• Routing in openvpn

    2
    0 Votes
    2 Posts
    337 Views
    JKnottJ
    @gmbarlev There is no difference between routing through a VPN or nor. It's all about your routing configuration. A VPN is simply another interface. So, once you've verified the VPN is working, ensure your routing is correct.
  • This topic is deleted!

    3
    0 Votes
    3 Posts
    39 Views
  • FailOver once wan1 return, openvpn goes down

    1
    0 Votes
    1 Posts
    145 Views
    No one has replied
  • Trouble getting ExpressVPN running on pfSense 2.3.5

    10
    0 Votes
    10 Posts
    2k Views
    E
    OK, I did some further digging on these lines coming from my openvpn.log file: Mar 11 22:19:57 firewall openvpn[99120]: ++ Certificate has key usage 00b0, expects 00a0 Mar 11 22:19:57 firewall openvpn[99120]: ++ Certificate has key usage 00b0, expects 0088 I found an article on this site which is talking about OpenVPN and remote-cert-tls server option in Advanced Configuration -> Custom options. When I add the option "remote-cert-ku b0" just after the option "remote-cert-tls server" my openvpn client connection status went to "up". [image: 1584029851828-screenshot-from-2020-03-12-17-17-19.png] So now the VPN connection is up I can continue to configure pfsense to route the WAN through the tunnel. Keep you posted if necessary. Thanks for the help so far. Erik
  • No Internet with PIA And OpenVPN Server

    1
    0 Votes
    1 Posts
    228 Views
    No one has replied
  • OpenVPN 443 with WEB server

    1
    0 Votes
    1 Posts
    163 Views
    No one has replied
  • Fixed IP Client

    20
    0 Votes
    20 Posts
    1k Views
    S
    @johnpoz I followed the instructions but after a couple of days the problem is present again, the vpn client has been assigned the IP address: 10.0.2.3 how is it possible ? where am i wrong? thanks.
  • Change the route of OpenVPN

    1
    0 Votes
    1 Posts
    155 Views
    No one has replied
  • OpenVPN and NAT from External IP

    2
    0 Votes
    2 Posts
    336 Views
    V
    @tompark said in OpenVPN and NAT from External IP: Does anyone have any suggestions on what I have missed? You didn't mention, what's your problem.
  • Can't seem to access IPSEC tunnel to edgerouterX via openVPN

    1
    0 Votes
    1 Posts
    189 Views
    No one has replied
  • Help With OpenVPN Client Export

    7
    0 Votes
    7 Posts
    648 Views
    B
    @Rico said in Help With OpenVPN Client Export: I did....but seems I misunderstood. Thought you have one box running 2.4.4 and working with your andoid and another box with 2.3.5 throwing that error. -Rico Ah, I see. I still do have the 2.3.5 box running (not in production, just to fiddle with) but it will be turned into a NAS box shortly. I edited the file and for some reason the export from the 2.4.4 version is not putting my WAN IP in it. Once I added the IP, I was able to import it with no errors. Thanks
  • 0 Votes
    5 Posts
    985 Views
    N
    @kiokoman thanks for the tip, I have configured a bridge with linux tools (brctl) and I'm using virt-io and I thought that would be enough but it is in fact very reasonable that it would actually introduce limitations and weird behaviors like what I'm seeing, I will dig further the issue
  • Authentication fails for only some users

    4
    0 Votes
    4 Posts
    805 Views
    sullivasS
    I just wanted to post a follow-up in case someone in the future has the same problem and comes across this thread. We were able to determine that the service account we were using to bind to AD was unable to properly access the entire directory structure (still not sure why not, but that doesn't matter). I could see it make a connection to the domain controller and then attempt to check each of the containers defined in the pfSense authentication server, but it would return "0 users found" in the LDAP query even though the account to be authenticated was there in that container. What fixed it was to add that account we use for directory binding to the Built-In "Account Operators" group. After that everything has worked perfectly.
  • Accessing OPT1 network

    2
    0 Votes
    2 Posts
    435 Views
    R
    Okay, I believe all is working now. When you write things out as I did in this post, you realize what you're missing. I needed the gateway on my OPT1 interface to the 192.168.1.1 router we have. Now, I can see all.
  • OpenVPN Client IP Issue

    1
    0 Votes
    1 Posts
    182 Views
    No one has replied
  • Force some hosts through OpenVPN

    1
    0 Votes
    1 Posts
    212 Views
    No one has replied
  • Bundle OpenVPN Connect Client for MAC with the configs

    1
    0 Votes
    1 Posts
    126 Views
    No one has replied
  • 0 Votes
    4 Posts
    556 Views
    RicoR
    https://www.netgate.com/resources/videos/openvpn-as-a-wan-on-pfsense.html -Rico
  • Correct setup for pfSense + VPN + Pi-Hole ?

    2
    0 Votes
    2 Posts
    1k Views
    Z
    Bumping this and adding more specifics... According a post on the Pi-hole forum, the correct config is: Add the Pi-Hole IP address to pfSense > Services > DHCP Server > DNS Servers. Do not enable DNS Forwarder. Do not enable DNS Resolver. Do not add a DNS entry in the System > General Setup > DNS Server Settings. The last setting seems to be causing an issue -- the router is unable to connect to my VPN provider if no entry is made in System > General Setup > DNS Server Settings. It's also unable to connect if the Pi-Hole IP address is entered there. Specifying a public DNS, such as Clouldflare, does work -- but then I am not sure if all DNS queries are going through the Pi-hole?
  • OpenVPN not resolving internal DNS names

    6
    0 Votes
    6 Posts
    530 Views
    johnpozJ
    Well the only thing that can talk over the tunnel - is your vpn clients.. But sure you can limit what your vpn clients can access if you want/desire to do so. The automatic acls should prob be updated to auto allow tunnel networks to be honest.. But anyone that understands how the acls work, would know that they need to adjust them, etc. Glad you got it sorted..
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.