• OpenVPN - Multi Site Communication

    4
    0 Votes
    4 Posts
    909 Views
    G

    Thanks for answers

    I'll explain the real situation, I'll have more than 100 clients (router with a local network), so my OpenVPN will give IP to the router.
    Let's take:

    -> Router A: VPN IP 10.2.2.2 | Local network: 24.1.1.0/24
    -> Router B: VPN IP: 10.2.2.3 | Local network: 24.1.2.0/24
    -> Router C: VPN IP: 10.2.2.4 | Local network: 24.1.3.0/24
    ….
    ....
    ....

    So I want to block communication between all router (easy, I just disable the option "Allow communication between client)

    But I'll create user to my OpenVPN (example for my windows computer)
    -> Client A: VPN IP: 10.2.2.40

    And for this client, I need to allow communication to all routers.

    So what can I do?
    Disable "Allow communication between client", and can create specific rules for the user I want to allow communication?
    Make a second server for my users and configure it to communicate to all the clients of the first server? (BUT HOW?)

    Thanks for your help

  • Openvpn tap 2.4.2_RELEASE-p1 does it work?

    18
    0 Votes
    18 Posts
    3k Views
    X

    Thank you could achieve your TAP bridge simon.lock.

    Can you give us how your final config looks like..?

    I was trying the custom```
    push "redirect-gateway def1";

    Cheers.
  • VPN through 2 ports only

    1
    0 Votes
    1 Posts
    367 Views
    No one has replied
  • [Solved] Configure PIA Aliased IPs

    4
    0 Votes
    4 Posts
    693 Views
    R

    Thanks for the quick replies!

    bcruze:
    I did try that guide, I reckon its the same as the first link I posted. I'm a bit confused by it, as Step 18 has:
    Set Interface to "OpenVPN"
    But it doesn't show where to setup this interface, or where it came from? I think it's missed a step somewhere (or I'm misunderstanding).

    V3lcr0:
    If I remove those two rules, I just get a data from LAN to go over my normal gateway ie WAN. Sorry might have misunderstood your instructions.

    Alias for source (Firewall -> Alias -> IP):
    Name:PIA_VPN_IPs
    Type:Host(s)
    IP or FQDN: 192.168.1.48

    Any other hints?

    Edit:
    Sorry everyone, the answer was hidden in plain sight! A new interface OpenVPN is added automagically when you configure it. I added all the NAT outbound rules as specified in the guides with OpenVPN as the interface this time and it worked straight away!

  • My Gigabit OpenVPN Experience

    4
    0 Votes
    4 Posts
    942 Views
    R

    reserved

  • Connection error: TLS handshake failed

    1
    0 Votes
    1 Posts
    647 Views
    No one has replied
  • OpenVPN - DNS Issue

    3
    0 Votes
    3 Posts
    543 Views
    Z

    Correction: I'm running 2.4.2 Release FreeBSD 11.1 Release -p6.

  • OpenVPN client port-forwarding route-nopull issue

    2
    0 Votes
    2 Posts
    998 Views
    N

    I did a little bit of digging and found the following.

    Port Forwarding from VPN Provider to Torrent Client:
    https://forum.pfsense.org/index.php?topic=65094.0

    Which also refers to this thread:
    https://forum.pfsense.org/index.php?topic=65230.0

    So the floating rule did the trick and now port-forwarding works! :)

    Is this a bug? Was it reported back in 2013? Has it been fixed and then regressed?

  • Port Forwarding from VPN Provider to Torrent Client

    9
    0 Votes
    9 Posts
    11k Views
    N

    @Nadar:

    We're discussing the exact same issue in this thread: http://forum.pfsense.org/index.php?topic=65230.new;topicseen#new

    From what I can understand, the reason is that the reply-to address for some reason isn't used for the return packets for the associated firewall rule for the port forwarding NAT rule. I've managed to get it to work by:

    On the NAT port forwarding rule, select "none" under "Filter rule association". Create the rule manually instead, under floating rules. The rule is basicly a "copy" of the one automaticly created by NAT:

    Pass, Quick, in, IPv4, <protocol>, source: any, Destination: port forwarding destination host, Destination port range: forwarded port

    Make sure it's high up/on top in the floating rules, and make sure it's a quick rule. When I look in rules.debug, the effect of this is simply that the rule (it's the firewall rule that contains the reply-to address) ends up much higher in the resulting ruleset, and that seems to make all the difference. I haven't quite figured out why yet.</protocol>

    Thanks! You saved me from a lot of troubleshooting. Is this a bug which has still not been fixed?

  • Pfsense OpenVPN Radius connect clients to different subnets

    1
    0 Votes
    1 Posts
    402 Views
    No one has replied
  • OpenVPN Site to Site with OSPF

    7
    0 Votes
    7 Posts
    2k Views
    F

    Very well.

    So I followed your hint of P2P with Shared Key and configured as the following:

    Site A is Server for Site B
    Site A is Server for Site C
    Site B is Server for Site C

    Site C is Client for Site A
    Site C is Client for Site B
    Site B is Client for Site A

    Everything seems smooth in terms of route learning and inter-site connectivity.

    I did some traceroutes and I was able to see that if I interrupt the direct connectivity between A and B then A goes through C to achieve B. That's what I wanted!

    I had to set the same metric on quagga "Interface Settings" for all interfaces on all boxes to let OSPF decide the best paths. OSPF implementation seems to be smart enough to know the shortest path.

    Question: On site C I'm using 2 PFSense with CARP. Is there any way to sync the QUAGGA configs between them? I only found the option to monitor the CARP interface…

  • Two servers, want one to have no LAN access

    14
    0 Votes
    14 Posts
    1k Views
    ivorI

    https://www.netgate.com/our-services/gold-membership.html

  • Client Not Getting Gateway

    6
    0 Votes
    6 Posts
    784 Views
    E

    @viragomann:

    With "Redirect gateway" checkt, the client should get pushed the default route.
    However, the default route is split in two parts:

    0.0.0.0/1        <ovpn-server>128.0.0.0/1</ovpn-server>

    That's why the OS doesn't see the vpn server as default gateway.

    So check the clients routing table or try a traceroute to a public address to verify if you go over vpn.

    Nevermind!, i ran a "tracert" command to "X" public IP and i noticed it is going trough my VPN server, i also checked on http://www.whatsmyip.org/ and i had my VPN server public IP.

    Thanks for the tip !

  • Cannot ping or access remote network

    9
    0 Votes
    9 Posts
    1k Views
    V

    So the pfSense local network address 10.10.0.4 is not set as default gateway on the remote machines?
    You have garbled the vtnet0 address, so I assume it will be a public one, isn't it?

  • OpenVPN site-to-site routing question

    3
    0 Votes
    3 Posts
    492 Views
    T

    @viragomann:

    If the cloud has no route back to the clients LAN, you have to set an S-NAT rule on the server site for the client-cloud connection.

    Ah ha!  This was the missing piece.  I added an outbound NAT rule for the remote LAN on the WAN interface and that completed the route.

    Thanks!

  • Site-to-Site Not working

    4
    0 Votes
    4 Posts
    626 Views
    A

    DERP!

    I figured it out.  I had the tunnel network set to a /24 instead of a /30.  with a /24 you need to specify routing commands manually on a site-to-site.

  • [Solved] OpenVPN Site-to-Site host pfsense services on main site

    2
    0 Votes
    2 Posts
    1k Views
    M

    Tired of tinkering with the production environment to find out the problem and sometimes knocking down all the connections I decided to build a lab of virtual machines / networks and followed this tutorial creating an environment from scratch.

    https://forum.pfsense.org/index.php?topic=144212.0

    And I have achieved connectivity between all pfsense hosts also between pfense hosts and the servers located in the Main Office.

    With this result I went into the production environment and created a new openvpn server on different port and started to migrate the branches from old configuration to new successfully.

    The above link is very practical and produces very little configuration on the clients, controlling almost everything in server configuration.

    Thanks to the friends who tried to help.

    Now I can rest my head, 8) 8) 8), because I have not thought of anything else for more than 7 days.

  • OpenVPN Connection With Domain Name

    7
    0 Votes
    7 Posts
    1k Views
    dotdashD

    @bond_it:

    The only issue is that the OpenVPN export exports the interface IP address

    On the client export page, change host name resolution to 'other', enter vpn.mycompany.com in the host name box, then click the 'save as default' button.

  • Need Help How to Create Open vpn Client L2TP/IPsec

    1
    0 Votes
    1 Posts
    319 Views
    No one has replied
  • Slow OpenVPN perfomance in virtualized pfSense (Hyper-V).

    5
    0 Votes
    5 Posts
    3k Views
    B

    Since I had a similar issue the solution I found was written here: https://forum.pfsense.org/index.php?topic=88467.msg491409#msg491409

    System -> Advanced -> Networking (tab) and check the "Disable hardware checksum offload"

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.