• This topic is deleted!

    2
    0 Votes
    2 Posts
    97 Views
    No one has replied
  • HELP: Firewall Settings for Remote Networks over VPN

    6
    0 Votes
    6 Posts
    795 Views
    A

    I found the setting in the Sierra Wireless RV50 OpenVPN Tunnel settings. There is a setting called NAT, which I had to set to disable. After I disabled it, the SNAT was removed and the true source IPs are now visible. Thanks.

  • How to route single client through openvpn tunnel

    3
    0 Votes
    3 Posts
    608 Views
    G

    According to this video https://www.youtube.com/watch?v=ov-xddVpxhc
    You can use firewall rules to exclude the hosts that you dont want to go through the vpn tunnel.
    So if you set static ip's for the hosts that use the vpn tunnel an make a firewall alias for the dhcp range and use this alias in a firewall rule which will pass the vpn tunnel and to go through the wan
    Wouldn't that work?

  • 0 Votes
    4 Posts
    2k Views
    T

    Jimp can you take a quick look at my other theard, basiclly the same issue but I noticed a change in routing table that effects my other vlans. i'm trying to understand what can cause the change in routing table. The "static" part is removed when openvpn dies, after it reconnects it's not replaced.

    I'm giving up on UDP for the moment, but i made more comments about that in the other thread.

    https://forum.pfsense.org/index.php?topic=145237.0

    Before OpenVPN connection dies

    Destination        Gateway            Flags    Netif Expire
    default            10.75.1.2          UGS      pppoe0
    PUBLIC-IP.static link#13            UHS        lo0

    After OpenVPN connection dies.

    Destination        Gateway            Flags    Netif Expire
    default            10.75.1.2          UGS      pppoe0
    PUBLIC-IP        link#13            UHS        lo0

  • OpenVPN client with kill switch

    4
    0 Votes
    4 Posts
    2k Views
    DerelictD

    Not a pfSense problem. You might want to consult your operating system or OpenVPN support/forums for that.

    (Viscosity tells me when I am disconnected…)

    Someone else might know. Personally I think you're overthinking it.

    I would figure out why your home pfSense is crashing. Mine never does.

  • Ping between OpenVPn Peer to Peer doesn’t work

    1
    0 Votes
    1 Posts
    303 Views
    No one has replied
  • OpenVPN Remote Access segment traffic.

    1
    0 Votes
    1 Posts
    374 Views
    No one has replied
  • Certificate Issues

    7
    0 Votes
    7 Posts
    2k Views
    V

    I'm also using OpenVPN Connect 1.2.9 build 0 (iOS 64-bit) and there's no problem like that.

  • [Solved] LAN to LAN not routing

    15
    0 Votes
    15 Posts
    1k Views
    B

    For anyone who stumbles across this thread, the solution was to add the OpenVPN connection as a Interface on the client side. After creating the interface, restart the OpenVPN service and add allow firewall  rules for the interface. For OSPF to work, you need to add the interface on both ends.

    It's also advised to remove/disable the default OpenVPN rules as they'll supersede the interface rules if matched first.

  • Site-To-Site Remote can not access Lan

    3
    0 Votes
    3 Posts
    439 Views
    ?

    facepalm That was it!

    I added the rules to the Firewall and now does everything work as expected.

    Thanks for the right pointer  :)

  • Open Vpn not connecting from client side

    2
    0 Votes
    2 Posts
    430 Views
    V

    Check the client log and post it here.
    Also look if there are entries in the server log.

  • Pfsense with OpenVPN and AD authentication -> how can i use MFA ?

    2
    0 Votes
    2 Posts
    340 Views
    jimpJ

    You'd add that on your AD setup, not on pfSense. Look into AD-based multi-factor auth.

  • OpenVPN 2.4.4

    2
    0 Votes
    2 Posts
    668 Views
    A

    Do you have an example?

    Our configuration on six boxes started on pfSense 2.3.4 and i upgraded it to 2.4.2_p1 on all of them. I did not have to change anything on our OpenVPN configurations so far.

  • Ifconfig mismatch help needed

    3
    0 Votes
    3 Posts
    695 Views
    F

    simples

    thanks very much, all sorted  :)

  • Restrict OVPN client Access to Single PC

    4
    0 Votes
    4 Posts
    804 Views
    S

    Can someone help  :'(

  • Client Specific Override - can't communicate

    3
    0 Votes
    3 Posts
    557 Views
    S

    Looking for a solution  :'(

  • Site to site working. Now need a 2nd & 3rd

    2
    0 Votes
    2 Posts
    448 Views
    L

    I have successfully set up 4 site with independent connections between each other (see attached).

    ![4 Site connection with pfSense and openVPN.png_thumb](/public/imported_attachments/1/4 Site connection with pfSense and openVPN.png_thumb)
    ![4 Site connection with pfSense and openVPN.png](/public/imported_attachments/1/4 Site connection with pfSense and openVPN.png)

  • Basic walk though

    2
    0 Votes
    2 Posts
    570 Views
    R

    If you want all ethernet ports to have the VPN then it should do that by default.

  • OpenVPN speed vs hardware

    10
    0 Votes
    10 Posts
    4k Views
    R

    @Rango:

    @Ryu945:

    Crypto-Dev by itself also did nothing.  I only got it to work when both were turned on.

    That's interesting. I now only have Crypto Dev on both sides and it boosts 20% so i can get 120Mbs on N3150 and medium is about 115-117Mbps but when i switch to only AES-NI it goes down by 20%

    to base line with is about 100Mbps which is what you see in screenshot above. I tried it every possible combination and that's what i'm getting. At least i'm happy Cryptodev is working and boosting a bit, 20%.

    Maybe if AES-NI would work it would boost much more. I dunno what the expectation of hardware based acceleration should be. I just reported what my testing yielded. I am happy with pfsense but it

    seems AES-NI module is not working and looks like Cryptop Dev is FreeBSD solution to it, for now maybe. Maybe in 2.5 this will change when they focus on it.  I can't wait if so.

    I am however disappointed i purchased N3150 however. I didn't do enough research then. The fact that i owned asus 87u also purchased for encryption. It is now exclusively AP. I guess as they say u learn on your own mistakes. I've learned. Thanks for posting your results. :)

    I did this AES-NI test with the version that came out before the Spectrum/Meltdown bug so I don't know if things have changed in the version I currently run.  I will have to run more test at a later time.  I did notice a massive speed reduction after that update.

  • Multiple VPN and Multiple Wan

    3
    0 Votes
    3 Posts
    657 Views
    R

    1)  Do you have duel WAN working by itself?

    2)  Just for a sanity check, is there a reason your using two WANs?

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.