• OpenVPN configs locations

    3
    0 Votes
    3 Posts
    486 Views
    A
    @viragomann Thanks a lot :)
  • pfsense 2.5.1 OpenVPN drop RDP to Windows Machine

    5
    0 Votes
    5 Posts
    709 Views
    W
    @zabi Hi, my output, [2.5.1-RELEASE][admin@pfSense.home.arpa]/root: grep scrub /tmp/rules.debug scrub on $WAN inet all fragment reassemble scrub on $WAN inet6 all fragment reassemble [2.5.1-RELEASE][admin@pfSense.home.arpa]/root: grep vpn_networks /tmp/rules.debug table <vpn_networks> { 192.168.77.0/24 } My connection to RDP after authentication to Windows, the screen blank.. After that my ping will be timed out.. If i close my RDP Windows, the connection will be back after 30 seconds.. I can access to HTTPS, HTTP, SSH without any issues.. Just wonder is it the version 2.5.1 bugs.. I will deploy version 2.5.0 to try it out again..
  • pfSense 2.5.0 remote to 2.5.1 pfSense server - LAN traffic won't transit

    4
    0 Votes
    4 Posts
    595 Views
    L
    @divsys You were right. I was missing the Client Specific Override entry. I created a CSO on the server side, selecting the correct OpenVPN server, with the Common Name from the client certificate certificate, my IPv4 Tunnel Network set to 10.0.9.0/24 my IPv4 Local Network/s set to 192.168.1.0/24 my IPv4 Remote Network/s set to 192.168.10.0/24 and my routing fired right up. You are the man.
  • Error after update to 2.5.1

    9
    0 Votes
    9 Posts
    926 Views
    GertjanG
    @peterzy It seems that the pre release "2.6.0"corrects the Mult iWAN bug. See the forum post related to that issue.
  • Connect openVPN client before user login for AD

    1
    0 Votes
    1 Posts
    157 Views
    No one has replied
  • Unusual OpenVPN routes

    1
    0 Votes
    1 Posts
    218 Views
    No one has replied
  • openvpn client routing some traffic that it shouldn't

    2
    0 Votes
    2 Posts
    193 Views
    T
    nevermind, found the issue. i had specified an IP address reservation for the pfsense firewall on the openvpn server, and had the subnet wrong. it was set to the vpn tunnel gateway, instead of 255.255.255.0, so pfsense had some issues with it. changed appropriately and it works now... RTFM.....
  • OpenVPN Connects but no traffic until I reconnect again

    1
    0 Votes
    1 Posts
    173 Views
    No one has replied
  • Assigning tunnels, hostnames, and IPs to clients in OpenVPN

    2
    0 Votes
    2 Posts
    333 Views
    H
    After playing around, I can assign the .40 tunnel, but can't assign the same IP that I normally reserve for my phone on that subnet or I get no internet service. I get randomly assigned IP of .40.2. That IP has no hostname in the Pihole query list and does not show up in the DHCP status so I can assign a static IP and give it a hostname. I'm at a loss how to assign a hostname. I know it's trivial, but if I was running it with several hundred VPN users, I would think there's a way to assign hostnames when they log on. I've googled and searched, and I can't find how. Thanks for any help.
  • Destination Network

    2
    0 Votes
    2 Posts
    416 Views
    V
    @vincent_28 The reason might be a missing route on the client. To direct internet traffic over the vpn, check "Redirect gateway" in the server settings. Also ensure that pfSense has added an outbound NAT rule for the OpenVPN tunnel network. In the picture there might be a typo in the vpn network, the shown is a public IP. @vincent_28 said in Destination Network: I already setup also in rules > OpenVPN> the destination is WAN Net but not still appearing the IP of WAN. This does not allow internet access. WAN net is only the subnet of your WAN IP. So if it's a /32 (PPP), there is nothing else included. You need to set the destination to "any" in the pass rule. If you want to prohibit access to your LAN add an additional block rule for that destination to the top of the rule set.
  • 0 Votes
    4 Posts
    577 Views
    L
    Strange, since I've completed this setup : adding the outbound NAT for the VPN creating the gateway add a dynamic dns entry for the VPN "wan" interface some process or something kicked in, because now I get a mail every 15 minutes with in the subject : Arpwatch Notification : Cron <root@aureliusgate01> /etc/rc.filter_configure_sync and the following content in the mail body : X-Cron-Env: <SHELL=/bin/sh> X-Cron-Env: <PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin> X-Cron-Env: <HOME=/root> X-Cron-Env: <LOGNAME=root> X-Cron-Env: <USER=root> 0 addresses deleted. 0 addresses deleted. I know this is the cron line with the schedule 0,15,30,45 * * * * root /etc/rc.filter_configure_sync but I didn't add it or activate it, so it was there already, so I wonder why it now is "active" or sending these mails?
  • OpenVPN +NPS Radius (windows) with SMS/Phone App Code

    6
    0 Votes
    6 Posts
    2k Views
    D
    Thank you very much Now It´s working fine.
  • Duplicate user in OpenVPN client export list

    1
    0 Votes
    1 Posts
    254 Views
    No one has replied
  • OpenVPN fails to connect after update to 21.02.2-RELEASE

    1
    0 Votes
    1 Posts
    229 Views
    No one has replied
  • Openvpn Intermittent routing issues with some clients

    3
    0 Votes
    3 Posts
    518 Views
    G
    @nunu thanks for helping me on this. When I look at the routing table on windows (route print), I see the route, it looks like it is setup properly I wonder if this is a ipv4/6 issue.
  • OpenVPN Server Behind NAT being blocked by Firewall Rule

    2
    0 Votes
    2 Posts
    712 Views
    V
    @preimmortal said in OpenVPN Server Behind NAT being blocked by Firewall Rule: I checked the firewall log to see why this is occuring: Apr 21 16:29:11 ► CLIENT_VPN Default deny rule IPv4 (1000000104) 192.168.0.100:1194 123.123.123.123:12345 TCP:FPA In this case, 192.168.0.100:1194 would be the WAN address for my pfsense box and 123.123.123.123:12345 would be the client trying to access the VPN. The CLIENT_VPN is a client VPN connection that is being used for other outbound traffic. I would have expected the OpenVPN Server to use the default gateway, which is WAN Basically respond packets are routed accordingly to the routing table if the incoming interface of the requests is unclear. I suspect that the other client connection set the default route, presumably pushed by the server. I reviewed my firewall rules and tried to set up some rules to force all outbound traffic to use the WAN gateway and also set up the Outbound NAT for the OpenVPN Server: Outbound NAT rules have no affect on respond packets. I tried to set up policy based routing documented here: Not clear what you aim to achieve with that in this case. Simply ensure that there is a firewall rule on the WAN interface allowing the OpenVPN access on port 1194, ensure that there is no floating rule or interface group rule matching this traffic.
  • openvpn question/users

    1
    0 Votes
    1 Posts
    337 Views
    No one has replied
  • Added an interface and lost connection to 2 routers

    4
    0 Votes
    4 Posts
    612 Views
    S
    @kakerstrom Interesting, I recently set up a Hurricane Electric IPv6 tunnel which involves adding an interface. I was already connected to the web GUI via a PC on LAN. Routing out from the PC over IPv6 actually worked but I found I couldn't ping or DNS query the new LAN IPv6 until I restarted the router. Firewall rules seemed to be ignored as the default block rule was triggering. Sounds like you restarted after removing the interface? Would have been interesting to know if restarting first would have fixed it for you... For client/remote routers we usually allow GUI and/or SSH access from our IP, either on WAN or if they have a web server one can NAT forward WANIP:50443->LANIP:443 (still limited by source IP). Also re: referrers, in System/Advanced/Admin Access, set "Alternate Hostnames," for instance add the WAN IP or hostnames.
  • Site to site OpenVPN client auto reconnect

    openvpn config
    1
    0 Votes
    1 Posts
    521 Views
    No one has replied
  • Bug: More than one OpenVPN client does not connect

    2.5.1 openvpn client
    2
    0 Votes
    2 Posts
    647 Views
    G
    I have the similar issue after upgrading to 21.02.2 version on my Negate SG-5100. Prior to upgrade all OpenVPN connections were working fine. After upgrade only one VPN connection is working, other is connected but no traffic passing. On disabling the VPN on connection 2, data traffic starts but not on VPN. Not sure if it's a bug generated by pfsense update.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.