• 0 Votes
    2 Posts
    2k Views
    S

    While connecting through ubuntu client system following error occured
    NOTE: unable to redirect default gateway – Cannot read current default gateway from system
    Is it causing the issue.Can any one help me.........

  • Open VPN netmask 255.25.255.252

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    N

    On OpenVPN Server you set the tunnel network. for example

    10.10.10.0/24

    10.10.10.0/30 is the OpenVPN Server itself
    10.10.10.4/30 is the first OpenVPN client which connects
    10.10.10.8/30 is the second OpenVPN client which connects
    ….
    10.10.10.252/30 is the 63rd OpenVPN client which connects.

    In short:
    Every client connection on OpenVPN needs a subnet of /30

    First IP: Network IP
    Second IP: OpenVPN Server IP
    Third IP: OpenVPN Client IP
    Foruth IP: Broadcast IP

    This is how every client connection/subnet looks like.

  • OpenVPN client cannot ping LAN from VPN subnet

    Locked
    5
    0 Votes
    5 Posts
    6k Views
    D

    I restored from a previous backup that didn't contain any configuration information for OpenVPN. Ping now works. And doesn't stop working after 30 seconds of being up. So far so good.

    I imported the pfsense certificate authority certificate and key (ca.crt & ca.key) into the Cert Manager CA Authority tab from our older Linux-based router which used easyrsa to generate those certificates/keys. Then I went to the client certificate tab and imported Firewall.crt & Firewall.key from our Linux-based router to a 'Firewall' certificate entry. I also imported a client certificate and key into a new client certificate entry called DougSampson.

    I went to the OpenVPN configuration and imported the contents of the ta.key into the TLS-Authentication box. For the Peer Certificate Authority I chose the Firewall Certificate Authority certificate (ca.crt in this case) and for the Peer Certificate Revocation List I chose the Firewall Certificate Authority entry (we didn't employ a CRL list on our Linux-based router). For the Server Certificate, I chose the Firewall server certificate (in this case, the Firewall.crt) for the Server Certificate box. I chose 1024 bits for the DH Parameter Length. We had a dh1024.pem file from our Linux-based router but didn't know where to put it- there's no box for selecting the dh1024.pem file. It currently sits in the /root/easyrsa4pfsense/keys folder. POSTSCRIPT: I now notice 'dh /etc/dh-parameters.1024' in server1.conf. Should I replace the contents of that file with the contents from the /root/easyrsa4pfsense/keys/dh1024.pem?

    The contents of server1.conf is as follows:

    dev ovpns1 dev-type tun dev-node /dev/tun1 writepid /var/run/openvpn_server1.pid #user nobody #group nobody script-security 3 daemon keepalive 10 60 ping-timer-rem persist-tun persist-key proto udp cipher BF-CBC up /usr/local/sbin/ovpn-linkup down /usr/local/sbin/ovpn-linkdown local 69.xxx.xxx.xxx tls-server server 10.0.8.0 255.255.255.0 client-config-dir /var/etc/openvpn-csc tls-verify /var/etc/openvpn/server1.tls-verify.php lport 1194 management /var/etc/openvpn/server1.sock unix max-clients 5 push "route 192.168.101.0 255.255.255.0" push "dhcp-option DOMAIN dawnsign.com" push "dhcp-option DNS 192.168.101.1" push "dhcp-option DNS 192.168.101.4" push "dhcp-option DNS 192.168.101.7" push "dhcp-option DNS 192.168.101.254" push "dhcp-option NTP 192.168.101.254" push "dhcp-option NTP 192.168.101.4" push "dhcp-option WINS 192.168.101.4" client-to-client ca /var/etc/openvpn/server1.ca cert /var/etc/openvpn/server1.cert key /var/etc/openvpn/server1.key dh /etc/dh-parameters.1024 crl-verify /var/etc/openvpn/server1.crl-verify tls-auth /var/etc/openvpn/server1.tls-auth 0 comp-lzo passtos persist-remote-ip float push "route 192.168.102.0 255.255.255.0"

    Content of client.ovpn:

    client dev tun proto udp remote 69.xxx.xxx.xxx 1194 resolve-retry infinite nobind persist-key persist-tun ca ca.crt cert DougSampson.crt key DougSampson.key tls-auth ta.key 1 comp-lzo verb 3

    The client config file worked just fine with our existing Linux-based router running OpenVPN.

    Now when I try to connect, it fails with a TLS handshake error. Here is what the openvpn.log spits out:

    Feb 28 10:07:05 pfsense openvpn[11729]: event_wait : Interrupted system call (code=4) Feb 28 10:07:05 pfsense openvpn[11729]: /usr/local/sbin/ovpn-linkdown ovpns1 1500 1542 10.0.8.1 10.0.8.2 init Feb 28 10:07:05 pfsense openvpn[11729]: SIGTERM[hard,] received, process exiting Feb 28 10:07:05 pfsense openvpn[48656]: OpenVPN 2.2.0 i386-portbld-freebsd8.1 [SSL] [LZO2] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Aug  6 2012 Feb 28 10:07:05 pfsense openvpn[48656]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Feb 28 10:07:05 pfsense openvpn[48656]: Control Channel Authentication: using '/var/etc/openvpn/server1.tls-auth' as a OpenVPN static key file Feb 28 10:07:05 pfsense openvpn[48656]: TUN/TAP device /dev/tun1 opened Feb 28 10:07:05 pfsense openvpn[48656]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Feb 28 10:07:05 pfsense openvpn[48656]: /sbin/ifconfig ovpns1 10.0.8.1 10.0.8.2 mtu 1500 netmask 255.255.255.255 up Feb 28 10:07:05 pfsense openvpn[48656]: /usr/local/sbin/ovpn-linkup ovpns1 1500 1542 10.0.8.1 10.0.8.2 init Feb 28 10:07:05 pfsense openvpn[50174]: UDPv4 link local (bound): [AF_INET]69.xxx.xxx.xxx:1194 Feb 28 10:07:05 pfsense openvpn[50174]: UDPv4 link remote: [undef] Feb 28 10:07:05 pfsense openvpn[50174]: Initialization Sequence Completed Feb 28 10:08:06 pfsense openvpn[50174]: <ovpn client="" ip="" addr="">:51681 Re-using SSL/TLS context Feb 28 10:08:06 pfsense openvpn[50174]: <ovpn client="" ip="" addr="">:51681 LZO compression initialized Feb 28 10:09:06 pfsense openvpn[50174]: <ovpn client="" ip="" addr="">:51681 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Feb 28 10:09:06 pfsense openvpn[50174]: <ovpn client="" ip="" addr="">:51681 TLS Error: TLS handshake failed</ovpn></ovpn></ovpn></ovpn>

    Moreover, the pfsense server stops being able to ping! After rebooting, I'm unable to ping at all.

    It looks like there is a misconfiguration error somewhere in there and I cannot figure it out. Can anyone spot any errors? I notice that in the server1.conf file, the cipher is specified but it is not specified in the client config file. Is this an error? Are there any other errors?

    ~Doug

  • Open VPN Client Satus Problem

    Locked
    8
    0 Votes
    8 Posts
    3k Views
    P

    My example of this "feature" is at http://forum.pfsense.org/index.php/topic,59464.0.html
    I have noticed it with both Peer-to-peer shared key and SSL/TLS links every now and then. I saw it just now and managed to gather some data.

  • Can't access remote subnet from Lan

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    ?

    figured it out by myself, NAT rules doesn't seem to be created by default, so i added the outbound NAT rules myself …  8)

  • OpenVPN for iOS with HTTP Proxy

    Locked
    2
    0 Votes
    2 Posts
    4k Views
    J

    For info heres my .ovpn config file

    persist-tun
    persist-key
    cipher BF-CBC
    tls-client
    client
    remote 88.77.66.55 443 tcp
    http-proxy 10.11.13.30 80
    auth-user-pass

    Here's the iOS openvpn log:

    2013-02-27 12:40:26 –--- OpenVPN Start -----
    2013-02-27 12:40:26 EVENT: RESOLVE
    2013-02-27 12:40:26 EVENT: WAIT
    2013-02-27 12:40:27 Transport Error: TCP connect error on '88.77.66.55' for TCP session: Connection refused
    2013-02-27 12:40:27 Client terminated, restarting in 2...

  • Client Export Utility issue

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C

    haha…

    I cannot believe this. I feel like a right noob now  ;D
    Thanks a lot! it works in a real browser.

  • Moving away from pptp in favor of openvpn

    Locked
    8
    0 Votes
    8 Posts
    3k Views
    C

    @phil.davis:

    NAT the incoming OpenVPN road warrior links/clients onto your LAN

    That's one of the solutions I have looked for but couldn't find how to do so.
    Another point is I wouldn't know which client connected because of the NAT but that would be acceptable if I would get it working

  • OpenVPN,Bridging for LAN Games, Success with one problem

    Locked
    5
    0 Votes
    5 Posts
    5k Views
    S

    Thanks, but where did you put the command?
    Do you mean in the box "Additional configuration options" in the export client tab?
    Or should i download the files and edit the config?

  • User (authentication), AD vs local

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • OpenVPN for iOS - Finally Available!

    Locked
    52
    0 Votes
    52 Posts
    44k Views
    jimpJ

    If you use user auth on the server side, and you don't save the password on the client side, yes.

    If you are only doing certificate auth, probably not.

  • Lost connectivity from LAN side (pfsense) to some OpenVPN clients

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    belleraB

    pfSense version?
    OS client version?
    OpenVPN client version?
    Do you have a LAN rule permitting all traffic to the whole tunneling network (policy routing)?
    Are you sure that clients aren't using your subnets for their local network?
    Have the affected clients more than a NIC?
    Are allways the same clients?
    Do you see any message at OpenVPN logs (server & affected clients)?
    Are you using tun or tap?
    Are you using tcp or udp?
    Do you see anything at your pfSense firewall log?

  • Surprising: Junk DSL Modem causes issuses.

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    J

    So the issue is this ##@(# DSL modem. Because in pfSense 1.2.3 only "WAN" interface could be PPPoE, the modem was configured for PPPoE. But in this mode the DSL modem assigns the IP as a /8 to pfSense! So since both IP address (everything is dynamic) happen to start with 198. there was a conflict. After configuring the PPPoE on pfSense the subnet mask is 255.255.255.255 and there's no more conflict.

    :'(

  • Open vpn bridge stopped working

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • RDP to OpenVPN Client

    Locked
    10
    0 Votes
    10 Posts
    11k Views
    belleraB

    Finally it works!

    I had two errors:

    Incorrect manual NAT Outbound Incorrect policy routing at LAN, as you said. $ pfctl -s rules | grep VPNs pass in quick on em0 inet from <adm_pcs> to 192.168.XXX.0/22 flags S/SA keep state label "USER_RULE: Access from LAN to VPNs"</adm_pcs>

    em0 is my LAN
    adm_pcs is my alias for administrator's computers at the LAN side.
    192.168.XXX.0/22 covers all my OpenVPN networks (I have many OpenVPN servers running).

    Version 2.0.1-RELEASE (i386) built on Mon Dec 12 19:00:03 EST 2011 FreeBSD 8.1-RELEASE-p6

    Many thanks!

  • OpenVpn client printer

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    S

    remote are incorrectly set to the same HQ subnet (192.168.1.x)
    I would be more convenient to change the remote,
    I try,.. thanks!

  • Help to set up OpenVPN server

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    N

    Thanks, that's clearer.

    I'll do the redirecting bit, so if I decide to change to UDP later (unlikely, but you never know) it won't bite me.

  • Site to site - multiple subnets

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    B

    Problem solved:

    reinstalled both ESXi machines (promisc mode on) reinstalled both VM pfSense (2.1beta i386) configured OVPN bridge (tap) first > works ok configured OVPN tunnel (tun) all working smoothly

    I should've done this from the begging, not trying to fix anything was broke.

    This topic can be closed.

    Thanks again

  • How to route a local subnet (VLAN) through a OpenVPN client on pfsense?

    Locked
    7
    0 Votes
    7 Posts
    17k Views
    CNLiberalC

    I'm looking to do this same thing.  I want all traffic in the new VLAN to go over the OpenVPN connection.  Jimp:  You mentioned setting DNS servers so they go over the VPN.  How would you do that?  Setup a rule that any connection to a certain DNS IP address uses the OpenVPN gateway?

    What if I also wanted any queries to certain websites to go over the OpenVPN connection, regardless of VLAN membership?  Thanks!

    EDIT:  What if I also wanted to set pfSense as an OpenVPN server for a separate connection?  Would this pose serious issues?

  • Packet loss over openvpn bridge

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    P

    OpenVPN on client:

    Feb 18 16:34:31 openvpn[13124]: TCPv4_CLIENT link local (bound): [AF_INET]xx.xx.xx.xx
    Feb 18 16:34:31 openvpn[13124]: TCPv4_CLIENT link remote: [AF_INET]xx.xx.xx.xx:1197
    Feb 18 16:34:31 openvpn[13124]: Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:1197
    Feb 18 16:34:32 openvpn[13124]: Initialization Sequence Completed

    Ping results:
    Packets: Sent = 101, Received = 69, Lost = 32 (31% loss),
    Approximate round trip times in milli-seconds:
    Minimum = 22ms, Maximum = 126ms, Average = 37ms

    OpenVPN on server:
    Feb 18 16:34:28 openvpn[11737]: Inactivity timeout (–ping-restart), restarting
    Feb 18 16:34:28 openvpn[11737]: SIGUSR1[soft,ping-restart] received, process restarting
    Feb 18 16:34:29 openvpn[11737]: NOTE: the current –script-security setting may allow this configuration to call user-defined scripts
    Feb 18 16:34:29 openvpn[11737]: Re-using pre-shared static key
    Feb 18 16:34:29 openvpn[11737]: Preserving previous TUN/TAP instance: ovpns1
    Feb 18 16:34:29 openvpn[11737]: Listening for incoming TCP connection on [AF_INET]xx.xx.xx.xx:1197
    Feb 18 16:34:31 openvpn[11737]: TCP connection established with [AF_INET]xx.xx.xx.xx:1765
    Feb 18 16:34:31 openvpn[11737]: TCPv4_SERVER link local (bound): [AF_INET]xx.xx.xx.xx:1197
    Feb 18 16:34:31 openvpn[11737]: TCPv4_SERVER link remote: [AF_INET]xx.xx.xx.xx:1765
    Feb 18 16:34:31 openvpn[11737]: Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:1765
    Feb 18 16:34:32 openvpn[11737]: Initialization Sequence Completed

    As you can see, these logs show the initial connection but there is nothing after that.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.