Try to get the log off the phone, odds are it will tell you why.
Usual suspects: Clock on the phone is wrong/not set, or you're using a cert/key format that the phone does not understand (e.g. you need SHA1 not SHA256)
You really just need to type the 3 letters "pen" in the middle of "ovpn"to make "openvpn".
I can only guess that you have accidentally deleted or added some syntax character when making the edit.
This change is simple enough that I would just do it from Diagnostics->Edit, Load, type the 3 chars in the right place and press "Save". No need to mess with command line.
Create a new CA, set to import, copy/paste from –---BEGIN CERTIFICATE----- to end of the CA cert, save. Then import your certificate on the Cert Manager tab using the user cert and key from the p12.
This thread can be considered closed. believe it or not, I had not cabled to tie the LAN segment to the switch with the other devices I was attempting to connect to. Everything is connecting as expected.
:-[
Another pfsense is working without problems and I can ping the ovpns-Interface ip-address of the tunnel network from the pfsense itself. So it must be a problem with the pfSense-installation I'm testing right now. I will backup the setup and reinstall it this evening.
Well, that was it. After switching the OVPN subnet to an arbitrary 192.168.xxx.0/24 subnet the traffic is flowing properly. Thank you so much for your help.
Status > System Logs, OpenVPN tab. It isn't there for long, but they are logged there. If you forward those logs to a remote syslog server they could be retained longer.
Now I remember my reason for not wanting some shares to work across the VPN. We have a backup share where laptops automatically do backup at lunchtime (if they are turned on and on the LAN). The backup share is accessed by an automatic job on the client laptop. There are also other shares on the server that the ordinary user uses.
When they go to another office, they need to use the user shares remotely across the VPN. But when the backup job starts up at lunchtime, I don't want it to succeed - and saturate the VPN with a backup to their home site.
I don't think there is going to be a way to fix this with firewall rules or Windows server settings. Might have to think some more about making an DNS alias name for the server, making that alias only resolve at the home site, and making the backup job use that alias. Then it should fail when the laptop is away from its "home site".
Anyway - not a pfSense issue, but may be doable with a DNS Forwarder Host Override (extra name) at the home site.
It's working now. Seems it was a combination of things.
I needed the iroutes on the server, and I also had the VPN server configuration set to "Remote Access SSL/TLS" since I was initially using this for Road Warriors, but later wanted to add a site-to-site. Changing it to Peer to Peer gave me an option for Remote Networks on the server side that I didn't see before and once I entered the branch network in there things started working.
Thanks for your help, hope the OP gets it going as well.
It appears you have routed setup, so why are you using Device Mode "Tap"? You should be using "Tun".
Yeah, that was a derp on my part. tap is actually correct - I was trying to get to a server bridged configuration (so I could get broadcasts working across the VPN). It was just figuring out how to do that in the "pfSense way." I could have copied my old config out of DD-WRT and the script I had written to bring everything online, but then I wouldn't have learned anything.