• [Help] Configuring Open VPN to bridge same subnets/vlans over wan tunnel

    1
    0 Votes
    1 Posts
    211 Views
    No one has replied
  • Firewall rules w/mixed interface assignments

    1
    0 Votes
    1 Posts
    158 Views
    No one has replied
  • OpenVPN as a WAN - IPv4 works buy IPv6 leaks

    8
    0 Votes
    8 Posts
    731 Views
    Y
    @Bob-Dig I need to get some work done right now and I don't know enough to figure this out quickly so I just did a factory reset and I'm just going to use the IVPN app on my computer today… Really frustrating but… No choice right now. Thanks for trying to help!!
  • How to use OPT1 port to segment VPN traffic outside of LAN traffic?

    3
    0 Votes
    3 Posts
    342 Views
    V
    Thanks for your help Netblues, helped to understand better what I need to do
  • Unable to connect to openvpn

    7
    0 Votes
    7 Posts
    2k Views
    J
    @nikkon thanks you for the information!
  • Poor perfomance over OpenVPN

    4
    0 Votes
    4 Posts
    493 Views
    DaddyGoD
    @jordiSL said in Poor perfomance over OpenVPN: FW: Super Micro XG-1537 You mean, like original Netgate hardware (XG-1537)? @jordiSL "I get is 30Mbps" Yes, it seems low... (This gives me almost 10x higher speed (M11SDV-4C-LN4F), so your device also needs to know this speed) interesting to read this: https://docs.netgate.com/pfsense/en/latest/book/hardware/hardware-sizing-guidance.html two things I'm thinking about now: loader.conf.local (flow control (FC), EEE, hw.igb.rx_process_limit="-1" hw.igb.tx_process_limit="-1, etc.) https://docs.netgate.com/pfsense/en/latest/hardware/tuning-and-troubleshooting-network-cards.html https://calomel.org/freebsd_network_tuning.html @jordiSL "The client fiber is 300Mbps which I'm connected." incorrectly configured this side or incorrect measurement method... BTW: OpenVPN dslreports.com (on 500/200 - ISP): [image: 1596809326215-c7581716-ed59-4378-b5c7-5617a6c24f44-image.png] and what about these? ifconfig igb0 -rxcsum -rxcsum6 -txcsum -txcsum6 -lro -tso -vlanhwtso (igb, IX, em, etc.)
  • OpenVpn howto masquerade all VPN traffic

    open vpn
    9
    0 Votes
    9 Posts
    2k Views
    johnpozJ
    Then its something with the switches.. Do they have gateways set? Do they allow access from other than their own network.. Are their masks set correctly.. What is your tunnel network, if they are set for say 10/8 and think your coming from a local IP, they won't send answer back to gateway, etc.
  • OVPN Client to multi-site

    3
    0 Votes
    3 Posts
    324 Views
    M
    Thank you very much! That works perfect!
  • Firewall rules for every Openvpn-client, is ip-adress fixed?

    3
    0 Votes
    3 Posts
    365 Views
    horshackH
    @dotdash Thank you for this helpful hint. I did this: VPN - openvpn - Client Specific overriedes - add common name: xxx IPv4 Tunnel network: 192.168.10.200/24 (network 192.168.10.x is the ipv4-tunnel I also use for my other "normal" users without fixed ip address) IPv6-Tunnel network: fd73:123:456:2::200/64 (network fd73:123:456:2 is the ipv6-tunnel I also use for my other "normal" users without fixed ip address) Now I can create firewall rules (Firewall/Aliases/Edit) specific for my clients.
  • Issues with OpenVPN on pfSense 2.4.5 <-> Robustel R2000-4L

    2
    0 Votes
    2 Posts
    192 Views
    B
    Ok this is "solved", if you can call it that. I gave up trying to get OpenVPN running on the Robustel. I instead used a OpenWRT based router to connect to the very same pfSense, had it working in under 10 minutes.
  • VPN Client, ClamAV and PFblocker

    10
    0 Votes
    10 Posts
    1k Views
    W
    Here is a utube from Lawrence about Suracata and encryption. I am not a IT pro. Maybe some can let me know if you find this accurate? https://www.youtube.com/watch?v=7gZYbIr_Qj4
  • OpenVPN Firewall Rule Help

    9
    0 Votes
    9 Posts
    1k Views
    N
    Figured it out on my own, had to reach the pfSense Book, some googling, and testing on a standalone station. Forum was not much help, honestly. What I did: Put a deny all IPv4+6 right above the default OpenVPN allow any any rule Only permitted the ports needed to allow file sharing and AD authentication (Google them. It should be 135, 137-139, 88, 445, etc. if you have older equipment) I then made an alias for my client IP, Internal IPs I need to manage, and ports for that management. So ports 3389,22,80,443, etc. It's whatever you need for your situation. When making new users for other clients I forced them to a single IP within the Client Specific Override and made sure to allow random ports for concurrent connections Make new users and assign them into groups if they need special access, like IT needs to RDP to a server etc. DO NOT USE THE SAME USER ACCOUNT FOR ALL CLIENTS, you can do this but it's a liability, hard to manage, and have organized logging. If it's just a few people, I can understand it, but for 50-100? make the users or link to an authentication server That got me up and going for the most part, I had to work with legacy VMWare, so I had to reinvent the wheel with some of the virtual networking/bridging. TIP: Read the pfSense Book first for any questions you have Understand the rule processing order Group interface rules are in a higher order than your interface rules, so filter the group first, the interface LAN should be filtered afterwards to follow suit. This is just what I did to fix my problem, I've found decent guides with these links and this documentation... (see below) https://docs.netgate.com/manuals/pfsense/en/latest/the-pfsense-book.pdf https://chrislazari.com/pfsense-setting-up-openvpn-on-pfsense-2-4/ https://www.informaticar.net/openvpn-on-pfsense-enable-access-to-the-lan-resources/ keep in mind that the last two links do not highlight security after making it work, that's what the pfSense book is there to provide. Read page 172 and finish that chapter to understand it. Then, like I said, test it yourself and verify your rules work. I wasn't able to find a direct answer for my question and struggles, so I'm hoping this helps someone too. I've attached pictures too because maybe I'm wrong and there's a better way to do it. [image: 1596549869660-filteredopenvpngroup.png] If this is wrong, feel free to correct me and give me a better solution. Thanks
  • 0 Votes
    1 Posts
    596 Views
    No one has replied
  • OpenVPN traffic blocked after datacenter outage

    2
    0 Votes
    2 Posts
    261 Views
    T
    Well, this morning everything is back to normal... I have no clue about what happened, but anyway sorry for the noise.
  • Trouble getting only some traffic to route through VPN client

    3
    0 Votes
    3 Posts
    366 Views
    T
    @viragomann wow, that was it. when I checked the "Don't pull routes" option, that was exactly what I needed to get it to work. Now, VLAN 10 goes through the WAN and VLAN 50 goes through the VPN. Thanks very much!
  • 0 Votes
    3 Posts
    358 Views
    V
    @velupazhani You have to add an additional (or multiple if needed) phase 2 to the IPSec configuration for the OpenVPN tunnel. In the OpenVPN server settings add the network(s) behind the IPSec to the "Local networks" to push the route to the clients.
  • Client connected via OpenVPN, not routing through IPSec

    4
    0 Votes
    4 Posts
    500 Views
    M
    The solution to my problem was to ditch policy-based IPSec and switch to route-based IPSec. This reduces the number of phase 2 entries by a lot but requires more static routes. IMHO it's better this way because there's no intransparent mix of different ways of routing packages between their destinations. Now everything is just in the routing table.
  • pfSense OpenVPN server, Asus RT-AC66U client

    8
    0 Votes
    8 Posts
    2k Views
    DaddyGoD
    @ReneMG said in pfSense OpenVPN server, Asus RT-AC66U client: Try this: appropriate
  • questions about openvpn on pfsense

    2
    0 Votes
    2 Posts
    190 Views
    RicoR
    There is no limitation in pfSense, you can have as many Users or OpenVPN Instances as you want. The hardware depends on your WAN and VPN throughput, not really the number of VPN users. -Rico
  • Unexplainable trouble with OpenVPN connection - beer for tip to fix it :)

    Moved
    16
    0 Votes
    16 Posts
    1k Views
    K
    Good morning, As of 1.8. I can confirm that the secondary WAN is up and working ”as before” - the FUP was reset. So it really is a ISP “feature” - they block access between their clients. So thanks to my multi WAN setup i was not aware of this limitation and “suddenly” i experienced that once the secondary WAN was not working thanks to the applied FUP. Thanks to all of you for your support.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.