• Switch OpenVPN to IPv6

    4
    0 Votes
    4 Posts
    575 Views
    P

    @the-other said in Switch OpenVPN to IPv6:

    you write that you want to change to IPv6 udp for openVPN but your screenshot shows you configured TCP port 1194...might be a problem, since UDP 1194 is standard port for openVPN (default), with TCP most ppl chose 443 (in order to reach your VPN in strict surroundings > hotel where UDP ist closed).

    I made a mistake, I changed it to IPv6 UDP (1194).

    That was the problem. Now it works :-)

  • New to pfSense and NordVPN - Is there a 2.7.2 guide for configuring them?

    6
    0 Votes
    6 Posts
    6k Views
    D

    In doing some more research I think I may use PIA (Private Internet Access) for my VPN rather than NordVPN. It is easier to configure. I appreciate all of the help I have received so far. Thanks to all.

  • Configure Which Machines Use VPN vs WAN

    2
    0 Votes
    2 Posts
    245 Views
    GertjanG

    @panzerscope said in Configure Which Machines Use VPN vs WAN:

    but failed to find a decent guide and that is to configure on PfSense

    Here https://www.youtube.com/@NetgateOfficial/videos on that page you'll find Advanced OpenVPN on pfSense 2.4 and Advanced OpenVPN on pfSense 2.4

    They are old, but they with show what needs to be done.

    What you probably want is this : Policy Routing Configuration.

  • Can't access LAN from VPN clients

    9
    0 Votes
    9 Posts
    924 Views
    Z

    @viragomann Now i can't connect to proxmox server only, but any other service is working

  • OpenVpn com 2 Links de Internet

    1
    0 Votes
    1 Posts
    203 Views
    No one has replied
  • Configuring DDNS for OpenVPN

    5
    0 Votes
    5 Posts
    610 Views
    Z

    @viragomann OH! I get it now! I thought I needed to configure it by editing the VPN's config/wizard. But still, I knew it has to have an easier way.

    Thanks a lot!

  • OpenVPN service stopping when Internet is gone v2.7.2

    4
    0 Votes
    4 Posts
    462 Views
    F

    @romega3 No it's pfSense OpenVPN on both sides.

  • 3 Sites VPN doesn't work correctly

    8
    0 Votes
    8 Posts
    851 Views
    J

    @hispeed A ha, yeah, you're using a /24 for the tunnel. No need for that. If you used a /30 or /31 you wouldn't need CSO at all.

  • How to add IntermediateCa using an external CA

    1
    0 Votes
    1 Posts
    204 Views
    No one has replied
  • Cannot connect with RDP via openVPN

    64
    0 Votes
    64 Posts
    15k Views
    I

    @johnpoz

    Johnpoz, Hey JohnPoz, I think you're the only one who can help me.
    I have done a refit of my network with Catalyst 3750 and 4948-10GE.
    I have a serious DNS problem.
    I have a few switches/routers that run OSPF, 1 router is connected via a /30 subnet (lag of four ports) to the firewall.
    All clients behind the ospf routers can reach the pfsense GUI webpage, but they cannot access the internet. Windows 10 diag indicates the DNS server is unavailable. Windows DNS server is configured with the IP address (LAN interface) of the firewall.
    A null route is configured on the ASBR (0.0.0.0 0.0.0.0 next hop IP) and has been propagated to all ospf switches/routers. In pfsense there is a static route (the lagg link) back to the internal ospf network. So I know that routing works from the client to the edge firewall and vice versa.
    I have configured a rule that allows the internal network (summary route) to the firewall and for outbound NAT, allows the internal network (summary route) to everything (*).

    Normally every client should be on the internet, but that doesn't happen, Windows 10 complains about DNS unavailable, I don't understand what is wrong.
    In pfsense I did a few tests with nslookup in diagnostics for msn.be for example and the output is positive. I do not immediately see an error in the output. Can I assume that DNS resolution works on the firewall?

    One way to test is to connect a PC in a /30 directly to the LAN port, but the /30 LAN port has a port channel, and I tried one link instead but that didn't work, couldn't connect to the firewall, probably because of the static route which expects another network device, I dont' know.

    Do you perhaps have some advice?Example.jpg

  • VMware ESXI 8 NIC Passthrough on WAN

    1
    0 Votes
    1 Posts
    241 Views
    No one has replied
  • OpenVPN Speed

    3
    0 Votes
    3 Posts
    489 Views
    W

    @marcelobeckmann

    Thanks really thankful for this :) will look into it.

  • OpenVPN Firewall/tun Question

    4
    0 Votes
    4 Posts
    552 Views
    V

    @CoffeeOrTea said in OpenVPN Firewall/tun Question:

    At the time I made this post, I didn't realize that you could assign an interface to OpenVPN. I eventually did, which added a 2nd tab to the firewall rules area, so now I have two OpenVPN tabs in the firewall rules area

    pfSense show particular interfaces on the rules page in upper-case letters. So I'd expect, that it is rather shown as "OPENVPN" there in addition to OpenVPN, wich is the interface group.

    if I have no rules at all on the OpenVPN tab, but then add a rule to allow WAN traffic on the OpenVPN interface tab, I don't get WAN access.
    But if I allow WAN on the OpenVPN tab, then it works.

    So you presumably did something wrong.
    OpenVPN is just the interface group and the interface is a member of it.
    Note that rules on interface groups have priority over ones on member tabs.

  • OpenVPN Client and Multi-WAN

    3
    0 Votes
    3 Posts
    427 Views
    M

    Thanks, that seem to solve the issue but feels like a workaround.

  • Site-to-site openvpn routing issue

    9
    0 Votes
    9 Posts
    1k Views
    B

    @viragomann
    It works !!
    Thank you SO MUCH for your precious help...

    I now need to adjust firewall rules.

    Thanks again

    Robert

  • VPN tunnel routing to wrong vlan

    1
    0 Votes
    1 Posts
    130 Views
    No one has replied
  • DNS entries vs NAT reflection and android always on vpn

    2
    0 Votes
    2 Posts
    324 Views
    D

    In the end I turned off NAT reflection for all but the VPN rule. The rest worked fine with the split DNS approach and no NAT reflection.
    I don't think it is doable to have the android openvpn client requery dns when transitioning networks. Though I guess you could have forwarding rule on the LAN that redirects VPN traffic to the pfsense interface where openvpn server is listening.

  • site-to-site ssl/tls with ospf

    10
    0 Votes
    10 Posts
    1k Views
    M

    @deet said in site-to-site ssl/tls with ospf:

    I'm moving forward now with a separate OpenVPN tunnel per remote site, each on a /30 point-to-point link. Deprecated or not

    If you are willing to spin up a new VPN overlay why not just use IPsec. Easier to maintain and run dynamic protocols and there are no deprecation notices.

  • Proper network subnet selection in site-to-site setup?

    17
    0 Votes
    17 Posts
    872 Views
    D

    That was the key clue. A Google search for that line led to another discussion in this forum. The last post in that discussion hinted at adjustment of the compression configuration. When I switched my server’s like this:

    Screenshot 2024-02-14 at 11.34.21 PM.png

    i.e., set the compression to “Refuse any non-stub compression,” I could see my client’s pfSense appliance at 192.168.4.5.

    Voilà!

  • pfSense UI doesn't support inline keys - tls-crypt-v2

    10
    0 Votes
    10 Posts
    4k Views
    M

    @Dyspareunia said in pfSense UI doesn't support inline keys - tls-crypt-v2:

    tls-crypt-v2 /var/etc/openvpn/client6/tls-crypt-v2

    Just wanted to say Thank you for this post. I was not able to add tls-crypt-v2 in the pfsense client creation GUI but with your approach it worked for me 😻

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.