• VPN auto reconnect

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    G
    Those 2 settings worked perfectly thanks. (NAT was pointing to the CARP VIP :) )
  • [OpenVPN Client Export: no option for private key passphrase?]

    2
    0 Votes
    2 Posts
    1k Views
    F
    Never mind. Found it.
  • Cannot connect to both firewalls over VPN

    1
    0 Votes
    1 Posts
    916 Views
    No one has replied
  • Open VPN Multi Gateway

    2
    0 Votes
    2 Posts
    1k Views
    C
    Anyone at all? Any opinions?
  • Client not learning a route to the pfSense inside LAN

    3
    0 Votes
    3 Posts
    1k Views
    B
    Thanks for coming back to me. It's now fixed. The issue was laptop privileges, in the end. Once I ran OpenVPN as the administrator, then it worked fine.
  • Can ping/connect from pfSense box, but not LAN…

    2
    0 Votes
    2 Posts
    2k Views
    A
    Aha… Figured it out from: http://doc.pfsense.org/Create-OpenVPN-client-to-TUVPNcom.pdf I needed to create an extra interface and gateway. All seems to work OK now...
  • NewBee QUESTION on openvpn

    2
    0 Votes
    2 Posts
    1k Views
    S
    A good place to start is to understand how tunnel networks work. http://openvpn.net/index.php/open-source/faq/75-general/293-what-is-the-principle-behind-openvpn-tunnels.html
  • 0 Votes
    2 Posts
    1k Views
    P
    The rules on an interface tab apply to traffic coming IN on that interface. The first packet when a "connection/flow/session" is first started is checked by the rules, then if it is permitted, a firewall flow/state is added, and subsequent packets in both directions that match the flow/state are allowed. Thus, to get out from LAN (to the internet…) a suitable pass rule is needed on LAN. For a connect coming from a client on the other end of an OpenVPN link, a rule is needed on OpenVPN to allow the incoming connect. Once the flow is established, the traffic in both directions for that flow "flows":) That might be enough to give you the concept and you will be able to apply it in practice.
  • OpenVPN for my Metro Ethernet traffic. At a loss

    8
    0 Votes
    8 Posts
    3k Views
    C
    Thank you Phil for all your help.  I finally got it up and running with your help and Jim's help.  Once I got the OPTn set to openvpn I had to set outbound nat on SITE A for SITE B to get out to public. All seems to be working good so far.    Now I will work on getting NAT working for the servers in SITE B through SITE A.
  • [Solved] Need clarification on site to site shared key

    8
    0 Votes
    8 Posts
    3k Views
    C
    @jimp: @CuriousG: Edit2: Site C will not always be up, will this affect communication between site A and B? Avoid using "edit" to ask questions. It does not notify that the post was updated the same way a reply does. If C is just another client, it won't affect anything between And B. If A were down, then B could not reach C, but that is the only failure that would be a problem. Thanks.  It makes perfect sense if A was down since it is the "server".  Only reason I asked is I got a call today that they weren't able to reach A from B but since this user is a handful in the first place I didn't know what to think when I activated site C and everything was fine.
  • [Patch included] Active Directory group membership checking for 2.0.1

    5
    0 Votes
    5 Posts
    4k Views
    D
    Hey, I have been trying to use your patch and can't work out what I'm doing wrong. I applied the patch OK and created a new entry in 'System: Authentication Servers' then configured OpenVPN server to uses it. Any help would be great The System: Authentication Servers entry: System: Authentication Servers Descriptive name OpenVPNUsers Type LDAP LDAP Server Settings –----------------------------------------------------- Hostname or IP address 10.10.10.10 Port value 389 Transport TCP Peer Certificate Authority internal-ca Protocol version 3 Search scope Level:  Entire Subtree Base DN:  DC=domain,DC=com,DC=au Authentication containers Containers:  CN=OpenVPN Users,OU=Users,DC=domain,DC=com,DC=au Bind credentials User DN:  readonlyuser Password:  password User naming attribute samAccountName Group naming attribute cn Group member attribute memberOf OpenVPN Log: Jun 6 15:51:24 openvpn[45763]: 49.176.33.77:19534 [] Peer Connection Initiated with [AF_INET]49.176.33.77:19534 Jun 6 15:53:55 openvpn[45763]: 49.176.33.77:19534 Re-using SSL/TLS context Jun 6 15:53:55 openvpn[45763]: 49.176.33.77:19534 LZO compression initialized Jun 6 15:53:58 openvpn: : Now Searching for janedoe in directory. Jun 6 15:53:58 openvpn: : The container string contains at least one group, we need to find user DN now Jun 6 15:53:58 openvpn: : User found Jun 6 15:53:58 openvpn: : Now Searching in server OpenVPNUsers, container CN=TechNet OpenVPN Users,OU=Users with filter (samaccountname=janedoe). Jun 6 15:53:58 openvpn: : Search resulted in error: Success Jun 6 15:53:58 openvpn: : ERROR! Either LDAP search failed, or multiple users were found. Jun 6 15:53:58 openvpn: user janedoe could not authenticate. Jun 6 15:53:58 openvpn[45763]: 49.176.33.77:19534 WARNING: Failed running command (–auth-user-pass-verify): external program exited with error status: 255 Jun 6 15:53:58 openvpn[45763]: 49.176.33.77:19534 TLS Auth Error: Auth Username/Password verification failed for peer
  • OpenVPN Management Daemon Unreachable

    3
    0 Votes
    3 Posts
    2k Views
    M
    Well, I figured out half of my issue… In the OpenVPN configuration, I mistakenly assumed that leaving the "Concurrent connections" field blank would default to unlimited, but once I plugged an arbitrary positive integer in there, VOILA!  My Tunnelblick client on the Mac can now fully establish a connection. I still can't get the Windows machine to connect.  I originally installed the client, the imported the configuration from the client export package.  I think I'm going to try and use the Windows Installer export instead and see if that fixes the issue.
  • Multi Protocol (TCP/UDP)

    4
    0 Votes
    4 Posts
    2k Views
    jimpJ
    Yes, so long as a route is pushed for the other tunnel network. e.g. the UDP VPN pushes a route to the client's for the TCP VPN tunnel network, and vice versa.
  • TLS handshake errors

    9
    0 Votes
    9 Posts
    3k Views
    E
    Something interesting is going on in DNS land, is evidently part of my problem. WAN is, unfortunately, dynamic. Have had a DynDNS.org domain since it was free, and pfsense is (supposedly) configured to update it, and reports it as being up to date (green.) However dyndns's own nameservers reported a different address. This may be some misguided part of their transformation to "notfree." Doesn't actually make me want to pay them, for some reason. Does not appear to be a "caching" problem. Appears to be a "reported up to date, but not up to date" problem. I just corrected it by going straight into dyn.com. That was after checking the username setting and re-pasting the password into pfsense - same username and password pasted into DYN worked, so those are right. Got a quick subdomain over at FreeDNS (afraid.org), had to make a guess at what the "Auth Code" was, popped that in and appear to have pfsense ACTUALLY updating it to the correct address, so a config exported with that address actually connects somewhat reliably. So far. Many twisty little passages, all alike, indeed.
  • PfSense 2.0.3 + OpenVPN, resolving problems.

    12
    0 Votes
    12 Posts
    4k Views
    Z
    found the options myself :) but thanx for all the help! :)
  • Site to site VPN routing additional subnetworks at Main server site

    12
    0 Votes
    12 Posts
    4k Views
    P
    @tbaror: Ok, I think the mystery solved , but still not works :( , i discovered next hop right after external fw leg is 192.168.0.254 so this is why there is no  routing to 192.168.0.0/24 but what more mysterious is when i do tracroute from firewall its go trough vpn tunnel  ,but not the case from lan client side Any idea Thanks IMHO, when you ping/traceroute from a LAN client, the packet goes first to your other gateway. That other gateway knows about 192.168.0.0/24 attached to (or close to) it. So it sends it there. When you ping/traceroute from pfSense, it knows a route to 192.168.0.0/16 across the OpenVPN, so sends it across the OpenVPN. I am finding more and more, rule #1 of designing a private IPv4 network is, never use 192.168.[0-n].0 addresses (where "n" is maybe up to 10 or 20). Then you avoid conflicts with all the default private networks that get in your way when your network map expands. I pick a "random" 10.n.0.0/16 and make /24s out of that - e.g. 10.73.0.0/24 10.73.1.0/24 … IPv6 is much better, with a large chunk of "private" address space to randomly pick from.
  • OpenVPN site to site setup problems

    10
    0 Votes
    10 Posts
    5k Views
    G
    More port forward… ![port forward 2.JPG](/public/imported_attachments/1/port forward 2.JPG) ![port forward 2.JPG_thumb](/public/imported_attachments/1/port forward 2.JPG_thumb)
  • Problems with StrongVPN

    2
    0 Votes
    2 Posts
    1k Views
    B
    Ok, after several hours of fiddling around I have sort of gotten it to work. Its a bit strange but after turn on comp-lzo in the advanced config it does seems to now work, ie if i go to whatsmyip.org it now shows as the strongvpn. It does seem to be quite slow and is constantly dropping…so this will require more work I feel but at least it is now working.. I hope this will help others who have the same problem.
  • Problem with OpenVPN connecting

    7
    0 Votes
    7 Posts
    3k Views
    P
    Yes, the wizard should create some decent rules to let traffic through. Traffic from the Windoes client should have a source IP in the tunnel network, so your extra rule should be a good thing. Post a screenshot of the rules you have on OpenVPN now.
  • Transparent firewall thru OpenVPN site-to-site?

    6
    0 Votes
    6 Posts
    2k Views
    F
    Itried switching to tap but get this error: openvpn[5474]: WARNING: Since you are using –dev tap, the second argument to --ifconfig must be a netmask, for example something like 255.255.255.0. (silence this warning with --ifconfig-nowarn)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.