• Interface opvnc not appear on openVPN client connection

    5
    0 Votes
    5 Posts
    646 Views
    RicoR

    Share your OpenVPN Client settings (screenshots).

    -Rico

  • openvpn 86125 RESOLVE: Cannot resolve host address:

    2
    0 Votes
    2 Posts
    2k Views
    RicoR

    In Diagnostics -> DNS Lookup you can resolve this express vpn host or not?

    -Rico

  • OpenVPN acts as default Gateway. Why?

    4
    0 Votes
    4 Posts
    2k Views
    D

    @abadonna your link is down can you send me your tutorial. I'm trying to setup Secuirtykiss

  • only one user account works with openvpn

    14
    0 Votes
    14 Posts
    2k Views
    L

    i had it on authentication only in the open vpn server, now users are showing up for export, you nailed it thank you so much!

  • SSL/TLS + user auth / Openvpn two-factor authentication question

    4
    0 Votes
    4 Posts
    669 Views
    N

    @jimp

    Ok, Thanks Rico and Jimp !

    / br, pete

  • 0 Votes
    2 Posts
    590 Views
    iorxI

    SOLVED

    Do NOT use the character "¤"

    ¤

    in the password field. This makes pfsense create a config.xml.bad and revert to a previous version of the config.

    OpenVPN files under /var/etc/OpenVPN are created and active until reboot of pfsense.
    Newly created entry not shown in Services or Status, but still connecting in the background.

    My config.xml.bad, Under OpenVPN client section:

    <auth_pass>zYdfrJn&curren;bE</auth_pass>

    Using a password not containing "¤" does work, entry is created and functional.

    Anywhere said that password shouldn't contain strange characters? If not, this looks like a bug to me.

    Brgs,

  • OpenVpn:TLS Error: TLS handshake failed

    7
    0 Votes
    7 Posts
    6k Views
    johnpozJ

    @yash said in OpenVpn:TLS Error: TLS handshake failed:

    read UDP: Unknown error (code=10054)

    You need to validate that port is open from your client to the server.. It could be blocked at your client side, etc.. Or sure you could be blocking it on pfsense, or some nat router between.

    Is that IP your public IP that you xxxxx out?

    Lets see your firewall rules on your wan to validate 1199 is open.. Also your pfsense is not behind a nat right? And has public IP on its wan? Simple sniff on the wan for UDP traffic 1199 and then try to connect with your client will tell you for sure if the traffic is getting to pfsense or not.

  • OpenVPN + Dual WAN + CARP cluster

    3
    0 Votes
    3 Posts
    379 Views
    V

    I will take a look on those! Thanks for now!

  • OpenVPN: TLS Negotiation Failed?

    11
    0 Votes
    11 Posts
    2k Views
    A

    @derelict I hear ya’. That’s a bummer, but makes sense... I could maybe I replace our existing router with another pfSense one and do a P2P server between both of them instead so the firewalls can talk to each other? xFi isn’t the best with their interface - far too simple. Home-Network friendly I suppose.

    Thank you for the help though.

  • AES-NI / Cryptodev / OpenVPN – help a n00b understand

    39
    0 Votes
    39 Posts
    40k Views
    B

    Sorry to necrobump, but this should be pinned in official pfsense OpenVPN tutorials. Two years I've been using ~30-40Mps VPN being sure it's speed is limited by the provider. I just tested snd/rcvbuffer and fast-io and immediately landed on stable 60Mbps. Holy smokes! Thanks for making my life better :)

  • AWS OpenVPN WAN works LAN doesn't

    2
    0 Votes
    2 Posts
    289 Views
    D

    This was solved as you can't use a subnet that follows under the 10.1.0.0/16 VPC setup in AWS.

    10.1.99.0 changed to 192.168.XX.X/24 subnet worked

  • TAP bridge packet loss

    2
    0 Votes
    2 Posts
    474 Views
    P

    I just noticed in the OpenVPN client log the following:

    WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1601', remote='link-mtu 1602'

    Where does these MTU values comes from?

    I have no MTU defined in OpenVPN client config.
    I have no MTU defined in OpenVPN server config.
    I have no MTU defined in WAN interface.
    I have no MTU defined in OpenVPN interface.

  • Open VPN: can't ping local LAN host when connected

    12
    0 Votes
    12 Posts
    1k Views
    J

    Thanks Rico. I already had and used the first set of instructions.
    I'm watching the first video now.

  • PIA

    1
    0 Votes
    1 Posts
    266 Views
    No one has replied
  • Why is it so? VOIP requires interface rule

    1
    0 Votes
    1 Posts
    255 Views
    No one has replied
  • VOIP over OpenVPN post call delay for reuse

    1
    0 Votes
    1 Posts
    239 Views
    No one has replied
  • 0 Votes
    6 Posts
    623 Views
    RicoR

    Well with Remote Networks not matching properly I would expect it not working, so put your main office network 10.11.0.0/16 there.
    Can you ping main office network clients from the remote side pfSense directly?

    -Rico

  • OpenVPN server configuration file

    3
    0 Votes
    3 Posts
    367 Views
    A

    Perfect, thank you!!

  • Openvpn won't fallback to wan1 after failover to wan2

    2
    0 Votes
    2 Posts
    312 Views
    RicoR

    So you just do Multiple Remote Statements? This would be the behavior then.
    Check out https://www.netgate.com/resources/videos/advanced-openvpn-on-pfsense-24.html which covers different Multi WAN tactics for OpenVPN (starting at 40:08min).
    I recommend you to watch the whole video tho. ☺

    -Rico

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.