• Multi-VPN Client and Firewall Rule Issue (Not a Gateway Option)

    2
    0 Votes
    2 Posts
    401 Views
    P

    I removed all the VPNs and walked through the process again, seems to be working now as it is an available gateway now.

  • Difficulties on pfSense 2.4.3-p1 and OpenVPN on WAN TCP 443

    2
    0 Votes
    2 Posts
    477 Views
    U

    @unknowneleven said in Difficulties on pfSense 2.4.3-p1 and OpenVPN on WAN TCP 443:

    Hi. I have been trying to make OpenVPN work on TCP 443 since the day one that I installed pfSense. I've managed to get it working in pretty much any port and protocol I've tried, except on TCP 443. I knew that it could conflict with the webConfigurator port, so from the beginning of the installation I changed it's port to 8443, and I've even checked on Sockets that there is indeed no other service binding or trying to bind on WAN:443, only OpenVPN.

    I've tried to connect on my phone and my notebook, but none will. Ironically, when I try to connect from inside my LAN, it works immediately. It only doesn't connect from outside my network.
    I've checked my firewall rule on the WAN interface, but it's as it should be.

    In fact, when I try to connect to the OpenVPN on TCP 443, appears a strange connection on Sockets, with question mark (?) identification on the WAN IP:443 and the other end IP:port.
    Basically, that tells me that it's not a problem in the end device, for it reaches the firewall. But it seems that pfSense, or OpenVPN, do not identify that connection as OpenVPN on TCP 443.

    I've tried everything I could find, even the port-share localhost 443.

    If someone can give me some light, I'll be forever grateful.

    Thanks.

    My setup: OpenVPN on WAN, to TCP 443. Firewall rule on WAN: pass TCP any to WAN address on HTTPS (443).

    Just remembering: OpenVPN works on any other port I tried. It doesn't work only in TCP 443 (though I never tried UDP 443).

    Also, I've got Dynamic DNS on the configuration, so the client is set to connect to the DDNS.

  • Route one subnet through VPN, another one through regular gateway?

    2
    0 Votes
    2 Posts
    480 Views
    johnpozJ

    @aileron said in Route one subnet through VPN, another one through regular gateway?:

    These will be connected to the same physical interface.

    Doesn't work that way if your network is 192.168.0/24 you can not just add devices using 192.168.1/24

    I would suggest you do some research on basic networking 101 before you start playing with policy routing. Change your lan network to /23 if you want to use both .0.x and .1.x addresses. Or put this .1/24 on its own vlan, etc.

    Then its very simple to policy route out any clients you want via your vpn. Just make sure to turn off default route from your vpn connection in pfsense and just policy route who you want to use or not use the vpn connection.

  • Site to Site changing my WAN IP? SOLVED

    10
    0 Votes
    10 Posts
    1k Views
    K

    @stephenw10 Well you wont believe what it was, it was the WPAD, as site 1 has wpad i also have the proxy auto detect on site 2 i disable the auto detect and bam showing the real WAN ip for the websites. i guess no i have to see how i can disable that.

  • Upgraded to 2.4.3, OpenVPN tunnel cannot be established anymore

    14
    0 Votes
    14 Posts
    2k Views
    chpalmerC

    Is your Unbound service actually running- /status_services.php

  • Bypass VPN by port, not IP

    5
    0 Votes
    5 Posts
    894 Views
    DerelictD

    The most-specific rules should generally be at the top to prevent something more general from matching first.

  • OpenVPN "Connected" but not routing..

    21
    0 Votes
    21 Posts
    11k Views
    P

    @wormuths np problem! good luck with it

  • Intel RDRAND Hardware Crypto is worth?

    1
    0 Votes
    1 Posts
    328 Views
    No one has replied
  • Communication Between Clients of Multiple OpenVPN Sites

    5
    0 Votes
    5 Posts
    584 Views
    chpalmerC

    Your tunnel networks need to be in the same subnet 172.27.224.0/30 would work for both of them.

  • OpenVPN group vs Interface Group firewall rule order

    5
    0 Votes
    5 Posts
    1k Views
    MajicJayJM

    I realize that this is an old post, but I couldn't find the answer to the Interface Group order anywhere in the forums. Using /tmp/rules.debug. I found that manually created Interface Groups come before OpenVPN rules. I also found that if you have multiple interface groups then they are processed in alphabetical order.

    I have three Interface groups: Local for all my local subnets, Clients for local client subnets, and IoT for local IoT subnets. They were processed in the following order: Clients, IoT, Local. When I renamed Local to All_LAN and made a minor change to the rules so they were rewritten, the order changed to All_LAN, Clients, IoT, which is the order I wanted.

    I realize I probably don't need so many subnets, but using Interface groups and RADIUS to assign VLANs made it easy to setup. I have a VLAN for each person in my household in Clients Interface Group and my IoT devices are in different VLANs by type. It was simple using FreeRADIUS.

    Thanks

  • OpenVPN connecting but can't access to my local devices / shared folder

    4
    0 Votes
    4 Posts
    924 Views
    J

    Hello Yes all is working, after some rechearch i found something concerning virus protection.
    But now my problem is : i have to disable my bitdefender firewall to access to my network. Someone know how to enable the btdefender firewall and add an exception ?

    Thank a lot

  • 0 Votes
    29 Posts
    7k Views
    J

    Problem solved.

    I 'm so sorry to be so stupid i was focus on my local network and forgot the client configuration and change the ip --'
    I put my public ip and all work fine now.

    Thank a lot all for your help.

    Have a great day (i't my bithday today :p = 30yo)

  • IPV4 Network Tunnel config Issue

    10
    0 Votes
    10 Posts
    1k Views
    K

    By the way, tap mode changes almost nothing in the scenario. The only difference is that the tunnel network is no longer point-to-point and has broadcast semantics resembling a typical ethernet LAN. Client configuration and routing are still pretty much the same and if you can't get tun mode working properly you won't get tap mode working either.

  • OpenVPN interfaces do not report uptime in dashboard

    2
    0 Votes
    2 Posts
    504 Views
    G

    I would like this feature, too.

  • VPN client does not connect to OpenVPN server (error).

    5
    0 Votes
    5 Posts
    763 Views
    I

    Hmm, yes indeed.

  • After disabling OpenVPN Client, WAN Bounce Required

    6
    0 Votes
    6 Posts
    779 Views
    johnpozJ

    Well your authentication retry checkbox would have nothing to do with that.

  • openvpn server + ddwrt openvpn client

    2
    0 Votes
    2 Posts
    650 Views
    K

    on pfSense which is the server and the DDWRT is the client you need to add this part on the pfSense client override

    ifconfig-push 192.168.90.5 192.168.90.6 iroute 192.168.1.0 255.255.255.0

    192.168.90.5/24 is my openvpn server and the 192.168.1.0/24 is my LAN which is behind pfSense change the IP depending to your config

  • Remote V virtual IP question?

    3
    0 Votes
    3 Posts
    414 Views
    M

    Thank you. That explains things perfectly.

  • Unable to reach machines

    1
    0 Votes
    1 Posts
    357 Views
    No one has replied
  • OpenVPN route addition failed using service

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.