@divsys:
The two issues that immediately come to mind:
The ports you use on pfSense for the two different OpenVPN servers must be different and have the appropriate Firewall rules enabled.
You can use both 1194 and 11394 for the two different servers, but you must have firewall rules for both.
The certificate you used for the 2nd OpenVPN server should be different than the 1st (you say that it was - good), but the CA used for that certificate must be the same as the CA used for the Client's certificate. In addition, the Client's certificate should be of Type "User" NOT "Server".
Your log error message indicated that something was trying to connect (that's good) but failed to handled key negotiation (not so good).
Hi divsys,
Thanks for your help :-)
It isn't the first proposition because i created 2 rules on Wan interface (1 for 1194 in UDP and 1 for 11394 in UDP too..) and i add a rule to allow any traffic in OpenVPN interface.
The certificate for the 2nd OpenVPN server it's an other certificat than the 1st.
I created a CA different from the 1st and from this new CA, i created an internal certificate type "Server".
I use this internal certificat in the openServer at option "Server certificat".
But if the certificat isn't good, how is it possible that the openVPN works when i try from INSIDE of the infrastrcture ? Oo'
when i look my openVPN client config, i see the IP Wan from my pfsense. And when i try openVPN with my internet connection shared by my mobile phone to my laptop, it doesn't work :'(
My purpose it's to use OpenVPN with just login/password+OTP without any client certificat.
EDIT: the problem has been solved. a little problem with virtual IP… ::)