• QUESTION VPN

    3
    0 Votes
    3 Posts
    789 Views
    ?
    Hi, this is the schema of network SITE01                                                                                SITE02 [FORTINET-FW]       ||                                                                    ||                                                                            ______ |          |                          (optical-fiber)                              |          | |LAN01|==[CISCO01]====== ======[CISCO02]==  | LAN02 | |          |                                                                            |            | |          |                                                                            |            | |(192.168.1.0/24)                                                            |(172.16.1.0/24) ||                                                                            |__| But when this SITE02 i execute tracert to mail server (mail.domain.com) this out to internet and down by the Fortinet is for this that i need install pfsense. Thanks for you help
  • Question about CA's, and OpenVPN Server

    2
    0 Votes
    2 Posts
    682 Views
    jimpJ
    A CA/Cert made with the Wizard should work and show up in the Cert Manager afterward. You can make them yourself, too, but using the Wizard is also fine. There is no specific requirement for the information you put in the CA/Cert so long as you respect the limitations for special characters in the current release. It should be unique but it can be generic. Meaning if you have multiple CA entries or multiple certificates, they should not have identical values for all fields as this can confuse many utilities which locate certificates by subject. The CA/Cert for OpenVPN are self-signed so they don't have to be verified beyond the certificate being made from the correct CA.
  • Adding OpenVPN Hosed pfSense Box (help?)

    8
    0 Votes
    8 Posts
    2k Views
    M
    I finally got it working. I used a combination of the old "password file" guide, Finger79's settings above, and the packaged ovpn file for the NYC Server, and finally got everything working. (Note, didn't use the OVPN vile, but used the certs it came packaged with.) @Finger79: I'd read some things that crypto acceleration in OpenVPN is automatic and that the "crypto acceleration" drop-down is legacy or doesn't apply to modern CPUs.  If that's off, then let me know. In retrospect this makes a lot of sense.  I tried with it both off and on, and didn't find it made any difference in CPU load during bandwidth tests.
  • Enter at your own risk: newbie trying go configure OpenVPN client

    5
    0 Votes
    5 Posts
    1k Views
    T
    Thanks so much - finally got everything to work!
  • PfSense OpenVPN & Windows 10 Speed

    1
    0 Votes
    1 Posts
    704 Views
    No one has replied
  • 0 Votes
    12 Posts
    3k Views
    DerelictD
    The point is if that feature is not disabled and the gateway is detected as down, the rule still exists but without the policy routing applied so all that VPN traffic goes to the routing table and out WAN in-the-clear. This is the default behavior. By default, when a rule has a gateway specified and this gateway is down, the rule is created omitting the gateway. This option overrides that behavior by omitting the entire rule instead. tagging/tagged is the best way to ensure traffic that should go over the VPN does not go out WAN. If it should go over the VPN tag it. Do not let anything out WAN with that tag.
  • OpenVPN RoadWarrior Porblem after 2.3.4 Update

    2
    0 Votes
    2 Posts
    711 Views
    B
    Not a problem from 2.3.4 just a nasty route on the wrong place …
  • OpenVPN TAP doesn't route WebInterface or other VPNs

    1
    0 Votes
    1 Posts
    482 Views
    No one has replied
  • Site to site openvpn using extra hardware (separate gateway)

    1
    0 Votes
    1 Posts
    478 Views
    No one has replied
  • Route UK On Demand TV addresses through WAN instead of OpenVPN PIA

    1
    0 Votes
    1 Posts
    589 Views
    No one has replied
  • OpenVPN configuration with VLANs problem

    1
    0 Votes
    1 Posts
    495 Views
    No one has replied
  • 0 Votes
    2 Posts
    740 Views
    V
    https://forum.pfsense.org/index.php?topic=130407.msg718680#msg718680
  • OpenVPN Client Export updated to 1.4.5 for OpenVPN 2.4.2

    3
    0 Votes
    3 Posts
    1k Views
    jimpJ
    Uninstall your package and then reinstall it – don't just do a reinstall/upgrade. If you were coming from a much older version there was a bug a couple revs back that could delete the template files, so the template pkg needs reinstalled, which would only happen if you removed it completely then reinstalled it.
  • [SOLVED] OpenVPN Client Export - Empty link in Version 2.3.4 ?

    5
    0 Votes
    5 Posts
    3k Views
    L
    Well, reinstalling the openvpn-client-export package added back the Export tabs, but I found out it also changed our client export files. I downloaded a new config file & found that the two bottom lines in the old version's client config file:       tls-auth pfSense-udp-<port>-<username>-tls.key 1       ns-cert-type server Were replaced with the following line:       remote-cert-tls server I updated my config file (instead of right-clicking and selecting "Connect", select "Edit Config") and now VPN connects like normal. I updated the package to 1.4.5 this morning, and it still connects fine after making the change above.  Now I just have to update the config file on the other laptops.</username></port>
  • Site to Site VPN

    2
    0 Votes
    2 Posts
    928 Views
    B
    Yep. Just create a * * * rule on the OpenVPN interface (or limit it however you want.) Until you do, no traffic will pass on it.
  • Client-side Network Isolation with OpenVPN Client for Windows

    1
    0 Votes
    1 Posts
    684 Views
    No one has replied
  • RADIUS authentication for OpenVPN

    2
    0 Votes
    2 Posts
    770 Views
    jimpJ
    It's not simple to have the firewall do that, you have to use a somewhat redundant gateway+route as described here: https://doc.pfsense.org/index.php/Why_can%27t_I_query_SNMP,_use_syslog,_NTP,_or_other_services_initiated_by_the_firewall_itself_over_IPsec_VPN
  • Can't access all services

    8
    0 Votes
    8 Posts
    2k Views
    R
    Hi all Still no have access to file server nor server mail. I have on openvpn rules * * * * and also in lan rules I have * * * * but if i go on diagnostic/ping and try to ping my file server from my vpn server, i can't
  • OpenVPN - messaging services

    1
    0 Votes
    1 Posts
    647 Views
    No one has replied
  • Inspecting OpenVPN traffic on the VPN head-end pfSense appliance.

    1
    0 Votes
    1 Posts
    564 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.