• Openvpn nat issue

    2
    0 Votes
    2 Posts
    1k Views
    W

    "SOLVED" because I got the solution up and running under shorewall. Sorry pfSense - it's been nice with you.

  • LDAP+Certificate for OPenVPN on PFSense 2.1.2

    2
    0 Votes
    2 Posts
    3k Views
    V

    You have to assign your CA to your OVPN server and the user have to get a certificate from the same CA.
    For this go to System > user manager > server tab and add your LDAP server there. After it is configured correctly you should see the user at users tab, edit the user and add a certificate.

  • Multiple User Best Practice

    6
    0 Votes
    6 Posts
    1k Views
    V

    the people using the VPN wouldn't have a clue on how to change the config

    In that case it will be OK to use just a single CA. But our Clients are software developers. I do not need to tell more.  ;)

  • HEADS UP: Updated OpenVPN Client Export package 1.2.5 for Heartbleed fix

    24
    0 Votes
    24 Posts
    9k Views
    J

    @jimp:

    It's actually 1.2.9 now. Any version 1.2.5 or later is fine for this issue.

    I've noticed this too :) updated and all is working great
    you guys are the best

  • OpenVPN client can't reach one of my internal routes

    6
    0 Votes
    6 Posts
    5k Views
    T

    I had a similar problem, and adding an NAT rule solved it too.

  • Internet flow through OpenVPN

    5
    0 Votes
    5 Posts
    1k Views
    M

    I am still a bit lost how to route all my internet traffic through the openVPN. If anyone knows a way, i would really appreciate it.

    Thanks!

  • Current Best Method for Multiwan OpenVPN Server

    10
    0 Votes
    10 Posts
    2k Views
    A

    Ok, everything seems to be working splendidly now.  Not sure what I did other than disable NAT on my edge router.  It does take a couple minutes for the DNS to propagate out though, as expected.  I'm guessing there is not way to reduce that.  Thanks again for your advice.  :D

  • Open VPN The Heartbleed Bug

    1
    0 Votes
    1 Posts
    754 Views
    No one has replied
  • PHP error in OpenVPN Export

    4
    0 Votes
    4 Posts
    2k Views
    D

    Ahhh ok I appreciate it and sorry for posting it originally in the wrong forum.
    And its working now using the autoadd rules from the wizard.
    I was able to Frankenstein the config and get it to close out tls auth
    Now I just need to figure out why my router is not forwarding the ports to it from outside the network
    Thanks again

  • RADIUS vs LDAP for AD authentication for OpenVPN

    39
    0 Votes
    39 Posts
    31k Views
    A

    I actually also got the AD for authentication working for our Openvpn implementation, key is using the extended query option to differentiate between OU, apart this there is nothing much to change in your AD structure.

  • Incorrect tls-auth setting for Peer to Peer SSL/TLS OpenVPN with tls-auth

    4
    0 Votes
    4 Posts
    1k Views
    D

    Great tip! Worked like a charm. Thanks a lot.

  • Can't connect multiple users via OpenVPN

    2
    0 Votes
    2 Posts
    674 Views
    R

    Look at the logs on pfSense and the second client.
    Also add "verb 4" to the configs both on server and client, to have a more detailed log on what's happening.

  • Heartbleed bug - does it affect pfs 2.1?

    7
    0 Votes
    7 Posts
    4k Views
    C

    @ncolunga:

    If pfsense 2.1 uses openssl-1.0.0_10 it shouldn't be affected by this bug. Isn't it?

    2.1 and 2.1.1 have vulnerable openssl versions.
    https://pfsense.org/security/advisories/pfSense-SA-14_04.openssl.asc

  • Let pfsense route internal connection to different vpns/no vpn

    1
    0 Votes
    1 Posts
    684 Views
    No one has replied
  • OpenVPN error

    5
    0 Votes
    5 Posts
    5k Views
    S

    Thanks! - Don't know how I missed that.

  • [SOLVED] pfSense w/OpenVPN; Ubuntu Clients

    2
    0 Votes
    2 Posts
    13k Views
    I

    This can be closed.

    My problem was with the TLS-Auth key. I did have the wrong one. Once I edited the key and added the 1 behind it in my conf it resolved the problem.

    As for the GUI it too works. I needed to go into the Advanced settings and enable TLS-Auth and choose my key. It now works like a charm..

    Thanks for the help Jimp.

  • Expected behavior with OVPN users and certificates?

    2
    0 Votes
    2 Posts
    823 Views
    jimpJ

    Those are both expected behaviors.

    #1 - It doesn't matter if pfSense has the user cert in its database. All that matters is that it's a valid certificate made against the right CA. Deleting the certificate does nothing from a security standpoint. At most it would break the export but that doesn't stop the existing client from working.

    #2 - Placing a certificate in a CRL does nothing special until that CRL is used by something (e.g. a specific OpenVPN server). You could revoke a cert from one server while letting it work in another one, provided both OpenVPN servers used different CRLs.

  • OpenVPN Site-to-Site through Roadrunner

    3
    0 Votes
    3 Posts
    1k Views
    P

    Let's assume the SiteA RoadRunner tunnel is 10.42.42.0/24
    On SiteB site-to-site Remote Networks put 10.0.0.0/16,10.42.42.0/24
    On Site A RoadRunner server Local Network/s put 10.0.0.0/16,192.168.0.0/16
    Then routing will work.

    Make sure rules on OpenVPN at SiteA and SiteB allow the traffic to/from those subnets.
    Then firewalling will allow the traffic.

    I connect in like this all the time, to 1 office, and use the whole internal network across lots of offices.

  • Options error: –local and --nobind don't make sense when used together.

    5
    0 Votes
    5 Posts
    15k Views
    B

    @cmb:

    Choose the WAN interface you want it to use in the Interface drop down, and don't specify nobind, that'll give you what you're looking for.

    Ok that's what I have already so I will leave it as is. Thanks

  • OpenVPN & PIA - Inconsistent Connection

    4
    0 Votes
    4 Posts
    2k Views
    C

    I just tried restarting the VPN and it now works but the other issues of links going down and what not are still pending.  I'll have to see how long this stays connected for.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.