• Need Help w/ Port Forwarding Using OpenVPN Connection

    2
    0 Votes
    2 Posts
    427 Views
    DerelictD
    https://doc.pfsense.org/index.php/How_can_I_forward_ports_with_pfSense https://doc.pfsense.org/index.php/Port_Forward_Troubleshooting You will want to put the port forward on the OpenVPN assigned interface. You will want to be sure the rules on the OpenVPN interface group tab DO NOT match the port forwarded traffic. In fact, if this is your only OpvnVPN client, just delete/disable all rules on the OpenVPN tab.
  • Looking for understanding of the routes that are added

    2
    0 Votes
    2 Posts
    442 Views
    DerelictD
    It is just the way OpenVPN works. That route gets traffic for the /24 into OpenVPN. From there OpenVPN does the right thing.
  • 0 Votes
    6 Posts
    1k Views
    V
    @ashima: Hi, That is possible if you are having site-2-site openvpn connection. Then all the systems from Client A side can access 192.168.20.x series and vice versa. As far as I can understand from your post  is that you are running windows based openvpn client software  on individual systems on Client A. If that is the case then I guess you will  not able to access systems on Client A side from 192.168.20.x. I suggest to put up a device (may be another pfsense device) at Client A and then the two devices can make a openvpn connection. Then all the devices from either side should be able to talk to each other. regards, Ashima Thanks to all, following the Ashima suggestion I solved the problem, I just bought a simple router board  Mikrotik RB260GS and make the connection  site to site open VPN, So now is solved. Thanks to all for your cooperation, all the best. Gully
  • DNS over VPN, but DNS needed to dial VPN

    4
    0 Votes
    4 Posts
    792 Views
    T
    I have worked around this situation by just using the VPN server's IP address instead of its hostname in the VPN client config.
  • 2nd connection not working

    17
    0 Votes
    17 Posts
    2k Views
    M
    Apologies for the delayed response. I have to walk away as this was doing my head in. It can't be this hard… I have a VPN tunnel established between server and client1 (10.0.8.1 & 10.0.8.2) Both server & client1 have openVPN fw rules allowing full access. Server LAN can ping 10.0.8.1 & 10.0.8.2 Server pfSense can ping 10.0.8.1 & 10.0.8.2 Client1 LAN can only ping 10.0.8.2 Client1 pfSense can ping 10.0.8.1 & 10.0.8.2 Does this sound correct or does this indicate a problem?
  • Multiple VPN Connections

    3
    0 Votes
    3 Posts
    3k Views
    gregeehG
    Thank you for the detailed response, I will give it a try. Greg Edit:  I followed your suggestion and I have hosts going via the LA Server for particular domains.  However I have no access to any other websites/domains except those that go via the LA Server.  What could I have done wrong? Thanks, Greg Edit2: Deleted all my changes and started again, now it works just fine.
  • AWS openvpn pfsense unable to ping client from server

    1
    4 Votes
    1 Posts
    408 Views
    No one has replied
  • Import User Certificates from stand alone OpenVPN server to Pfsense

    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    Are the certificates+keys password protected? If not, you can't import them without removing that password. That said, you do not need to import user certificates to use them. They won't be usable with the export package, but they are still valid for VPN Access so long as they validate against the CA as they should, and provided they are not on an active CRL.
  • Client VPN access to multiple subnets

    7
    0 Votes
    7 Posts
    3k Views
    M
    @deepak11: Hi guys, I'm also having the same problem, and also I tried adding push route in "Advanced Configuration". its not working. any other suggessions ? deepak11, this is a 4.5 year old thread, you should start a new thread with your specific details in it, so we can offer targeted troubleshooting. At a high level, two things are needed: On site A's remote access config, push a route to site B's LAN to your clients On Site B's site-to-site config, add a return route to site A's remote access tunnel network This can all be done in the GUI now
  • CA private key

    5
    0 Votes
    5 Posts
    2k Views
    D
    Thanks!, I found all the certificates including the CA cert and private key. Just to add some information, this post https://forum.pfsense.org/index.php?topic=32372.0 help me get the string of this certificates from the base64 encoded xml fields.
  • Client Export Utility & Multiple OpenVPN Servers

    8
    0 Votes
    8 Posts
    3k Views
    I
    @jimp: @iesjg.tic: Same problem here. Set up two instances with the same certs (for client access, not site-to-site) and only the first one appears in the dropdown. Reinstalled the client export package, same thing, only the first one shows Any ideas? Check the mode, as mentioned a few posts above. If it does not show in the list, it must not be set to a remote access mode. You're right! Just set "Remote Access (SSL/TLS)" server mode and showed up! Thanks!!
  • OpenVPN Server setup issues

    5
    0 Votes
    5 Posts
    2k Views
    L
    Thank you both so much for the clues!  I edited the existing rule created by the wizard on WAN, changing to protocol from "any" to "tcp" and that fixed it up. Really appreciate the help.
  • Allow OpenVPN clients to access remote site connected via IPSec

    5
    0 Votes
    5 Posts
    1k Views
    R
    Found it!  I a Zxyel Zywall 110 and I forgot that I needed to add a dedicated routing setup after setting up the new IPSec connection. Thanks!
  • MPLS plus OpenVPN

    5
    0 Votes
    5 Posts
    2k Views
    P
    The thing is, it works on the Network 1; and route on pfsense is here, and route is on computer too, but don't work on OpenVPN connection [image: Capture.png] [image: Capture2.png]
  • Openvpn - Business hours

    8
    0 Votes
    8 Posts
    1k Views
    C
    Yep the client-connect script sounds ideal, need to test it on test unit to see what variables you can see will revert back.
  • OpenVPN needs to be restarted at pfsense reboot

    12
    0 Votes
    12 Posts
    4k Views
    T
    Okay, well it sounds like you're set.  Policy routing is just using firewall rules to assign certain traffic to certain gateways and other traffic to other gateways (at least that's my high level understanding of it).  The alternative would be to be to assign traffic to gateways via static routes.  In any case, if you're set up with VLANs I trust you know what you're doing :)
  • Bridged VLAN Tagging between Two PF Sense over OpenVPN Tunnel

    3
    0 Votes
    3 Posts
    658 Views
    stephenw10S
    So in fact you only need two VLANs? Or is that just an example? If it really is only two you can just use two OpenVPN TAP tunnels on different ports. Bridge them to the VLAN interfaces at each end. That actually helps throughput in most cases by using two OpenVPN processes. Steve
  • Cannot Route through OpenVPN Client

    4
    0 Votes
    4 Posts
    579 Views
    J
    So I don't know how or why, but recreating the client seems to have fixed this. Not sure why I didn't try this earlier. For some context though, the raw interface socket changed. The original interface was being labeled as OPT9 but when I recreated the client it now is branded as OPT1. At a guess I was creating the client before I had finished something else VLAN related and the OPT interface was mislabelled or misassigned somehow and that is why traffic flow and routing was broken. Thanks for the tip viragomman!
  • Best practices to manage many OpenVPN connections/certificates

    1
    0 Votes
    1 Posts
    397 Views
    No one has replied
  • Email notifications not working through PIA Vpn

    2
    0 Votes
    2 Posts
    348 Views
    V
    The only workaround would be to check "Don't pull routes" in the client settings and direct your traffic by policy routing to the vpn server. So the default route points to the WAN gateway, which is used by pfSense for upstream traffic.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.