• Traffic will not route through VPN [Solved]

    4
    0 Votes
    4 Posts
    3k Views
    A
    So i created a new rule at the top my connection status image is attached. Rules are LAN IPv4 * LAN net * * * OpenVPNinterface_VPNV4 IPv4 * LAN net * * * * none OpenVPNinterface IPv4 * * * * * * none OpenVPN IPv4 * * * * * * none This results is some very unexpected behavior, i.e. i can only reach a handful of websites and alot of domains become unreachable. My IP is identified as ISP IP and not VPN. **Update: I got the traffic to route through VPN somewhat. So by adding redirect-gateway def1, i get the correct Remote IP but i have the same problems mentioned earlier: i can ONLY reach a handful of websites **Update 2: Ok now it WORKS!! and i am even able to selectively route traffic for specific domain/IPs that i define. I have no idea why it works now, all i know is i m backing this shiz up. Is there a easy way to backup the whole image of the OS and not just configuration? If someone is pulling their hair with vpn setup on this great software my recommendation is to make changes 1 at a time then reboot and test. **Update 3: The routing problems were caused by HAVP antivirus, specifically Transparent proxy. ![Connection Status.jpg](/public/imported_attachments/1/Connection Status.jpg) ![Connection Status.jpg_thumb](/public/imported_attachments/1/Connection Status.jpg_thumb) ![Gateway connection.jpg](/public/imported_attachments/1/Gateway connection.jpg) ![Gateway connection.jpg_thumb](/public/imported_attachments/1/Gateway connection.jpg_thumb)
  • Using a client.ovpn file with pfsense

    5
    0 Votes
    5 Posts
    7k Views
    M
    Thanks for the link Mirimir, unfortunately I think we have different ideas of what is "easy-to-follow", besides your page discuss a very different setup, installing pfsense in VM's and what-not. I already have a dedicated pfsense router that I wish to use. I futher wish to route traffic to one of 3 VPN servers based on protocol/target name/IP address. My pfsense is set up in what I believe is the standard way for dual wan.  Normally I'd go to the Lan tab and create a new rule, I can make selections for which conditions I'd want to use the VPN, but I can't see where I then pick the VPN link?  I would assume I should pick "Gateway" but when I do that I don't see VPN as a gateway???
  • Unable to route VPN Traffic between multiple sites

    6
    0 Votes
    6 Posts
    3k Views
    M
    The route statements need to be there, so in theory it shouldn't matter whether they're added to the advanced box or generated by the GUI using the new "172.20.10.0/24,172.16.1.0/24" syntax of 2.1.  All the commands get entered into the same config. So, if using "172.20.10.0/24,172.16.1.0/24" on the remote networks line works while adding routes to the advanced box doesn't… I'm wondering if that's a bug. For the DEVS Does v2.1 and above now prefer multiple subnets be entered on the "IPv4 Remote Network/s" and "IPv4 Local Network/s" line vs. the advanced config box or are we looking at a possible bug?  Please confirm.
  • Unable to get bidirectional traffic on site to site VPN

    4
    0 Votes
    4 Posts
    4k Views
    B
    @Marvosa: thanks for your suggestions and observations. In response to your suggestions: I already have in place any to any rules in all relevant interfaces in my testbed I'm not using windows at all, and yes, I have permissive host firewall rules in both desktops at each LAN I've tried rebooting several times (although not quite after each change/attempt) It is. The weirdest thing to me is the fact that when I ping a Client-side LANs desktop from a Server-side LAN desktop and capture traffic at the virtual interface from the PFSense that runs as OpenVPN server (opvpns1) I do see the packets passing through, but I don't see them coming to opvpnc1 (virtual interface from the PFSense that runs as OpenVPN client). It seems as those packets 'get lost' at the OpenVPN tunnel. And as I mentioned in previous posts, I don't spot any issues either with the traffic routes or with filtered out packets at the firewall log. Thanks once again though
  • Communication between OpenVPN clients. Problem…

    3
    0 Votes
    3 Posts
    1k Views
    M
    Thank your ! After I added 192.168.101.0/24 to remote networks in branch office,  all working fine! 102 addres - it was my error while i write this message.
  • OpenVPN bridge (peer to peer) connection problem

    10
    0 Votes
    10 Posts
    6k Views
    X
    For a working solution, have a look at reply #3 from phil.davis on this thread: http://forum.pfsense.org/index.php/topic,70066.0.html
  • Set one IP to use OpenVPN gateway

    2
    0 Votes
    2 Posts
    862 Views
    jimpJ
    Interfaces > (assign), assign the VPN and then enable it with an IP type of "none", then go back and edit/save the VPN to make sure it's started back up OK. After that you should see a gateway for the VPN in System > Routing, and you can use that gateway in firewall rules to make traffic exit that path. Depending on the other side you might also need to setup manual outbound NAT rules to do NAT as the traffic leaves the VPN
  • Filtering rules with multiple OpenVPN servers

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    The most likely cause in this scenario is that your per-interface rules are not being matched as you expect. If the VPNs are assigned with an IP type of "none" as they should be, make sure you are not using the macros for things like "VPN_1 subnet" and similar. With an IP type of "none" those are really blank/null. If you specify the actual subnets there, the traffic can be matched.
  • Site to site on two pfsense

    14
    0 Votes
    14 Posts
    7k Views
    C
    Well… (feeling kinda stupid) :P I got as far as step 2 and it started working like expected. I haven't had to reboot PFSense devices in ages and didn't occur to me. In my defense, they were also in production use so was not convenient at the time. Problem solved IPSec had something left over after disabling tunnels that a reboot resolved. Thanks Marvosa...
  • 0 Votes
    3 Posts
    1k Views
    J
    @marvosa: Need to clarify some info: Your diagram shows "OpenVPN Tunnel Network: 10.0.10.0/24" and "Subnet to pfSense3: 10.0.10.8/30".  Please clarify what you meant because those networks overlap. When you say "I have a remote site connected with OpenVPN Peer to Peer (SSL/TLS) working" you never specified what was connected. I can only assume from your diagram that you meant PFsense 1 and PFsense 3 are connected and that each side can communicate with the other side's LAN, but please verify my assumption is correct. On PFsense 2, is there a typo or is 172.16.10.1/26 really a WAN interface? Why isn't it a LAN interface?  I would imagine 172.16.20.0/26 cannot communicate with 172.16.10.0/26 because there is no return route back to 172.16.20.0/26 on PFsense 2.  Although, I'm not even sure that's possible because it's a WAN interface and being NAT'd… someone else chime in if they know for sure you need a return route to 172.16.20.0/26 on the cisco. Remember Post your server1.conf from PFsense 1 and client1.conf from PFsense 3. pfSense1 Site2Site (PKI) dev ovpns2 dev-type tun tun-ipv6 dev-node /dev/tun2 writepid /var/run/openvpn_server2.pid #user nobody #group nobody script-security 3 daemon keepalive 10 60 ping-timer-rem persist-tun persist-key proto udp cipher AES-256-CBC up /usr/local/sbin/ovpn-linkup down /usr/local/sbin/ovpn-linkdown local TRIMMED-PUBLIC-IP tls-server server 10.0.10.0 255.255.255.0 client-config-dir /var/etc/openvpn-csc ifconfig 10.0.10.1 10.0.10.2 tls-verify /var/etc/openvpn/server2.tls-verify.php lport 1195 management /var/etc/openvpn/server2.sock unix ca /var/etc/openvpn/server2.ca cert /var/etc/openvpn/server2.cert key /var/etc/openvpn/server2.key dh /etc/dh-parameters.1024 tls-auth /var/etc/openvpn/server2.tls-auth 0 route 172.16.20.0 255.255.255.192 route 172.16.20.64 255.255.255.192 route 192.168.0.0 255.255.255.0 push "route 172.16.0.0 255.255.248.0" push "route 172.16.10.0 255.255.255.192" push "route 10.2.6.0 255.255.255.0" push "route 10.2.31.0 255.255.255.0" push "route 10.31.10.0 255.255.255.0" push "route 10.31.112.0 255.255.255.0" push "route 10.31.253.0 255.255.255.0" push "route 10.32.253.0 255.255.255.0" push "route 10.252.130.0 255.255.255.0" push "route 10.252.144.0 255.255.255.0" push "route 10.252.252.0 255.255.255.0" push "route 10.253.1.192 255.255.255.255" push "route 10.253.252.0 255.255.255.0" pfSense3 (Client) dev ovpnc1 dev-type tun dev-node /dev/tun1 writepid /var/run/openvpn_client1.pid #user nobody #group nobody script-security 3 daemon keepalive 10 60 ping-timer-rem persist-tun persist-key proto udp cipher AES-256-CBC up /usr/local/sbin/ovpn-linkup down /usr/local/sbin/ovpn-linkdown local TRIMMED-PUBLIC-IP tls-client client lport 0 management /var/etc/openvpn/client1.sock unix remote TRIMMED-REMOTE-IP 1195 ifconfig 10.0.10.2 10.0.10.1 ca /var/etc/openvpn/client1.ca cert /var/etc/openvpn/client1.cert key /var/etc/openvpn/client1.key tls-auth /var/etc/openvpn/client1.tls-auth 1 Also here is the CSO (-csc) file for that client ifconfig-push 10.0.10.10 10.0.10.9 iroute 172.16.20.0 255.255.255.192 USING Site2Site 12:00:41.556303 IP 192.168.0.47.38007 > 10.31.10.89.33438: UDP, length 24 12:00:41.628250 IP 192.168.0.47.38007 > 10.31.10.89.33439: UDP, length 24 12:00:41.699052 IP 192.168.0.47.38007 > 10.31.10.89.33440: UDP, length 24 12:00:41.770609 IP 192.168.0.47.38007 > 10.31.10.89.33441: UDP, length 24 12:01:55.579807 IP 192.168.0.47.38022 > 10.31.10.89.33441: UDP, length 24 12:02:00.580990 IP 192.168.0.47.38022 > 10.31.10.89.33442: UDP, length 24 12:02:05.581638 IP 192.168.0.47.38022 > 10.31.10.89.33443: UDP, length 24 12:02:10.582314 IP 192.168.0.47.38022 > 10.31.10.89.33444: UDP, length 24 USING RoadWarrior 11:35:41.019829 IP 10.0.8.202.37905 > 10.31.10.89.33435: UDP, length 24 11:35:41.182282 IP 10.0.8.202.37905 > 10.31.10.89.33436: UDP, length 24 11:35:41.253157 IP 10.0.8.202.37905 > 10.31.10.89.33437: UDP, length 24 11:35:41.324107 IP 10.0.8.202.37905 > 10.31.10.89.33438: UDP, length 24 11:37:07.139149 IP 10.31.253.2.46027 > 10.31.10.89.33438: UDP, length 24 11:37:07.281083 IP 10.31.253.2.15414 > 10.31.10.89.33439: UDP, length 24 11:37:07.351882 IP 10.31.253.2.3381 > 10.31.10.89.33440: UDP, length 24 11:37:07.422730 IP 10.31.253.2.23474 > 10.31.10.89.33441: UDP, length 24
  • Nerd in need - OpenVPN add route errors?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    I've fixed the issue by removing the following from my VPN provider's config: [route-delay 1 10;] [route-metric 512]                     and [route-method exe] Also, removing the quad zero route from the config, prevented the add route error as my VPN provider was pushing the [redirect-gateway] option anyway.
  • MOVED: server openvpn non si avvia

    Locked
    1
    0 Votes
    1 Posts
    763 Views
    No one has replied
  • 0 Votes
    1 Posts
    2k Views
    No one has replied
  • VPN Client cannot connect to servers on VPN network…

    4
    0 Votes
    4 Posts
    2k Views
    T
    This mysteriously started working.  The only thing I can think of is that I a reboot of my Ubuntu Laptop or pfSense server fixed the issue.
  • OpenVPN failover and DynDNS update

    1
    0 Votes
    1 Posts
    913 Views
    No one has replied
  • Sanity check for openvpn clients accessing LAN

    6
    0 Votes
    6 Posts
    2k Views
    D
    Fair enough.  Like I said, though, I am literally the only person who has access to this VPN.  Thanks, I think I will figure out how to secure access from the VPN subnet just to be safe, and remove the NAT rule…
  • PortForward NAT to S2S

    1
    0 Votes
    1 Posts
    916 Views
    No one has replied
  • Accessing IPsec branch office from an OpenVPN client

    14
    0 Votes
    14 Posts
    4k Views
    C
    It worked! Thank you for your patience! I didn't even think to change the "LAN" part of that config. I was kind of assuming that once you're VPN'd in, you're part of the LAN.
  • MOVED: le service openvpn et tjr "stopped"

    Locked
    1
    0 Votes
    1 Posts
    623 Views
    No one has replied
  • System: Certificate Revocation List Manager => Export missing?

    7
    0 Votes
    7 Posts
    3k Views
    R
    ah yes… I have later forgot/overseen the 1st change which calls the update routine... --- /usr/local/www/system_crlmanager.php.orig 2013-04-12 16:31:46.000000000 +0200 +++ /usr/local/www/system_crlmanager.php 2013-11-29 23:21:22.000000000 +0100 @@ -107,6 +107,7 @@ } if ($act == "exp") { + crl_update($thiscrl); $exp_name = urlencode("{$thiscrl['descr']}.crl"); $exp_data = base64_decode($thiscrl['text']); $exp_size = strlen($exp_data); @@ -580,11 +581,9 @@ - [![](/themes/<?= $g['theme'];?>/images/icons/icon_down.gif "<?=gettext(")" alt="" width="17" height="17" border="0" />](system_crlmanager.php?act=exp&id=<?=$tmpcrl['refid'];?>) - [![](/themes/<?= $g['theme'];?>/images/icons/icon_e.gif "<?=gettext(")" alt="" width="17" height="17" border="0" />](system_crlmanager.php?act=edit&id=<?=$tmpcrl['refid'];?>)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.