• OpenVPN Client Deployment Options

    1
    0 Votes
    1 Posts
    388 Views
    No one has replied
  • OpenVPN IPV6 Question

    1
    0 Votes
    1 Posts
    392 Views
    No one has replied
  • Can not establish connection to OPENVPN server

    4
    0 Votes
    4 Posts
    744 Views
    GertjanG
    @abonent1978 If the only VPN config present contains : remote 171.x.x.x 1199 Then where does "92.113.146.1:1194" come from ? What / who is the client VPN ?
  • Slow VPN speed on OpenVPN through PFSense

    4
    0 Votes
    4 Posts
    952 Views
    P
    Several things will affect performance. VPN will always be slower due to the encryption-decryption processes. What else is the VM host doing ? Have you tried other encrytpion algorythms ? What CPU is the client using ? Perhaps run PfSense on it's own hardware ?
  • Unable to connect to my server

    2
    0 Votes
    2 Posts
    505 Views
    V
    @IT-META I guess, your "TLS Key Usage Mode" is wrong. You can either configure it for authentication only or auth + control channel encryption. Check your server settings and configure the client accordingly.
  • OpenVPN Auth failure

    2
    0 Votes
    2 Posts
    363 Views
    X
    I found an error in the RADIUS server setup that has fixed this issue.
  • 0 Votes
    3 Posts
    615 Views
    C
    @patient0 Thanks much, I'll check it out!
  • 0 Votes
    1 Posts
    174 Views
    No one has replied
  • 0 Votes
    3 Posts
    440 Views
    L
    For reference, the site-to-site environment we had set up between the two locations was based on this official Netgate configuration: [OpenVPN + OSPF Site-to-Site Setup] This is the exact topology and integration model that was implemented, that worked flawlessly until the upgrade to 24.11, which further supports the conclusion that the issue lies with the OpenVPN tunnel performance rather than OSPF itself.
  • 0 Votes
    7 Posts
    1k Views
    JKnottJ
    @pietsnot56 said in Endpoint address family (IPv6) is incompatible with transport protocol (udp4): Any idea what's wrong? Many cell networks are now IPv6 only. On Android devices, 464XLAT is used to connect to IPv4 only sites over an IPv6 only network. iPhones use something similar, but I don't know the details. Perhaps there's some issue there. My phone gets the IPv4 address 192.0.0.4, which is reserved for 464XLAT, as well as a global IPv6 address. I have pfSense configured to allow openVPN to use either IPv4 or IPv6 to connect. Do you have IPv6 available from Telenet? BTW, Telenet used to be an X.25 packet switched network back in the dark ages. The company I used to work for provided Telenet in Canada and I maintained part of that system.
  • Slow throughput when using Windows OpenVPN clients vs Linux

    1
    0 Votes
    1 Posts
    201 Views
    No one has replied
  • Accesssing a local subnet defined as an alias over LAN from OpenVPN

    1
    0 Votes
    1 Posts
    201 Views
    No one has replied
  • Upgrade 2.6 to 2.7 Open VPN broken

    Moved
    5
    0 Votes
    5 Posts
    769 Views
    V
    @stephenw10 Yes you are correct, I misunderstood myself. After my box crashed doing the 2.6.0 to 2.7.0 upgrade and eventually after getting 2.7.0 to work, I compared both xml backup files and only saw differences in time stamps, but now realise it's the import of updated packages that caused my problem. I'm running ZFS and will look at taking an image snap once I work out how to get from Pfsense to FreeBSD, out and back via a USB3 port. That suggests I need an external monitor, keyboard, and mouse on the box, unless it can be done through Pfsense GUI, but that won't work for recovery if the GUI has crashed. I've met these situations before and an image snap can only be trusted to work if you've actually used it successfully to recover. In the PC world I've trusted and used Acronis for years. Thanks for the link. I've always created bootable flash sticks and created matching config XMLs. Once the box crashes, I'm offline with no internet access to download anything or get help asking questions. I still keep an ISP Thomson box handy just in case. Thanks for your help - regards - Vox
  • SiteToSite only oneway

    5
    0 Votes
    5 Posts
    658 Views
    G
    Solved, since i'm using azure vm i'd to add route on azure portal. Thanks to all
  • 0 Votes
    1 Posts
    218 Views
    No one has replied
  • 0 Votes
    2 Posts
    343 Views
    B
    Update: I had the same issue today, configuring another client with the same topology. This time i had another pfsense 2.7.2 needed the extra routing on CSO when i created a remote access open VPN Server on the same pfSense. I lost access suddenly during configuration, and then i had to use again Client specific override for the VPN Tunnel in order to communicate again. Based on above, it seems that Open VPN inter-routing acting strangely. Is this a miss-configuration from my side, and i should always have that extra routing for the remote access tunnel ? or is a bug in the OpenVPN implementation on pfSense ?? Still i'm wondering why some instances working and some not. Please, awaiting for any comments and if someone faced that again in the past.
  • 0 Votes
    6 Posts
    840 Views
    V
    @Martek said in NAT from internet host through WAN to VPN connected host on specific tcp port: My posibility is to use "Client Specific Overrides" to adjust that end of the VPN tunnel. Yeah, the CSO is needed on the server to route the traffic to the proper client. But it doesn't do anything on the client side. However using "Client Specific Overrides" with "Redirect Gateway: Force all client generated traffic through the tunnel" to be set, doesn't change the result. I'd expect, that it would work with this option, presumed the route on the client is really added. This would route any upstream traffic from the client over the VPN, however, but not only responses on the forwarded requests. Is this, what you want? If so the outbound NAT rule on WAN for LAN2, you mentioned above, is needed to get internet access. For testing the routing, on pfSense try to ping the host in LAN2 from the LAN1 IP. Ensure that the firewall of the host itself doesn't block access from outside. Also check if the upstream traffic is routed over the VPN by accessing whatismyipaddress.com or something else showing you source IP.
  • monitoring certificate & CRL expirations

    1
    0 Votes
    1 Posts
    200 Views
    No one has replied
  • Can connect to OVPN Server and that's about it

    ovpn server firewall log
    15
    0 Votes
    15 Posts
    2k Views
    GertjanG
    @pfsblah said in Can connect to OVPN Server and that's about it: I can't give thumbs up Gave you one
  • open VPN with server internet

    2
    0 Votes
    2 Posts
    339 Views
    J
    It sounds like your VPN is successfully connecting, but it’s only routing traffic for internal access—not tunneling all internet traffic through the VPN server. To make sure all traffic, including public browsing, uses the VPN’s location/IP, you need to enable full tunnel routing. Here’s what you should check and configure: Server Configuration (server.conf or openvpn.conf) Add this line: push "redirect-gateway def1 bypass-dhcp" This tells the client to route all internet traffic through the VPN. Enable IP Forwarding on the VPN Server On Linux: echo 1 > /proc/sys/net/ipv4/ip_forward Or permanently in /etc/sysctl.conf: net.ipv4.ip_forward = 1 Configure NAT on the Server (iptables example) iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE Replace 10.8.0.0/24 with your VPN subnet and eth0 with your actual network interface. Client Configuration Make sure the client doesn’t override the redirect: Remove any pull-filter ignore "redirect-gateway" line Allow the server-pushed route If you're planning to serve multiple clients or rotate egress IPs, consider integrating proxy rotation on the VPN server side. This can be done with tools like a rotating outbound proxy pool or IPtables-based policy routing, especially useful for web scraping, testing, or anonymization scenarios.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.