• OpenVPN freezes but no crash

    1
    0 Votes
    1 Posts
    613 Views
    No one has replied
  • 0 Votes
    7 Posts
    2k Views
    DerelictD
    It looks to me like server1.conf is your site-to-site and server2.conf is your remote access. It also looks like your diagram should have 172.16.9.0/24 as your remote access network.  Is that true? If all that is the case, you have routes from pfSense for: route 192.168.2.0 255.255.255.0 route 172.16.4.0 255.255.255.0 …in both configs.  Those routes should only be in your site-to-site. If you want your remote access clients to access all LANs at all sites, you need to push them routes for everything, meaning 172.16.1.0/24, 172.16.2.0/24, 172.16.4.0/24, 192.168.2.0/24. And you need to push routes to all foreign networks to each site.  For instance, Satellite office 2 needs to be pushed routes for the following: 172.16.1.0/24 172.16.2.0/24 172.16.4.0/24 172.16.9.0/24 (Note you could just push a route to 172.16.0.0/16 instead.  Or even /20 in that particular case.)
  • Unable to connect most of the time via WAN to OpenVPN.

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN Dynamic Routing iroute and OSPF via CCD files [SOLVED]

    3
    0 Votes
    3 Posts
    3k Views
    C
    some additional assumptions, this scans the /var/etc/openvpn-csc file for custom client overrides.  It is expecting both an ifconfig and an iroute directive in these files to work.  You need both, the first pushes a "static" IP to the client so you can reference an iroute behind that interface.
  • OpenVPN allow 1 IP not all Lan visible

    2
    0 Votes
    2 Posts
    717 Views
    K
    On the VPN firewall, make 3 rules pass to 10.10.10.150/32 block 10.10.10.0/24 pass from any to any
  • Block traffic when VPN is down

    6
    0 Votes
    6 Posts
    8k Views
    D
    I see - Appreciate the info!
  • Routing Help

    2
    0 Votes
    2 Posts
    1k Views
    P
    When defining the tunnel, make sure to put all the relevant networks at each end into the Local Network/s and Remote Network/s boxes on the webGUI. Then routes across the tunnel will appear when the tunnel comes up. Put pass rules on each end of the tunnel to allow the incoming traffic from the other end. Put pass rules on local subnets firewall rules to pass the traffic for the other end without putting it to any gateway or gateway group. That way this internal private network traffic will be handed directly to the ordinary routing table. (If you have multi-WAN and thus have rules that feed lots of public internet traffic into varioues gateways or gateway groups, then the pass rules for the internal OpenVPN traffic need to come before all that - you do not want to accidentally push your internal traffic out some gateway to the public internet.)
  • OpenVPN clients on same subnet as interal network.

    8
    0 Votes
    8 Posts
    12k Views
    M
    My problem is this. I can ssh to all clients on my network and vpn just fine. But when I try to see their share folders I can not. I have done some reading and I'm starting to think it's because my VPNserver is not sending a gateway so the network stays unidentified jdsimonds, I believe it's already been said in one way or another, but everything is working as excepted.  You have configured a routed tunnel and you can access everything via IP.  However, broadcast traffic will not traverse a routed tunnel.  That is why you are unable to see shares, browse for computers, and access resources by name the way you are used to.  You will need to configure a bridged tunnel for that. Also, if your main concern is accessing shares and resources by name, just configure a DNS server and push it out to your clients. A bridged tunnel is less efficient and doesn't scale well.  Typically the only reason to go bridged is if you are running an application that is dependent on broadcast traffic. IMO, you'll be much happier keeping your routed tunnel and fixing your name resolution issue via DNS instead of bridging and replicating all your Broadcast (NETBIOS,etc) traffic over WAN links.
  • OpenVPN Site-to-Site TAP Help

    11
    0 Votes
    11 Posts
    8k Views
    Y
    Success!  I fixed the POS VLAN IP address, rebooted both boxes, and whole POS system now works.  Performance is a new issue, though.  A slight one or two second lag occurs sometimes at the client site POS terminals, between button presses and screen refresh.  It might be due to the TAP or the ~800 kbps upload limit at both sites.  This ain't over yet, but it works for now.  Thanks dotdash.
  • OpenVPN Cliënt export not working

    3
    0 Votes
    3 Posts
    1k Views
    DerelictD
    When the export links don't show up it's usually a certificate mismatch somewhere.  Like the user certificates aren't created under the same CA the OpenVPN server instance is set to use… NOTE: If you expect to see a certain client in the list but it is not there, it is usually due to a CA mismatch between the OpenVPN server instance and the client certificates found in the User Manager.
  • Route some internet traffic over VPN over VPN

    6
    0 Votes
    6 Posts
    2k Views
    DerelictD
    Paid OpenVPN servers usually push you a default route.  If you want to pick and choose what traffic you send over ovpnc3, add route-nopull; to its configuration then use policy routing to send select traffic over it. Also I'm not sure what we're looking at.  It looks like we're looking at a pfSense with a client that is getting a default route from it's VPN server but it also has a server defined.  Pushing a default route from that server shouldn't effect the default route on that pfSense but on its clients connected to the defined server. You might need to draw a diagram.
  • SOLVED - openvpn-multiwan-port share tcp 80 not work, pleas help

    1
    0 Votes
    1 Posts
    4k Views
    No one has replied
  • HOW TO Communicate openvpn client to LAN host (LAN IP's without gateway)

    7
    0 Votes
    7 Posts
    2k Views
    J
    PPTP is faster and easy but less secure and for some reason it is not working on some broadband device users here, maybe because it uses some shared IP. L2TP is good but giving me a hard time to it set properly, IPSec works well too particular on site-to-site using tunnel, but using client mode like openvpn I heard that its not working on some device/OS. I think my plan is not possible to work for now after your interesting feedback regarding on my concern. Putting my external server behind pfsense and use Virtual IP to solve this while finding some way to work it. Thanks again Derelict
  • Client can't ping a server on a different gateway

    4
    0 Votes
    4 Posts
    1k Views
    johnpozJ
    then you could create a static route on the box your trying to get to, so that it knows to talk to pfsense when talked to from a openvpn client.  Need to create a route for your vpn clients network pointing to the pfsense lan ip. Other way you could do it is nat it pfsense, so that vpn clients look like they are the pfsense lan IP - but this is bit more complicated. The correct solution though is to have pfsense be the endpoint of both of these connections - or just get rid of one of the connections, etc.
  • [SOLVED] OpenVPN Site to Site VPN and Client VPN routing howto

    4
    0 Votes
    4 Posts
    1k Views
    B
    I added to site to site VPN on client side: Remote Networks: 192.168.0.0/24 Now it looks like everything it's okay.
  • Setting up this VPN network

    1
    0 Votes
    1 Posts
    643 Views
    No one has replied
  • [SOLVED]: Route some traffic over site B gateway

    Locked
    3
    0 Votes
    3 Posts
    887 Views
    R
    Thank you so much, the final piece of the puzzle has been found ;-) The NAT table was something i completely forgot to check ;-). Rules that made my day: iptables -I FORWARD -i tun0 -o vlan2 -j ACCEPT iptables -t nat -A POSTROUTING -s 10.0.1.0/24 -o vlan2 -j SNAT --to-source $(nvram get wan_ipaddr) The first one to allow packets from the tunnel to go to the wan interface and the second to activate the natting for those packets ;-)
  • PIA VPN setup

    8
    0 Votes
    8 Posts
    2k Views
    W
    @Phurious: I have PIA setup on my pfSense 2.15 box.  What part is failing for you?  If you got to Status –-> OpenVPN what does it say for your PIA client?  Have you checked the OpenVPN logs for an error? Which method did you use? Were there any additional steps that you needed to take? Are there any services such as snort or pfblocker that could cause problems? UPDATE: We have success!! For some reason when I was adding the PIAVPN interface the Network Port wasn't saving as ovpn1 () but reverting back to something else. This time I did all the steps and then went through everything again et voila! Thanks to all that helped.
  • How to use pfSense as a 'client' to my off-site OpenVPN Access Server?

    3
    0 Votes
    3 Posts
    1k Views
    R
    Hmm - how to describe it. I want pfSense to somehow direct ALL Internet traffic to the OpenVPN. It is essentially SITE-TO-SITE, but the OpenVPN Access Server is not pfSense. It is literally a OpenVPN Access Server. The LAN host will already be connected to OpenVPN Access Server (my dedicated server at a datacenter) through pfSense. ALL 'LAN' hosts will use VPN Server 1 (dedicated server at a datacenter). ALL hosts on the LAN will use the VPN. So then I don't need to go to each individual host and install the OpenVPN client. I want to utilize my VPN without installing a client on each host. :)
  • Broken Gateway ? of default vpn route

    1
    0 Votes
    1 Posts
    832 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.