• OpenVPN routing

    1
    0 Votes
    1 Posts
    131 Views
    No one has replied
  • Gateway Monitoring

    1
    0 Votes
    1 Posts
    132 Views
    No one has replied
  • Routing traffic through OpenVPN Client for Specific IPs

    9
    0 Votes
    9 Posts
    727 Views
    C
    @MoonKnight Thanks for the feedback. I have since gotten rid of the destination rule inversion on the IPGROUP_ROUTE_VIA_EXPRESSVPN and set it to Any. This gives me better protection to make sure absolutely nothing goes out that is in that group if it does not go out the ExpressVPN gateway.
  • Single WAN, multiple VPN connections, multiple local networks

    3
    0 Votes
    3 Posts
    234 Views
    W
    @viragomann Yes, I think I tracked it down to the VPN instances getting the same virtual IP in pfsense, which is making it conflict. And these are not changeable.... so.... currently looking at setting up a dedicated vpn connection on the linux box for the static route for the mailserver.
  • 0 Votes
    7 Posts
    290 Views
    S
    @DominikHoffmann Since you can reproduce it I'd create a bug report at redmine.pfsense.org.
  • Need Clarification on /usr/local/sbin/ovpn-linkup

    2
    0 Votes
    2 Posts
    150 Views
    X
    edit: Apr 26 11:17:34 openvpn 83673 do_ifconfig, ipv4=1, ipv6=0 Apr 26 11:17:34 openvpn 83673 /sbin/ifconfig ovpns4 172.16.10.1 172.16.10.2 mtu 1500 netmask 255.255.255.255 up Apr 26 11:17:34 openvpn 83673 /usr/local/sbin/ovpn-linkup ovpns4 1500 0 172.16.10.1 172.16.10.2 init Apr 26 11:17:34 openvpn 83673 /sbin/route add -net 10.4.0.0 172.16.10.2 255.255.0.0 Apr 26 11:17:34 openvpn 83673 /sbin/route add -net 172.16.20.0 172.16.10.2 255.255.255.0 Apr 26 11:17:34 openvpn 83673 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Apr 26 11:17:34 openvpn 83673 Socket Buffers: R=[42080->524288] S=[57344->524288] Apr 26 11:17:34 openvpn 83673 UDPv4 link local (bound): [AF_INET]175.144.139.191:1120 Apr 26 11:17:34 openvpn 83673 UDPv4 link remote: [AF_UNSPEC] This is log from Server. Is there any indicator showing something wrong or its perfectly fine? VPN has been down for awhile when using openvpn after update on pfsense. anyone care to help?
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    4 Views
    No one has replied
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    5 Views
    No one has replied
  • Client Specific Overrides Not Working after Device Swap

    2
    0 Votes
    2 Posts
    136 Views
    V
    @James92 It's pretty hard to tell you, what's wrong there, when only seeing two rows extracted from the log. Clear the OpenVPN log. Go into the server settings and set the log verbosity level to 4. Then try to connect from a client. Post the whole OpenVPN log after. You can obscure public IPs of course.
  • Proxy and OpenVPN

    1
    0 Votes
    1 Posts
    130 Views
    No one has replied
  • What Does "Redirect IPv4 Gateway" Do?

    7
    0 Votes
    7 Posts
    5k Views
    S
    I want to force the client to use its own internet gateway. In my scenario, the client must definitely use its own internet. Some clients can send all traffic over VPN and the internet can be accessed through the VPN server's internet. I prevent this situation with security rules, but this time the internet cannot be accessed in any way. Even if routing is done to access the internet via VPN, my VPN server must not allow this and force it to use its own gateway. How do I do this?
  • 0 Votes
    2 Posts
    561 Views
    P
    @lifeboy Does the windows client machine have other network adapters such as vmware virtual adapters ?
  • iPerf testing slow OVPN speeds

    1
    0 Votes
    1 Posts
    159 Views
    No one has replied
  • SG2100 as OpenVPN gateway

    5
    0 Votes
    5 Posts
    241 Views
    G
    @guillaume14 I made some tests with 2 pfsense box on the remote site: the first one (192.168.10.254) is the default gateway for the remote site computers (192.168.10.0/24) the second one (192.168.10.129) has only one interface (WAN) with 192.168.10.254 as a the default gateway and the OpenVPN client instance to the OpenVPN HQ instance If i add a route to the HQ site (192.168.14.0/24) on the first pfSense box using 192.168.10.129 as the gateway i cant access devices on the remote site (copier web interface for instance) from a computer in the HQ site but i can do a tracert to the same copier. Any clue ? Thanks
  • 0 Votes
    8 Posts
    5k Views
    D
    @JonathanLee Thanks this fixed worked for me. My iPhone would not connect without it.
  • Error while saving OpenVPN Routes

    3
    0 Votes
    3 Posts
    190 Views
    A
    Thanks @viragomann that works perfect
  • Alias for IPv4 Local network in OpenVPN not up to date

    1
    0 Votes
    1 Posts
    170 Views
    No one has replied
  • 0 Votes
    2 Posts
    212 Views
    S
    A reboot fixed it, but would be interesting what can cause this issue.
  • OpenVPN client not using the assigned interface

    14
    1 Votes
    14 Posts
    3k Views
    D
    The problem still exists in 2.7. If during the OpenVPN client connection the interface, specified in client's config, is down, the connection happens through another gateway (which could be a metered backup connection for example). This is a major issue in my opinion. UPD: "Do not create rules when gateway is down" option is checked BTW.
  • OpenVPN Web GUI & HTTP Issue resolution

    1
    0 Votes
    1 Posts
    126 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.