• Connectivity between OVPN Client and Peer-to-Peer networks

    4
    0 Votes
    4 Posts
    712 Views
    L
    This thread solved my issue - https://forum.pfsense.org/index.php?topic=147108.0 Added remote site's LANs into Access server's config. Works fine! Thanks!
  • OpenVPN behind the router

    11
    0 Votes
    11 Posts
    2k Views
    DerelictD
    That is from an issue with the openvpn wizard. Already fixed in 2.4.3_1 and 2.3.5_2
  • This topic is deleted!

    3
    0 Votes
    3 Posts
    112 Views
  • RESOLVE errors after vpn tunnel goes down

    1
    0 Votes
    1 Posts
    419 Views
    No one has replied
  • Windows OS clients can't connect to the Internet

    10
    0 Votes
    10 Posts
    1k Views
    V
    So the client can't reach 8.8.8.8.  :o According to your routing table, it should be routed to your default gateway 192.168.7.254. Try a "tracert 8.8.8.8" to see where it stucks. Maybe it helps to route the DNS server over the vpn. To do so, add "8.8.8.8/32" to you "IPv4 Local networks" in the vpn server settings (comma separated from other networks). Also an outbound NAT rule for the vpn tunnel network on WAN is needed in this case. Maybe it was added automatically by pfSense.
  • Filter error after setup of OpenVPN

    3
    0 Votes
    3 Posts
    625 Views
    jimpJ
    If you upgrade to 2.4.3-p1 that wizard issue has been fixed. So if you use the wizard again after upgrading it will be OK for future tunnels. Editing the current rule and fixing it manually will work around the issue on 2.4.3.
  • OpenVPN dpinger behavior question

    5
    0 Votes
    5 Posts
    1k Views
    G
    I know saying "me too!" isn't the biggest help ever.  However, I also have run in to this issue. I have my WAN Gateway and running OpenVPN for my other gateway.  At random, my internet kill-switch kicks in because OpenVPN is restarting. May 15 19:25:09 rc.gateway_alarm 98632 >>> Gateway alarm: VPN_WAN_VPNV4 (Addr:REDACTED Alarm:1 RTT:31347ms RTTsd:5964ms Loss:21%) May 15 19:25:09 check_reload_status updating dyndns VPN_WAN_VPNV4 May 15 19:25:09 check_reload_status Restarting ipsec tunnels May 15 19:25:09 check_reload_status Restarting OpenVPN tunnels/interfaces May 15 19:25:09 check_reload_status Reloading filter May 15 19:25:10 php-fpm 243 /rc.openvpn: OpenVPN: One or more OpenVPN tunnel endpoints may have changed its IP. Reloading endpoints that may use VPN_WAN_VPNV4. I thought it was a memory issue, I did turn up a few things to push my rig to see what I could get away with but even with things turned down (log retention, number of entries for pfblocker, things like that) it still keeps cycling itself. I will say I only started having this issue in the past few weeks.  I am only running the pfBlocker package, but I do have some large lists.  I initially thought a cron job was causing a memory issue to make this go down however, I switched the cron jobs to once a day at 2am but still experienced the issue. Either of you guys have similar setups that can correlate potential causes so we can start to work towards a solution?  Or smarter minds than my own are definitely in this community so I would love to hear back from someone that can tell me where my dumb mistake lies - I will glady wear egg on my face if it means network gains some stability. Thanks!
  • Hostname Resolution over OpenVPN

    7
    0 Votes
    7 Posts
    3k Views
    DerelictD
    From the client: dig @dns_server_ip_address something.com Does that work? If not find out why not.
  • OpenVPN + External RADIUS - Failed auth-user-pass-verify

    8
    0 Votes
    8 Posts
    3k Views
    DerelictD
    Sorry. Don't know about all that microsoft crap.
  • OpenVPN Server - No internet with "Redirect IPv4 Gateway" checked

    3
    0 Votes
    3 Posts
    1k Views
    B
    Thanks, it worked! I knew it could be something very simple. I was silly assuming OpenVPN Server pushes the default DNS.
  • PfSense + unRAID BitTorrent + AirVPN = Confusing

    19
    0 Votes
    19 Posts
    4k Views
    M
    So, I have no idea why it worked, but I installed the VPN version of the client, and it started downloading! I guess the container might be a bit buggy? It's double tunnelled now, so the client makes a VPN connection to the VPN network by using the original VPN tunnels. This stuff makes my head spin!
  • Openvpn blues

    2
    0 Votes
    2 Posts
    640 Views
    stephenw10S
    The OpenVPN tab encompasses all OpenVPN traffic. So any rules there are applied to all OpenVPN connections. The tabs for assigned OpenVPN interfaces (StrongVpnMiami here) have rules only for that connection. So if you want to allow traffic in on only one VPN interface you should put rules there and only there. The main OpenVPN tab is parsed first so if you have an allow all rule there rules on the individual connections are not ever hit. That becomes important if you have site-to-site tunnels with incoming traffic. When traffic comes in via a particular connection you need it to hit a rule on the specific tab so it get a 'reply-to' tag on the firewall state allowing the reply traffic to go back via the correct connection. With a VPN connection to a public server like StrongVPN you normally don't want connections coming in over the VPN at all so don't need rules there. The firewall rules in your screenshot above on LAN have some issues. Nothing can ever hit the bottom two rules because all traffic from the LAN subnet will be caught by the 4th rule and sent via WAN_DHCP. No traffic that isn't from the LAN subnet should come in via the LAN (unless you have routed subnets). Steve
  • OpenVPN Server help - pfsense behind another router/fw, how to configure?

    4
    0 Votes
    4 Posts
    2k Views
    V
    It should look like at the attached drawing. Connect pfSense neither to LAN nor to WAN. The transfer network has to be a separate network. I don't know if your router can provide a third network. If not maybe it's VLAN capable, so you can achieve the same logical setup with VLAN. If you use the WAN interface on pfSense and enter the 10.199.0.1 as gateway, that IP is used as default gateway and packet destined for LAN will be sent to it. So there is no special route necessary on pfSense. Only on the router you have to add a route for the VPN tunnel network. [image: VPN_transfer_network.png] [image: VPN_transfer_network.png_thumb]
  • Visibility of computers on remote LAN

    2
    0 Votes
    2 Posts
    544 Views
    B
    Look more closely at the OpenVPN config.  There is a provision to enable netbios over openvpn.  This is easier to do in TAP mode as your OpenVPN clients will already be on the correct network to connect to netbios resources on the OpenVPN server's local network.  If you are using TUN mode, you must allow the TUN network access to the netbios resources you want to connect to.
  • OpenVPN clients accessing IPSEC tunnel to Amazon VPC

    3
    0 Votes
    3 Posts
    596 Views
    B
    I just tested this, and was able to hop OpenVPN > PFSense1 > IPSec > PFSense2, but I do use TAP mode which makes the firewall rules on the end points a bit simpler.
  • "script-security 3" instead of 2?

    3
    0 Votes
    3 Posts
    5k Views
    johnpozJ
    What do you mean nobody knows?  Your thread has been here what not even 3 days yet.. If your connecting to a vpn service that is using username and passwords then yes.  If they defaulted to 2, that is just one thing that users would dick up and wonder why it doesn't work because they don't read and just click shit ;) Kind of how there are hidden firewall rules created when you enable dhcpd that are not shown.  Because the typical user would not know what to enable if not there, and if they were shown would end up deleting and then asking why dhcpd is not working. Do you always need to know what they use to make the hotdog? If you want to make it 2 - go right ahead and edit the source file so its a 2.. https://github.com/pfsense/pfsense/search?utf8=%E2%9C%93&q=script-security&type= And update to pfsense will put it back to 3. While openvpn might put a warning in the connection about it… Is it really an issue on your firewall, where YOU created the connection to this vpn?
  • No openvpn connectivity after first disconnect

    1
    0 Votes
    1 Posts
    520 Views
    No one has replied
  • Client with XP cannot connect with OpenVPN

    13
    0 Votes
    13 Posts
    3k Views
    jimpJ
    If you use the client export package, you can click the option to export one of the old windows installers with the "-xp" suffix, and you can also check the "legacy client" option in the export package when making inline configurations. But the best thing to do is ditch XP.
  • Tuning openvpn / pfsense2.4.3 / vmware 6.5

    2
    0 Votes
    2 Posts
    1k Views
    B
    I would try deactivating AES in System>Advanced>Miscellaneous, as the AES instructions are available to OpenSSL natively and don't need additional wrappers to be used.  This is mentioned in other threads.  You might also try using the AES-GCM encryption modes.  Another thing to try is using LZ4 compression and pushing it to all clients. I  am running with the settings I have mentioned under QEMU/KVM on AMD for remote access with SSL/TLS and User Auth, and for peer to peer tunnels, and it seems to serve me well. Cheers.
  • Inability to access LAN over OpenVPN after minor changes

    6
    0 Votes
    6 Posts
    1k Views
    P
    So, bit later than I wanted. But think I've discovered the problem lies with authentication. May 8 23:21:14 openvpn 65105 Authenticate/Decrypt packet error: packet HMAC authentication failed May 8 23:21:14 openvpn 65105 TLS Error: incoming packet authentication failed from [AF_INET6]::ffff:(remote site wan):7003 (via ::ffff:(pfsense wan address)%em0) May 8 23:21:16 openvpn 65105 Authenticate/Decrypt packet error: packet HMAC authentication failed May 8 23:21:16 openvpn 65105 TLS Error: incoming packet authentication failed from [AF_INET6]::ffff:(remote site wan):7003 (via ::ffff:(pfsense wan address)%em0) May 8 23:21:20 openvpn 65105 Authenticate/Decrypt packet error: packet HMAC authentication failed May 8 23:21:20 openvpn 65105 TLS Error: incoming packet authentication failed from [AF_INET6]::ffff:(remote site wan):7003 (via ::ffff:(pfsense wan address)%em0) May 8 23:21:28 openvpn 65105 Authenticate/Decrypt packet error: packet HMAC authentication failed May 8 23:21:28 openvpn 65105 TLS Error: incoming packet authentication failed from [AF_INET6]::ffff:(remote site wan):7003 (via ::ffff:(pfsense wan address)%em0) May 8 23:21:45 openvpn 65105 Authenticate/Decrypt packet error: packet HMAC authentication failed May 8 23:21:45 openvpn 65105 TLS Error: incoming packet authentication failed from [AF_INET6]::ffff:(remote site wan):7003 (via ::ffff:(pfsense wan address)%em0) Starts blasting en masse the moment I try to ping/navigate to anything on the LAN. Not sure how to rectify that, given my setup is identical (short of lan address) to how it was setup when it was working for two years.  Google-fu all points to configurations far more advanced than mine on Ubuntu servers or OpenWRT, not sure how to decipher and apply to mine.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.