• Default gateway pushed to Client OpenVPN bridge/TAP

    2
    0 Votes
    2 Posts
    638 Views
    S
    Which version of the client are you using, and can you post server/client configurations on your thread here? I suspect if you aren't pushing this from your server the client may be setting it. Windows also has metric priorities on each ethernet adapter and it may be the case that if both are publishing default routes, the interface with the lower metric value is winning out.
  • User Auth issue

    2
    0 Votes
    2 Posts
    976 Views
    jimpJ
    @alagave said in User Auth issue: can't ask for 'Enter Private Key Password:' Somehow it thinks your certificate private key is password protected. If it is, then don't do that. Remove the password from the key and then import it again.
  • Split tunneling doens't work for Linux clients.

    2
    0 Votes
    2 Posts
    338 Views
    S
    The problem was caused by Network Manager which was handling the opvn config. To disable sending all traffic through the VPN do this Click NetworkManager applet icon > VPN Connections > Configure VPN... > select VPN network > Edit > IPv4 Settings > Routes... > Check ‘Use this connection only for resources on its network’ SOLVED!
  • How do I force all internet through the VPN tunnel?

    6
    0 Votes
    6 Posts
    352 Views
    M
    Well, the topic is "How do I force all internet through the VPN tunnel?", so my assumption is you want internet traffic on your LAN forced thru a VPN tunnel, correct? If so, your end is the local end and the network behind the VPN is the remote (or far) end. how do I do a Policy route? Assign the VPN to an interface. On the LAN tab, create a firewall rule (above your LAN net/any rule) that has: a. Protocol = any b. Source = specify your LAN subnet or choose " c. Destination = any d. Gateway = The gateway IP created from assigning the VPN to an interface (This is done by expanding the "Advanced Options" section)
  • first time setting up a site-to-site VPN with openVPN over pfSense

    3
    0 Votes
    3 Posts
    441 Views
    M
    thank you @Rico for you reply I will read it soon! then I should connect the internet cable directly to the WAN port of the pfSense. If I use pfSense in place of the ISP router: do you think I should ask my internet provider for the line parameters to be settled up on pfSense? or maybe have I to set up some other special configuration on the pfSense because I use it in place of the ISP router? thanks!
  • Yealink connection troubles

    3
    0 Votes
    3 Posts
    480 Views
    S
    Gosh! So easy. Thank you very much.
  • How to allow roaming clients access remote LANs?

    3
    0 Votes
    3 Posts
    435 Views
    S
    @viragomann said in How to allow roaming clients access remote LANs?: @scilek said in How to allow roaming clients access remote LANs?: Remote Networks -> 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24 These networks has to the added to the "Local Networks" in the access servers settings. Leave "Remote Networks" blank. Iam sorry, in my haste, I made a mistake. I have corrected my original post. Additionally you have to add the tunnel subnet of the remote access server (10.0.2.0/24) to the "Remote Networks" in the OpenVPN settings of both branches. I did that and it worked. Thank you very much. (Well, I had to create static routes again, but still, I now understand the whole concept.)
  • Batch process openvpn clients - how to?

    1
    0 Votes
    1 Posts
    130 Views
    No one has replied
  • 0 Votes
    4 Posts
    596 Views
    JKnottJ
    @Crimzinza Also run Packet Capture on pfSense, to determine if it's getting that far. It's hard to solve a problem when we don't know the details.
  • Implementing Site-to-Site as Client-to-Client, not Client-to-Server

    5
    0 Votes
    5 Posts
    628 Views
    I
    Hello Jim, thanks for your suggestions, of course you were right. On the LAN side I had a default gateway to reach some internal subnets, which tricked pfSense into thinking that LAN was actually a WAN. I suppose that this was the reason that caused the masking of packets routed by OpenVPN and directed downstram via the default gateway. The setting of Firewall > NAT > Outbound was and remains "Automatic outbound NAT rule generation. (IPsec passthrough included)". Added the proper static routes on LAN side, removed the default gateway on the LAN side, everything was back to work as expected, that is: no automatic masquerading happening for packets coming from remote OpenVPNs. Lesson learned: the "add gateway for WAN, none for LAN" advice during setup process is there for a reason. Thank you again Gino
  • 2 Openvpn clients, one causes internet connection lost on just one device

    9
    0 Votes
    9 Posts
    815 Views
    bthovenB
    No. I got a public ip from my ISP.
  • OpenVPN P2P (SSL/TLS), 1 server+n clients, improper routing

    2
    0 Votes
    2 Posts
    437 Views
    K
    The Remote IPv4 networks were also defined in 2 other OpenVPN server definitions. While the tunnels not being active, it does seem to create routes for it. In the end this seems pretty logical, but was unexpected while doing the configuration. I was under the impression that the routes would only be set upon actual OpenVPN connection. Changing the subnets, eliminating overlap (wether connected or not), did the trick. "Duh".
  • Route traffic of local IP through OpenVPN site-to-site client?

    7
    0 Votes
    7 Posts
    770 Views
    E
    Yea that fixed it. I didn't have to add a gateway on the pfsense at site B. I added the interface/gateway on site A side and created rules in LAN tab to route IPs in alias over to site-to-site interface gateway. Then pushed the routes to site B in the site-to-site OpenVPN server configuration on site A. On site B, I only needed to create NAT outbound rules so that packets would be able to get out to the internet.
  • 0 Votes
    1 Posts
    751 Views
    No one has replied
  • MTU/MSSFIX

    16
    0 Votes
    16 Posts
    17k Views
    T
    @rustydusty1717 I know this is an old post but how do i perform these chances to the MTU/MSSFIX. There is no clear instructions on how to perform any of this.
  • OpenVPN, Portforwarding

    1
    0 Votes
    1 Posts
    175 Views
    No one has replied
  • OpenVPN site-to-site tunnel connected but can't access local network

    5
    0 Votes
    5 Posts
    1k Views
    JeGrJ
    OpenVPN and IPSec have no problem whatsoever in co-existing and having tunnels defined. If stopping IPSEC makes your OVPN tunnel work, you have it wrong. Most commonly you are probably using the same subnets on OVPN as in IPSEC or try to route a network that is already defined in IPSEC. Without your config, that's all we can guess.
  • OpenVPN connected but can't access local network

    8
    0 Votes
    8 Posts
    1k Views
    kiokomanK
    every time someone had this problem on the forum it turn out to be a routing issue, check if this help, https://forum.netgate.com/topic/127348/openvpn-only-works-for-a-single-user-at-a-time there is a workaround at the end but i think is a not necessary hack as i'm pretty sure there is something wrong he did somewhere else. Open a new 3d with your problem, this is old and not related.
  • Issues with OpenVPN->pFsense->iPsec

    1
    0 Votes
    1 Posts
    133 Views
    No one has replied
  • OpenVPN design issue

    6
    0 Votes
    6 Posts
    616 Views
    DerelictD
    Traffic selectors have nothing to do with whether or not the authentication is RSA or shared-key. Configure your routing and traffic selectors properly and it will work. There is not going to be a walkthrough specific to your scenario unless you yourself write it. You'll have to post more details about your situation to get more specific assistance.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.