• OpenVPN service stopping when Internet is gone v2.7.2

    4
    0 Votes
    4 Posts
    452 Views
    F

    @romega3 No it's pfSense OpenVPN on both sides.

  • 3 Sites VPN doesn't work correctly

    8
    0 Votes
    8 Posts
    843 Views
    J

    @hispeed A ha, yeah, you're using a /24 for the tunnel. No need for that. If you used a /30 or /31 you wouldn't need CSO at all.

  • How to add IntermediateCa using an external CA

    1
    0 Votes
    1 Posts
    203 Views
    No one has replied
  • Cannot connect with RDP via openVPN

    64
    0 Votes
    64 Posts
    15k Views
    I

    @johnpoz

    Johnpoz, Hey JohnPoz, I think you're the only one who can help me.
    I have done a refit of my network with Catalyst 3750 and 4948-10GE.
    I have a serious DNS problem.
    I have a few switches/routers that run OSPF, 1 router is connected via a /30 subnet (lag of four ports) to the firewall.
    All clients behind the ospf routers can reach the pfsense GUI webpage, but they cannot access the internet. Windows 10 diag indicates the DNS server is unavailable. Windows DNS server is configured with the IP address (LAN interface) of the firewall.
    A null route is configured on the ASBR (0.0.0.0 0.0.0.0 next hop IP) and has been propagated to all ospf switches/routers. In pfsense there is a static route (the lagg link) back to the internal ospf network. So I know that routing works from the client to the edge firewall and vice versa.
    I have configured a rule that allows the internal network (summary route) to the firewall and for outbound NAT, allows the internal network (summary route) to everything (*).

    Normally every client should be on the internet, but that doesn't happen, Windows 10 complains about DNS unavailable, I don't understand what is wrong.
    In pfsense I did a few tests with nslookup in diagnostics for msn.be for example and the output is positive. I do not immediately see an error in the output. Can I assume that DNS resolution works on the firewall?

    One way to test is to connect a PC in a /30 directly to the LAN port, but the /30 LAN port has a port channel, and I tried one link instead but that didn't work, couldn't connect to the firewall, probably because of the static route which expects another network device, I dont' know.

    Do you perhaps have some advice?Example.jpg

  • VMware ESXI 8 NIC Passthrough on WAN

    1
    0 Votes
    1 Posts
    239 Views
    No one has replied
  • OpenVPN Speed

    3
    0 Votes
    3 Posts
    486 Views
    W

    @marcelobeckmann

    Thanks really thankful for this :) will look into it.

  • OpenVPN Firewall/tun Question

    4
    0 Votes
    4 Posts
    548 Views
    V

    @CoffeeOrTea said in OpenVPN Firewall/tun Question:

    At the time I made this post, I didn't realize that you could assign an interface to OpenVPN. I eventually did, which added a 2nd tab to the firewall rules area, so now I have two OpenVPN tabs in the firewall rules area

    pfSense show particular interfaces on the rules page in upper-case letters. So I'd expect, that it is rather shown as "OPENVPN" there in addition to OpenVPN, wich is the interface group.

    if I have no rules at all on the OpenVPN tab, but then add a rule to allow WAN traffic on the OpenVPN interface tab, I don't get WAN access.
    But if I allow WAN on the OpenVPN tab, then it works.

    So you presumably did something wrong.
    OpenVPN is just the interface group and the interface is a member of it.
    Note that rules on interface groups have priority over ones on member tabs.

  • OpenVPN Client and Multi-WAN

    3
    0 Votes
    3 Posts
    422 Views
    M

    Thanks, that seem to solve the issue but feels like a workaround.

  • Site-to-site openvpn routing issue

    9
    0 Votes
    9 Posts
    1k Views
    B

    @viragomann
    It works !!
    Thank you SO MUCH for your precious help...

    I now need to adjust firewall rules.

    Thanks again

    Robert

  • VPN tunnel routing to wrong vlan

    1
    0 Votes
    1 Posts
    130 Views
    No one has replied
  • DNS entries vs NAT reflection and android always on vpn

    2
    0 Votes
    2 Posts
    322 Views
    D

    In the end I turned off NAT reflection for all but the VPN rule. The rest worked fine with the split DNS approach and no NAT reflection.
    I don't think it is doable to have the android openvpn client requery dns when transitioning networks. Though I guess you could have forwarding rule on the LAN that redirects VPN traffic to the pfsense interface where openvpn server is listening.

  • site-to-site ssl/tls with ospf

    10
    0 Votes
    10 Posts
    1k Views
    M

    @deet said in site-to-site ssl/tls with ospf:

    I'm moving forward now with a separate OpenVPN tunnel per remote site, each on a /30 point-to-point link. Deprecated or not

    If you are willing to spin up a new VPN overlay why not just use IPsec. Easier to maintain and run dynamic protocols and there are no deprecation notices.

  • Proper network subnet selection in site-to-site setup?

    17
    0 Votes
    17 Posts
    868 Views
    D

    That was the key clue. A Google search for that line led to another discussion in this forum. The last post in that discussion hinted at adjustment of the compression configuration. When I switched my server’s like this:

    Screenshot 2024-02-14 at 11.34.21 PM.png

    i.e., set the compression to “Refuse any non-stub compression,” I could see my client’s pfSense appliance at 192.168.4.5.

    Voilà!

  • pfSense UI doesn't support inline keys - tls-crypt-v2

    10
    0 Votes
    10 Posts
    4k Views
    M

    @Dyspareunia said in pfSense UI doesn't support inline keys - tls-crypt-v2:

    tls-crypt-v2 /var/etc/openvpn/client6/tls-crypt-v2

    Just wanted to say Thank you for this post. I was not able to add tls-crypt-v2 in the pfsense client creation GUI but with your approach it worked for me 😻

  • OpenVPN to main office and access branch office

    2
    0 Votes
    2 Posts
    342 Views
    V

    @brianjmc1
    Tried the forum search?
    There are several threads regarding this topic.

    In the OpenVPN access server settings you have to add 192.168.200.0/24 to the "local networks" to push the route to the clients.

    And in IPSec you have to add a phase 2 for the OpenVPN tunnel pool and the branch LAN.

    So in the main office:
    local network: OpenVPN tunnel network
    remote: 192.168.200.0/24

    And in the branch:
    local network: 192.168.200.0/24
    remote: OpenVPN tunnel network

    Ensure that the access is allowed on all incoming interfaces.

  • OpenVPN Site-to-Site SSL/TLS VPN

    9
    0 Votes
    9 Posts
    1k Views
    mohkhalifaM

    Guys! I'm seeking you help please

  • Help Setting up OpenVPN

    20
    0 Votes
    20 Posts
    2k Views
    C

    @viragomann appreciate you helping me to troubleshoot anyways!

  • Upgrading from 2.6.0 to latest community version(2.7.2)

    2
    0 Votes
    2 Posts
    458 Views
    V

    @rjabellax5
    Basically your settings should also work well with pfSense 2.7.2.
    However, shared key mode will be removed from future OpenVPN versions. So you should consider to move over to SSL/TLS peer-to-peer connections.
    At this occasion you may also want to update the ciphers to GCM or CHACHA20-POLY1305, depending on your hardware.

  • 2fa with ldap - Active Directory - Freeradius

    5
    0 Votes
    5 Posts
    755 Views
    O

    @bamypamy said in 2fa with ldap - Active Directory - Freeradius:

    https://forum.netgate.com/topic/180533/openvpn-freeradius-and-ldap/7

    Responder Cotización

    Yes I saw it, but I also have more than 10 users. It's a shame not to be able to implement this 2FA

  • OpenVPN, FreeRadius and LDAP

    7
    0 Votes
    7 Posts
    1k Views
    B

    @michmoor I checked this option but I also have the problem that it is more than 10 Users. I guess I need to ask for some money. ;-)
    Thanks for replying.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.