• [SOLVED] OpenVPN Multi WAN CARP Failover

    2
    0 Votes
    2 Posts
    525 Views
    I
    SOLVED! I reviewed my settings: I made NAT rules for WAN Address instead of CARP VIP. Changed NAT Rules to CARP VIP (openVPN Port) -> localhost. Now it works like a charm and failover is great!
  • How to access local networks while connected OpenVPN

    7
    0 Votes
    7 Posts
    949 Views
    M
    Sorry, I misread your OP. I thought you were connecting to your office from home, but it's the other way around. There are two possible scenarios for what you're experiencing: You configured a full tunnel deployment at home and all traffic is being routed over the tunnel upon connection. There are some overlapping subnets between your office and home LAN, so once you connect, traffic that would normally be routed locally via the default route is now being routed down the VPN. If you post your server1.conf (located here -> /var/etc/openvpn), it'd be easy to verify. However, the quick check would be to go to your config and see if you have the "Redirect IPv4 Gateway" option checked. If so, unchecking it would move you to a split tunnel deployment and will now only route traffic down the tunnel that is destined for your Home LAN subnet, which should solve your issue. If you unchecked the option or it was never checked and still have issues, then you most likely have a subnet conflict and you will have to move your home LAN to a new subnet and then reconfigured your OpenVPN server accordingly.
  • pfSense won't let me save OpenVPN settings - Solved

    3
    0 Votes
    3 Posts
    530 Views
    T
    @JeGr said in pfSense won't let me save OpenVPN settings: BTW: if you wrote your IP in the local port field you showed in your screenshot above, you have other problems at hand... the IP goes in the box below ;) LOL my bad...missed it when I edited the screenshot. I edited the post :) Thank you for the explanation.
  • Can't connect to remote computers except by FQDN.

    4
    0 Votes
    4 Posts
    474 Views
    B
    As I said, everything used to work with the same VPN config with my OpenWRT router, I just figured when the VPN was connected the domain information was getting passed through before. But I went and found the domain passthrough and set it up, and it is working like it used to now, I can connect just by ComputerName. Not sure how the other router worked without the same setting. Thank you both for your help.
  • 0 Votes
    1 Posts
    260 Views
    No one has replied
  • OpenVPN client causing latency and packet loss on non VPN traffic

    1
    0 Votes
    1 Posts
    276 Views
    No one has replied
  • Unable to ping LAN hosts after connecting to VPN

    11
    0 Votes
    11 Posts
    568 Views
    S
    @marvosa That actually was the problem. I was mistakenly connecting the router's WAN port to the LAN port of the Netgate. Admittedly I should have recognized the issue with having the two networks (Netgate - Router, then Router's LAN). So, everything just about works. I want to access a particular host on the LAN (a network share). I looked up the DHCP client list and found its assigned IP address and was able to remotely (through the VPN) connect to it. Because I wan't this to be reliable, I assigned a static DHCP rule for this specific LAN host. But now the VPN client's cannot see it anymore. What could be going on? All other dynamically allocated DHCP slots remain reachable from the VPN. I have a rule on the OpenVPN group to allow any to any, which is why the first part worked. But for some reason the statically assigned DHCP rule is acting as if it were not part of the LAN? I did notice that the host was marked as "offline" in the DHCP client list despite being active and reachable from other hosts on the LAN. I tried adding a rule specifically allowing access to this static IP from the VPN, but of, course, the any to any rule takes precedence so this new rule does not get used. Any ideas? Actually, the issue seemed to have resolved itself after some time.
  • Open VPN - user authentication is working but no LAN access

    7
    0 Votes
    7 Posts
    756 Views
    M
    Post your server1.conf (/var/etc/openvpn).
  • Clients cannot communicate with each other.

    42
    0 Votes
    42 Posts
    8k Views
    DerelictD
    @scilek said in Clients cannot communicate with each other.: I have learned through hardship that it is a good idea to reboot your router after configuring router OpenVPN clients/servers A reboot is not necessary. Only stating this so future readers will know. Glad you got past whatever problem it is you were having.
  • OpenVPN connects but no internet traffic

    4
    0 Votes
    4 Posts
    1k Views
    M
    Post your server1.conf (/var/etc/openvpn).
  • Default gateway pushed to Client OpenVPN bridge/TAP

    2
    0 Votes
    2 Posts
    644 Views
    S
    Which version of the client are you using, and can you post server/client configurations on your thread here? I suspect if you aren't pushing this from your server the client may be setting it. Windows also has metric priorities on each ethernet adapter and it may be the case that if both are publishing default routes, the interface with the lower metric value is winning out.
  • User Auth issue

    2
    0 Votes
    2 Posts
    981 Views
    jimpJ
    @alagave said in User Auth issue: can't ask for 'Enter Private Key Password:' Somehow it thinks your certificate private key is password protected. If it is, then don't do that. Remove the password from the key and then import it again.
  • Split tunneling doens't work for Linux clients.

    2
    0 Votes
    2 Posts
    345 Views
    S
    The problem was caused by Network Manager which was handling the opvn config. To disable sending all traffic through the VPN do this Click NetworkManager applet icon > VPN Connections > Configure VPN... > select VPN network > Edit > IPv4 Settings > Routes... > Check ‘Use this connection only for resources on its network’ SOLVED!
  • How do I force all internet through the VPN tunnel?

    6
    0 Votes
    6 Posts
    352 Views
    M
    Well, the topic is "How do I force all internet through the VPN tunnel?", so my assumption is you want internet traffic on your LAN forced thru a VPN tunnel, correct? If so, your end is the local end and the network behind the VPN is the remote (or far) end. how do I do a Policy route? Assign the VPN to an interface. On the LAN tab, create a firewall rule (above your LAN net/any rule) that has: a. Protocol = any b. Source = specify your LAN subnet or choose " c. Destination = any d. Gateway = The gateway IP created from assigning the VPN to an interface (This is done by expanding the "Advanced Options" section)
  • first time setting up a site-to-site VPN with openVPN over pfSense

    3
    0 Votes
    3 Posts
    453 Views
    M
    thank you @Rico for you reply I will read it soon! then I should connect the internet cable directly to the WAN port of the pfSense. If I use pfSense in place of the ISP router: do you think I should ask my internet provider for the line parameters to be settled up on pfSense? or maybe have I to set up some other special configuration on the pfSense because I use it in place of the ISP router? thanks!
  • Yealink connection troubles

    3
    0 Votes
    3 Posts
    489 Views
    S
    Gosh! So easy. Thank you very much.
  • How to allow roaming clients access remote LANs?

    3
    0 Votes
    3 Posts
    448 Views
    S
    @viragomann said in How to allow roaming clients access remote LANs?: @scilek said in How to allow roaming clients access remote LANs?: Remote Networks -> 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24 These networks has to the added to the "Local Networks" in the access servers settings. Leave "Remote Networks" blank. Iam sorry, in my haste, I made a mistake. I have corrected my original post. Additionally you have to add the tunnel subnet of the remote access server (10.0.2.0/24) to the "Remote Networks" in the OpenVPN settings of both branches. I did that and it worked. Thank you very much. (Well, I had to create static routes again, but still, I now understand the whole concept.)
  • Batch process openvpn clients - how to?

    1
    0 Votes
    1 Posts
    130 Views
    No one has replied
  • 0 Votes
    4 Posts
    596 Views
    JKnottJ
    @Crimzinza Also run Packet Capture on pfSense, to determine if it's getting that far. It's hard to solve a problem when we don't know the details.
  • Implementing Site-to-Site as Client-to-Client, not Client-to-Server

    5
    0 Votes
    5 Posts
    646 Views
    I
    Hello Jim, thanks for your suggestions, of course you were right. On the LAN side I had a default gateway to reach some internal subnets, which tricked pfSense into thinking that LAN was actually a WAN. I suppose that this was the reason that caused the masking of packets routed by OpenVPN and directed downstram via the default gateway. The setting of Firewall > NAT > Outbound was and remains "Automatic outbound NAT rule generation. (IPsec passthrough included)". Added the proper static routes on LAN side, removed the default gateway on the LAN side, everything was back to work as expected, that is: no automatic masquerading happening for packets coming from remote OpenVPNs. Lesson learned: the "add gateway for WAN, none for LAN" advice during setup process is there for a reason. Thank you again Gino
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.