• Adding OpenVPN Hosed pfSense Box (help?)

    8
    0 Votes
    8 Posts
    2k Views
    M
    I finally got it working. I used a combination of the old "password file" guide, Finger79's settings above, and the packaged ovpn file for the NYC Server, and finally got everything working. (Note, didn't use the OVPN vile, but used the certs it came packaged with.) @Finger79: I'd read some things that crypto acceleration in OpenVPN is automatic and that the "crypto acceleration" drop-down is legacy or doesn't apply to modern CPUs.  If that's off, then let me know. In retrospect this makes a lot of sense.  I tried with it both off and on, and didn't find it made any difference in CPU load during bandwidth tests.
  • Enter at your own risk: newbie trying go configure OpenVPN client

    5
    0 Votes
    5 Posts
    1k Views
    T
    Thanks so much - finally got everything to work!
  • PfSense OpenVPN & Windows 10 Speed

    1
    0 Votes
    1 Posts
    679 Views
    No one has replied
  • 0 Votes
    12 Posts
    3k Views
    DerelictD
    The point is if that feature is not disabled and the gateway is detected as down, the rule still exists but without the policy routing applied so all that VPN traffic goes to the routing table and out WAN in-the-clear. This is the default behavior. By default, when a rule has a gateway specified and this gateway is down, the rule is created omitting the gateway. This option overrides that behavior by omitting the entire rule instead. tagging/tagged is the best way to ensure traffic that should go over the VPN does not go out WAN. If it should go over the VPN tag it. Do not let anything out WAN with that tag.
  • OpenVPN RoadWarrior Porblem after 2.3.4 Update

    2
    0 Votes
    2 Posts
    662 Views
    B
    Not a problem from 2.3.4 just a nasty route on the wrong place …
  • OpenVPN TAP doesn't route WebInterface or other VPNs

    1
    0 Votes
    1 Posts
    455 Views
    No one has replied
  • Site to site openvpn using extra hardware (separate gateway)

    1
    0 Votes
    1 Posts
    456 Views
    No one has replied
  • Route UK On Demand TV addresses through WAN instead of OpenVPN PIA

    1
    0 Votes
    1 Posts
    585 Views
    No one has replied
  • OpenVPN configuration with VLANs problem

    1
    0 Votes
    1 Posts
    488 Views
    No one has replied
  • 0 Votes
    2 Posts
    694 Views
    V
    https://forum.pfsense.org/index.php?topic=130407.msg718680#msg718680
  • OpenVPN Client Export updated to 1.4.5 for OpenVPN 2.4.2

    3
    0 Votes
    3 Posts
    1k Views
    jimpJ
    Uninstall your package and then reinstall it – don't just do a reinstall/upgrade. If you were coming from a much older version there was a bug a couple revs back that could delete the template files, so the template pkg needs reinstalled, which would only happen if you removed it completely then reinstalled it.
  • [SOLVED] OpenVPN Client Export - Empty link in Version 2.3.4 ?

    5
    0 Votes
    5 Posts
    3k Views
    L
    Well, reinstalling the openvpn-client-export package added back the Export tabs, but I found out it also changed our client export files. I downloaded a new config file & found that the two bottom lines in the old version's client config file:       tls-auth pfSense-udp-<port>-<username>-tls.key 1       ns-cert-type server Were replaced with the following line:       remote-cert-tls server I updated my config file (instead of right-clicking and selecting "Connect", select "Edit Config") and now VPN connects like normal. I updated the package to 1.4.5 this morning, and it still connects fine after making the change above.  Now I just have to update the config file on the other laptops.</username></port>
  • Site to Site VPN

    2
    0 Votes
    2 Posts
    888 Views
    B
    Yep. Just create a * * * rule on the OpenVPN interface (or limit it however you want.) Until you do, no traffic will pass on it.
  • Client-side Network Isolation with OpenVPN Client for Windows

    1
    0 Votes
    1 Posts
    657 Views
    No one has replied
  • RADIUS authentication for OpenVPN

    2
    0 Votes
    2 Posts
    726 Views
    jimpJ
    It's not simple to have the firewall do that, you have to use a somewhat redundant gateway+route as described here: https://doc.pfsense.org/index.php/Why_can%27t_I_query_SNMP,_use_syslog,_NTP,_or_other_services_initiated_by_the_firewall_itself_over_IPsec_VPN
  • Can't access all services

    8
    0 Votes
    8 Posts
    2k Views
    R
    Hi all Still no have access to file server nor server mail. I have on openvpn rules * * * * and also in lan rules I have * * * * but if i go on diagnostic/ping and try to ping my file server from my vpn server, i can't
  • OpenVPN - messaging services

    1
    0 Votes
    1 Posts
    623 Views
    No one has replied
  • Inspecting OpenVPN traffic on the VPN head-end pfSense appliance.

    1
    0 Votes
    1 Posts
    535 Views
    No one has replied
  • 0 Votes
    5 Posts
    1k Views
    johnpozJ
    ^ good example, if your not using user certs to validate user as 2FA then there is really nothing that can not be publicly published. And you don't have to worry about the certs because your using a different OTP as your 2FA..
  • OpenVpn with hide.me vpn service

    4
    0 Votes
    4 Posts
    2k Views
    M
    I would imagine that you could follow the guide to setting up a Private Internet Access (PIA) VPN, and just replace anything in the guide that is specific to PIA with the information from hide.me.  Maybe combine a tutorial for PIA with the hide.me tutorial for setting up a client on an DD-WRT Router?  The hide.me DD-WRT guide on their site for an OpenVPN configuration should give you what you need to swap out with PIA when following the PIA guide. DDWRT Guide: https://hide.me/en/vpnsetup/ddwrt/openvpn/ PIA Guide for pfSense: https://forum.pfsense.org/index.php?topic=76015.0
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.