• Problem with pat and gateway configuration.

    3
    0 Votes
    3 Posts
    842 Views
    M

    My client setup file

    dev tap
    persist-tun
    persist-key
    cipher AES-128-CBC
    auth SHA1
    tls-client
    client
    resolv-retry infinite
    remote 81.233.18.249 1194 udp
    route-gateway 192.168.1.253
    lport 0
    auth-user-pass
    ca srv-pfsense-udp-1194-ca.crt
    ns-cert-type server
    comp-lzo

  • Ipredator VPN client setup - system flags on embedded systems

    1
    0 Votes
    1 Posts
    655 Views
    No one has replied
  • Routing issue on client site

    3
    0 Votes
    3 Posts
    895 Views
    D

    1. In some articles pointed out the server mode needs to be "Remote Access(SSL/TLS)" when using multi-sites conection, I am going to setup another client sites later. But anyway, I will try to test in both way.

    2. The rules are same on the OpenVPN tab on both ends.

    3. Forgot to mention, I have been using a gateway groups as my openvpn client interface, include default gateway and 192.168.60.1 could both conect to internet.

    server1.conf
    –-----------------
    dev ovpns1
    dev-type tun
    tun-ipv6
    dev-node /dev/tun1
    writepid /var/run/openvpn_server1.pid
    #user nobody
    #group nobody
    script-security 3
    daemon
    keepalive 10 60
    ping-timer-rem
    persist-tun
    persist-key
    proto udp
    cipher AES-128-CBC
    up /usr/local/sbin/ovpn-linkup
    down /usr/local/sbin/ovpn-linkdown
    local 123.x.x.x
    tls-server
    server 192.254.0.0 255.255.255.192
    client-config-dir /var/etc/openvpn-csc
    tls-verify /var/etc/openvpn/server1.tls-verify.php
    lport 1194
    management /var/etc/openvpn/server1.sock unix
    max-clients 10
    push "route 192.168.0.0 255.255.255.0"
    client-to-client
    ca /var/etc/openvpn/server1.ca
    cert /var/etc/openvpn/server1.cert
    key /var/etc/openvpn/server1.key
    dh /etc/dh-parameters.1024
    tls-auth /var/etc/openvpn/server1.tls-auth 0
    comp-lzo
    persist-remote-ip
    float

    route 192.168.1.0 255.255.255.0

    client1.conf

    dev ovpnc1
    dev-type tun
    tun-ipv6
    dev-node /dev/tun1
    writepid /var/run/openvpn_client1.pid
    #user nobody
    #group nobody
    script-security 3
    daemon
    keepalive 10 60
    ping-timer-rem
    persist-tun
    persist-key
    proto udp
    cipher AES-128-CBC
    up /usr/local/sbin/ovpn-linkup
    down /usr/local/sbin/ovpn-linkdown
    local 192.168.60.2
    tls-client
    client
    lport 0
    management /var/etc/openvpn/client1.sock unix
    remote 123.x.x.x 1194
    ca /var/etc/openvpn/client1.ca
    cert /var/etc/openvpn/client1.cert
    key /var/etc/openvpn/client1.key
    tls-auth /var/etc/openvpn/client1.tls-auth 1
    comp-lzo

    4. Packets captured on em3 interface:
    14:11:55.909401 IP 192.168.60.2 > 192.168.0.6: ICMP echo request, id 50999, seq 16729, length 40
    14:11:57.408812 IP 192.168.60.2 > 192.168.0.6: ICMP echo request, id 50999, seq 16985, length 40
    14:11:58.884478 IP 192.168.60.2 > 192.168.0.6: ICMP echo request, id 50999, seq 17241, length 40

    No icmp packets were captured on vpn interface.

  • OpenVpn Client and Server at same time

    3
    0 Votes
    3 Posts
    1k Views
    M

    A couple things:

    1.  Without seeing the configs we can only speculate, but my best guess is the OpenVPN server on the remote end does not know how to reach the 10.100.6.x subnet, so return traffic is being dropped.  Most likely the remote end is missing a return route for the 10.100.6.x subnet.

    2.  If I'm not mistaken, "iroute" is a server-side directive, so you can remove "iroute 10.100.6.0 255.255.255.0;" from your client config.

  • OpenVpn p2p(sharedkey) Vpn is up , no ping

    2
    0 Votes
    2 Posts
    946 Views
    M

    Post the server1.conf and client1.conf.

  • Ifconfig: ioctl (SIOCAIFADDR): Destination address required

    4
    0 Votes
    4 Posts
    3k Views
    D

    bump

  • Openvpn mtu-test info This connection is unable to accomodate a UDP

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN run as non-privileged user

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ

    Not at this time.

  • Log when roadwarrior users login?

    2
    0 Votes
    2 Posts
    499 Views
    jimpJ

    There is not one currently. It may be possible to add in the future, or one could be manually added into the /etc/inc/openvpn.auth-user.php above/below the success syslog message.

  • How to Store the Password in pfSense Permanently?

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ

    That option exists on 2.2 in the OpenVPN client settings.

    On 2.1.x, place your file in /root/ or /conf/ and it should carry over between updates.

  • OpenVPN daemon shutdown

    3
    0 Votes
    3 Posts
    1k Views
    jimpJ

    That would be between OpenVPN and OpenSSL, not something we've done. The box prints the list of ciphers from OpenVPN and if it can't use one it states, it must be something between there and OpenSSL. You might post that same question to an OpenVPN board, see if anyone else has tried it.

    Or test it on a 2.2 snapshot.

  • Site to site configuration fight

    1
    0 Votes
    1 Posts
    677 Views
    No one has replied
  • OpenVPN access to remote IPSec network

    4
    0 Votes
    4 Posts
    943 Views
    P

    @kejianshi:

    Try using a full mesh VPN like TINC at all 3 points and then everything with happily talk to everything else.

    IPSec also works. In small networks it isn't complicated to setup. With 3 sites, 3 tunnels give full mesh connectivity and no routing issues.

  • Cannot connect to Mullvad VPN with pfsense OpenVPN.

    3
    0 Votes
    3 Posts
    3k Views
    S

    I think this is the setting you're looking for:

    Navigate to "System: Advanced: Miscellaneous"

    Then go to "Gateway Monitoring" and check "Skip rules when gateway is down"

  • 0 Votes
    1 Posts
    862 Views
    No one has replied
  • 0 Votes
    1 Posts
    925 Views
    No one has replied
  • Packet Loss over OpenVPN Connection

    2
    0 Votes
    2 Posts
    2k Views
    C

    So I think this is related to the ASA I'm using. I'm connected at another location and I'm not experiencing any packet loss.

  • Site-to-Site traffic not flowing to OpenVPN users

    5
    0 Votes
    5 Posts
    2k Views
    F

    I have the same issue.

    Sanjay in your exampe, which VPN Address pool you added in the Phase 2 entry?

    Thanks

  • Howto OpenVPN over https?

    2
    0 Votes
    2 Posts
    781 Views
    F

    Ok i got it.
    I had to delete all rules and NAT translation related to wan address and 443.
    Than i reconfigured OpenVPN Server and now everything is fine.  ;)

  • OpenVPN with LDAP Windows 2012 R2 domain "AUTH_FAILED"

    5
    0 Votes
    5 Posts
    2k Views
    B

    I think the group member attribute is what is causing most peoples issues with ad/ldap.

    Glad you got it working. :)

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.