• PfSense 2.2.4 + OpenVPN Peer to Peer route error

    1
    0 Votes
    1 Posts
    630 Views
    No one has replied
  • [Solved] OpenVPN: Can not Ping/Access Remote LAN

    6
    0 Votes
    6 Posts
    1k Views
    F
    @Bunkai.Satori: Hi Doktornotor, Fmslick, The Computer Guy, thank you very much for your advice. I have realized, for VPN communication, I have to open local firewall ports on the remote PC. Somehow I thought, because I have VPN connection, I am bypassing the firewall rules. Indeed I am bypassing the firewall but on the pfSense appliance only. On the remote PC I am trying to ping/access, I have to block the firewall or open appropriate ports. I have tried so many combinations and invested many hours into this problem just to find out that I have to open target device firewall ports. Indeed Doktornotor, you were perfectly correct. :-) Thank you very much that you were trying to help. I am marking this question as solved. Bye. I'm happy to hear you go it to work!!  ;) HAppy to hear you got it to work.
  • PFsense anonymous VPN Client and security

    3
    0 Votes
    3 Posts
    2k Views
    DerelictD
    Outbound traffic isn't controlled by rules on the OpenVPN interface/tab.  It's just like a WAN.  If you have no rules, no inbound connections from the VPN tunnel will be accepted and no rules are required for outbound connections. Traffic going out the VPN is allowed into pfSense by LAN rules which policy route the traffic to the VPN gateway, then, absent any advanced outbound floating rules, the traffic is allowed out the VPN, just like connections out WAN.
  • How to connect to specific IP in lan over vpn?

    2
    0 Votes
    2 Posts
    557 Views
    johnpozJ
    what does client to client connectivity setting have to do with talking to devices on your lan behind openvpn on pfsense? That setting says openvpn clientA can not talk to clientB.. that has nothing to do with clientA or B talking to lan device 192.168.1.42
  • 0 Votes
    4 Posts
    1k Views
    A
    awesome thanks!
  • Open vpn multiple site to site S2S vs SSL/TLS

    3
    0 Votes
    3 Posts
    1k Views
    Y
    thanks jimp. i will go with SSL/TLS method. appreciate the link.
  • OpenVPN Bridge Layer2 Pfsense 2.2 Same Subnets

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Check if OpenVPN is running

    5
    0 Votes
    5 Posts
    1k Views
    johnpozJ
    I use the watchdog package to monitor ntp, freeradius an openvpn.  Even can be setup to send you alerts if has to restart something.
  • OpenVPN - Dropping out - Fatal error

    2
    0 Votes
    2 Posts
    2k Views
    A
    Hi, at first sight, seems that there are two errors: The first: /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1542 172.27.232.9 [More Information] 255.255.252.0 [More Information] init    Closing TUN/TAP interface  Exiting due to fatal error Appears to be a problem related to the hardware (patch cord, network card, etc.) Due to something, the link is going down. If you can verify the above components and see if the errors are gone. The second error: ERROR: could not read Auth username from stdin  TLS: soft reset sec=0 bytes=257104590/0 pkts=272786/0 Question: This error occurs few seconds after the first one? If yes, maybe it's related to the first. If the first error gets corrected and this error continues, try to increase the verbosity of the log file (one way too is to add to the file /var/etc/server1.ovpn the lines: "verb 5" and  "log-append /var/etc/log.txt", restart openvpn and see the log file contents. This modification will be lost after reboot) to have more information which command exactly is complaining about the missing  Auth username and so we can solve the problem.
  • TLS Error: TLS handshake failed

    9
    0 Votes
    9 Posts
    5k Views
    johnpozJ
    why does it say user cert on that - are you trying to use the server cert as your user cert as well?  You have to create a specific user cert, you can not use the same server cert for your user.  See my example where I have a johnpoz cert as the user cert. [image: samecert.png] [image: samecert.png_thumb]
  • Problem using OpenVPN

    6
    0 Votes
    6 Posts
    2k Views
    D
    OK, if you're using a physical IP, I'm guessing your WAN is setup with a Static address? Does the current WAN->Interfaces IP address match what's in your OPenVPN client? I notice another problem, if I connect at my server and try to PING in my Client, I can't, I lose all the packets, the same happens if I connect at the client, all PING packets are lost. (Yes, ICMP is enabled in both sides). My internet provider are the same in both sides. But if I connect in another computer outside my network (My Personal Computer) I can ping in both sides (Client and Server). Huh? I don't quite understand, are you trying to connect to your OpenVPN server from the LAN (inside your own network) side of your pfSense box? That's not going to work properly using OpenVPN, and that's not what the VPN is for in the first place. If you can connect from outside (using OpenVPN?) then what's the problem with your setup? I'm getting confused as to what your problem is here. Can you post a simple diagram explaining your setup and the problem you're trying to solve?
  • Do 127.0.0.0/8 rules need to be duplicated?

    3
    0 Votes
    3 Posts
    822 Views
    M
    I do route DNS lookups through it and I did not setup the 127.0.0.0/8 rule and it's working fine. I'm using Hybrid Outbound NAT and just added the LAN Subnet.
  • Source of fcgicli

    3
    0 Votes
    3 Posts
    1k Views
    J
    thank a lot ! I noticed that I only searched in repositories and not in files.
  • PFSense 2.2.4 + OpenVPN 2.3.8: LAN Access Problems

    7
    0 Votes
    7 Posts
    2k Views
    N
    Yes.  That's pretty much the purpose of the VPN; to access the LAN.  Have full access to everything 192.168.2.0/24.  Also to the LAN the client is connected to (assuming it's not the same as the remote LAN; 192.168.2.0/24). Be sure the LAN the client is connected to is not the same as the remote LAN.  That's why I use 192.168.2.0/24 instead of the common defaults 192.168.0.0/24 or 192.168.1.0/24 that most private LANs are configured as.
  • [SOLVED] PFSense 2.2.4 + OpenVPN 2.3.8: Can not create OpenVPN connection

    24
    0 Votes
    24 Posts
    7k Views
    B
    Hi Johnpoz, Thermo, I have redone that, as you recommended. As part of my learning process it was great exercise: IPv4 Tunnel NEtwork: 192.168.188.0/24 IPv4 Local Networks: 192.168.168.0/24, 192.168.169.0/24 That is correct, that I will have a bit more flexibility now to grant access to only one network if needed. Thank you.
  • Bad VPN routing after internet reconnect?

    1
    0 Votes
    1 Posts
    776 Views
    No one has replied
  • [Solved] Some hosts missing over OpenVPN

    7
    0 Votes
    7 Posts
    1k Views
    D
    Perhaps a gentle reminder to the OP: Some might find it helpful if you were to update the original message title to include "[Solved]". I know this gets missed, often the OP never comes back to check the forum (all their problems are solved after all) but I find it worth repeating from time to time.
  • Openvpn 2.3.8 and pfsense 2.2.4 no working

    10
    0 Votes
    10 Posts
    2k Views
    johnpozJ
    Well then he should be using 10/8 ;)
  • Site-2-site routing problem?

    5
    0 Votes
    5 Posts
    1k Views
    D
    well from that trace looks like pfsense is sending it out its wan vs going down the tunnel. Hmmmmmm OP: Can you post your OpenVPN configs for the Server and the Client?
  • Block AD users to connect through OpenVPN

    9
    0 Votes
    9 Posts
    2k Views
    D
    Amazingly, reading the docs helps… https://doc.pfsense.org/index.php/OpenVPN_with_RADIUS_via_Active_Directory#On_the_Active_Directory_domain_controller
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.