• OpenVPN connects but no internet traffic

    4
    0 Votes
    4 Posts
    1k Views
    M

    Post your server1.conf (/var/etc/openvpn).

  • Default gateway pushed to Client OpenVPN bridge/TAP

    2
    0 Votes
    2 Posts
    637 Views
    S

    Which version of the client are you using, and can you post server/client configurations on your thread here? I suspect if you aren't pushing this from your server the client may be setting it. Windows also has metric priorities on each ethernet adapter and it may be the case that if both are publishing default routes, the interface with the lower metric value is winning out.

  • User Auth issue

    2
    0 Votes
    2 Posts
    974 Views
    jimpJ

    @alagave said in User Auth issue:

    can't ask for 'Enter Private Key Password:'

    Somehow it thinks your certificate private key is password protected. If it is, then don't do that. Remove the password from the key and then import it again.

  • Split tunneling doens't work for Linux clients.

    2
    0 Votes
    2 Posts
    337 Views
    S

    The problem was caused by Network Manager which was handling the opvn config. To disable sending all traffic through the VPN do this
    Click NetworkManager applet icon > VPN Connections > Configure VPN... > select VPN network > Edit > IPv4 Settings > Routes... > Check ‘Use this connection only for resources on its network’

    SOLVED!

  • How do I force all internet through the VPN tunnel?

    6
    0 Votes
    6 Posts
    352 Views
    M

    Well, the topic is "How do I force all internet through the VPN tunnel?", so my assumption is you want internet traffic on your LAN forced thru a VPN tunnel, correct? If so, your end is the local end and the network behind the VPN is the remote (or far) end.

    how do I do a Policy route?

    Assign the VPN to an interface. On the LAN tab, create a firewall rule (above your LAN net/any rule) that has:
    a. Protocol = any
    b. Source = specify your LAN subnet or choose "
    c. Destination = any
    d. Gateway = The gateway IP created from assigning the VPN to an interface (This is done by expanding the "Advanced Options" section)
  • first time setting up a site-to-site VPN with openVPN over pfSense

    3
    0 Votes
    3 Posts
    440 Views
    M

    thank you @Rico for you reply

    I will read it soon!

    then I should connect the internet cable directly to the WAN port of the pfSense.

    If I use pfSense in place of the ISP router:

    do you think I should ask my internet provider for the line parameters to be settled up on pfSense?
    or maybe have I to set up some other special configuration on the pfSense because I use it in place of the ISP router?

    thanks!

  • Yealink connection troubles

    3
    0 Votes
    3 Posts
    477 Views
    S

    Gosh! So easy.

    Thank you very much.

  • How to allow roaming clients access remote LANs?

    3
    0 Votes
    3 Posts
    435 Views
    S

    @viragomann said in How to allow roaming clients access remote LANs?:

    @scilek said in How to allow roaming clients access remote LANs?:

    Remote Networks -> 172.16.0.0/24, 172.16.1.0/24, 172.16.2.0/24

    These networks has to the added to the "Local Networks" in the access servers settings.
    Leave "Remote Networks" blank.

    Iam sorry, in my haste, I made a mistake. I have corrected my original post.

    Additionally you have to add the tunnel subnet of the remote access server (10.0.2.0/24) to the "Remote Networks" in the OpenVPN settings of both branches.

    I did that and it worked. Thank you very much. (Well, I had to create static routes again, but still, I now understand the whole concept.)

  • Batch process openvpn clients - how to?

    1
    0 Votes
    1 Posts
    130 Views
    No one has replied
  • 0 Votes
    4 Posts
    596 Views
    JKnottJ

    @Crimzinza

    Also run Packet Capture on pfSense, to determine if it's getting that far. It's hard to solve a problem when we don't know the details.

  • Implementing Site-to-Site as Client-to-Client, not Client-to-Server

    5
    0 Votes
    5 Posts
    624 Views
    I

    Hello Jim, thanks for your suggestions, of course you were right.

    On the LAN side I had a default gateway to reach some internal subnets, which tricked pfSense into thinking that LAN was actually a WAN.
    I suppose that this was the reason that caused the masking of packets routed by OpenVPN and directed downstram via the default gateway.
    The setting of Firewall > NAT > Outbound was and remains "Automatic outbound NAT rule generation.
    (IPsec passthrough included)".

    Added the proper static routes on LAN side, removed the default gateway on the LAN side, everything was back to work as expected, that is: no automatic masquerading happening for packets coming from remote OpenVPNs.

    Lesson learned: the "add gateway for WAN, none for LAN" advice during setup process is there for a reason.

    Thank you again
    Gino

  • 2 Openvpn clients, one causes internet connection lost on just one device

    9
    0 Votes
    9 Posts
    814 Views
    bthovenB

    No. I got a public ip from my ISP.

  • OpenVPN P2P (SSL/TLS), 1 server+n clients, improper routing

    2
    0 Votes
    2 Posts
    437 Views
    K

    The Remote IPv4 networks were also defined in 2 other OpenVPN server definitions. While the tunnels not being active, it does seem to create routes for it. In the end this seems pretty logical, but was unexpected while doing the configuration. I was under the impression that the routes would only be set upon actual OpenVPN connection.

    Changing the subnets, eliminating overlap (wether connected or not), did the trick.

    "Duh".

  • Route traffic of local IP through OpenVPN site-to-site client?

    7
    0 Votes
    7 Posts
    768 Views
    E

    Yea that fixed it. I didn't have to add a gateway on the pfsense at site B. I added the interface/gateway on site A side and created rules in LAN tab to route IPs in alias over to site-to-site interface gateway. Then pushed the routes to site B in the site-to-site OpenVPN server configuration on site A. On site B, I only needed to create NAT outbound rules so that packets would be able to get out to the internet.

  • 0 Votes
    1 Posts
    751 Views
    No one has replied
  • MTU/MSSFIX

    16
    0 Votes
    16 Posts
    17k Views
    T

    @rustydusty1717 I know this is an old post but how do i perform these chances to the MTU/MSSFIX. There is no clear instructions on how to perform any of this.

  • OpenVPN, Portforwarding

    1
    0 Votes
    1 Posts
    174 Views
    No one has replied
  • OpenVPN site-to-site tunnel connected but can't access local network

    5
    0 Votes
    5 Posts
    1k Views
    JeGrJ

    OpenVPN and IPSec have no problem whatsoever in co-existing and having tunnels defined. If stopping IPSEC makes your OVPN tunnel work, you have it wrong. Most commonly you are probably using the same subnets on OVPN as in IPSEC or try to route a network that is already defined in IPSEC. Without your config, that's all we can guess.

  • OpenVPN connected but can't access local network

    8
    0 Votes
    8 Posts
    1k Views
    kiokomanK

    every time someone had this problem on the forum it turn out to be a routing issue,
    check if this help,
    https://forum.netgate.com/topic/127348/openvpn-only-works-for-a-single-user-at-a-time
    there is a workaround at the end but i think is a not necessary hack as i'm pretty sure there is something wrong he did somewhere else. Open a new 3d with your problem, this is old and not related.

  • Issues with OpenVPN->pFsense->iPsec

    1
    0 Votes
    1 Posts
    133 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.