• Monitor OpenVPN Certificate expiration dates

    5
    0 Votes
    5 Posts
    5k Views
    A
    We also needed to check the expiration date of pfSense certificates, my colleague wrote a Check_MK plug-in: https://github.com/ThomasKaiser/Check_MK/blob/master/agents/plugins/pfsense-certificate-expiration.sh
  • OpenVPN JumpCloud Server Certificate not showing up

    2
    0 Votes
    2 Posts
    467 Views
    se_marcS
    so after a bit of playing around i ended up figuring out how to get it working. i'm not the best with certs but here is a video for how to configure: https://www.youtube.com/watch?v=kHXRvdLpXmk steps: list itemBefore anything, follow the instructions on JumpCloud for setting up LDAP and binding a user to LDAP: https://support.jumpcloud.com/support/s/article/using-jumpclouds-ldap-as-a-service1 The following command outputs the certificate authority to the /tmp/ directory as jumpcloud.chain.pem. echo -n | openssl s_client -connect ldap.jumpcloud.com:636 -showcerts | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/jumpcloud.chain.pem Skip the first certificate of the chain. Add the next 3 certificates in the chain individually as Certificate Authorities in pfSense using the following settings: System > Cert. Manager > CAs tab > Add Descriptive name: JumpCloud CA (add a 1, 2, and 3 after each certificate) Method: Import an Existing Ceritifcate Authority Trust Store: check this box Randomize Serial: check this box Certificate Data: paste the single certificate here Save The following command outputs only the JumpCloud LDAP Server certificate to the /tmp/ directory as jumpcloud.ldap.pem echo -n | openssl s_client -connectldap.jumpcloud.com:636 | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/jumpcloud.ldap.pem Add the Server Certificate to pfSense. System > Cert. Manager > Certificates tab > Add/Sign Method: Import an Existing Certificate Descriptive name: JumpCloud Server Certificate Certificate data: paste the certificate here Save If you don't have a JumpCloud account set up and bound to LDAP, you'll need to do that first. You can use your account or create a new user. There only needs to be one bound account but there can be multiple. In JumpCloud: Users > Select the user you'd like bound to LDAP > User Security Settings and Permissions > check the Enable as LDAP Bind DN box and Save user LDAP > Add a new LDAP server > Add the user groups or users Create the LDAP Server in pfSense NOTE: you can get YOUR_ORG_ID from JumpCloud's Settings page System > User Manager > Authentication Servers tab > Add LDAP Server Settings: Type: LDAP Hostname or IP Address: ldap.jumpcloud.com Port Value: 636 (SSL) Transport: SSL - Encrypted Peer Certificate Authority: JumpCloud LDAPS SSL Client Certificate Protocol Version: 3 Search Scope - Level: Entire Subtree Search Scope - Base DN: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com Authentication Containers: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com Extended Query: &(objectClass=inetOrgPerson)(uid=*) Bind Credentials - User DN: uid= ldap-binding user,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com Bind Credentials - Password: ldap-binding-user's-password User Naming Attribute: uid Group Naming Attribute: cn Group Member Attribute: memberOf Group Object Class: groupOfNames Save Test the authentication in pfSense Diagnostics > Authentication > LDAP put in your user name and password and click Test You should see a green box indicating success Setting up OpenVPN: Type of Server: LDAP LDAP servers: Choose the JumpCloud LDAP server you created in the previous steps Certificate Authority: choose the OpenVPN authority you created earlier Certificate: Choose the OpenVPN certificate you created earlier Change any other settings to your liking and you're all set.
  • Remote Clients as well as Peer to Peer VPN

    3
    0 Votes
    3 Posts
    414 Views
    B
    @viragomann said in Remote Clients as well as Peer to Peer VPN: e wizard to configure the additional access server. Thanks so much, much appreciated
  • OpenVPN with laptop clients failing after pfSense Upgrade to 2.5.0

    15
    0 Votes
    15 Posts
    3k Views
    jimpJ
    @yobyot said in OpenVPN with laptop clients failing after pfSense Upgrade to 2.5.0: @eapperley This change worked for me, too. Is there a point release coming which will include this fix? Yes: https://redmine.pfsense.org/issues/4521#note-27
  • openvpn client not connecting and not shows why!

    4
    0 Votes
    4 Posts
    718 Views
    D
    cgv
  • 0 Votes
    1 Posts
    251 Views
    No one has replied
  • OpenVPN Client Dial Secondary External IP Address

    10
    0 Votes
    10 Posts
    849 Views
    B
    @viragomann Awesome, thanks so much for that, I really appreciate your help
  • Openvpn Manual Start

    openvpn
    1
    0 Votes
    1 Posts
    226 Views
    No one has replied
  • Fluctuations in the OpenVPN connection after upgrading to version 2.5.0

    1
    0 Votes
    1 Posts
    250 Views
    No one has replied
  • pfSense Client VPN Slow Speed

    3
    0 Votes
    3 Posts
    454 Views
    C
    @bcruze Thank you, made no difference in speed though. CPU is fine on the host as well.
  • Users OVPN auth failure with 2 backends after upgrade to 2.5.0

    6
    0 Votes
    6 Posts
    1k Views
    viktor_gV
    @proger said in Users OVPN auth failure with 2 backends after upgrade to 2.5.0: @viktor_g This bug not listed.. :( here is: Related issues Bug #4521: Issue with OpenVPN certificate depth validation and long certificate subjects
  • Remote client cannot access internal network

    12
    0 Votes
    12 Posts
    1k Views
    W
    I found the problem. There was a floating rule that disabled access to the internal network. We never used floating rules, but we did have virtual networks where the rules were for and these networks were removed with the move to the new location. After disabling these rules my test works (a simple webserver with a default page and a NAT-rule to access it from outside)
  • pfSense 2.5.0-RELEASE OpenVPN Cert bug

    10
    0 Votes
    10 Posts
    2k Views
    W
    @wtw Any suggestions on how to view the calls? It appears the place to check are the calls in ovpn_auth_verify during the TLS verify (line 27).
  • OpenVpn Clients, problem connecting simultaneous clients

    2
    0 Votes
    2 Posts
    347 Views
    M
    hi every one, i have the same probleme did you find any solution please?
  • Client timeouts and reconnections

    3
    1 Votes
    3 Posts
    696 Views
    P
    @dyener thank you for the pointer! Adding lport 0 to the client config fixed my issues.
  • IP BACKUP OPENVPN SITE2SITE

    7
    0 Votes
    7 Posts
    724 Views
    V
    @vettalex If it's an SSL/TLS setup check "Dynamic IP" in the server settings.
  • pfSense in AWS - OpenVPN slow performance

    3
    1 Votes
    3 Posts
    811 Views
    H
    @ghummantech Hi, I was able to resole the issue selecting different EC2 instance size, t3 or larger (without bust limit) seems to be resolving the problem. Give it a try and let me know.
  • OpenVpn + Radius

    1
    0 Votes
    1 Posts
    200 Views
    No one has replied
  • v2.5 and Synology OpenVPN client

    1
    1 Votes
    1 Posts
    1k Views
    No one has replied
  • Traffic Graph Incorrect Numbers

    3
    0 Votes
    3 Posts
    462 Views
    S
    I ran a few ookla speedtests, again, graph looks fine but numbers are nonsense. I have a 50mbit/s speed limiter on both pfsense boxes. [image: 1615081446614-pfsense_speedtest_dip.png]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.