• [Solved] OpenVPN Multiple WAN Asymmetric Routing Issue

    8
    0 Votes
    8 Posts
    917 Views
    T

    @viragomann - thanks for the response, I really appreciate it. Can you elaborate what you meant by this:

    @viragomann said in [Solved] OpenVPN Multiple WAN Asymmetric Routing Issue:

    @tman222
    I cannot see any benefit at all in directing upstream traffic from VPN clients out on the interface, where the VPN connection comes in.
    ...

    Why would there be no benefit?

    Also, a more general question: What is the overall advantage then of going with the port forward / localhost method for multiwan if the interface on the OpenVPN server can setup using the gateway (failover) group? Is the port forward / localhost method a more robust failover method for OpenVPN compared to using the gateway group?

    Thanks again for your help.

  • get notifications of failed freeradius login over OpenVPN

    2
    0 Votes
    2 Posts
    96 Views
    GertjanG

    @frog

    Click here :

    25a4fba8-25c8-4cbd-a033-8299c3ce8cc8-image.png

    I pre entred the needed search termes already.
    "openvpn notify"

    You'll find some old threads where OpenVPN notifying was created.
    Be aware : these were the days of OpenVPN 2.4.x or 2.5.x
    Its of course not guaranteed that these instruction still work today - current pfSense version uses OpenVPN 2.6.x.

    The good news : OpenVPN is opensource freeware etc, so all you need is the manual ^^

  • OpenVPN Site-To-Site traffic in only one direction

    2
    0 Votes
    2 Posts
    172 Views
    C

    @Cryux

    Turned out I had a firewall rule on the client lan that passed any/any but specified the gateway... Removing the gateway specification, setting to default, cleared up all my problems...

  • T-mobile 5G home internet connecting with Openvpn

    1
    0 Votes
    1 Posts
    355 Views
    No one has replied
  • block access from certain countries or IPs

    3
    0 Votes
    3 Posts
    320 Views
    johnpozJ

    @frog yeah you can create aliases with pfblocker and then only allow what is in the alias to connect. I would go more for allow vs block, because normally this is a much smaller list vs trying to block the planet.

    But if you just want to block a couple of countries and allow the rest then sure block vs allow.

    For example - I currently allow only the US and a few specific IP ranges that might not be US to access any of my services I expose. But if you wanted to allow everyone other than say mexico ;) then that list would be smaller and would be better to block vs allow.

  • pfSense as OpenVPN client cannot ping remote network hosts

    10
    0 Votes
    10 Posts
    2k Views
    P

    I have a TP-Link Archer as VPN server at my Dad's old house. Can ping & connect to everything in the remote LAN, but can only ping the TP-Link. The TP seems to block it's web access via the VPN, but I think that's a router limitation.

    Not really a problem for me, but will check the config & let you know on Sunday when I'm there in case it helps.

    No special routes, etc. in the client config. Local = 192.168.123.0/24 and remote = 192.168.2.0/24

  • MAX site to site open VPN

    5
    0 Votes
    5 Posts
    451 Views
    M

    @kistudent

    some general guidelines then..

    https://docs.netgate.com/pfsense/en/latest/vpn/performance.html#general-advice

  • Cipher missing from server post Server Certificate renewal

    28
    0 Votes
    28 Posts
    2k Views
    P

    @Gertjan @NightlyShark Thanks for your support and advice. Post version upgrade the issue was resolved.

    Things are in control now and working well...

    Once again thank you everyone.....

  • Can't connect after switch from Shared Certificate to TLS

    2
    0 Votes
    2 Posts
    171 Views
    No one has replied
  • 0 Votes
    1 Posts
    169 Views
    No one has replied
  • Package installer failed (openvpn-export)

    9
    0 Votes
    9 Posts
    818 Views
    GertjanG

    @Alessio-Zatta said in Package installer failed (openvpn-export):

    So its running on an old PC

    That was my initial pfSense experience !
    A desktop PC has a build in NIC, so add one more and you're good.

    Still today, you should make use of some common knowledge : Make live easy on yourself.
    So, these are "the rules" :
    If the motherboard has Realtek chipset : pay it a visit in the PC's bios, and select Realtek's most useful option : set it to "Off". Disable it. You just raised the chance of having a perfect "home build router" experience by a lot.
    Next rule : No, don't take that USB to NIC adapter. Don't fall into that trap.

    Do what needs to be done : get that one or dual Intel NIC, and slap in in your PC.
    If you're above average, you check upfront that the card you buy is supported by "FreeBSD". If the card is Intel branded, you'll be good.

    Using these rules and pfSense is up on running in .... 5 minutes ?

    Later on, you can always activate the Realtek NIC again, and see if it plays nicely. Not all of them are bad.

    And again : Wile installing pfSense, you have to assign networks, as a router needs a WAN and a LAN.
    You also have to create your own password.
    And here it comes : if you use or see a wizard that talks about 'DNS' do not touch your keyboard. Use the mouse, if possible, and enter nothing. Just click on 'Next'.
    Next has been chosen by Netgate as the perfect DNS setting.
    pfSense will work out of the box.
    Up can now see the available package list. and install what you want.

    And as "realtek", later on, you can adapt your DNS settings if you want to.
    "It will break" but now you can "step back" and it works again.
    After the wtf phase, the conclusions that you will make at that moment are very important.

  • OpenVPN tunnels require restart after WAN failover

    2
    0 Votes
    2 Posts
    256 Views
    W

    I managed to mitigate this somewhat by changing the configuration of the offending interface to static address assignment. That didn't prevent it from going down, but it did at least keep OpenVPN tunnels not bound to that interface from needing a restart. The WAN interface in question is passed through from an AT&T residential fiber gateway / ONT. It's an Intel I-225 for what that's worth.

    I'm not convinced the interface isn't at fault, so I switched over from the igc0 interface to a vlan on my main NIC, which is ix0. That wastes a NBASE-T switch port but works ok so far.

  • Client Specific Overrides Security

    4
    0 Votes
    4 Posts
    441 Views
    V

    @McMurphy said in Client Specific Overrides Security:

    but if all users on on the same VPN server how best to differentiate between users to firewall some and not others?

    With firewall rules.

    In the CSO you can state a unique virtual IP (tunnel network) for each client. Then you can use this in firewall rules as source to allow certain accesses.

  • OpenVPN Client Crashes Randomly Only With Some Users

    5
    0 Votes
    5 Posts
    376 Views
    K

    @slu OK, thanks for the suggestions, I will investigate when user is available.

  • 0 Votes
    3 Posts
    1k Views
    B

    I just also found it on the Tunnelblick website.
    https://tunnelblick.net/cTunnelblick4.html

  • Multiple OVPN Clients on 1194

    8
    0 Votes
    8 Posts
    688 Views
    M

    @viragomann
    Thank you. Long day and was not thinking.
    I was thinking outbound traffic was on port 1194

  • How to NAT a WAN port to a SiteToSite LAN Address

    10
    0 Votes
    10 Posts
    617 Views
    V

    @labu73
    pfSense uses the reply-to tag to route response traffic to public sources back to a non-default gateway. Otherwise it would be routed out on WAN.

    The reply-to tag is added by the filter rule, which allows the incoming request packets. So this rule has to be defined on an unique interface.
    However, OpenVPN is an interface group including all OpenVPN instances, which are running on pfSense AND rule on interface groups as well as floating rules have precedence over rules on member interfaces. That's why this rule got hits, while the rule in the interface didn't.

  • OpenVPN Multiple WAN Failover Question

    9
    0 Votes
    9 Posts
    955 Views
    V

    @tman222
    I don't expect, that any Radius traffic going out of pfSense. I don't use it, but as I understand it, it's just a local authentication server.

    So if the reply-to tags are applied properly to the VPN connection, I'd expect it to work.

  • How to invalidate existing server certificates?

    2
    0 Votes
    2 Posts
    278 Views
    V

    @pyite
    You can revoke the client certificate to prevent using it to connect.

    To do so, you have to create revocation lists for the used CAs in System > Certificates > Revocation, as long as you didn't this already. Then assign it your VPN servers.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.