ that Rebooted Both Firewall…. Than to redirect the internet throught the vpn just chect the related boxes and and create the nat routes...
  • OpenVPN - Export with multiple VPN profiles

    14
    0 Votes
    14 Posts
    7k Views
    johnpozJ
    Glad you go it sorted… and happy I could point out how simple it was ;)
  • Active Directory RADIUS

    1
    0 Votes
    1 Posts
    650 Views
    No one has replied
  • OpenVPN problem after 2.2.5 upgrade

    4
    0 Votes
    4 Posts
    1k Views
    A
    Hi again, thanks for your comments. I have tried saving the server config again with no luck. I am not using subnet 192.168.80.X por any other purpose. I think the problem might have anything to do with the fact that the client gets assigned ip address 255.255.255.255 instead of 192.168.80.X (see the image). Any other suggestions? ![Captura de pantalla 2015-11-26 a las 23.39.35.png](/public/imported_attachments/1/Captura de pantalla 2015-11-26 a las 23.39.35.png) ![Captura de pantalla 2015-11-26 a las 23.39.35.png_thumb](/public/imported_attachments/1/Captura de pantalla 2015-11-26 a las 23.39.35.png_thumb)
  • Imposible to share Nets from Openvpn-Client to clients

    1
    0 Votes
    1 Posts
    544 Views
    No one has replied
  • OpenVPN Client Windows disconnects

    5
    0 Votes
    5 Posts
    1k Views
    SoloamS
    Found the problem, I'm also using "User Auth", and I had "auth-nocache", apparently after one hour I have to renter the user and password! I removed "auth-nocache" and the problem is solved. Is this a security hole? Allowing the cache of the user credentials? Thank you all Best Regards
  • Connection Timing out

    1
    0 Votes
    1 Posts
    704 Views
    No one has replied
  • 0 Votes
    1 Posts
    742 Views
    No one has replied
  • AD user accounts for OpenVPN

    4
    0 Votes
    4 Posts
    2k Views
    S
    @skaaptjop: Could you describe what you meant by "single OpenVPN configuration file"? Sure. All my users are using the exact same OpenVPN configuration file(s), but every user can login with his own Active Directory login. The files are OpenVPN Configuration file Security certificate Key file Each user has to import those three files in his […]OpenVPN/config/ directory to be able to connect to pfSense VPN. If they connect with this connection/settings, they will see a login prompt for username and password and there they can use their Active Directory login credentials. :) Well… At the end I just had to create one single OpenVPN configuration package and user and don't have to create always a OpenVPN configuration for each user. Also I don't have to delete all those users after they may have left the company or just don't need the access anymore. To manage the access to pfSense, I've created a security group in our Active Directory, which has members like me and other users, which should have access to pfSense VPN. If somebody shouldn't have access anymore, I just have to remove his membership of this group. Very easy. :)
  • OpenVPN just won't work

    19
    0 Votes
    19 Posts
    4k Views
    T
    yes, I did that. After I switched to automatic, all other rules got disabled. After that I checked that all network applications are still running as intended and it turned out they were obsolete anyway :-D
  • Adding OpenVPN client/interface takes over WAN interface (bug?)

    3
    0 Votes
    3 Posts
    928 Views
    N
    I also have added and removed multiple OpenVPN interfaces before and have not seen this before. Did hestitate to post this issue, because I did expect a question if I could reproduce. But currently do not want to try reproduce, because of the risk of internet connection going offline again. Maybe later, have to schedule. But I am also quite sure I did not accidentally changed the WAN interface to OpenVPN interfaces. The moment (described as: "Then I saw no new gateway was added, but the WAN_DHCP (default) gateway was now automatically linked to new created OpenVPN interface") I clearly remember me thinking: how is this possible, that a way to change OpenVPN in upgrade from 2.1.5 to 2.2.5, why does anybody wants this to be done like this, I do not understand the purpose. I can PM the config history of that day if you would like? (I did make a total diff dump from beginning to end. Maybe something missing from the start of the day, I am not sure. Maybe there is also a easy way to create a total dump for each individual change made during the day from begin to end?)
  • Speed

    13
    0 Votes
    13 Posts
    2k Views
    O
    Thank you for all of the replies.  He said the quality was good after switching on the fastforwarding, which surprises me too, but he seems happy. The cpu doesn't seem to be an issue at all.  There is nobody around here that will sell me a faster upstream.  I hope Ting or someone like that will come here someday. This is for college sports, which they should sell internationally, but they don't, so he needs the US. Is this the type of vps you are talking about?  http://lowendbox.com  I thought about something like this before, but the ones I looked at were much more expensive. We started this way, because he was complaining about it and it dawned on me that it would be really easy to do with pfsense, so we could test it for free and go from there.
  • Problem with custom subnet for Windows client

    10
    0 Votes
    10 Posts
    2k Views
    maxxerM
    on a side note I douse tun, but the virtual driver in windows is called TAP anyway
  • Openvpn connect/disconnect custom scripts

    1
    0 Votes
    1 Posts
    495 Views
    No one has replied
  • Weird Site to Site Openvpn Problem

    3
    0 Votes
    3 Posts
    1k Views
    L
    To be honest I don't know why is set with such an algorithm  :o . I changed it to a more standard AES. I tried to change the network mask to 24 but nothin changed. For the firewall rules: How should be set? is not enough a "allow all" rule in both the openvpn tab? Thank you Update: now works, but the connection goes down every one hour or so and hangs on ping-reconnect. also I found a crash report logging into the server: http://pastebin.com/dHKJ9CKz Any advice about what to check? Thank you
  • OpenVPN Client not using defined interfaces

    1
    0 Votes
    1 Posts
    566 Views
    No one has replied
  • Reasonably secure config for OpenVPN?

    6
    0 Votes
    6 Posts
    2k Views
    D
    RDP over UDP works even on W7, the RDP 8.0/8.1 updates have been available for quite some time. https://support.microsoft.com/en-us/kb/2592687 https://support.microsoft.com/en-us/kb/2830477
  • PfSense in AWS as OpenVPN Client to OpenVPN server - Not working properly

    3
    0 Votes
    3 Posts
    1k Views
    P
    First, thank you for your quick response. I use Linux (10.157.30.147) on one end which is on the LAN of pfSense Firewall and Windows (10.0.10.35) on the other end behind OpenVPN server. No firewall enabled on either of the boxes. I did tcpdump on pfSense and also on the Linux machine. On the Linux machine I receive the echo request and it also generates the echo reply. Please see below. [root@ip-10-157-30-147 ~]# tcpdump -i eth0 -p icmp tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes 18:18:27.936003 IP 10.0.10.35 > 10.157.30.147: ICMP echo request, id 1, seq 2906, length 40 18:18:27.936055 IP 10.157.30.147 > 10.0.10.35: ICMP echo reply, id 1, seq 2906, length 40 18:18:32.928501 IP 10.0.10.35 > 10.157.30.147: ICMP echo request, id 1, seq 2907, length 40 18:18:32.928553 IP 10.157.30.147 > 10.0.10.35: ICMP echo reply, id 1, seq 2907, length 40 This means the ping (echo request) is traversing the tunnel and hits the Linux box, the Linux box responds as well. Let's take a look at pfSense now. The echo reply from Linux box is getting on the LAN interface of the pfSense firewall (xc1). Please see below output. [2.2.4-RELEASE][root@pfSense.localdomain]/root: tcpdump -i xn1 -p icmp tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xn1, link-type EN10MB (Ethernet), capture size 65535 bytes 18:22:58.711404 IP 10.0.10.35 > 10.157.30.147: ICMP echo request, id 1, seq 2961, length 40 18:22:58.711956 IP 10.157.30.147 > 10.0.10.35: ICMP echo reply, id 1, seq 2961, length 40 18:23:03.719116 IP 10.0.10.35 > 10.157.30.147: ICMP echo request, id 1, seq 2962, length 40 18:23:03.719689 IP 10.157.30.147 > 10.0.10.35: ICMP echo reply, id 1, seq 2962, length 40 However, the traffic does not go over the Tunnel interface (ovpnc1) interface or WAN interface (xn0) after the LAN interface (xn1)i checked tcpdump on both while running continuous ping and nothing is showing up. To make it more complicated and proof that routing works properly, when I initiate the ping form the Linux box towards Windows. It works flawlessly I can also see tcpdump on the LAN and Tunnel interfaces of pfSense. Please check below. (pfSense - LAN interface) [2.2.4-RELEASE][root@pfSense.localdomain]/root: tcpdump -i xn1 -p icmp tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xn1, link-type EN10MB (Ethernet), capture size 65535 bytes 18:33:56.021258 IP 10.157.30.147 > 10.0.10.35: ICMP echo request, id 10512, seq 22, length 64 18:33:56.106887 IP 10.0.10.35 > 10.157.30.147: ICMP echo reply, id 10512, seq 22, length 64 18:33:57.022572 IP 10.157.30.147 > 10.0.10.35: ICMP echo request, id 10512, seq 23, length 64 18:33:57.108684 IP 10.0.10.35 > 10.157.30.147: ICMP echo reply, id 10512, seq 23, length 64 (pfSense - Tunnel interface) [2.2.4-RELEASE][root@pfSense.localdomain]/root: tcpdump -i ovpnc1 -p icmp tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on ovpnc1, link-type NULL (BSD loopback), capture size 65535 bytes 18:36:47.092394 IP 10.157.30.147 > 10.0.10.35: ICMP echo request, id 14864, seq 4, length 64 18:36:47.240297 IP 10.0.10.35 > 10.157.30.147: ICMP echo reply, id 14864, seq 4, length 64 18:36:48.093977 IP 10.157.30.147 > 10.0.10.35: ICMP echo request, id 14864, seq 5, length 64 18:36:48.261499 IP 10.0.10.35 > 10.157.30.147: ICMP echo reply, id 14864, seq 5, length 64 All firewall rules for OpenVPN are any any.
  • Multicast over an OVPN bridged tunnel

    2
    0 Votes
    2 Posts
    973 Views
    B
    Any advise ?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.