• DCO mode can't creat tun interface

    1
    0 Votes
    1 Posts
    135 Views
    No one has replied
  • Still issues with peer-to-peer network

    1
    0 Votes
    1 Posts
    102 Views
    No one has replied
  • NordVPN Client - not working

    10
    5
    0 Votes
    10 Posts
    1k Views
    johnpozJ
    @br8bruno so gibberish that has zero to do with their interception of dns. The only thing you could do to avoid interception would be to use say doh, or dot might not be intercepted or blocked and you would know if intercepted because there is no way you would trust the cert they send back. Unbound can forward to dot. But with normal resolving dns traffic is sent via 53, which they are intercepting. Part of doh and dot is avoiding interception. And actually validating your talking to the NS you want to talk too. I have no issues with the technology in general, and sure it has some valid use cases. The problem I have with doh is how browsers and apps are turning it on without explicit user acknowledgement and signoff.. And make it difficult to block if you as the admin of your network do not want devices on your network using it. This is easy with dot, you can just block port 853 - but with doh it uses 443.. Which without knowing the actual endpoint they are going to talk to, is impossible to block without breaking the internet for your devices on your network. Use some other vpn service is what I would do.. One that doesn't mess with your dns.
  • OpenVPN and firewall troubleshooting

    4
    0 Votes
    4 Posts
    256 Views
    T
    Thanks @viragomann and @Gertjan! Your suggestions gave me stuff to look into further and I now have it working. The net is, check to make sure the correct interface is specified in the firewall rules. I also think including IPv4 and IPv6 (ipv4+ipv6) in the same rule makes things confusing for you and for the firewall itself. Tim
  • Can’t reach remote host in peer-to-peer network

    17
    1
    0 Votes
    17 Posts
    1k Views
    D
    Please see https://forum.netgate.com/post/1181349 and https://forum.netgate.com/post/1181336 for the final puzzle pieces that got it to work.
  • Peer-to-peer authentication fails—why?

    9
    0 Votes
    9 Posts
    983 Views
    D
    Please see https://forum.netgate.com/post/1181349 for the final puzzle piece that got it to work.
  • Still no reliable peer-to-peer connection, but progress made

    6
    1
    0 Votes
    6 Posts
    523 Views
    D
    @viragomann said in Still no reliable peer-to-peer connection, but progress made: And additionally all remote networks have to be stated in the server settings. This was the crux of the matter! Thank you very much!
  • ubuntu 22 openvpn server to pfsense connects but no traffic

    7
    0 Votes
    7 Posts
    300 Views
    A
    just checking back if anyone knows why the connection works perfectly in android but wont work at all in pfsense firewall?
  • Export user configuration for use with peer-to-peer server?

    1
    0 Votes
    1 Posts
    87 Views
    No one has replied
  • 0 Votes
    1 Posts
    97 Views
    No one has replied
  • No Traffic in Side-by-Side Tunnel

    3
    11
    0 Votes
    3 Posts
    134 Views
    Gamienator 0G
    @viragomann Oh wow, thats true o.O Thanks for that!
  • DCO available only on Plus version?

    14
    0 Votes
    14 Posts
    757 Views
    M
    @viragomann That is what i think. A lot of us have home labs. And 130 $ a year, it's much too much.
  • Dashboard Traffic Graph VPN

    5
    4
    0 Votes
    5 Posts
    351 Views
    J
    @the-other said in Dashboard Traffic Graph VPN: what works: Correct that works fine. @the-other said in Dashboard Traffic Graph VPN: I cannot even select opt1 seems "different" that you can't even select it on the widget. My solution to the flat line was to unselect that graph, so it doesn't even try to show the flat line. Deal with it another day. Since it looks like it is most likely a bug.
  • Installing and configuring OpenVPN Access Server + pfsense

    2
    0 Votes
    2 Posts
    720 Views
    U
    If you are a n00bie like me, and are coming across this article... I figured it out. Below are the steps: Install OpenVPN Access Server (OpenVPN AS) on a Virtual Appliance or Dedicated Device. On your firewall, "Pinhole" the OpenVPN port through the firewall (usually UDP Port 1194). Update the hostname to OpenVPN AS to a DNS entry that is accessible locally (e.g. 192.168.x.x) and globally (123.210.x.x). Get an SSL certificate from LetsEncrypt, and configure automatic renewals (guide). In OpenVPN Access Server, configure SAML Authentication with your Identity Provider (IdP) of choice (e.g. Entra, Google, IBM Verify, etc.) Within OpenVPN Access Server, configure your Access Control policy via User Permissions or Group Permissions Use your phone to test the if your SAML authentication and OpenVPN Access Control policies are working. As for forum moderators and pfSense developers, I think it would be helpful if within your documentation you emphasised that OpenVPN Access Server is an easy option for organisations looking to implement a MFA-protected VPN solution. IMO everything on the web points to using OpenVPN embedded into pfSense, making organisations think that authentication via RADIUS and LDAP are the only options. Personally, for VPN I think it is safer to limit the number of times end-users need to enter their username/password. Instead, each time they access they should complete a push/biometric challenge. Since re-authentication is so much faster, you can make your VPN disconnect after a few minutes of inactivity. And, end-users can't really complain since reconnecting is so simple. OpenVPN AS as a FREE license that allows 2 concurrent connections. After that you have to purchase a subscription, which is reasonable, all things considered.
  • Unable to connect to MS SQL

    1
    0 Votes
    1 Posts
    78 Views
    No one has replied
  • Coping of some files failes

    2
    0 Votes
    2 Posts
    118 Views
    P
    @pfadmin so it seams that OpenVPN is not the problem. I brougth up a wireguard tunnel with the same effect. Example File stops at 55% copie. Do I use at the same pc out of the same LAN a OpenVPN connection we use for Roadrunners, than it works. I can not see the difference...
  • OpenVPN: no longer access to my LAN, why?

    4
    0 Votes
    4 Posts
    207 Views
    K
    @slu After I've turned off the IPSec-Tunnel it worked again. It routed everything to the IPSec-Tunnel. Of course I have a route 192.168.0.0/16 into the IPSec-tunnel and my local LAN is 192.168.1.0/24, but this normally should work (and it did), because the LAN is locally connected and connected routes are better than static. But I do not have so many subnets behind the IPSec-tunnel, so I can route only the needed subnets.
  • DNS leaks using OpenVPN client tunnel

    69
    0 Votes
    69 Posts
    28k Views
    T
    @gschmidt i stumbled upon this and while youve seem to have had your issue solved, i found two solutions within the several hours i was trying to fix this leak. one way is to use cmd in windows and using openvpn community edition cmd line interface to use "path to ovpn gui exe, keep quotations" --config "path to ovpn file to use, keep quotations" --block-outside-dns pause OR change all dns to google or cloudflare dns in network connections you can use this software to do it automatically instead of manually https://www.sordum.org/9432/dns-lock-v1-5/
  • Automatic creation of user certificates

    2
    0 Votes
    2 Posts
    372 Views
    W
    @streetsfinest Hello, Have you found a way Maybe?
  • 0 Votes
    2 Posts
    167 Views
    V
    @munson What do you mean by "unencrypted traffic"? It's on the web browser to request traffic unencrypted (http) or encrypted (https). pfSense has no impact on this as long as you don't run a proxy. Generally to force all upstream traffic from the client over the VPN, check "Redirect IPvX Gateway" in the server settings. Then ensure, that there is an outbound NAT rule in place for the OpenVPN tunnel network. If not switch the outbound NAT into hybrid mode and enter a rule for the source of the tunnel network to WAN.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.