corp network
|
|
pfsense (192.168.60.10) WAN (additional fully external ip resolves to here)
|
|
pfsense lan interface (192168.1.1)
|
|
Windows radius server (192.168.1.10)
OpenVPN Config:
Server Mode: Remote Access (SSL/TLS + User Auth)
Backend for Authentication: RADIUS
Protocol: tcp
Device Mode: tun
Interface: WAN
Local Port: 443
System: Authentication Servers Settings:
Hostname or ip: 192.168.60.10
Shared Secret: pasted over from radius server
Auth Port: 1812
Accounting Port: 1813
Auth Timeout: 500
Before when I would manually enter a bad password it would show up in the radius server logs. This time using wireshark, I can't detect that any traffic is even making it to radius. I can verify with captures that it is reaching the openvpn server. I think somehow openvpn can't reach the radius server and it is timing out and failing. Like I said I have all rules down trying to figure out why, any help is appreciated. Pretty sure its something really simple I am just not seeing.
Also forgot to add, I didn't change anything about the NPS config from the working connection to the non-working connection. Still have it set to receive requests from 192.168.60.10.
OpenVPN Log:
May 21 11:33:38
openvpn: user 'clarkdori' could not authenticate.
May 21 11:33:38
openvpn[52966]: 64.134.31.222:63010 WARNING: Failed running command (–auth-user-pass-verify): external program exited with error status: 255
May 21 11:33:38
openvpn[52966]: 64.134.31.222:63010 TLS Auth Error: Auth Username/Password verification failed for peer
May 21 11:33:38
openvpn[52966]: 64.134.31.222:63010 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
May 21 11:33:38
openvpn[52966]: 64.134.31.222:63010 TLS Error: TLS handshake failed
May 21 11:33:38
openvpn[52966]: 64.134.31.222:63010 Fatal TLS error (check_tls_errors_co), restarting
May 21 11:33:38
openvpn[52966]: TCP connection established with [AF_INET]64.134.31.222:63012
IPV4 Tunnel 192.168.2.0/24
IPV4 Local 192.168.1.0/24