• OpenVPN and SIP needs NAT

    4
    0 Votes
    4 Posts
    4k Views
    D

    My experience with SIP has been bittersweet at times (and I know I'm not alone).
    I find things have improved between providers and the current releases of FreePBX/Asterisk/pfSense such that mucking about in pfSense is mostly not needed anymore.
    No to mention the SIP protocol itself has evolved (somewhat) for the better, although I still use IAX2 with some setups to avois the NAT nightmare that can SIP can be.

    Very often it "just works" which is gratifying after years of trying to resolve  Voip software/ DID provider/Hardware manufacturer issues when everybody pointed at the other guy as the source of the problem <sigh>.

    Glad you're up and running.</sigh>

  • MOVED: Regras de sáida pelo OpenVPN

    Locked
    1
    0 Votes
    1 Posts
    480 Views
    No one has replied
  • How to setup OpenVPN site to site connection in pfsense with DHCP

    4
    0 Votes
    4 Posts
    899 Views
    D

    It it nice when the magic finally works  :)

    Glad you got i working.

    Feel free to ask more if you hit any particular road blocks or have some new config questions.

  • SAMBA over OpenVPN working partially

    18
    0 Votes
    18 Posts
    5k Views
    I

    Understood!!!

    THANKS!

  • Automatically Route Client IP addresses to the LAN

    1
    0 Votes
    1 Posts
    472 Views
    No one has replied
  • OpenVPN - Site-to-Site - Multiple Sites (Peer to Peer -Shared key)

    7
    0 Votes
    7 Posts
    2k Views
    A

    Hi fgmoyses,

    Can you send me the details of client and server setup for multiple sites.Because I am tying almost one week to fix this issue.I am very glad if you send me your setup.

    Thanks and regards.

  • Can't access remote network through OpenVPN tunnel

    13
    0 Votes
    13 Posts
    2k Views
    W

    I see what you're saying. Thanks.

  • New OpenVPN setup for road-warriors - connected but no routing

    55
    0 Votes
    55 Posts
    22k Views
    S

    I know it's an older thread but I wanted to throw out two things that helped me.  We have a CARP setup so two routers.

    router2 couldn't ping the OpenVPN-LAN subnet. Routes looked fine.  Solution: reboot router2.

    When testing, router1 worked fine. Router2 connected and I could ping the router but not further. Solution: devices on the LAN are set to the CARP alias IP as their gateway, so the VPN through router2 will only work if CARP failover is in effect so that IP is shifted to router2.

  • Force using IP of interface

    9
    0 Votes
    9 Posts
    2k Views
    V

    You just need to create an outbound NAT rule which translates source IP of packets leaving pfSense on your "problem interface" to the interface address. This solution works, no matter if DHCP is on or not.

  • Connection working, but can brows internet only partly?!

    1
    0 Votes
    1 Posts
    575 Views
    No one has replied
  • Openvpn pfsense 2.2

    11
    0 Votes
    11 Posts
    3k Views
    B

    Hrm. After increasing the logging level to 4 again from the recommended 3 I'm now seeing this message a lot:

    MULTI: bad source address from client

    Gotta get to bed for tonight but it seems like the IP that is showing up at the OpenVPN server is that of my local wifi connection and not the VPN IP that should be showing up.

    ~Brett

    OpenVPN config:

    <openvpn><openvpn-server><vpnid>1</vpnid> <mode>server_tls</mode> <protocol>UDP</protocol> <dev_mode>tun</dev_mode> <ipaddr><interface>wan</interface> <local_port>7696</local_port> <custom_options><caref>snip</caref> <crlref><certref>snip</certref> <dh_length>1024</dh_length> <cert_depth>1</cert_depth> <crypto>AES-128-CBC</crypto> <digest>SHA1</digest> <engine>none</engine> <tunnel_network>172.16.snip/24</tunnel_network> <tunnel_networkv6><remote_network><remote_networkv6><gwredir>yes</gwredir> <local_network>192.168.snip/24</local_network> <local_networkv6><maxclients>10</maxclients> <compression>adaptive</compression> <passtos><client2client><dynamic_ip>yes</dynamic_ip> <pool_enable>yes</pool_enable> <topology_subnet><serverbridge_dhcp><serverbridge_interface>none</serverbridge_interface> <serverbridge_dhcp_start><serverbridge_dhcp_end><dns_domain>snip</dns_domain> <dns_server1>192.168.snip</dns_server1> <dns_server2>8.8.8.8</dns_server2> <dns_server3>8.8.4.4</dns_server3> <dns_server4><push_register_dns>yes</push_register_dns> <netbios_enable><netbios_ntype>0</netbios_ntype> <netbios_scope><no_tun_ipv6><verbosity_level>4</verbosity_level></no_tun_ipv6></netbios_scope></netbios_enable></dns_server4></serverbridge_dhcp_end></serverbridge_dhcp_start></serverbridge_dhcp></topology_subnet></client2client></passtos></local_networkv6></remote_networkv6></remote_network></tunnel_networkv6></crlref></custom_options></ipaddr></openvpn-server></openvpn>
  • OpenVPN allows webConfigurator

    12
    0 Votes
    12 Posts
    2k Views
    DerelictD

    Generally, on interface rules that are evaluated top down - first match wins, if you want to limit what the users can do you go from most specific to least specific:

    Pass what your users need to access - DNS to DNS servers, pings to gateway for troubleshooting/comfort, etc.
    Block what you do not want your users to access - DMZ to LAN or other local networks, webConfig (don't forget WAN address or This firewall (self)), etc.
    Pass everything else - (the internet)

  • Seperating VPN Traffic from Non VPN Traffic

    14
    0 Votes
    14 Posts
    3k Views
    T

    @Derelict:

    Just look at the OpenVPN threads.  There's a really long one about PIA that covers all this.  Sorry, I don't have a bookmark for it.

    There's a checkbox in the OpenVPN client config that says don't pull routes.  With that checked make an alias for the hosts you want to go out the VPN and set the VPN as a gateway in a matching rule.

    Appreciate the help. Will look for the post on PIA so I can figure it out.

  • OpenVPN, RADIUS & Client-Specific Overrides

    1
    0 Votes
    1 Posts
    790 Views
    No one has replied
  • Multiple OpenVPN servers

    4
    0 Votes
    4 Posts
    2k Views
    DerelictD

    Meaning all clients get routes to 10.0.0.0 and 10.0.1.0.  The firewall rules control who can actually talk to what.

    It just lets you standardize the server config for all users.  You can also just push specific routes to local assets to specific users.  OpenVPN will pretty much be able to do anything you can think of.

  • Pfsense OpenVPN Site-to-Site

    1
    0 Votes
    1 Posts
    682 Views
    No one has replied
  • Hub and Spoke OpenVPN routing

    1
    0 Votes
    1 Posts
    725 Views
    No one has replied
  • Possible? Multiple Backend for authentication

    3
    0 Votes
    3 Posts
    815 Views
    iorxI

    ;) "Science bitch!" - Breaking Bad.

    I would say that it works. I authenticated with two account found in the separate backends  :o.

    multiselect-auth-works.png
    multiselect-auth-works.png_thumb

  • Issue setting up 2 PIA accounts

    3
    0 Votes
    3 Posts
    864 Views
    B

    I deleted the Server and disabled the working Client for now.  I have pasted the logs to a pic attached.

    Capture.JPG
    Capture.JPG_thumb

  • Pfsense assigning itself the wrong ip?

    3
    0 Votes
    3 Posts
    745 Views
    J

    On further investigation, it seems that pfsense is doing exactly as it should, it is assigning itself the 42.1 address, it's the dd-wrt router that is insisting on the .5 and .6 addresses.

    Thank you for the links though, definitely good information that I didn't know before

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.