• Pfsense can't establish gateway to OpenVPN server

    4
    0 Votes
    4 Posts
    861 Views
    N
    Hello Thanks for your assistance Assuming you mean - VPN IP Network Specify the addresses and netmasks for the virtual networks created for VPN clients  The VPN tunnel network is  172.27.240.0/20 My Pfsense box is getting assigned  the 172.27.254.38 ip and it seems to know the gateway is 172.27.254.1 but the interface shows as down as it cannot ping or talk to 172.27.254.1 . On the OpenVPN server, I can ping the 172.27.254.1  Gateway IP but not from the PfSense Box. Some documentation seems to say you need to assign a manual route, and others do not.  I have tried  assigning a manual NAT listing but it didn't seem to change anything.
  • Client VPN wont pass traffic to site to site

    2
    0 Votes
    2 Posts
    412 Views
    A
    Start from checking your routing tables. I suppose that remote site may have no information on how to reach your remote access subnet.
  • Error creating new internal certificate

    9
    0 Votes
    9 Posts
    2k Views
    fabricioguzzyF
    hello Jimp doing it right now. Thanks Fabricio.
  • PFSense server connect as Client to OpenVPN server

    2
    0 Votes
    2 Posts
    456 Views
    A
    You don't need to touch configuration files. Navigate to VPN-OpenVPN-Clients and add your client configuration there.
  • OpenVPN client export not working in version 2.3.4-RELEASE

    4
    0 Votes
    4 Posts
    3k Views
    J
    I had the same issue on 2.4.2 version Users where able to connect to client but could not access anything on lan When downloading new Windows Installer it is only 5KB large and it did not work on PC's Uninstalling and installing back openvpn-client-export package resolved the problem
  • ~~pfSense 2.4.3 OpenVPN Wizard BUG?~~

    3
    0 Votes
    3 Posts
    1k Views
    M
    Hi Derelict, I should have checked the bugtracker:-) But thanks for your response.
  • PfSense OpenVPN Setup and MacBook Pro Setup

    2
    0 Votes
    2 Posts
    630 Views
    DerelictD
    I would just spring the $9 on Viscosity and call it a day. Create the OpenVPN server and use the client export package to generate your configuration. Import it into Viscosity and you are done.
  • Create more than one IPv4 Tunnel Network

    4
    0 Votes
    4 Posts
    713 Views
    R
    sorted !!! what i did was create a "client specific override" common name rob and ip 10.100.3.10/24 and this is my rule https://s31.postimg.org/pxsqg9env/openvpn_rules.png now i can only talk to 10.100.1.253 which is my switch, if i try 10.100.1.254 which is my router i cannot get access to it thanks rob
  • OpenVPN no Gateway assigned to client

    7
    0 Votes
    7 Posts
    5k Views
    S
    @Derelict: You need to set the search domain properly on the client if you expect it to append the domain name in a lookup. Try resolving the FQDN. If that works it's a search domain problem. Precisely correct.  I thought I had tried that but I went back through and looked at my previous pings and found I had misspelled it.  This is primarily for VPN protected RDP access so I can just use the FQDN of the server and it pops them in just fine.  Thanks again for your help!  You learn something new every day!
  • Site to Site routing with pfSense and remote Edgerouter not working

    15
    0 Votes
    15 Posts
    3k Views
    A
    @Derelict: I did that manually and it worked fine. Could you please compare my configuration with yours? Here a the relevant part of the server config and override file: --- /var/etc/openvpn/server4.conf --- server 10.9.0.0 255.255.255.128 ifconfig 10.9.0.1 10.9.0.2 route 192.168.1.0 255.255.255.0 topology subnet route 10.9.0.128 255.255.255.128 --- /var/etc/openvpn-csc/server4/username --- push "route 10.0.1.0 255.255.255.0" iroute 192.168.1.0 255.255.255.0 ifconfig-push 10.9.0.134 255.255.255.128 With this configuration - client IP is not on "server" subnet- I get the error message I mentioned earlier. As I'm reading OpenVPN documentation I realize that server configuration page needs some modification in order to support pool configuration with topology subnet.
  • OpenVPN server interface(tun) treated as WAN -type interface?

    1
    0 Votes
    1 Posts
    351 Views
    No one has replied
  • Site to Site with stunnel package

    7
    0 Votes
    7 Posts
    2k Views
    H
    Any updates please
  • 0 Votes
    1 Posts
    1k Views
    No one has replied
  • OpenVPN site to site one-way problem

    2
    0 Votes
    2 Posts
    521 Views
    J
    Guys problem solved, For some reason unknown to me yet, PFBlockeNg was blocking access to pinging and HTTPS sites of the remote network. Http sites worked normally. Once I disabled PFBlockerNG, everything works as expected. Now I have to find the setting in PFBlockerNG to allow simultaneous operation of Site 2 Site VPN and PFBlockerNG . Any recommendation is welcome.
  • OpenVPN through OpenVPN

    2
    0 Votes
    2 Posts
    646 Views
    jimpJ
    Nothing special to it. Make sure your destination IP address has a route sending it through your other VPN and it will do the rest on its own. You'll be slowed down by having to encrypt/decrypt everything twice, and you'll lose even more bytes per packet to overhead, but otherwise it should work.
  • Possible Security Bug: Client Override

    12
    0 Votes
    12 Posts
    2k Views
    jimpJ
    It's entirely possible that AD does the right thing and OpenLDAP-based systems fail that test. Strengthens the case that it's not a pfSense issue, but a problem on the authentication server.
  • Notification in /tmp/rules.debug after OpenVPN Wizard

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ
    It's also been fixed in the repository for a while now: https://redmine.pfsense.org/issues/8391
  • Remote OpenVPN access to a AirVPN pfSense box

    2
    0 Votes
    2 Posts
    577 Views
    D
    Try this guide https://nguvu.org/pfsense/pfsense-inbound_vpn/ It has some useful tips.
  • Open VPN TUN Site-to-Site only can ping VPN peers, works fine with TAP

    7
    0 Votes
    7 Posts
    2k Views
    A
    https://www.speedguide.net/analyzer.php Here's where I get the values: 1397 MTU(now after testing tun-mtu values) 1357 MSS I currently have these advanced options set: fixmss; tun-mtu:1400 I was able to confirm these are functional after setting the MTU to 1300 and getting that result on the test above. but with 1400, it seems 1397 is the best I can do, which makes sense if the MSS of non-tunneled packets is 1460 (40bytes of headers) - another 40 bytes for encapsulated packets = 1420, so it seems there's about 23 bytes of OpenVPN headers for TLS/SSL authentication. I was just hoping to get as close to the 1420 I've seen in IPsec as possible. I'm not using IPSec because of the routing functionality. I set the tun-mtu to 1402 and the tested result still returns the above results with MTU 1397
  • Successful ping when VPN client is deactivated

    4
    0 Votes
    4 Posts
    704 Views
    M
    Oh, thx for that plausible example. That makes sense ;)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.