SOLVED: the Client certificate was not present, apparently the OpenVPN configuration Wizar only create a "Server Certificate", so the user one have to be created manually.
@gertjan I took a look at the OpenVPN access server documentation and logs.
The connection issue is due to a TLS error. I have spent some time looking into it and learned more about the access server.
Long story short, I decided to switch from the access server to a pfSense OpenVPN server.
Main reason is that I found the amount of configuration options in the OpenVPN access server quite limited.
I managed to set up get connected to the pfSense OpenVPN server quite easily but I encountered a new problem. I can not connect to certain websites.
@jknott
I finally solved creating another phase2 in ipsec, now works fine.
As described here:
https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/multiple-subnets.html
We ran into a similar issue with pfSense 2.5.1 running OpenVPN with RADIUS and 2FA/MFA. For us, the fix adding these options in the OpenVPN Client Export tool under Additional configuration options :
@umm12
I was part of the pfsense team before and I using pfsense for about 100 different projects now. But it is not possible to use two way/side SSL for openvpn in this job. You can use a shared certificate for all your clients that if clients do not have that certificate can not enter your service with a username and password.
thanks
I'm guessing that there are limitations or bugs when trying to use a TAP interface in a peer to peer setup. Or maybe you have to add in some custom settings to make it work. Either way, I had to go with layer 3 TUN mode and use a dedicated PC client to relay DHCP and bridge the layer 2 traffic via a 2nd VPN connection using remote access. This method doesn't scale well and is a bit over complicated, but it does what I need for now.
Try using Ivacy's Netherlands VPN. I've never came across any of the problems mentioned. I get fast internet speeds with no throttling, be it for torrenting or streaming or any other purpose.
I’m having the same scenario. 2 Torgaurd VPN clients, and they end up with the same virtual IP addresses, and traffic through the VPN stops.
A restart of pfsense would previously resolve the issue by assigning different virtual IP’s, but over the last week or so both connections get the same.
@topogigio
Yes, with TLS auth, only clients with a certificate signed by the CA which is selected in the server settings are allowed to connect.
You can additionally check „strict user CN matching“ to ensure all clients can connect with their own cert.