• 10 Votes
    23 Posts
    22k Views
    GertjanG

    @Bambos said in HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection:

    for the remote access VPN, if is SSL/TLS + User auth, does this working with freeradius as well ?

    I'm using FreeRadius myself for the captive portal.
    Never tried to do this ... 😊

    You probably want also see this one also : FreeRadius on pfSense software for Two Factor Authentication although I presume that article was written for those who wanted to "why do things the easy way if much harder is so much better ?"

    @Bambos said in HEADS UP: OpenVPN deprecating shared key mode, requires TLS, deprecating cipher selection:

    i have many 2.6 versions clients to upgrade

    Keep in mind that 2.6.0 uses the "old" (now completly ditched because of security) OpenVPN (and now also old OpenSSL !!) libaries.
    The recent pfSense uses the more modern OpenVPN and OpenSSL.

    All this means that some options won't work anymore.
    Some more options will work, but will be depreciated soon (as usual).
    I Use OpenVPN myself, so I always have a look at the "source" : web pages like this and the classic openvpn support forum.

    The OpenVPN client also changed to support the newer OpenVPN server.

    And yes, I agree, syncing the entire openvpn user fleet can be a hassle.

  • Scaling OpenVPN (and VPNs in general)

    Pinned
    12
    6 Votes
    12 Posts
    12k Views
    M

    I have discovered that OpenVPN implementation in PFsense is slow even without ciphering data, look at my post:
    link text

  • OpenVPN Documentation

    Pinned Locked
    1
    0 Votes
    1 Posts
    35k Views
    No one has replied
  • 0 Votes
    1 Posts
    17 Views
    No one has replied
  • 0 Votes
    3 Posts
    31 Views
    L

    For reference, the site-to-site environment we had set up between the two locations was based on this official Netgate configuration:
    👉 [OpenVPN + OSPF Site-to-Site Setup]

    This is the exact topology and integration model that was implemented, that worked flawlessly until the upgrade to 24.11, which further supports the conclusion that the issue lies with the OpenVPN tunnel performance rather than OSPF itself.

  • 0 Votes
    2 Posts
    169 Views
    patient0P

    @chitchat said in OpenVPN wizard WAN rule allows outside access to the administrative WebGUI:

    The only pass rule for WAN is one created by the OpenVPN wizard

    The pfSense+ OpenVPN Wizard created this rule, or what wizard? That's more a "let's get hacked" rule.

    The "OpenVPN OVPN WAN Remote Access for Cos wizard" rule allows access from any outside IP, any protocol to the pfSense+ address.

    What you want is to follow Netgate docs: OpenVPN Firewall Rules.

    Basically: change protocol to UDP, destination port 1194 (if the OpenVPN port left as standard).

  • 0 Votes
    7 Posts
    191 Views
    JKnottJ

    @pietsnot56 said in Endpoint address family (IPv6) is incompatible with transport protocol (udp4):

    Any idea what's wrong?

    Many cell networks are now IPv6 only. On Android devices, 464XLAT is used to connect to IPv4 only sites over an IPv6 only network. iPhones use something similar, but I don't know the details. Perhaps there's some issue there. My phone gets the IPv4 address 192.0.0.4, which is reserved for 464XLAT, as well as a global IPv6 address.

    I have pfSense configured to allow openVPN to use either IPv4 or IPv6 to connect. Do you have IPv6 available from Telenet?

    BTW, Telenet used to be an X.25 packet switched network back in the dark ages. The company I used to work for provided Telenet in Canada and I maintained part of that system.

  • Openvpn Failover

    3
    0 Votes
    3 Posts
    93 Views
    K

    @rajukarthik Outbound or inbound?

  • Slow throughput when using Windows OpenVPN clients vs Linux

    1
    0 Votes
    1 Posts
    27 Views
    No one has replied
  • Accesssing a local subnet defined as an alias over LAN from OpenVPN

    1
    0 Votes
    1 Posts
    43 Views
    No one has replied
  • Upgrade 2.6 to 2.7 Open VPN broken

    Moved
    5
    0 Votes
    5 Posts
    110 Views
    V

    @stephenw10 Yes you are correct, I misunderstood myself. After my box crashed doing the 2.6.0 to 2.7.0 upgrade and eventually after getting 2.7.0 to work, I compared both xml backup files and only saw differences in time stamps, but now realise it's the import of updated packages that caused my problem.

    I'm running ZFS and will look at taking an image snap once I work out how to get from Pfsense to FreeBSD, out and back via a USB3 port. That suggests I need an external monitor, keyboard, and mouse on the box, unless it can be done through Pfsense GUI, but that won't work for recovery if the GUI has crashed. I've met these situations before and an image snap can only be trusted to work if you've actually used it successfully to recover. In the PC world I've trusted and used Acronis for years. Thanks for the link. I've always created bootable flash sticks and created matching config XMLs. Once the box crashes, I'm offline with no internet access to download anything or get help asking questions. I still keep an ISP Thomson box handy just in case.

    Thanks for your help - regards - Vox

  • SiteToSite only oneway

    5
    0 Votes
    5 Posts
    90 Views
    G

    Solved, since i'm using azure vm i'd to add route on azure portal.

    Thanks to all

  • 0 Votes
    1 Posts
    62 Views
    No one has replied
  • 0 Votes
    2 Posts
    93 Views
    B

    Update:

    I had the same issue today, configuring another client with the same topology.
    This time i had another pfsense 2.7.2 needed the extra routing on CSO when i created a remote access open VPN Server on the same pfSense.

    I lost access suddenly during configuration, and then i had to use again Client specific override for the VPN Tunnel in order to communicate again. Based on above, it seems that Open VPN inter-routing acting strangely.

    Is this a miss-configuration from my side, and i should always have that extra routing for the remote access tunnel ? or is a bug in the OpenVPN implementation on pfSense ?? Still i'm wondering why some instances working and some not.

    Please, awaiting for any comments and if someone faced that again in the past.

  • 0 Votes
    6 Posts
    167 Views
    V

    @Martek said in NAT from internet host through WAN to VPN connected host on specific tcp port:

    My posibility is to use "Client Specific Overrides" to adjust that end of the VPN tunnel.

    Yeah, the CSO is needed on the server to route the traffic to the proper client. But it doesn't do anything on the client side.

    However using "Client Specific Overrides" with "Redirect Gateway: Force all client generated traffic through the tunnel" to be set, doesn't change the result.

    I'd expect, that it would work with this option, presumed the route on the client is really added.
    This would route any upstream traffic from the client over the VPN, however, but not only responses on the forwarded requests. Is this, what you want?

    If so the outbound NAT rule on WAN for LAN2, you mentioned above, is needed to get internet access.

    For testing the routing, on pfSense try to ping the host in LAN2 from the LAN1 IP. Ensure that the firewall of the host itself doesn't block access from outside.
    Also check if the upstream traffic is routed over the VPN by accessing whatismyipaddress.com or something else showing you source IP.

  • monitoring certificate & CRL expirations

    1
    0 Votes
    1 Posts
    48 Views
    No one has replied
  • Can connect to OVPN Server and that's about it

    15
    0 Votes
    15 Posts
    326 Views
    GertjanG

    @pfsblah said in Can connect to OVPN Server and that's about it:

    I can't give thumbs up

    Gave you one 👍

  • open VPN with server internet

    2
    0 Votes
    2 Posts
    98 Views
    J

    It sounds like your VPN is successfully connecting, but it’s only routing traffic for internal access—not tunneling all internet traffic through the VPN server. To make sure all traffic, including public browsing, uses the VPN’s location/IP, you need to enable full tunnel routing.

    Here’s what you should check and configure:

    Server Configuration (server.conf or openvpn.conf)
    Add this line:

    push "redirect-gateway def1 bypass-dhcp"

    This tells the client to route all internet traffic through the VPN.

    Enable IP Forwarding on the VPN Server
    On Linux:

    echo 1 > /proc/sys/net/ipv4/ip_forward

    Or permanently in /etc/sysctl.conf:

    net.ipv4.ip_forward = 1

    Configure NAT on the Server (iptables example)

    iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE

    Replace 10.8.0.0/24 with your VPN subnet and eth0 with your actual network interface.

    Client Configuration
    Make sure the client doesn’t override the redirect:

    Remove any pull-filter ignore "redirect-gateway" line

    Allow the server-pushed route

    If you're planning to serve multiple clients or rotate egress IPs, consider integrating proxy rotation on the VPN server side. This can be done with tools like a rotating outbound proxy pool or IPtables-based policy routing, especially useful for web scraping, testing, or anonymization scenarios.

  • OpenVPN PacketLoss

    1
    0 Votes
    1 Posts
    91 Views
    No one has replied
  • OpenVPN TOTP - 50X error on RADIUS authentication

    1
    0 Votes
    1 Posts
    73 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.