• [Solved] OpenVPN Issues with SlickVPN

    3
    0 Votes
    3 Posts
    2k Views
    A

    I'm on 2.5 (upgraded from working 2.4.5p1) I imported both their CA the client certificate and set

    Data Encryption Algorithms to:
    Encryption Algorithm: AES-256-CBC
    NCP Algorithms: AES-256-CBC

    The Fallback Data Encryption Algorithm to:

    AES-256-CBC

    Auth digest algorithm to:

    SHA1 (160-bit)

    Allow compression:

    Decompress incoming, do not compress outgoing (Asymmetric)

    Compression:

    Disable Compression [Omit Preference]

    Topology:

    net30 - Isolated /30 network per client

    Ping settings set to:

    Inactive:
    0

    Ping method:
    keepalive

    Interval:
    15

    Timeout:
    120

    Custom options:
    remote-cert-tls server;

    I do have my default gateway set to my ISP, and I and set rules for the packets I want routed via the tunnel. I also tag the packets and added a floating rule looking for those tagged packets in case the tunnel is down,and drop them, since vpn traffic I want out the tunnel only and never routed via default gateway.

  • No LAN, Quirky Firewall Access, IPv6

    6
    0 Votes
    6 Posts
    569 Views
    J

    Solution Found
    It was a MTU issue and most frustratingly it came to me at random. There was no particular reason to it other than me going, "Huh. I've never thought of MTU." and did some Googling to find the right MTU for OpenVPN and found that the default 1500 was too much for my network and had to step it down to around 1160 which fixed all the issues I've had before. I'm sure the routing quirk on the host was a one-off, but finally the VPN works just like how I want it.

    TL;DR: Check if the MTU is too high.

  • OpenVPN Server config using Wizard seems to default to AES-256-CBC

    3
    0 Votes
    3 Posts
    289 Views
    E

    @bob-dig Sorry, my error, and sincere apologies. I now realise that I was actually examining the wrong server config file in /var/etc/openvpn/ - I now have three separate OpenVPN Servers. Please ignore the post.

  • pfSense+ OpenVPN is too slow

    1
    0 Votes
    1 Posts
    290 Views
    No one has replied
  • 0 Votes
    2 Posts
    201 Views
    jimpJ

    On OpenVPN 2.5.0 you don't pick an encryption algorithm, you pick a list of Data Ecnryption Algorithms and set a Fallback Data Encryption Algorithm for when cipher negotiation doesn't work.

  • Radius Attribute Returns

    2
  • OpenVPN Site to Site keeps disconnecting after upgrade to 2.5.0

    2
    0 Votes
    2 Posts
    633 Views
    jimpJ

    Something is restarting it, but you'll need to check through the other logs (e.g. system log, gateway log) to see what is triggering that.

  • OpenCPN

    8
    0 Votes
    8 Posts
    750 Views
    V

    @diablort666 said in OpenCPN:

    @viragomann La vpn se establece sin errores, si tengo habilitado el acceso remoto, haciendo pruebas no llego con ping a ningún equipo.

    Have to use a translater.

    See, what I wrote above.
    You can simply check that with pfSense, using the Ping tool in the Diagnostic menu.
    Do a ping to a computer with default options. I think, you will get responses.
    Then change the sourece to OpenVPN and try again. Do you still get a response?

  • Client device running OpenVPN not connecting to LAN

    10
    0 Votes
    10 Posts
    1k Views
    V

    @theskelly said in Client device running OpenVPN not connecting to LAN:

    so perhaps I'll make pfsense the client instead.

    Ttat's a very good decission. 🙂

  • 0 Votes
    3 Posts
    704 Views
    R

    If anyone else hits this, netgate support found I was using "openvpn" in the outbound NAT rules as the interface. Specifying this to the VPN Client interface resolved the issues.

  • Can ping gateway through OpenVPN, but cannot access Pfsense panel

    1
    0 Votes
    1 Posts
    197 Views
    No one has replied
  • Monitor OpenVPN Certificate expiration dates

    5
    0 Votes
    5 Posts
    5k Views
    A

    We also needed to check the expiration date of pfSense certificates, my colleague wrote a Check_MK plug-in: https://github.com/ThomasKaiser/Check_MK/blob/master/agents/plugins/pfsense-certificate-expiration.sh

  • OpenVPN JumpCloud Server Certificate not showing up

    2
    0 Votes
    2 Posts
    467 Views
    se_marcS

    so after a bit of playing around i ended up figuring out how to get it working. i'm not the best with certs but here is a video for how to configure:

    Youtube Video

    steps:

    list itemBefore anything, follow the instructions on JumpCloud for setting up LDAP and binding a user to LDAP: https://support.jumpcloud.com/support/s/article/using-jumpclouds-ldap-as-a-service1 The following command outputs the certificate authority to the /tmp/ directory as jumpcloud.chain.pem. echo -n | openssl s_client -connect ldap.jumpcloud.com:636 -showcerts | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/jumpcloud.chain.pem

    Skip the first certificate of the chain.

    Add the next 3 certificates in the chain individually as Certificate Authorities in pfSense using the following settings:

    System > Cert. Manager > CAs tab > Add

    Descriptive name: JumpCloud CA (add a 1, 2, and 3 after each certificate)

    Method: Import an Existing Ceritifcate Authority

    Trust Store: check this box

    Randomize Serial: check this box

    Certificate Data: paste the single certificate here

    Save

    The following command outputs only the JumpCloud LDAP Server certificate to the /tmp/ directory as jumpcloud.ldap.pem echo -n | openssl s_client -connectldap.jumpcloud.com:636 | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/jumpcloud.ldap.pem Add the Server Certificate to pfSense.

    System > Cert. Manager > Certificates tab > Add/Sign

    Method: Import an Existing Certificate

    Descriptive name: JumpCloud Server Certificate

    Certificate data: paste the certificate here

    Save

    If you don't have a JumpCloud account set up and bound to LDAP, you'll need to do that first.

    You can use your account or create a new user. There only needs to be one bound account but there can be multiple.

    In JumpCloud:

    Users > Select the user you'd like bound to LDAP > User Security Settings and Permissions > check the Enable as LDAP Bind DN box and Save user

    LDAP > Add a new LDAP server > Add the user groups or users

    Create the LDAP Server in pfSense

    NOTE: you can get YOUR_ORG_ID from JumpCloud's Settings page

    System > User Manager > Authentication Servers tab > Add

    LDAP Server Settings:

    Type: LDAP

    Hostname or IP Address: ldap.jumpcloud.com

    Port Value: 636 (SSL)

    Transport: SSL - Encrypted

    Peer Certificate Authority: JumpCloud LDAPS SSL Client Certificate

    Protocol Version: 3

    Search Scope - Level: Entire Subtree

    Search Scope - Base DN: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com

    Authentication Containers: ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com

    Extended Query: &(objectClass=inetOrgPerson)(uid=*)

    Bind Credentials - User DN: uid= ldap-binding user,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com

    Bind Credentials - Password: ldap-binding-user's-password

    User Naming Attribute: uid

    Group Naming Attribute: cn

    Group Member Attribute: memberOf

    Group Object Class: groupOfNames

    Save

    Test the authentication in pfSense

    Diagnostics > Authentication > LDAP

    put in your user name and password and click Test

    You should see a green box indicating success

    Setting up OpenVPN:

    Type of Server: LDAP

    LDAP servers: Choose the JumpCloud LDAP server you created in the previous steps

    Certificate Authority: choose the OpenVPN authority you created earlier

    Certificate: Choose the OpenVPN certificate you created earlier

    Change any other settings to your liking and you're all set.

  • Remote Clients as well as Peer to Peer VPN

    3
    0 Votes
    3 Posts
    398 Views
    B

    @viragomann said in Remote Clients as well as Peer to Peer VPN:

    e wizard to configure the additional access server.

    Thanks so much, much appreciated

  • OpenVPN with laptop clients failing after pfSense Upgrade to 2.5.0

    15
    0 Votes
    15 Posts
    3k Views
    jimpJ

    @yobyot said in OpenVPN with laptop clients failing after pfSense Upgrade to 2.5.0:

    @eapperley

    This change worked for me, too.

    Is there a point release coming which will include this fix?

    Yes: https://redmine.pfsense.org/issues/4521#note-27

  • openvpn client not connecting and not shows why!

    4
    0 Votes
    4 Posts
    695 Views
    D

    cgv

  • 0 Votes
    1 Posts
    245 Views
    No one has replied
  • OpenVPN Client Dial Secondary External IP Address

    10
    0 Votes
    10 Posts
    817 Views
    B

    @viragomann Awesome, thanks so much for that, I really appreciate your help

  • Openvpn Manual Start

    1
    0 Votes
    1 Posts
    224 Views
    No one has replied
  • Fluctuations in the OpenVPN connection after upgrading to version 2.5.0

    1
    0 Votes
    1 Posts
    246 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.