• How to route single client through openvpn tunnel

    3
    0 Votes
    3 Posts
    622 Views
    G
    According to this video https://www.youtube.com/watch?v=ov-xddVpxhc You can use firewall rules to exclude the hosts that you dont want to go through the vpn tunnel. So if you set static ip's for the hosts that use the vpn tunnel an make a firewall alias for the dhcp range and use this alias in a firewall rule which will pass the vpn tunnel and to go through the wan Wouldn't that work?
  • 0 Votes
    4 Posts
    2k Views
    T
    Jimp can you take a quick look at my other theard, basiclly the same issue but I noticed a change in routing table that effects my other vlans. i'm trying to understand what can cause the change in routing table. The "static" part is removed when openvpn dies, after it reconnects it's not replaced. I'm giving up on UDP for the moment, but i made more comments about that in the other thread. https://forum.pfsense.org/index.php?topic=145237.0 Before OpenVPN connection dies Destination        Gateway            Flags    Netif Expire default            10.75.1.2          UGS      pppoe0 PUBLIC-IP.static link#13            UHS        lo0 After OpenVPN connection dies. Destination        Gateway            Flags    Netif Expire default            10.75.1.2          UGS      pppoe0 PUBLIC-IP        link#13            UHS        lo0
  • OpenVPN client with kill switch

    4
    0 Votes
    4 Posts
    2k Views
    DerelictD
    Not a pfSense problem. You might want to consult your operating system or OpenVPN support/forums for that. (Viscosity tells me when I am disconnected…) Someone else might know. Personally I think you're overthinking it. I would figure out why your home pfSense is crashing. Mine never does.
  • Ping between OpenVPn Peer to Peer doesn’t work

    1
    0 Votes
    1 Posts
    309 Views
    No one has replied
  • OpenVPN Remote Access segment traffic.

    1
    0 Votes
    1 Posts
    377 Views
    No one has replied
  • Certificate Issues

    7
    0 Votes
    7 Posts
    2k Views
    V
    I'm also using OpenVPN Connect 1.2.9 build 0 (iOS 64-bit) and there's no problem like that.
  • [Solved] LAN to LAN not routing

    15
    0 Votes
    15 Posts
    1k Views
    B
    For anyone who stumbles across this thread, the solution was to add the OpenVPN connection as a Interface on the client side. After creating the interface, restart the OpenVPN service and add allow firewall  rules for the interface. For OSPF to work, you need to add the interface on both ends. It's also advised to remove/disable the default OpenVPN rules as they'll supersede the interface rules if matched first.
  • Site-To-Site Remote can not access Lan

    3
    0 Votes
    3 Posts
    442 Views
    ?
    facepalm That was it! I added the rules to the Firewall and now does everything work as expected. Thanks for the right pointer  :)
  • Open Vpn not connecting from client side

    2
    0 Votes
    2 Posts
    441 Views
    V
    Check the client log and post it here. Also look if there are entries in the server log.
  • Pfsense with OpenVPN and AD authentication -> how can i use MFA ?

    2
    0 Votes
    2 Posts
    340 Views
    jimpJ
    You'd add that on your AD setup, not on pfSense. Look into AD-based multi-factor auth.
  • OpenVPN 2.4.4

    2
    0 Votes
    2 Posts
    677 Views
    A
    Do you have an example? Our configuration on six boxes started on pfSense 2.3.4 and i upgraded it to 2.4.2_p1 on all of them. I did not have to change anything on our OpenVPN configurations so far.
  • Ifconfig mismatch help needed

    3
    0 Votes
    3 Posts
    718 Views
    F
    simples thanks very much, all sorted  :)
  • Restrict OVPN client Access to Single PC

    4
    0 Votes
    4 Posts
    824 Views
    S
    Can someone help  :'(
  • Client Specific Override - can't communicate

    3
    0 Votes
    3 Posts
    575 Views
    S
    Looking for a solution  :'(
  • Site to site working. Now need a 2nd & 3rd

    2
    0 Votes
    2 Posts
    456 Views
    L
    I have successfully set up 4 site with independent connections between each other (see attached). ![4 Site connection with pfSense and openVPN.png_thumb](/public/imported_attachments/1/4 Site connection with pfSense and openVPN.png_thumb) ![4 Site connection with pfSense and openVPN.png](/public/imported_attachments/1/4 Site connection with pfSense and openVPN.png)
  • Basic walk though

    2
    0 Votes
    2 Posts
    578 Views
    R
    If you want all ethernet ports to have the VPN then it should do that by default.
  • OpenVPN speed vs hardware

    10
    0 Votes
    10 Posts
    4k Views
    R
    @Rango: @Ryu945: Crypto-Dev by itself also did nothing.  I only got it to work when both were turned on. That's interesting. I now only have Crypto Dev on both sides and it boosts 20% so i can get 120Mbs on N3150 and medium is about 115-117Mbps but when i switch to only AES-NI it goes down by 20% to base line with is about 100Mbps which is what you see in screenshot above. I tried it every possible combination and that's what i'm getting. At least i'm happy Cryptodev is working and boosting a bit, 20%. Maybe if AES-NI would work it would boost much more. I dunno what the expectation of hardware based acceleration should be. I just reported what my testing yielded. I am happy with pfsense but it seems AES-NI module is not working and looks like Cryptop Dev is FreeBSD solution to it, for now maybe. Maybe in 2.5 this will change when they focus on it.  I can't wait if so. I am however disappointed i purchased N3150 however. I didn't do enough research then. The fact that i owned asus 87u also purchased for encryption. It is now exclusively AP. I guess as they say u learn on your own mistakes. I've learned. Thanks for posting your results. :) I did this AES-NI test with the version that came out before the Spectrum/Meltdown bug so I don't know if things have changed in the version I currently run.  I will have to run more test at a later time.  I did notice a massive speed reduction after that update.
  • Multiple VPN and Multiple Wan

    3
    0 Votes
    3 Posts
    677 Views
    R
    1)  Do you have duel WAN working by itself? 2)  Just for a sanity check, is there a reason your using two WANs?
  • PfSense 2.4.2P1 - OpenVPN with CARP VIP

    3
    0 Votes
    3 Posts
    596 Views
    R
    Thanks for the assist.  Turns out, I had to generate a new VPN profile for my client to get it working.  Editing the old VPN config (changing port numbers and IPs) did not work…
  • [Solved] Cannot access LAN when bypassing VPN

    7
    0 Votes
    7 Posts
    818 Views
    T
    @Derelict: It works if it is positioned ABOVE the policy-routing rule in the interface rule set. Forgive me, I guess I mix up the terms… Please see attached screenshot, that is what I thought you meant by putting it on the WLAN interface. But now I made a new floating rule like the 2nd screenshot and it works, I guess that is what you meant is a more neat solution? ![WLAN rules.PNG](/public/imported_attachments/1/WLAN rules.PNG) ![WLAN rules.PNG_thumb](/public/imported_attachments/1/WLAN rules.PNG_thumb) [image: Finale.PNG] [image: Finale.PNG_thumb]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.