• Per user firewall rules

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ

    There is no way to make "per-user" rules using the GUI alone. It is possible to do if the users and rules come via RADIUS, though.

    Giving each client a unique certificate/login and override with a unique IP is best, and the only way to make that work in the GUI.

  • OpenVPN Routing Issue/Question

    7
    0 Votes
    7 Posts
    1k Views
    M

    I needed to login to the VPN and ping a 172.17 host for the tunnel to be established.

  • Client can't ping lan

    10
    0 Votes
    10 Posts
    2k Views
    H

    thanks a lot guys. i appreciate your help and info.  ;)

  • OpenVPN Gateway Not "UP"

    35
    0 Votes
    35 Posts
    4k Views
    L

    I did a complete reinstall and started fresh.  I read a thread around the forums regarding the Traffic Shaper, and i think i might have went in there and tried it out which broke things in the background.  After a fresh install and some minor setup hiccups it seems that i'm up and running with OpenVPN routed to the one client that i want!!

    Thanks for all the help!

    Edit: I believe i found the culprit as well to the issues that i was having this entire time.  Squid…after i installed it again it ended up breaking the VPN connection.  Had to put in a bypass proxy setting in there and all is well again!

  • Ipredator - Config problems

    2
    0 Votes
    2 Posts
    1k Views
    D

    I'm assuming this is an OpenVPN client config on pfSense?

    Have you tried comparing the working script against the pfSense rewrites that fail?

    If there are a few necessary lines removed when pfSense does its write, you should be able to add them to the advanced section of the client config.  If it's something more there may be other ways, post back with more details.

  • OpenVPN + CARP

    2
    0 Votes
    2 Posts
    571 Views
    A

    I restarted CARP on Master and Slave and now it works.

  • OpenVPN Server and client, NAT issues… 50% packet loss, wrong routing.

    5
    0 Votes
    5 Posts
    5k Views
    S

    Bad form in posting back to my old posts, but just to let you know, that I've finally fixed it.

    Phil, I dug around regarding your suggestion and found this:

    https://forum.pfsense.org/index.php?topic=76015.0

    All working as intended!

    I've not restarted any of my client VPN connections, or rebooted, but I'm sure that if the client comes up with same interface (ovpnc1) then I consider myself a happy chap.

    Only 1 year in the making… wow.

  • How to access other lan inside lan

    4
    0 Votes
    4 Posts
    1k Views
    P

    If it is site-to-site, then, in the Remote Network/s box at both client and server end, list all the remote networks reachable across the VPN link. (i.e. the list will be "opposite" on client to server)

    If it is road warrior server, then put all the networks reachable through the server into the Local Network/s box - this will tell the clients what they can reach across their link to the server.

    In all cases put rules on OpenVPN to allow traffic from the clients to the various networks. Put rules on the server-end LAN etc to allow traffic from the server network/s to the clients (if you want traffic to be initiated in that direction also)

  • Can't get "redirect-gateway" to work correct

    2
    0 Votes
    2 Posts
    831 Views
    M

    A few things… first, this clearly is not a PFsense box... you should probably post in the forum of whatever distro you're using or openvpn.net, but will attempt to help anyway.

    1.  Provide a network map, so we know more about your network and what you're trying to access.

    2.  Is this in a lab?  Because it appears as though you are trying to connect to the VPN from the same LAN the server is on... but we'll know more when you provide the network map.

    3.  When you say "I can access the tunnel but I cannot access internet.", can you truly not access the internet or just unable to resolve domain names?  Because those are two separate issues.

  • Site-Site VPN between Sonicwall and PFSense

    6
    0 Votes
    6 Posts
    3k Views
    M

    Ramotalana, when you setup the tunnel it will only route traffic that you tell it to route… and it will only allow the traffic that your firewall rules tell it to allow...  i.e. only traffic destined for the tunnel will be routed over the tunnel.  Internet traffic along with everything else will follow the routing table on both ends.

  • OpenVPN open in house webpage problem

    2
    0 Votes
    2 Posts
    659 Views
    M

    How can we even begin to help troubleshoot?  There are no details.  Provide a network map, post your config, post your firewall rules.

  • OpenVPN Server Interface

    2
    0 Votes
    2 Posts
    760 Views
    K

    Yes - If you have multiple VPNs you can give them different sets of firewall rules.  Thats just for one.

  • Site to site tunnel with shared key drops under load and won't reconnect

    3
    0 Votes
    3 Posts
    1k Views
    P

    No luck.

    It turns out snort was being triggered and blocking my second site.  I simply disabled the offending rule, unblocked my IP and all seems well.  What's strange is that it didn't fail until significant data started being transferred through the tunnel.  That was very confusing.  I noticed that my client connection wasn't found in the server firewall log and after verifying with packet capture that the client was indeed sending, it dawned on me that something was eating the request.  Too many hours lost due to my own foolishness.

    Found on snort alerts tab (I copied this after disabling the rule):

    11/27/14
    09:27:06 1 UDP Potential Corporate Privacy Violation <clientwanip>Icon Reverse Resolve with DNS  Add this alert to the Suppress List and track by_src IP 13467 <serverwanip>Icon Reverse Resolve with DNS  Add this alert to the Suppress List and track by_dst IP 1195 1:2003320
    Add this alert to the Suppress List  Rule is forced to a disabled state. Click to remove the force-disable action from this rule. ET P2P Edonkey Search Results

    Beware snort users.</serverwanip></clientwanip>

  • How to tunnel all traffic over multiple VPNs?

    4
    0 Votes
    4 Posts
    2k Views
    L

    Check out this site and the articles, they all address the concern of chaining vpn tunnels: https://www.ivpn.net/privacy-guides/advanced-privacy-and-anonymity-part-8

    The simplest way to do it is with pfsense running in multiple VMs (you create multiple ESXI or VMware workstation VMs and chain them up).

    I hope this helps..

  • Service not running? Unable to contact daemon error

    4
    0 Votes
    4 Posts
    4k Views
    S

    Thank you very much for pointing to OSPF direction. Quagga behaves wierd a bit, exactly as written in this thread.  I had to add tunnel adresses manually, as advised here , and it worked for me. Everything runs fine for two weeks already, client reconnects properly. Restaring server side of OVPN tunnel does not crash client side anymore. The issue is solved.

  • OpenVPN freezes but no crash

    1
    0 Votes
    1 Posts
    612 Views
    No one has replied
  • 0 Votes
    7 Posts
    2k Views
    DerelictD

    It looks to me like server1.conf is your site-to-site and server2.conf is your remote access.

    It also looks like your diagram should have 172.16.9.0/24 as your remote access network.  Is that true?

    If all that is the case, you have routes from pfSense for:

    route 192.168.2.0 255.255.255.0
    route 172.16.4.0 255.255.255.0

    …in both configs.  Those routes should only be in your site-to-site.

    If you want your remote access clients to access all LANs at all sites, you need to push them routes for everything, meaning 172.16.1.0/24, 172.16.2.0/24, 172.16.4.0/24, 192.168.2.0/24.

    And you need to push routes to all foreign networks to each site.  For instance, Satellite office 2 needs to be pushed routes for the following:

    172.16.1.0/24
    172.16.2.0/24
    172.16.4.0/24
    172.16.9.0/24

    (Note you could just push a route to 172.16.0.0/16 instead.  Or even /20 in that particular case.)

  • Unable to connect most of the time via WAN to OpenVPN.

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN Dynamic Routing iroute and OSPF via CCD files [SOLVED]

    3
    0 Votes
    3 Posts
    3k Views
    C

    some additional assumptions, this scans the /var/etc/openvpn-csc file for custom client overrides.  It is expecting both an ifconfig and an iroute directive in these files to work.  You need both, the first pushes a "static" IP to the client so you can reference an iroute behind that interface.

  • OpenVPN allow 1 IP not all Lan visible

    2
    0 Votes
    2 Posts
    715 Views
    K

    On the VPN firewall, make 3 rules

    pass to 10.10.10.150/32
    block 10.10.10.0/24
    pass from any to any

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.