• Opening ports for bittorrent over a VPN (PIA)

    4
    0 Votes
    4 Posts
    2k Views
    DerelictD

    @firemogle:

    Really, if I can get port 6881 and 6882 going from VPN to one IP I think I would be set.

    Thanks again,

    Are you talking about connections outbound to destination ports 6881 and 6882 or connections from the internet to 6881 and 6882 being forwarded to your host?

    The latter is trivial. Just make the destination ports on the rules that policy route to the VPN 6881 - 6882 instead of any. I don't know if you need TCP or UDP or both. TCP probably. But I don't think bittorrent works this way.

    To get ports from the internet forwarded to your host, first PIA has to listen on those ports and know to forward the connections to you. You have to have an OpenVPN assigned interface and port forward those ports to your inside host. Then you have to be sure those ports are allowed into your firewall on OpenVPN assigned interface rules - normal auto-generated by the NAT rule are OK here. If you're talking about making something like the attached show Open, this is what you want.

    ![Screen Shot 2016-07-18 at 9.08.17 PM.png](/public/imported_attachments/1/Screen Shot 2016-07-18 at 9.08.17 PM.png)
    ![Screen Shot 2016-07-18 at 9.08.17 PM.png_thumb](/public/imported_attachments/1/Screen Shot 2016-07-18 at 9.08.17 PM.png_thumb)

  • OpenVPN server with multiple public IP addresses [Resolved]

    4
    0 Votes
    4 Posts
    4k Views
    S

    Probably so.
    Especially if that service wants to be < 1024 port. ;)

  • Specific devices with OVPN client as gateway

    8
    0 Votes
    8 Posts
    4k Views
    PippinP

    @Pippin:

    I know OpenVPN has a built in internal packet filter that would allow firewalling client-to-client connections

    Here I'm confusing tun and tap. In case of tap above is true.
    With a pf_plugin_module for OpenVPN one could setup a scheme for who can talk to who.

    1. Does allowing "Inter-client communication" in "Servers–>Edit server" set the client-to-client option in server config?
    2. If so, then this cannot be firewalled?

    Yes, I just checked this, it does set client-to-client in server config and to my knowledge it cannot be firewalled.
    Is that true also for pfSense?
    If so, then maybe this should be stated under the tick box/help.

    It would mean, if one wants to firewall client-to-client communication, do not tick this box.

  • OpenVPN & Traffic Graphs

    5
    0 Votes
    5 Posts
    2k Views
    M

    got it working.  turns out for some reason restarting the box once changes applied fixes it.  What i had done was right but reboot need for some reason.

    Thanks All

    Mat

  • 0 Votes
    1 Posts
    442 Views
    No one has replied
  • OpenVPN client with multiple server host or address

    3
    0 Votes
    3 Posts
    4k Views
    J

    Thanks for Pinpin quick reply.

    I will try that out.

    Thank you very much.

  • Recommended Configuration - Site-To-Site Question

    6
    0 Votes
    6 Posts
    1k Views
    D

    So, A<->B is SSL and A<->C is shared key, you're running two separate instances of OpenVPN on A?

    While there's nothing inherently wrong with that (I run many instances of servers and clients on my boxes) is there any reason not to consolidate the connections into a single server on "A"?

    If you've already "bit the bullet" and setup an SSL instance, I would suggest making both your connections SSL.
    Even if you need two separate instances, it'd be worth making both SSL IMHO.
    While getting the routing options to work with Shared Key is possible, I've always found the options more limiting compared to SSL.

    Pretty much fill in the network lists you need on the Server side, add the CSO's and you're up and running.

    The other plus would be we don't have to debug two types of connection (that's just me being greedy  ;D  )

  • OpenVPN client using 100% of the processor [SOLVED]

    26
    0 Votes
    26 Posts
    18k Views
    A

    I was just monitoring my firewall after a power outage and found this issue.
    I removed the simple traffic-shaper I recently put in place for VoIP and the CPU usage fell to sensible numbers.
    I tried putting the shaper back (CBQ) with the wizard but the openvpn usage went back to 100%, so it is not fixed

    2.3.1-RELEASE-p5 (amd64)

  • How to Site-to-Site Open VPN Tap (Bridge) Mode

    3
    0 Votes
    3 Posts
    2k Views
    johnpozJ

    what application is that is that has to broadcast?  What is the latency between these sites?  I doubt such a crappy application that needs to broadcast is going to work over any sort of latency.

    So these sites are using the same ip scheme?  Ie you have say 192.168.0/24 on both sides?  Even if you connect them at layer 2, your layer 3 has to be the same.

    As to your dhcp - the whole point of dhcp relay is to allow for your dhcp servers to be on different layer 2 networks.

    Here is a thread from 2014 wanting site to site tap - he got it working and there is instructions in there
    https://forum.pfsense.org/index.php?topic=84419.0

  • 0 Votes
    1 Posts
    1k Views
    No one has replied
  • Big gap between server mtu and the client mtu any suggestions

    1
    0 Votes
    1 Posts
    673 Views
    No one has replied
  • User Certificate Details

    3
    0 Votes
    3 Posts
    756 Views
    johnpozJ

    The others could be whatever you want on them..  Be it based on the specific user your creating the cert for, or you site and location.  Email for example could be the users, the admin..  etc..

  • OpenVPN. Server has IPv4/6 and CARP

    1
    0 Votes
    1 Posts
    482 Views
    No one has replied
  • Cypher and keysize settings 512?

    5
    0 Votes
    5 Posts
    776 Views
    L

    Sorry, that is the one I was talking about.  I'm not at home so I was going off of my phone configuration as I can't look at my system at the moment.

    Thanks for the answer.

  • OpenVPN to LAN LAGG

    2
    0 Votes
    2 Posts
    804 Views
    C

    switch is probably missing a default gateway, or has the wrong default gateway, or the default is on a diff subnet so it's replying back the wrong way.

  • Openvpn traffic slow

    1
    0 Votes
    1 Posts
    559 Views
    No one has replied
  • Multiwan with force push openvpn traffic over the group

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ

    Unless I've misunderstood your original request, no, you don't need anything like that.

    This is assuming you're talking about having remote access OpenVPN clients connect to both your WANs and use Multi-WAN for their Internet-bound traffic coming across the VPN:

    a: Make sure clients can connect to both WANs:
    1. Set the Interface for the VPN to Localhost
    2. Add port forwards to both WANs to forward your OpenVPN port for this server to localhost (127.0.0.1) on the same port

    b: Use gateway groups on OpenVPN rules:
    1. Firewall > Rules, OpenVPN tab
    2. Add a rule at the top of the list to match from a source of this server's tunnel network, destination is your local LAN, without a gateway set
    3. Add a rule just under the previous rule to match from a source of this server's tunnel network, destination is "any", using your existing gateway group.

  • Another "cant reach lan shares trough vpn"

    15
    0 Votes
    15 Posts
    6k Views
    D

    Not surprising - many (most/almost all ????) Windows/share issues across OpenVPN are Windows issues not OpenVPN issues.

    Dare I say that should be the title for a sticky note (or at least a line in the Wiki)…..........

  • Working OpenVPN tun that can access the LAN reliably

    13
    0 Votes
    13 Posts
    6k Views
    T

    I finally had some time to do some more exhaustive testing and you were right.  For some reason, the default flag in my Android VPN client was not routing all traffic over the VPN.  The route to the LAN was as expected (through pfsense) and the route to the WAN was over the cell network.  Once I set the flag to force everything over the VPN, the behavior (and routes) are the same.

    So in the end, I really just needed to lower the MTU to get a reliable connection.  I'm just happy it's working  :)

  • Connect to different sites using OpenVpn

    3
    0 Votes
    3 Posts
    692 Views
    T

    I finally got a chance to replace my working PFsense box at the main branch. Now I have it and a test box both v2.3 with openVPN. I exported a client from the test box and installed it on my PC which already had the client exported from the production box. I installed the testbox client which was very quick and evidently only installed the certificate. When I start OpenVPN manager (v. 0.0.3.6) from the desktop icon an icon appears in the area next to the clock (lower right in Windows 10-can't remember the name) then right click I get these options top to bottom: status, Pfsense-udp-1194-admin's name-config, then the same thing except with service on the end. Either of these options connects to the same box.
    How do I get it so I can choose which box to connect to? Thanks for any help!

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.