• PfSense + OpenLDAP + OpenVPN + OTP (RADIUS?)

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Browser based ssl vpn with watchguard

    2
    0 Votes
    2 Posts
    950 Views
    jimpJ

    No, there are no browser-based VPN options currently, primarily because there are no current, supported Open Source browser-based VPN projects.

    There was OpenVPN ALS/Adito years ago but that project died years ago.

  • Cannot access devices on LAN from VPN client

    22
    0 Votes
    22 Posts
    6k Views
    R

    @johnpoz:

    Well those are not actual true AP then, you got some soho wifi router as your AP??  If you can run 3rd party like dd-wrt on them you can set a gateway.

    3 different brands, and I can set just about everything but the gateway on two of them….
    Even my old Apple Airport has that option  >:(

    I know there's an unofficial dd-wrt build for one of them, but not for the other one. I'm not too keen on the unofficial builds.

    For now, i'll just stick to the current situation. I can access my NAS and it's shares, the main switch management and the devices and VMs i need. If i need to do maintenance on the access points i'll just have to come home once in a while  :P

  • OpenVPN Access (and RDP Port Forwarding) stopped working from my office.

    2
    0 Votes
    2 Posts
    845 Views
    johnpozJ

    Not sure why you would have both openvpn and rdp open to the public - if you want to rdp to something why would you not just vpn in and do whatever it is you want to do?

    As to why you can not connect from Location A, but you can from location B – clearly that would point to Location A blocking your traffic.  I find it really odd that a place of work would allow 3389 (remote desktop) directly out their firewall.

    But lets say they did, and still do - what do you get on a traceroute to your pfsense wan IP?  The public IP your trying to connect too... What does your openvpn client say for why it can not connect?

  • Split tunneling with OpenVPN

    6
    0 Votes
    6 Posts
    4k Views
    X

    I tried with the nopull, but then I manually have to create a route for the VPN. But this IP is not fixed, so on a reconnect I would have to update the route again. Unless there is something else I am missing here…. Anyway, all this got me thinking in a different direction which seems to do the trick:

    Proto       Source Port Destination Port Gateway Queue Schedule Description
    IPv4 TCP/UDP Hosts * Site1 * VPNV4 none
    IPv4 TCP/UDP Hosts * Site2 * VPNV4 none
    IPv4 TCP/UDP Hosts * Site3 * VPNV4 none
    IPv4 TCP/UDP Hosts * Misc * VPNV4 none
    IPv4 ICMP Hosts * * * WAN_PPPOE none
    IPv4 TCP/UDP Hosts * * * WAN_PPPOE none
    IPv4 * LAN net * * * * none Default allow LAN to any rule

    Hosts contain all hosts (except for the gateway IP address itself, basically LAN Net without LAN Address)

    From the initial tests this seem to work.

  • Quick question regarding Open VPN traffic

    4
    0 Votes
    4 Posts
    927 Views
    P

    I get it now.  I am relatively new to all of this and I am learning as I go along.

  • OpenVPN with multiple subnet

    4
    0 Votes
    4 Posts
    1k Views
    O

    I tried different things, including static routes, but without success (the problem may be related to the way the WAN interface of the Netgear Internet routers works..?).

    I solved by purchasing two switch layer 3 and configuring vlan.

    Anyway, thank for your answers.

  • Question about OpenVPN firewall rules

    9
    0 Votes
    9 Posts
    3k Views
    P

    Great - that helps sort things out for me.  I do have not rules on OpenVPN or PIA tabs.  Although I do have pass any rules on my VPN server interface tabs, since I am the only one who can connect to the Open VPN server and generate incoming traffic on those interfaces, I don't think passing all traffic should present a problem?

  • Hardening route/iptables behind OpenVPN?

    1
    0 Votes
    1 Posts
    985 Views
    No one has replied
  • PfSense as an OpenVPN client - LAN access to the server

    10
    0 Votes
    10 Posts
    3k Views
    D

    @divsys:

    Do you have the same "Allow any-any" rule on the OpenVPN tab of the pfSense server?

    Yes, I do.

    I've pretty much determined that what I'm trying to accomplish isn't possible. Now, I've noticed that if I connect to my VPS using SSH on the OpenVPN address [10.30.0.1], the SSH tunnel is originating from the OpenVPN address of my pfSense router [10.30.0.250] - if I could open ports/port forward on the pfSense OpenVPN address/interface, I could accomplish what I want [access to LAN resources on the OpenVPN server] but I haven't been successful at this either.

  • Can access LAN with OS X client but not with iOS client

    1
    0 Votes
    1 Posts
    550 Views
    No one has replied
  • VPN on a separate LAN?

    3
    0 Votes
    3 Posts
    2k Views
    S

    After a bit of struggle I got it working.

    It's been a crash course in certificates and stuff like that, I just couldn't get everything to line up properly. Most guides shows how easy it is to export vpn settings to a windows client, but I run linux and had to struggle some more.

    At one point I even swapped out the drive in my laptop to an old harddrive installed with windows - just to see it work - which it didn't..

    Then I discovered that even though I've told my ISP supplied router/modem to fork over the entire connection and external ip to my pfsense box, believing that would make the router/modem function as a pure modem, for some peculiar reason the firewall in the router/modem were still active. I disabled that, leaving the firewall duties to pfsense and suddenly everything worked.

    I flopped the linux drive back into the laptop and whadda'ya'know the linux vpn client worked just fine too..

    Finally I modified the firewall rule for openvpn to block access to my local lan, so now I can connect to the virtual lan and use my internet connection to surf the web, while my home lan remains off limits fomr the outside.

    All in all I'm a happy camper!

  • How to Route PFSense-openvpn Tunnel Network

    6
    0 Votes
    6 Posts
    3k Views
    V

    In this case the static route doesn't depend on a OpenVPN connection. The route goes to a static interface address of the other pfSense.

  • Can't see user session in the online users list on my RADIUS server

    3
    0 Votes
    3 Posts
    961 Views
    O

    Thanks Jimp!

  • [Solved] Can't start OpenVPN from GUI

    6
    0 Votes
    6 Posts
    2k Views
    C

    What do you have chosen for "Hardware Crypto" in your OpenVPN config? Is this on your SG-2220? I presume with the default crypto options under System>Advanced, having AES-NI enabled.

    Past instances of this were all in pre-release 2.2.0 versions with certain ciphers and certain hardware crypto. Those were attributable to a problem in OpenVPN that we got fixed in OpenVPN pre-2.2.0 release. But apparently there is still some combination of options there that triggers the same issue.

  • Client Export Utility

    2
    0 Votes
    2 Posts
    802 Views
    DerelictD

    You mean like the settings for host name resolution and everything else? No. You have to set them every time, unfortunately.

    You could probably modify the php with defaults but it'll get clobbered by updates.

    You could maybe make a patch.

  • OpenVPN Site-to-Site + OSPF [Solved]

    5
    0 Votes
    5 Posts
    3k Views
    A

    For anyone else who runs into this;
    https://forum.pfsense.org/index.php?topic=106559.0

  • Routing multiple LAN-s in OpenVPN

    11
    0 Votes
    11 Posts
    3k Views
    M

    This appears to be a simple setup… post the openvpn configs from both sides (server1.conf and client1.conf respectively) and we'll have a better idea of what is happening.

  • OpenVPN CRL issuer error

    1
    0 Votes
    1 Posts
    720 Views
    No one has replied
  • OpenVPN server connect to which vlans?

    6
    0 Votes
    6 Posts
    1k Views
    P

    Thank you both for your comments and insight.  I think that since I am the only person with VPN access, I will probably leave things as they are.  It will actually be helpful for administrative purposes, as I have no access to some of the devices on the vlans (other than my regular LAN) in my network unless I physically plug a machine into the correct port on my switch.  So this way, if I need to manage one of the devices on another vlan, I can simply connect via VPN, and I will have access to all vlans.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.