• [SOLVED]pfsense as openvpn client - issue with port forwarding

    Locked
    10
    0 Votes
    10 Posts
    20k Views
    jimpJ
    You can have rules on the OpenVPN tab just make sure they don't match the traffic that would be coming over the assigned interface. Meaning, specify a proper source on the rules for other VPN instances and not just use 'any' or at least make sure that they don't match the same exact traffic as the rules on the assigned interface. The wizard adds the any/any rule because most people don't want nor need to assign the VPN interface and just want to pass in all traffic from the VPN to their LAN or internal networks.
  • [Solved] Only partial LAN access!?

    Locked
    15
    0 Votes
    15 Posts
    5k Views
    C
    Thanks a lot for your reply  :) That did it, now everything works as expected, again a big THANKS to all of you who helped me out here  :) Have a nice week! Best regards, Chris
  • OpenVPN client cannot route to LAN

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    V
    @ciambellone: Hi All, I've resolved the problem. I've found an error in the configuration thanks a lot. hi sir! I failed you, but I do not know how to handle.You can share how to handle errors that are not.Thank you
  • Very slow OpenVPN through put

    Locked
    6
    0 Votes
    6 Posts
    6k Views
    S
    I have tried it from my parents house which has 15/5 and it is still stupid slow. What I am really trying to get to run better is file transfers and such to and from my home to my tablet/laptop. I have centralized all of my files on a home server and I would like to connect to it and be able view, download, upload, stream and szuch while out but with the 550kbs it is not working. I'm not funnling all my internet traffic thru the VPN so it is just file transfers. If I can get this to work properly I want to setup a backup server at my parents and do the backups over the VPN. Thanks for the help
  • Strange OpenVPN error

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    AhnHELA
    Check your firewall settings, and make sure your Protocol (UDP or TCP) and Port Number are set correctly.
  • OpenVPN + Client Export v0.29: Way around Windows UAC ?

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    N
    Yes I tried with the "OpenVPNManager GUI" checkbox option. And it seems to run as a service and it works around the UAC control as far as I can see that with the few tests I did. And it still allows different OpenVPN configs so you are able to select them from the new/different GUI - but they all must be in the new folder path and they must not be in a subfolder and so - of course - must have different filenames for .key, .p12 and .ovpn. If the config is in the new path it seems that it will be run as a service and if it is in the "old" path it will run "normal". Configs in both paths are possible. At least it seems to work and the new features and the slightly different behaviour in GUI will need some time to test but is probably a good possibility to use. :)
  • Route all traffic via VPN

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    G
    You have a problem with the default gateway for the LAN2 network. Try to manually set it as the OpenVPN one and let's see… Do you want to always route all traffic through the VPN, or only if it is up? Now, I really don't know about how pfSense behaves as an OpenVPN client (I just use it as a server). There must be an option to specify what to do with the traffic. Otherwise, I guess you could just setup some gateway failover between WAN an OpenVPN. Cheers!
  • IPVanish with pFSense

    Locked
    1
    0 Votes
    1 Posts
    6k Views
    No one has replied
  • How can I limit the number of connections in openvpn

    Locked
    3
    0 Votes
    3 Posts
    4k Views
    jimpJ
    There is a box on the server config: Concurrent connections Specify the maximum number of clients allowed to concurrently connect to this server. That limits the how many total connections can exist to the server.
  • OpenVPN Routing to other sites - Solved

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    R
    Thanks for the reply. The windows firewall was disabled on the server. I've tried it in reverse, and that worked. tracert 10.0.101.3 Tracing route to W7WS [10.0.101.3] over a maximum of 30 hops:   1    <1 ms    <1 ms    <1 ms  172.28.1.1   2    41 ms    41 ms    40 ms  10.0.2.1   3    77 ms    76 ms    76 ms  W7WS [10.0.101.3] Trace complete. I then tried accessing a non Windows Server and that worked too. After a bit more hunting round (as I said it's a network that I've inherited very recently) there was a firewall enabled on windows servers at the remote sites by the Endpoint Security with trusted networks that didn't include the VPN Network.
  • OpenVPN tunnel through LAN and no WAN

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    P
    I have an example install like this. The real internet comes through a Tp-link ADSL router (also has WiFi builtin) to an internal network - 10.49.120.0/24. The TP-Link is 10.49.120.41/24 and also has its wireless enabled so people with WiFi devices can connect to the LAN. But DHCP on the TP-Link is turned off. The pfSense is an Alix box with just the WAN port connected to this internal LAN and has address 10.49.120.250/24, and default gateway 10.49.120.41 (the TP-Link). pfSense DHCP is enabled, it gives out a range of addresses 10.49.120.100-199/24 with itself as the gateway. Manual Outbound NAT is enabled, and a rule added so that traffic from the clients comes into pfSense and then is NAT'd out through the TP-Link to the internet. (see screenshot - last rule) The advantage of this is that the TP-Link sees all the traffic as originating from the pfSense WAN IP 10.49.120.250 - so when traffic comes back in response, it is routed back to the pfSense, which can "unNAT" it and deliver to the original client. This means that pfSense can work properly (traffic flow in both directions goes through it) and you can do whatever filtering there. The pfSense has OpenVPN clients connecting out to other offices. The DNS Forwarder has Domain Overrides added to refer internal names to other office DNS Servers for internal resolution. Because the clients on the LAN (which to this pfSense is WAN) are using pfSense completely as their gateway, they can happily talk internally to things across the internal OpenVPN links, or externally to the real internet. The pfSense does all that for them. The main requirement is that you have a way to NOT get DHCP from the current default gateway (equivalent of the TP-Link in this example) - either disable DHCP on the current default gateway, or manually configure IP on the clients that you care about, so they use pfSense as their default gateway and DNS. (Note: in the screenshot 10.49.122.0/24 is the pfSense LAN port - there is nothing connected to that, but it would work as another routable subnet if needed/useful) [image: IJP-Manual-NAT.png] [image: IJP-Manual-NAT.png_thumb]
  • Trying to connect to Network Share fails - tap works/tun fails

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Setup remote access: remote host not accessible

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    M
    Couple things: In the Cryptographic Settings section, make sure you have a Peer Certificate Revocation List listed If the remote host has a software firewall enabled, make sure it is configured to respond to icmp What is the IP of the machine you are coming from?  Make sure it's not on the 192.168.101.0/24 network
  • OpenVPn no longer working, maybe config damaged

    Locked
    6
    0 Votes
    6 Posts
    2k Views
    C
    It looks like my cluster configuration is somehow "crippled", the openvpn problem i have must be a collateral damage. I'll update as soon as i'll have resolved.
  • OpenVPN in load balancing/failover scenario

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    In that way, if HDSL link goes down, all services will be still reachable via VPN / WAN2 link, even WAN2 is a private/natted connection. yes probably Also, if the WAN2 link goes down, VPN can be activated via WAN1, and again all services are available on both public IP. this might be a little tricky … there is, by my knowledge, no way to "activate" an openvpn connection upon failure. two things that might be worth a shot: -run the openvpn client (pfsense) on a virtual ip on the LAN interface and use a failover group to decide what WAN interface the client should connect to the server <-- perhaps someone has done this allready -perhaps the vpn provider is willing to offer 2 seperate openvpn connection, attached to the same public-ip ? Do you think is it possible ?  How I can manage the VPN as a WAN3 ?  Have someone any other suggestion ? most of it yes, some detail are a maybe. assign an interface to openvpn (interfaces–>assign). Lots of folks will probably have suggestions about the details :)
  • [SOLVED] Bad openVpn client config ?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    S
    Solved : A /30 will only work if you set up this with a shared key. For site-to-site you should use a shared key. Yes you will have to set an interface IP, because with a shared key no routes/IPs/DHCP-settings/anything will be pushed from the server. The configuration is only what you put into the config file. The reason why a /30 with a PKI won't work: In a PKI you have the x.1 IP for the server. Every time a client connects a new dynamic /30 subnet is added to the virtual interface. So x.0/30 initial IP of the Server. x.4/30 first client (x.5 server, x.6 client) x.8/30 second client (x.9 server, x.10 client) etc. This ensures that the clients can talk only with the server and not with each other directly.
  • OpenVPN server listening on 1194 - my connections is not on 1194

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    A
    HA! I feel dumb now :) Thank you for the quick response, and for the link!
  • Openvpn and few subnets

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Route or Firewall issue? (Simple setup)

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    E
    Thanks, fixed.  I had to create both WAN and LAN rules specifying the correct gateway interface.
  • Openvpn 1.2.3-RELEASE to openvpn 2.0.2-RELEASE (i386)

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    The keys to operate the VPN are kept in config.xml and will upgrade. If you want to start managing the keys from the GUI rather than easyrsa, then see this: http://doc.pfsense.org/index.php/Using_EasyRSA_Certificates_in_2.x
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.