• Unusual OpenVPN routes

    1
    0 Votes
    1 Posts
    218 Views
    No one has replied
  • openvpn client routing some traffic that it shouldn't

    2
    0 Votes
    2 Posts
    193 Views
    T

    nevermind, found the issue. i had specified an IP address reservation for the pfsense firewall on the openvpn server, and had the subnet wrong. it was set to the vpn tunnel gateway, instead of 255.255.255.0, so pfsense had some issues with it. changed appropriately and it works now... RTFM.....

  • OpenVPN Connects but no traffic until I reconnect again

    1
    0 Votes
    1 Posts
    173 Views
    No one has replied
  • Assigning tunnels, hostnames, and IPs to clients in OpenVPN

    2
    0 Votes
    2 Posts
    332 Views
    H

    After playing around, I can assign the .40 tunnel, but can't assign the same IP that I normally reserve for my phone on that subnet or I get no internet service. I get randomly assigned IP of .40.2. That IP has no hostname in the Pihole query list and does not show up in the DHCP status so I can assign a static IP and give it a hostname.

    I'm at a loss how to assign a hostname. I know it's trivial, but if I was running it with several hundred VPN users, I would think there's a way to assign hostnames when they log on. I've googled and searched, and I can't find how.

    Thanks for any help.

  • Destination Network

    2
    0 Votes
    2 Posts
    414 Views
    V

    @vincent_28
    The reason might be a missing route on the client.

    To direct internet traffic over the vpn, check "Redirect gateway" in the server settings.
    Also ensure that pfSense has added an outbound NAT rule for the OpenVPN tunnel network. In the picture there might be a typo in the vpn network, the shown is a public IP.

    @vincent_28 said in Destination Network:

    I already setup also in rules > OpenVPN> the destination is WAN Net but not still appearing the IP of WAN.

    This does not allow internet access. WAN net is only the subnet of your WAN IP. So if it's a /32 (PPP), there is nothing else included.
    You need to set the destination to "any" in the pass rule. If you want to prohibit access to your LAN add an additional block rule for that destination to the top of the rule set.

  • 0 Votes
    4 Posts
    568 Views
    L

    Strange, since I've completed this setup :

    adding the outbound NAT for the VPN creating the gateway add a dynamic dns entry for the VPN "wan" interface

    some process or something kicked in, because now I get a mail every 15 minutes with in the subject :

    Arpwatch Notification : Cron <root@aureliusgate01> /etc/rc.filter_configure_sync

    and the following content in the mail body :

    X-Cron-Env: <SHELL=/bin/sh> X-Cron-Env: <PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin> X-Cron-Env: <HOME=/root> X-Cron-Env: <LOGNAME=root> X-Cron-Env: <USER=root> 0 addresses deleted. 0 addresses deleted.

    I know this is the cron line with the schedule

    0,15,30,45 * * * * root /etc/rc.filter_configure_sync

    but I didn't add it or activate it, so it was there already, so I wonder why it now is "active" or sending these mails?

  • OpenVPN +NPS Radius (windows) with SMS/Phone App Code

    6
    0 Votes
    6 Posts
    2k Views
    D

    Thank you very much

    Now It´s working fine.

  • Duplicate user in OpenVPN client export list

    1
    0 Votes
    1 Posts
    253 Views
    No one has replied
  • OpenVPN fails to connect after update to 21.02.2-RELEASE

    1
    0 Votes
    1 Posts
    229 Views
    No one has replied
  • Openvpn Intermittent routing issues with some clients

    3
    0 Votes
    3 Posts
    515 Views
    G

    @nunu thanks for helping me on this.

    When I look at the routing table on windows (route print), I see the route, it looks like it is setup properly

    I wonder if this is a ipv4/6 issue.

  • OpenVPN Server Behind NAT being blocked by Firewall Rule

    2
    0 Votes
    2 Posts
    710 Views
    V

    @preimmortal said in OpenVPN Server Behind NAT being blocked by Firewall Rule:

    I checked the firewall log to see why this is occuring:
    Apr 21 16:29:11 ► CLIENT_VPN Default deny rule IPv4 (1000000104) 192.168.0.100:1194 123.123.123.123:12345 TCP:FPA
    In this case, 192.168.0.100:1194 would be the WAN address for my pfsense box and 123.123.123.123:12345 would be the client trying to access the VPN. The CLIENT_VPN is a client VPN connection that is being used for other outbound traffic. I would have expected the OpenVPN Server to use the default gateway, which is WAN

    Basically respond packets are routed accordingly to the routing table if the incoming interface of the requests is unclear.
    I suspect that the other client connection set the default route, presumably pushed by the server.

    I reviewed my firewall rules and tried to set up some rules to force all outbound traffic to use the WAN gateway and also set up the Outbound NAT for the OpenVPN Server:

    Outbound NAT rules have no affect on respond packets.

    I tried to set up policy based routing documented here:

    Not clear what you aim to achieve with that in this case.

    Simply ensure that there is a firewall rule on the WAN interface allowing the OpenVPN access on port 1194, ensure that there is no floating rule or interface group rule matching this traffic.

  • openvpn question/users

    1
    0 Votes
    1 Posts
    335 Views
    No one has replied
  • Added an interface and lost connection to 2 routers

    4
    0 Votes
    4 Posts
    605 Views
    S

    @kakerstrom Interesting, I recently set up a Hurricane Electric IPv6 tunnel which involves adding an interface. I was already connected to the web GUI via a PC on LAN. Routing out from the PC over IPv6 actually worked but I found I couldn't ping or DNS query the new LAN IPv6 until I restarted the router. Firewall rules seemed to be ignored as the default block rule was triggering. Sounds like you restarted after removing the interface? Would have been interesting to know if restarting first would have fixed it for you...

    For client/remote routers we usually allow GUI and/or SSH access from our IP, either on WAN or if they have a web server one can NAT forward WANIP:50443->LANIP:443 (still limited by source IP). Also re: referrers, in System/Advanced/Admin Access, set "Alternate Hostnames," for instance add the WAN IP or hostnames.

  • Site to site OpenVPN client auto reconnect

    1
    0 Votes
    1 Posts
    519 Views
    No one has replied
  • Bug: More than one OpenVPN client does not connect

    2
    0 Votes
    2 Posts
    645 Views
    G

    I have the similar issue after upgrading to 21.02.2 version on my Negate SG-5100. Prior to upgrade all OpenVPN connections were working fine. After upgrade only one VPN connection is working, other is connected but no traffic passing. On disabling the VPN on connection 2, data traffic starts but not on VPN.

    Not sure if it's a bug generated by pfsense update.

  • The DNS Dilemma - To leak or not to leak

    1
    0 Votes
    1 Posts
    467 Views
    No one has replied
  • Not able to RDP or SSH via OpenVPN

    5
    0 Votes
    5 Posts
    754 Views
    GertjanG

    @sakthi said in Not able to RDP or SSH via OpenVPN:

    and i'm able to access the ESXi homepage as well

    What is the IP of this ESXI VM ? 192.168.65.x/24 ?
    pfSense is 192.168.65.1 ?

    During setup, set up firewall rules on the OpenVPN (or OPENVPN interface if you have instantiated the OpenVPN interface - see Youtube => Netgate video's for details) lie this :

    d891ffed-7b91-45b7-a625-eae293eb9346-image.png

    I'm using myself the OpenVPN server of pfSense so I can call in, use the GUI of pfSEnse, or the SSH access, and also some RDP access to other devices on my LAN's (192.168.1.x/24 and 192.168.2.x/24)
    My OpenVPN Tunnel network is 192.168.3.x/24

    I had to inform my RDP (Microsoft based devices) that these had to accepts connection from the outside of their 'own' LAN, as by default they are restricted to their LAN == local access only.

    Btw : I have two local physical networks, 192.168.1.x/24 and 192.168.2.x/24
    As my devices to be contacted from "remote" are all on 192.168.1.x/24, I used the 192.168.2.x/24 network to see if I could connect to these RDP and SSH devices on 192.168.1.x/24.
    When I knew how to make it work from 192.168.2.x/24 I knew I could also make it work from 192.168.3.x/24 - the OpenVPN network.
    That was the moment I started to build my OpenVPN access.

  • [2.5.x] potential Bug: IPv6 tunnel network and gateway

    1
    0 Votes
    1 Posts
    257 Views
    No one has replied
  • First seven carp ip works then not

    6
    0 Votes
    6 Posts
    711 Views
    M

    @mgiammarco2
    I have deleted carp/nat/gateways/gateways groups on slave
    XMLRPC recreated them again but again wrong.
    How can I file a bug?

  • 1 Votes
    3 Posts
    1k Views
    E

    @johnnyfive Yeah this is the problem - what a shame. It would be really great to have full acceleration using QuickAssist!

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.