• Routing between two OpenVPN servers

    5
    0 Votes
    5 Posts
    235 Views
    PierreFrenchP

    Thanks for the advise
    I will double check and redo the config

  • OPENVPN

    1
    0 Votes
    1 Posts
    122 Views
    No one has replied
  • NordVPN Client only for specific hosts

    58
    0 Votes
    58 Posts
    10k Views
    GertjanG

    @Tom777

    As a test, disable gateway monitoring.

    2ef89efc-c44e-41f8-9a5d-11c50119273f-image.png

  • Upgrade existing Site to Site Open VPN Tunnels Shared Key to TLS

    13
    0 Votes
    13 Posts
    1k Views
    V

    @Bambos said in Upgrade existing Site to Site Open VPN Tunnels Shared Key to TLS:

    Sep 25 18:54:08 openvpn 4548 plant30/publicIP:44210 MULTI: Learn: 192.168.30.0/24 -> plant30/publicIP:44210

    BTW: this is the line showing, that the route was set inside OpenVPN.

  • Post Quantum Cryptography

    1
    0 Votes
    1 Posts
    177 Views
    No one has replied
  • OpenVPN routing problem from Office to Branch network

    3
    0 Votes
    3 Posts
    166 Views
    S

    @Sateetje I think I have found it. I had an allow all rule at the bottom of the rules on the LAN interface. In the rule I set the default gateway to a gateway group, look like this was the issue.

  • OpenVPN server with a different gateway (not default one)

    2
    0 Votes
    2 Posts
    144 Views
    V

    @leptdre
    What do you mean with "outbound traffic"? The upstream traffic from connected clients?
    If this you can simply policy route it like traffic on any other interface.

  • OpenVPN very slow after updating pfSense from 2.6.0 to 2.7.2

    1
    0 Votes
    1 Posts
    113 Views
    No one has replied
  • OpenVPN pfSense to pfSense (peer-to-peer) connected but not routing

    17
    0 Votes
    17 Posts
    691 Views
    V

    @jhg said in OpenVPN pfSense to pfSense (peer-to-peer) connected but not routing:

    It seems you need all of the following non-default settings
    Client

    System/General Setup/DNS Server Override ON

    As mentioned multiple times, I think, this setting affects pfSense itself only, as long as you have not enabled DNS forwarding in the Resolver.
    You still didn't mention if you have this.

    Anyway, it has no affect on a domains, which you have configured an override for.

    VPN Client/Tunnel Settings/"Pull DNS"

    This also has no affect on a domains, which you have configured an override for. So you don't need to set this for your purposes and I never suggested to enable this option.

    Custom firewall rule on OpenVPN interface to allow incoming traffic

    That's pretty plausible. pfSense is a firewall, all intended traffic needs a rule.

    Server

    DNS Resolver: add an ACL permitting the remote LAN to query the server's DNS resolver

    That's by design of Unbound (DNS Resolver). You need ACLs for all unknown source IPs.

    Some comments:

    If you use the wizard to create multiple VPNs you'll get duplicate firewall rules for incoming VPN traffic

    Also note, that the rule tab "OpenVPN" is in fact an interface group including all OpenVPN instances your are running, can be servers or clients. Hence rules, you add there are applied to all.
    For better separation you can assign interfaces to the OpenVPN instances. However, remember that rules on the interface group have priority over ones on a member interface.

  • 0 Votes
    1 Posts
    145 Views
    No one has replied
  • Failed to import openvpn profile in ios device

    3
    0 Votes
    3 Posts
    445 Views
    R

    @Gertjan

    Thank you for your response.

    I solved the issue by creating certificates by setting the digest algorithm as SHA245.

  • Multisite OpenVPN Set up , a good guide

    1
    0 Votes
    1 Posts
    92 Views
    No one has replied
  • ARP and DHCP and OpenVPN

    8
    0 Votes
    8 Posts
    346 Views
    T

    Yes, that was it.

    What I have settled on
    LAN = 192.168.0.1/24
    VPN = 192.168.1.0/24
    CIDR 192.168.0.0/23 "covers" them both perfectly

    I'm not quite sure what to do if I want another VPN.

    If I made it 192.168.2.0/24

    I'd have to use 192.168.0.0/22 to cover both VPNs and the LAN, but now the Maximum Address is 192.168.3.254 -- so it "wastes" 255 IP addresses.

    But I'm not there yet and there's probably a better way to do it.

    Thanks for all your help.

  • 0 Votes
    4 Posts
    413 Views
    V

    @Enso_
    I was talking about the firewall on the destination machine.

    To investigate the issue, sniff the traffic with packet capture on pfSense on the LAN interface and see if you get both, request and response packets.

  • OpenVPN errors with client on mikrotik

    5
    0 Votes
    5 Posts
    214 Views
    M

    @viragomann Here is the mikrotik config:

    2ca5f715-8cd8-400a-8c3e-c29d9f1f833d-image.png

    a9ba1797-f786-47d3-bba6-639dffdbc4c8-image.png

    586386f7-6801-4f64-a484-159b42b242c0-image.png

    I am just not sure regarding the IP's

  • 0 Votes
    3 Posts
    723 Views
    W

    Hey, In here I've decribed my work on this topic :)
    https://forum.netgate.com/topic/189447/openvpn-ssl-tls-user-auth-over-ldap/3

  • Server certificate expiring - Just want to check.........

    4
    0 Votes
    4 Posts
    209 Views
    V

    @alanbaker
    Retaining the serial doesn't make sense here. But anyway, it would not have any affect to the clients.

    As well the private key is only used by the server for encryption and doesn't affect the clients.

    After reissuing ensure that the new certificate is assigned properly to the server.

  • Open VPN Client Router CUDY

    1
    0 Votes
    1 Posts
    94 Views
    No one has replied
  • OpenVPN Client Export and Shared Key Export functions missing?

    3
    0 Votes
    3 Posts
    138 Views
    J

    @viragomann Thanks for the pointer. I've installed it now.

  • Unable to delete OpenVPN server and client definitions?

    2
    0 Votes
    2 Posts
    110 Views
    V

    @jhg
    Is there in interface assigned to the concerned OpenVPN instance by any chance?
    If so you have to remove it before.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.