• OpenVPN core error: crypto_alg: DSA: not found

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OPENVPN site to site routing

    3
    0 Votes
    3 Posts
    593 Views
    J
    @viragomann: Ping uses the ICMP protocol, so you have to add an additional rule where you allow that. Thank you was a NAT issue which we got resolved now. thank you for your answer
  • MTU errors

    3
    0 Votes
    3 Posts
    4k Views
    L
    I am experiencing the same problem. I have my pfSense box connected to StrongVPN and I see this in the logs: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1562' WARNING: 'mtu-dynamic' is present in remote config but missing in local config, remote='mtu-dynamic' When I put tun-mtu 1500 in the Custom Options, like you the warning changes.
  • Unable to access new VPN devices over openvpn server

    3
    0 Votes
    3 Posts
    532 Views
    johnpozJ
    So these new devices are pointing to pfsense as their gateway? Do they have host firewalls on them that could be blocking your tunnel network.. Why you should think its pfsense preventing access to devices on a network it allows access to seems a grasping at straws sort of thing without even basic troubleshooting.  Do you filter your vpn traffic to allow only access to specific IPs?  If not pfsense has nothing to do with the problem. Does pfsense have the mac address of these new devices in its arp table.  Can pfsense ping these devices from its interface in the 10.1.0.0/24 network?
  • Download PFsense

    5
    0 Votes
    5 Posts
    2k Views
    jahonixJ
    @kip: I just need a new OS on the system. ??? Whatever you mean by that.
  • Specifying 1 network on 1 interface tunnels the whole network

    4
    0 Votes
    4 Posts
    662 Views
    johnpozJ
    Are you pulling default routes from your vpn server your running.. Then yeah it would route all traffic through your vpn.. If you want your dmz machines to use the tunnel and your other machines to use your that is basic policy routing.. Just send the dmz or any IP you want out your gateway you created for the vpn connection.  Let your other clients just the normal routing of pfsense which should send it out your wan, etc.
  • OpenVPN VPN seems to work with only one IP?

    4
    0 Votes
    4 Posts
    725 Views
    T
    A quick update on this. I disabled my new config and created a new one from scratch. This time it works the way i want to. I have no idee what happend with the old one…
  • OpenVPN doesn't want to connect

    2
    0 Votes
    2 Posts
    887 Views
    B
    Maybe it's a Client Config error. Double check TLS Key is correct on your Desktop.
  • PfSense Running on VPS as an OpenVPN Client and OpenVPN Access Server

    1
    0 Votes
    1 Posts
    649 Views
    No one has replied
  • OpenVPN 3-4 sites

    5
    0 Votes
    5 Posts
    867 Views
    DerelictD
    If you want to do multiple sites on the same server there are additional considerations that usually require CSOs. And you must use SSL/TLS mode with a tunnel network larget than /30.
  • Strange Error with Virtual IP

    2
    0 Votes
    2 Posts
    740 Views
    M
    Just to follow up, I was able to get rid of this error, but disabling the 1:1 NAT mapping.
  • Help debugging a multi-VPN setup

    12
    0 Votes
    12 Posts
    2k Views
    M
    Sty make sure you don't have "redirect-gateway def1" in your advanced configuration for the PIA VPN.  That will override all of your policy based routing and send all traffic through the VPN by setting your default gateway to the VPN.
  • OpenVPN speed on AES-NI supported CPU

    6
    0 Votes
    6 Posts
    7k Views
    luckman212L
    Figured I'd post my results from tonight… SG-4860 w/ 4 tunnels in a load-balanced gw group spread across 2 WANs. NordVPN. 256k buffer, comp-lzo, fast-io + RDRAND. Was able to sustain 250Mbit/s with CPU load between 9-12% Pretty happy with this, but will continue striving for higher highs. [image: UJ0hCf7.png]
  • (SOLVED)I disable Pfsense DHCP and now i can't ping any LAN from VPN

    13
    0 Votes
    13 Posts
    2k Views
    johnpozJ
    Dude a mask of 255.0.0.0 means that 10.anything is the same network.. 10.13.11.100 is the same network as 10.12.10 So a client on 10.13.11.100 that gets traffic from something say 10.12.10.14 would just say oh hey buddy nice to talk to you.. Here is my answer.. it would NOT send it to its gateway because its the same network…  Fix your mask to be 24 bit and your problem will go away.
  • Ping LAN resource from VPN client

    3
    0 Votes
    3 Posts
    554 Views
    G
    Thanks! Windows firewall…  Should have guessed.. Now ping and Windows remote desktop from VPN client to LAN is working  :)
  • Access Remote 4G Modem via OpenVPN

    1
    0 Votes
    1 Posts
    314 Views
    No one has replied
  • OPENVPN with Virtual IP

    1
    0 Votes
    1 Posts
    664 Views
    No one has replied
  • Site-to-site VPN

    8
    0 Votes
    8 Posts
    859 Views
    F
    After countless hours day and night, and two different experts gave up, I finally made it myself. I have to say, I was pretty desperate. Solution? I went to interfaces on local pfsense, added some cryptic ovpnc to interfaces and added manually NAT-routes for all interfaces wlan, lan, opt1, opt2 etc (all allowed, every direction). For some reason, I don't know why, everything worked! I can ping in every direction as long as I'm on a LAN. Now I have to reduce the access again so that I don't have more open routes that needed. Thanks for no help on this…
  • Gatewaygroup with OpenVPN and LAN

    1
    0 Votes
    1 Posts
    361 Views
    No one has replied
  • Only allow access to certain IP's

    2
    0 Votes
    2 Posts
    505 Views
    R
    smashed it, i created a "client specific override" rule for the openvpn user "common name" to use a static virtual ip and from there i created "rules" under "openvpn" for the static ip to only access those ip addresses [image: Capture.PNG] [image: Capture.PNG_thumb]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.