• Compression being pushed by pfsense?

    7
    0 Votes
    7 Posts
    481 Views
    S

    @viragomann Thanks. Changing the server settings to Decompress + Disable Compression does remove the compression mismatch messages. But my strange connectivity issue still persists even with this change, which tells me that the compression mismatch was probably a redherring to my connectivity/routing issue.

    Thanks for your help on the compression part!

  • Solved: OpenVPN and Certificate Revocation Lists

    2
    0 Votes
    2 Posts
    395 Views
    A

    Replying to my own topic - I've missed something like I've thought :

    I was re-using an old List of revoked certificates. IT appears that the CRL ( Certificate Revocation List ) has an expiry date. Which is in no way visible in the GUI to be honest. When I've created a new list and applied it to the VPN, everything works as expected. The thing is that this becomes clear only when you go to create another CRL, to be honest GPT4 Solved it for me.
    7e545c7e-0e44-40ee-af81-4ca4cf9d714a-image.png

    Please close the topic.

  • OpenVPN via (temporary) LTE/4G (with static IPv6)

    8
    0 Votes
    8 Posts
    358 Views
    S

    Problem has been solved by using a secondary pfSense instance on a VPS, thanks

  • 0 Votes
    6 Posts
    518 Views
    JKnottJ

    @Jung-Fernmelder said in How to distribute IPv6 adresses to OpenVPN clients with changing prefixes via SLAAC:

    How to add the network by name?

    As I said, this would have to go to someone who's more familiar with OpenVPN. However, the global address is only necessary if you are going through the VPN & pfSense to the Internet. If you're accessing only your local network ULA is fine.

    I wish ISPs wouldn't do things like this that break IPv6.

  • OpenVPN(pureVPN) on version 2.7.2

    3
    0 Votes
    3 Posts
    334 Views
    M

    Did you manage to connect to Purepvn?

  • openvpn-client-import package not available for 2.7.2 CE?

    2
    0 Votes
    2 Posts
    112 Views
    M

    @DominikHoffmann
    From the documentation....

    8043c07a-b660-4ac6-85d0-8a6e11dda674-image.png

  • Unable to ping back from p2p server to client

    5
    0 Votes
    5 Posts
    289 Views
    dimskraftD

    @viragomann wow it worked, thank you! I had these entries, but they contained old configs!

  • P2P one mains site and multiple clients

    4
    0 Votes
    4 Posts
    191 Views
    V

    @PierreFrench
    Shared key is deprecated, as mentioned, and I didn't use it for years.
    So I don't know if and how client specific overrides and the client side LAN routing work with it.
    I think, it should if xou state the correct client name and the respective remote networks.

  • openvpn ping for a few seconds and stop

    1
    0 Votes
    1 Posts
    102 Views
    No one has replied
  • OpenVPN no access to a machine other than pfsense

    3
    0 Votes
    3 Posts
    163 Views
    P

    @johnpoz hi ! thanks ! it is due to bad gateaway config in my exi server (i set 2.100 instead of 2.1, i don't know why...)

    Thank a lot !

  • OpenVPN update

    8
    1 Votes
    8 Posts
    1k Views
    P

    @AwesomeRob Thank you for that :)

    I just tested with pfSense+ 24.03 and it still uses 2.6.8_1

    However if you then select the "development snapshot" branch under system update

    and ssh into pfSense and run

    pkg install openvpn

    then it does update to 2.6.11

    Not the cleanest option, but is a way to get it upgraded.

    After doing that upgrade then can always change the system update back to stable.

    Not sure if this may complicate when pfsense 24.08 is released (roadmap goal is August 2024) - however this may be our best option for now.

    For anyone wondering, here is output from my pfsense+ 24.03 after manually doing above described steps (including changing system upgrade option back to stable version) and then running openvpn --version

    OpenVPN 2.6.11 amd64-portbld-freebsd15.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] [DCO] library versions: OpenSSL 3.0.13 24 Oct 2023, LZO 2.10 DCO version: FreeBSD 15.0-CURRENT #0 plus-RELENG_24_03-n256311-e71f834dd81: Fri Apr 19 00:28:14 UTC 2024 root@freebsd:/var/jenkins/workspace/pfSense-Plus-snapshots-24_03-main/obj/amd64/Y4MAEJ2R/var/jenkins/workspace/pfSense-Plus-snapshots-24_03-main/sources/FreeBS Originally developed by James Yonan Copyright (C) 2002-2024 OpenVPN Inc <sales@openvpn.net> Compile time defines: enable_async_push=yes enable_comp_stub=no enable_crypto_ofb_cfb=yes enable_dco=yes enable_dco_arg=yes enable_debug=yes enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=no enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_management=yes enable_pam_dlopen=no enable_pedantic=no enable_pkcs11=yes enable_plugin_auth_pam=yes enable_plugin_down_root=yes enable_plugins=yes enable_port_share=yes enable_selinux=no enable_shared=yes enable_shared_with_static_runtimes=no enable_silent_rules=no enable_small=no enable_static=yes enable_strict=yes enable_strict_options=no enable_systemd=no enable_unit_tests=no enable_werror=no enable_win32_dll=yes enable_wolfssl_options_h=yes enable_x509_alt_username=yes with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes with_mem_check=no with_openssl_engine=auto with_sysroot=no
  • Site to Site VPN with multiple locations via one vpn server

    5
    0 Votes
    5 Posts
    320 Views
    T

    @viragomann Sorry there was some confusion on my end. The abbreviation CSO was not clear to me, but after some further searching it became clear and I added the route to the remote networks tab for the subnets on the client side. Thanks for your help, it works now!

  • Unstable VPN with RADIUS

    1
    0 Votes
    1 Posts
    72 Views
    No one has replied
  • MFA via external RADIUS

    1
    0 Votes
    1 Posts
    130 Views
    No one has replied
  • openvpn IPv4 Local network(s) alias

    Moved
    4
    0 Votes
    4 Posts
    201 Views
    R

    @micneu tut mir leid, ich bin ja auch selten dumm, wenn man schon deutsch spricht sorry
    @johnpoz thx to move :)

  • Survey: Who has successfully set up peer-to-peer network?

    17
    0 Votes
    17 Posts
    673 Views
    D

    So, I found a problem in the server configuration. I had to include the remote networks in the IPv4 Local network(s) section. Now it says:

    192.168.1.0/24,192.168.34.0/24,192.168.42.0/24,192.168.45.0/24,192.168.48.0/24,192.168.51.0/24,192.168.54.0/24

    and it works for some of those, but only for some.

    I compared the two client configurations on 192.168.34.1 and 192.168.54.1:

    <openvpn> <openvpn-client> <auth_user></auth_user> <auth_pass></auth_pass> <proxy_user></proxy_user> <proxy_passwd></proxy_passwd> <vpnid>1</vpnid> <dco>disabled</dco> <protocol>UDP4</protocol> <dev_mode>tun</dev_mode> <interface>wan</interface> <ipaddr></ipaddr> <local_port></local_port> <server_addr>hoffmann.homeunix.net</server_addr> <server_port>1194</server_port> <proxy_addr></proxy_addr> <proxy_port></proxy_port> <proxy_authtype>none</proxy_authtype> <description><![CDATA[Ipheion Solutions management interface]]></description> <mode>p2p_tls</mode> <topology>subnet</topology> <custom_options>verify-x509-name &quot;server&quot; name</custom_options> <caref>66d22c7d1f7c9</caref> <certref>66d22c7d9e38e</certref> <crlref></crlref> <tls>********</tls> <tls_type>auth</tls_type> <tlsauth_keydir>1</tlsauth_keydir> <digest>SHA256</digest> <tunnel_network></tunnel_network> <tunnel_networkv6></tunnel_networkv6> <remote_network>192.168.54.0/24</remote_network> <remote_networkv6></remote_networkv6> <use_shaper></use_shaper> <allow_compression>asym</allow_compression> <compression></compression> <auth-retry-none></auth-retry-none> <passtos></passtos> <udp_fast_io></udp_fast_io> <exit_notify>none</exit_notify> <sndrcvbuf></sndrcvbuf> <route_no_pull></route_no_pull> <route_no_exec></route_no_exec> <dns_add></dns_add> <verbosity_level>1</verbosity_level> <create_gw>both</create_gw> <data_ciphers>AES-128-GCM,AES-256-CBC</data_ciphers> <data_ciphers_fallback>AES-256-CBC</data_ciphers_fallback> <ping_method>keepalive</ping_method> <keepalive_interval>10</keepalive_interval> <keepalive_timeout>60</keepalive_timeout> <ping_seconds>10</ping_seconds> <ping_action>ping_restart</ping_action> <ping_action_seconds>60</ping_action_seconds> <inactive_seconds>0</inactive_seconds> </openvpn-client> </openvpn>

    and

    <openvpn> <openvpn-client> <auth_user></auth_user> <auth_pass></auth_pass> <proxy_user></proxy_user> <proxy_passwd></proxy_passwd> <vpnid>1</vpnid> <dco>disabled</dco> <protocol>UDP4</protocol> <dev_mode>tun</dev_mode> <interface>wan</interface> <ipaddr></ipaddr> <local_port></local_port> <server_addr>hoffmann.homeunix.net</server_addr> <server_port>1194</server_port> <proxy_addr></proxy_addr> <proxy_port></proxy_port> <proxy_authtype>none</proxy_authtype> <description><![CDATA[pfSense-UDP4-1194-millers-config_OpenVPN]]></description> <mode>p2p_tls</mode> <topology>subnet</topology> <custom_options>verify-x509-name &quot;server&quot; name</custom_options> <caref>66bd527e46839</caref> <certref>66bd527ec81c0</certref> <crlref></crlref> <tls>********</tls> <tls_type>auth</tls_type> <tlsauth_keydir>1</tlsauth_keydir> <digest>SHA256</digest> <tunnel_network></tunnel_network> <tunnel_networkv6></tunnel_networkv6> <remote_network></remote_network> <remote_networkv6></remote_networkv6> <use_shaper></use_shaper> <allow_compression>asym</allow_compression> <compression></compression> <auth-retry-none></auth-retry-none> <passtos></passtos> <udp_fast_io></udp_fast_io> <exit_notify>none</exit_notify> <sndrcvbuf></sndrcvbuf> <route_no_pull></route_no_pull> <route_no_exec></route_no_exec> <dns_add></dns_add> <verbosity_level>1</verbosity_level> <create_gw>both</create_gw> <data_ciphers>AES-128-GCM,AES-256-CBC</data_ciphers> <data_ciphers_fallback>AES-256-CBC</data_ciphers_fallback> <ping_method>keepalive</ping_method> <keepalive_interval>10</keepalive_interval> <keepalive_timeout>60</keepalive_timeout> <ping_seconds>10</ping_seconds> <ping_action>ping_restart</ping_action> <ping_action_seconds>60</ping_action_seconds> <inactive_seconds>0</inactive_seconds> </openvpn-client> </openvpn>

    The only real differences are in

    the description, the CA reference, the cert reference, and that the second has remote network specified, client side.
  • Client Specific Overrides via Cronjob Enable/Disable

    3
    0 Votes
    3 Posts
    168 Views
    F

    @viragomann
    Thank you very much for your great Idea!

    I will check this out.
    At the moment the Client is not setting the IP from Client Specified Override and we don't know why.
    After this weekend it will work, I am sure.

    Greetings

  • opvevpn client to site on secondary wan

    3
    0 Votes
    3 Posts
    173 Views
    M

    @viragomann ok thanks I'll do some tests

  • Pfsense connected to Fortigate as SSL VPN server only

    2
    0 Votes
    2 Posts
    580 Views
    V

    @Debian-Linux
    So your setup should look like this in the future:

    WAN ---- Forti ---- LAN | |--- pfSense-VPN-GW

    ?
    In fact pfSense is a LAN device in this case. Maybe there is a switch in between, but this doesn't matter.

    Yes, you can do this.

    You have to separate pfSense from the LAN, however. Create an additional subnet (maybe VLAN) between the Fortigate and pfSense. Assuming you connect the WAN interface of pfSense to the Forti, state the Forti IP (of the VLAN) as upstream gateway in the interface settings. On the Fortigate forward the OpenVPN traffic to pfSense. On the Forti create static routes for the OpenVPN tunnel networks (assuming you run an access server. For a site-2-site create static routes for the remote networks) and point them to pfSense. On pfSense go to NAT > Outbound, enable the hybrid mode and add a rule for the destination of your local networks (can be an alias) to the WAN interface and set it to "no NAT". This enables the destination device to see the real client source IP instead of the pfSense WAN IP.
  • Not using OVPN anymore - log entry

    2
    0 Votes
    2 Posts
    148 Views
    V

    @McMurphy
    The VPN_GW might arise from assigning an interface to an OpenVPN instance.
    So go to Interfaces > Assignments and check if there is a related existing interface. If so delete it.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.