• Cannot ping on few devices on LAN?

    5
    0 Votes
    5 Posts
    1k Views
    K

    Thank you it seems that it was the firewall of the computer the weirdest  thing as if connected though LAN able to ping but on OpenVPN nothing until the firewall is down on the PC

    Thank you again

  • Some issues with OpenVPN and port 1194 (Inactivity timeout)

    3
    0 Votes
    3 Posts
    2k Views
    A

    Again a quick update. It appears that the OpenVPN connection is now working! I have no idea what made it work, but I assume it has something to do with the fact that I'm not using a certificate anymore, but the username / password combination. I reset the pfSense router to factory defaults and it still works :-) The only problem now is that I seem to be losing connection now and then and the fact that I have no Internet at all whenever I'm connected to the VPN. I saw that there are more users that have experienced this issue, so I hope to find all the information I need here :-)

  • VPN issue in 2.2.6

    1
    0 Votes
    1 Posts
    721 Views
    No one has replied
  • "Page Not Available" when connected via OpenVPN

    3
    0 Votes
    3 Posts
    882 Views
    D

    Another very basic consideration, what's your home LAN IP subnet and what's your sister's?

    If they're the same (eg. 192.168.0.0/24 or 192.168.1.0/24) you're likely going to have issues…...

  • [solved] Routing WAN traffic over VPN server

    6
    0 Votes
    6 Posts
    2k Views
    M

    Yes, I had that set. The solution was to select the VPN interface at Services -> DNS resolver -> Outgoing Network Interfaces.

    Thank you too!

  • Firewall traffic being routed over OpenVPN Client - confused

    28
    0 Votes
    28 Posts
    4k Views
    H

    i'm using ssh to connect to pfsense from LAN. then from pfSense i ssh to a host on the internet by routing through a site-2-site openVPN tunnel. no ssh-tunneling involved, but i doubt it matters.

    i did forget to mention i had to manually add a NAT entry for the vpn-interface so that it would also NAT the WAN-address of the def gw. (because automagically, it doesn't )

  • OpenVPN won't start after getting IPv6 to work :(

    2
    0 Votes
    2 Posts
    667 Views
    jimpJ

    Do you have any more detail to share?  OpenVPN logs? System logs? There should be some record of why it's failing there, especially the OpenVPN log (Status > System Logs, OpenVPN tab)

  • OpenVPN - Radius Question

    3
    0 Votes
    3 Posts
    1k Views
    jimpJ

    In this case your worry is not with OpenVPN itself, that would still encrypt the authentication, but with the traffic between pfSense and the RADIUS server since RADIUS is sent in the clear. If that leg is secure you shouldn't have much to worry about.

    The way MSCHAPv2 is used by PPTP and WAP2-Enterprise makes it easy to compromise those protocols, but OpenVPN is a much different animal.

  • VPN client times out, can't reconnect. Requires service restart.

    14
    0 Votes
    14 Posts
    4k Views
    Z

    @TDJ211:

    You could run "wc -l /path/to/timestamp/file" to get a count.

    Where do I run this? On the CLI in putty? When I did I got "no such file name exists blah, blah, blah"

    Is it because it has yet to report an OpenVPN restart yet?

    You run that on the command line using putty or through the pfSense web interface. I assume you're putting the full path to wherever you have the timestamp file. When I used the relative path, like in the script I posted, it put the file at /var/log/timestamps.txt (which is not the location I expected). If you're not sure where it is, you can run this to find the absolute path:

    find / -name "timestamps.txt"

    In light of the above issue, I would recommend editing the script and changing "./timestamps.txt" to "/root/timestamps.txt" or some other absolute path so there is no question as to where it is. I will go back and change what I posted earlier.

    If the script hasn't kicked in and restarted your VPN yet, the file won't exist. If you want to see what the file will look like, run this from the command line:```
    date "+%Y-%m-%d %H:%M:%S" >> /absolute/path/to/timestamps.txt

    That will create the file, insert a timestamp, and then you should be able to run the "wc" command (with absolute path) successfully with a result of 1. * I'm not sure how much you know about this stuff, so I apologize if the absolute/relative path comments are unnecessary.
  • Route all traffic for specific VLAN over OpenVPN Client?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Making a VPN with PFsense

    3
    0 Votes
    3 Posts
    836 Views
    K

    i used this

    https://www.highlnk.com/2013/12/configuring-openvpn-on-pfsense/

    it was great :) only few issues with WPAD but thats another story

  • Weird connection issue from W10 client to pfsense OpenVPN

    1
    0 Votes
    1 Posts
    578 Views
    No one has replied
  • How does the OpenVPN client locate the OpenVPN server

    Locked
    3
    0 Votes
    3 Posts
    809 Views
    DerelictD

    In the client export utility you choose what to use as the remote server. I like to use a FQDN so if I change IP addresses the clients follow along.

  • Two OpenVPN Services, site2site and client

    7
    0 Votes
    7 Posts
    1k Views
    M

    MontanaIce, Glad it's working!  Just wanted to point out that no manual advanced settings or static routes were required though…. if you put the relevant info into the GUI, the correct openvpn configuration statements are automatically generated.  e.g.:

    Push 10.5.0.0/16 to your clients

    This can be added to the server config in the GUI under "IPv4 Local Network/s"

    Add a return route for the road warrior tunnel network (172.16.4.0/24) to Site A

    This can be added to the client config in the GUI under "IPv4 Remote Network/s"

    This will keep everything "cleaner" and within the openvpn config.  It will also be helpful if you ever need to analyse your .conf files and/or GUI options.  Also, while it's working, I don't think you want a static route to the external IP…  I would add the relevant info to the GUI and let PFsense generate the correct directives.

  • S2S Tunnel not Routing

    4
    0 Votes
    4 Posts
    2k Views
    M

    Okay, this makes no sense to me.  On a whim, I changed the tunnel network from a /30 to a /29 and now both ends are routing.  I had it as a /30 because the documentation I read said that no matter what size you make your tunnel network, it will chop it into /30s for each client.  Since I only had one client, I just made it a /30.

  • Revoking user SSL certificate blocks all other users

    2
    0 Votes
    2 Posts
    2k Views
    jimpJ

    How exactly did you create your certificates?

    If you generated them all with the same serial number, that would explain why revoking one blocks them all. CRLs work by certificate serial, and if your certificate generation script or system did not give each certificate a unique serial number, then they all will be revoked if you revoke one of them.

    Look at the full cert details from a few of your certs and compare the serials.

  • OpenVPN: Client Export Utility issue

    3
    0 Votes
    3 Posts
    1k Views
    K

    Problem solved,

    user certificates was missing.

  • Route all traffic across openvpn tunnel

    2
    0 Votes
    2 Posts
    6k Views
    V

    In the server settings check "Redirect Gateway". This should push the default route to the client. Remember that you run OpenVPN on Windows with admin privileges.

    On the pfSense server go to Firewall > NAT > Outbound and check if there is a rule for WAN interface, with source = your vpn tunnel network and NAT Address = WAN address. If it isn't there, add it manually.

  • [How to] pfSense Selective Routing via VPN and WAN Interfaces

    14
    0 Votes
    14 Posts
    30k Views
    S

    Success!

    I accomplished this with two LAN rules, which I forgot to move to the top, duh. One for Hulu/PC routing to WAN, another for Server routing to PIAVPN. Marked the latter one as NO_WAN_EGRESS. Created then a floating rule.

    Question: PIA has a few US servers. Can I create multiple interfaces and use them for failover? E.g. PIA1 US-EAST, PIA2 US-NY, if PIA1 goes down, pfSense will try to bring up PIA2.

    Action: Reject
    Quick: Checked
    Interface: WAN (you can also select multiple WAN interfaces or an interface group here)
    Direction: out
    Protocol: any
    Source: any
    Destination: any
    Description: Reject outbound traffic marked NO_WAN_EGRESS
    Advanced: You can match packet on a mark placed before on another rule: NO_WAN_EGRESS

  • Some port filtered from client

    2
    0 Votes
    2 Posts
    747 Views
    R

    Replying to myself, I found the solution thanks to this post: https://forum.pfsense.org/index.php?topic=88467.msg504596#msg504596

    Go to "System->Advance Networking" and disable:

    Hardware Checksum Offloading Hardware TCP Segmentation Offloading Hardware Large Receive Offloading

    and reboot.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.