• Using 2 or more VPN Connections

    4
    0 Votes
    4 Posts
    925 Views
    S
    No I have 2 strongvpn accounts. For some devices I want to route it to account 1 but others I want account 2.
  • Possible DNS Issue?

    2
    0 Votes
    2 Posts
    716 Views
    J
    Are you behind a Domain controller ? is Pfsense your Forwarder or other server ? screenshot of your pfsense DNS setting please?
  • OpenVPN and iOS?

    3
    0 Votes
    3 Posts
    1k Views
    C
    return the iphone 6…buy android, problem solved  ::) Jamerson advice is dead on. It works fine for me, 2.1.5 with a 4s
  • Stupid question: does pfSense filter the VPN tunnel?

    7
    0 Votes
    7 Posts
    2k Views
    K
    Nope - Your VPN will cut through your pfsense like a hot knife through butter.  Once you are using a machine inside the LAN running vpn client, the vpn server and any other clients connected to that server and anyone with access to the server or one of the clients or anyone who has hacked into the server or any of the clients on that server potentially have access to your LAN freely. So, like I said before, hope you trust your VPN server.
  • VPN Site-to-Site. Network B accesses the Network A, but not otherwise.

    2
    0 Votes
    2 Posts
    666 Views
    M
    Might need to re-write this… it doesn't make sense, but I'm guessing you're trying to say one side is able to communicate with the other, but not vice versa. Post a network map.  We need details in order to help you troubleshoot. Post your server1.conf and client1.conf.
  • Update/new version available

    4
    0 Votes
    4 Posts
    986 Views
    johnpozJ
    Your talking about the export package - openvpn is base install of pfsense, its not a package Available: 1.2.13 Installed: 1.2.12 I just updated this remotely without any issues.
  • OpenVPN access for Ubuntu client

    5
    0 Votes
    5 Posts
    6k Views
    K
    I agree with you jimp.  The bad news is openvpn GUIs seem to all suck for me in linux.  The good news is once you figure it out, which isn't hard, vpn in linux is very reliable.  I'd say more than windows.
  • [OpenVPN] access the data via the WAN Interface IP

    2
    0 Votes
    2 Posts
    597 Views
    M
    viettruong, I do not see a question here.  Please clarify what you are trying to do.
  • How to get PEM format for clients?

    2
    0 Votes
    2 Posts
    3k Views
    DerelictD
    If you need the key, then you need to export the key (second export button).  Key blobs don't start with –---BEGIN CERTIFICATE-----  they usually start with -----BEGIN RSA PRIVATE KEY----- Looked at the link.  Export the p12 (third export button).  If it prompts for a password enter nothing (unfortunately).
  • OpenVPN Rules using an OpenVPN interface

    1
    0 Votes
    1 Posts
    545 Views
    No one has replied
  • 0 Votes
    1 Posts
    881 Views
    No one has replied
  • A.D and users permissions

    5
    0 Votes
    5 Posts
    1k Views
    V
    @pberis: Just for clarification, How do you use "Client Specific Overrides" with AD?  Thought I had read somewhere that you had to use local database for CSO … Is this no longer true? Okay, that was wild guess. I have no experiences with OVPN server in combination with AD. I just use local database, cause we need a fistful users only. However, if you use TLS the second recommendation should work. It does a good job for me with local user db.
  • Openvpn can't access LAN

    8
    0 Votes
    8 Posts
    5k Views
    D
    I think there's a basic misunderstanding here: well, what I can't understand is; why it works only if I disable clients from pfsense gui !! and if I activate them I can just see my vpn clients. in this exemple and I use the same configuration, agenthex and agentansi (disabled ) connect successfully and ping my internal network, but it's not the case for agentonsa which is connected but can ping only vpn clients. I would like to share print screen, to show you better my problem, but when I attach files I receive " 500 Internal Server Error ". OpenVPN: Client Disabled  Protocol  Server  Description YES  UDP  41.X.X.X:1194  agenthex        YES  UDP  41.X.X.X:1194  agentansi        NO  UDP  41.X.X.X:1194  agentonsa The diagram you posted earlier shows a central pfSense box controlling LAN 172.16.10.0/24. You also showed two different clients, one PC based and on Linux based, connecting to the pfSense box via OpenVPN. In order to make this scenario work, you need only 3 pieces. An OpenVPN SERVER running on the pfSense box A Windows compatible OpenVPN client running on the Windows box. A Linux compatible client running on the Linux box. That's it. There is no need for any OpenVPN client on the pfSense box. The OpenVPN server on pfSense sits and watches on port 1194 for clients attempting to connect. The clients on each machine try to connect to the server IP address on port 1194 to get a connection. The reason it only works when you disable the other "clients" is 1) they're conflicting with the pfSense Server and trying to use the same port (1194) and 2) THEY'RE NOT NEEDED TO MAKE THIS WORK!  (sorry for the rant  :)  ) Seriously, I think you've actually got this working, it's just simpler than you think.
  • MOVED: No puedo ver mi Lan

    Locked
    1
    0 Votes
    1 Posts
    482 Views
    No one has replied
  • MOVED: OpenVPN entre pfSense e endian

    Locked
    1
    0 Votes
    1 Posts
    602 Views
    No one has replied
  • Faulty openvpn-client-export config files.

    8
    0 Votes
    8 Posts
    4k Views
    S
    Hi, I have the same problem. I created a new certificate and recognized a mistyping in the Name. Then I deleted it. After I recognized the text in the WebGui of the Certificate Authority Manager: Warning: openssl_x509_parse(): illegal ASN1 data type for timestamp in /etc/inc/certs.inc on line 394 Warning: openssl_x509_parse(): illegal ASN1 data type for timestamp in /etc/inc/certs.inc on line 444 Warning: openssl_x509_parse(): illegal ASN1 data type for timestamp in /etc/inc/certs.inc on line 490 Maybe it is, because the name for the Cert. that I wrongly entered, was the same that was already in use? I can not export any Client or Certificates anymore, like elemay mentioned. Is there any possibility to get more details where the problem is caused by? Maybe some one could help me how to fix it. BR and many thanks indvance.
  • Problems with site to site

    3
    0 Votes
    3 Posts
    745 Views
    M
    Give us a network map showing what you're trying to do, so we can help you.
  • Multi-WAN, OpenVPN, and routes/iroutes

    2
    0 Votes
    2 Posts
    847 Views
    DerelictD
    This is a known limitation, huh. https://doc.pfsense.org/index.php/Multi-WAN_2.0#Policy_Route_Negation I guess a reasonable practice would be to always define at least a management network in IPv4 Remote Networks on your client so you can get in and add other networks if you have to go Multi-WAN on the client side. Something like this also seems reasonable and seems to work.  (Screenshots aren't uploading): IPv4 * LAN net * RFC1918 * * none   Add private destinations to negate for VPN traffic IPv4 * LAN net * * * WANGROUP none   Default allow LAN to any rule
  • Another "can't access my LAN" situation.

    14
    0 Votes
    14 Posts
    6k Views
    panzP
    @kejianshi: Try this - Just list it in "IPV4 local networks" along with the other /24 you have listed there and remove your push command. I wonder what that would do? Sorry, would you mind to elaborate? Thanks! :)
  • 0 Votes
    2 Posts
    1k Views
    D
    Do you have two separate pfSense boxes or one installation with two WAN NICs or one pfSense and something else?  It's not clear from your explanation. Are these two firewalls actually independent of each other or does one get it's WAN from the other? Is the pfSense OpenVPN instance the client or the server? Perhaps a simple diagram would make it easier to understand. The only thing else I can guess from your description is you may have a description/config issue as you say So I can connect to the pfsense but cannot ping any devices on the 10.1.52.0/22 network. but you describe the pfSense LAN as: LAN: 10.1.53.5 (connected to the main network 10.1.53.0/22 ) No dhcp, Do you expect a ping from 10.1.52.x to reach 10.1.53.5? What do your route tables on the OpenVPN connected device look like? One last sanity check, are you sure the internal LAN device will respond to pings from an external subnet (Win firewalls off, AV disabled, etc.)?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.