• Can ping LAN hosts from VPN client, but cannot SMB browse?

    Locked
    5
    0 Votes
    5 Posts
    6k Views
    johnpozJ
    Great - just so you know, does not have to be h-node, you could set that to meet your resolution needs.  H is just hybrid will check wins first if one set, then broadcast. If you don't have any plans for wins, etc then you could just set it to B-node for broadcast only, etc.
  • Site-to-Site Routing

    Locked
    6
    0 Votes
    6 Posts
    2k Views
    chpalmerC
    Also- In your open VPN rules put your addresses    192.168.0.0/24 ect… Your LAN rules have a lot of redundant rules.    The ANY ANY rule pretty much does it... What version of pfSense are you running?    I havent had a client side openvpn gateway since 2.0.1 came out... Shouldn't have one on the server side... Mine- ifconfig 10.0.8.1 10.0.8.2 lport 1194 Yours (client side)is different from mine…    I don't think yours took...
  • Help - OpenVPN Tunnel has bandwitdh limit per user?

    Locked
    4
    0 Votes
    4 Posts
    17k Views
    K
    Through further testing, I discovered that this issue only occurred when doing SMB file copies from a Win7 machine to a Samba server (or vice versa).  The issue was caused by the settings of SO_SNDBUF and SO_RCVBUF socket options in Samba.  The recommended settings of 8192 cause a significant performance hit when transferring files over a VPN.  Changing the settings to 65536 cured the problem completely. Kevin
  • Can Ping Gateway, Cant Ping Anything else?!

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    M
    Bridged puts you logically on the LAN and could be considered easier, but all broadcast traffic will traverse the tunnel and an ethernet header is added to every packet creating overhead. Routed functions essentially the same… you can still connect to network shares, ping LAN IP's, ping by name (/w WINS), etc.  Also, only traffic destined to the client or the LAN will traverse the tunnel making it more efficient.  So... to each their own :) I've never tried a bridged setup, but I'm betting that OPENVPN tab is the OPT1 interface you renamed to OPENVPN and bridged to your LAN per the instructions from http://hardforum.com/showthread.php?t=1663797. If you add a pass any any rule to the OPENVPN tab you should be able to pass traffic.
  • OpenVPN + BGP finally stabilized

    Locked
    3
    0 Votes
    3 Posts
    5k Views
    K
    Yes I do. All/All Pass. Its definitely odd behavior… I have rules on OpenVPN, and All/All pass on each OpenVPN interface, assigned and set. And the block would show as coming from that interface. See, TCP SYN packets get through.. its something to do with state keeping. I am not a pf savvy guy (I know the basics, but analyzing the blocks is a bit beyond me at the moment)
  • GRE over OpenVPN for VLAN Site to Site

    Locked
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • Site to Site and Road warrior combined?

    Locked
    7
    0 Votes
    7 Posts
    4k Views
    K
    Tried that it though I didn't wait that long enough. I ll just tried again if that works. Thanks
  • Open vpn acess in local lan

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    M
    Post your tunnel settings and the firewall rules on your openvpn tab.
  • Cannot access LAN from OpenVPN server to pfSense OVPN client

    Locked
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • OpenVPN: connecting to LAN subnet

    Locked
    14
    0 Votes
    14 Posts
    8k Views
    P
    This line looks like a problem: 10.0.0.0        255.0.0.0        On-link          10.0.0.9    266 Your 10.0.0.9 interface (on your server, if I understood the descriptions correctly) is thinking that it is sitting on a 10.0.0.0/8 network. So when it replies to any 10.n.n.n addresses, it will think it can reach them directly on its local LAN. It should be in the 10.0.0.0/24 network. Then it will send packets for 10.0.10.0/24 network addresses to the router.
  • Exceptions for some web pages

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Errors with my OpenVPN

    Locked
    8
    0 Votes
    8 Posts
    7k Views
    D
    Did I put the wrong files??  ???
  • Access to external subnet (Hairpinning or similar)

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    i dont see a reason to use any kind of nat. as i understand currently the 10.10.88.0/24 is routed over the vpn and can contact clients on 192.168.78.0/24. if it were me i'd just add routes on both ends for the openvpn subnet (10.0.34.0/24), that way vpn users can go over the tunnel to reach the devices behind ASA5505.
  • Migrating OpenVPN filtering setup from 1.2.3 to 2.0.1

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Error msg when trying to create a CA

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    jimpJ
    What were you entering into all of the fields for the CA? As it says there, one of the strings was too long. Not sure which one it was complaining about though, if we can find out and repeat it, the input validation can be fixed to print a nicer error.
  • LAN connection problem after reboot.

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    R
    It is now working again  ;D The problem was that one of the routes did not survive the reboot.
  • 0 Votes
    5 Posts
    3k Views
    jimpJ
    I can make one for you also - just send an e-mail to wikiadmin (a) pfsense (d) org and it'll go to anyone who can make it for you. We'll need the username, password, e-mail, and name you want on the account.
  • Two route added by openvpn

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    N
    Look at the server configuration [image: 476896openvpnconfig.jpg]
  • Unable to setup OpenVPN client.

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    R
    Im still new to most network related issues, so maybe I'm using the wrong terminology when I search for how to set this up. But I have read every tutorial I could find with Google, I have read every tutorial I could find here on the forums, and I cannot find how to set-up this VPN connection. Can anybody at least point me in the right direction?
  • Pfsense to dd-wrt openvpn tunnel

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    C
    I use a P2P Shared Key tunnel… Not sure if this will help you but here is an example of my DD-WRT config.. And nothing is NAT from what I can tell. Straight routing..  pfsense site is 192.168.0.x, the other site is 192.168.50.x... 172.16.50.x is the tunnel. Startup commands # Config for Site-to-Site SiteA-SiteB echo " remote pfsense IP/Host proto udp          port 1195 dev tun0 persist-tun persist-key resolv-retry infinite secret /tmp/static.key nobind mute-replay-warnings verb 3 comp-lzo keepalive 15 60 daemon " > SiteA-SiteB.conf # Config for Static Key echo " -----BEGIN OpenVPN Static key V1----- -----END OpenVPN Static key V1----- " > static.key # Create interfaces /tmp/myvpn --mktun --dev tun0 ifconfig tun0 172.16.50.2 netmask 255.255.255.0 promisc up # Create routes route add -net 192.168.0.0 netmask 255.255.255.0 gw 172.16.50.1 route add -net 192.168.1.0 netmask 255.255.255.0 gw 172.16.50.1 route add -net 192.168.60.0 netmask 255.255.255.0 gw 172.16.50.1 route add -net 192.168.100.0 netmask 255.255.255.0 gw 172.16.50.1 route add -net 192.168.200.0 netmask 255.255.255.0 gw 172.16.50.1 # Initiate the tunnel sleep 5 /tmp/myvpn --config SiteA-SiteB.conf firewall commands, I need to tweaks these but they work… just can't ping the dd-wrt router but i can telnet/web into it # private subnets (anything FROM these subnets) iptables -A ALL_ACCEPT -s 192.168.0.0/16 -j ACCEPT iptables -A ALL_ACCEPT -s 172.16.50.0/24 -j ACCEPT iptables -A ALL_ACCEPT -s 172.16.60.0/24 -j ACCEPT # Open firewall holes iptables -I INPUT 2 -p udp --dport 1195 -j ACCEPT iptables -I FORWARD -i br0 -o tun0 -j ACCEPT iptables -I FORWARD -i tun0 -o br0 -j ACCEPT
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.