• HAVP and OpenVPN?

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • [solved]Problem with connection to Lan via RoadWarrior

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    C

    solved my problem, many thanks  ;) .

  • Clear ALL OpenVPN settings in pfSense

    Locked
    4
    0 Votes
    4 Posts
    5k Views
    J

    UPDATE:

    After re-watching the video, I decided to delete the user I had before and re-created it.

    Everything worked like a charm after that!

    Any admins may mark this as solved.

  • Open VPN and multiple sites

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    D

    Let me try to see if I understand you correctly. Which one is it:

    you want to replace IPsec with OpenVPN for a network topology consisting of 3 sites, each of which will be communicating directly with the other two, or you want to keep the current IPsec VPN setup, and just add a OpenVPN remote-access functionality (so that people can connect from e.g. home) to the main site, but you also want remote workers to be able to connect to LAN IPs at all three sites.

    In the first case,  keep in mind that you can't have a fully-routed topology and use both IPsec and OpenVPN at the same time.

    In the second scenario, you'd need to add IPsec P-2 entries for the OpenVPN roadwarrior subnet at both site-1 and site-3, and push appropriate routes to your OpenVPN clients (assuming you're not redirecting all their traffic to go via the VPN).

  • Tunnel Netmask must be /31?

    Locked
    8
    0 Votes
    8 Posts
    3k Views
    C

    yes they do.

  • Site-to-site OpenVPN with Certificates - best practice

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ

    Just make one CA for each "class" of VPN.

    One just for the site-to-site.

    Separate ones for each remote access that has a different set of access restrictions.

    Trying to do a large structure and intermediates is just over-complicating it for very little, if any, benefit.

  • Add some more routes to OpenVPN exported profiles for Mac and Win

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    P

    Thank you so much! :)

  • How do I set up this?

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • OpenVPN with many sites and home users

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Openvpn site to site problem

    Locked
    8
    0 Votes
    8 Posts
    3k Views
    N

    I think the netmask of the tunnel network needs to be /31 please give it a try.

    @cdc1975:

    Thanks for your help.

    ping from pfsense1 lan interface –-> pfsense2 lan-client OK
    ping from pfsense2 lan interface ---> pfsense1 lan-client OK
    ping from pfsense1 lan-client ---> pfsense 2 lan-client OK
    ping from pfsense2 lan-client ---> pfsense 1 lan-client OK

    From the pfsense1 or 2 is all ok! I can ping or ssh every machine in the 2 network.

    The problem is only when from a computer in one network i need to access to a computer in the other network.

    ping from a server in lan 1 --> to a server in lan 2 NOT OK
    ping from a server in lan 2 --> to a server in lan 1 NOT OK

  • 0 Votes
    2 Posts
    1k Views
    T

    Upgrading to snap shot solved this problem.
    2.0.3-PRERELEASE (amd64)
    built on Sat Feb 9 21:12:53 EST 2013

  • 2 VPN servers, no connection A-to-B while B-to-A is connected

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    M

    The problem was what I was suspecting. I had to create a rule that did not use a static port for destinations with port 1194. I then moved it in front of the rest of the LAN to WAN NAT settings.

  • OpenVPN TAP/Bridged with Win7\. All connects but not routing

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    F

    I have TUN working so will stick with this for now and will revisit when pfsense 2.1 is released.

  • Vpn roles

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    J

    Could you use 'client specific overrides' to give specific IP addresses to each user, then standard rules to restrict access?

  • Issues connected ipsec network to openvpn network

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    P

    In the Main Site OpenVPN Server Advanced box add:

    push "route 192.168.3.0 255.255.255.0"

    That will tell your OpenVPN road warriors about the route to East Coast.
    In the East Coast config, you will also need to tell it that the road warrior subnet (192.168.1.0/24) is reached across the IPsec link to Main - then East Coast can route/reply back to Road Warrior. I don't use IPsec, but I guess that will be easy.
    If you have restrictive firewall rules on OpenVPN or IPsec then you will need to modify those to pass packets to/from all 3 subnets.

  • Site To Site VPN consideration

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    T

    @phil.davis:

    It should work. Once the OpenVPN tunnel establishes, the routing table at 21x.x.x.x will have an entry for 195.x.x.x/n that will send those packets across the tunnel. Similarly the routing table at 195.x.x.x will have an entry for 21x.x.x.x sending those packets across the tunnel.
    Once the user packets between 21x.x.x.x<->195.x.x.x are in the tunnel, they are encapsulated and encrypted inside OpenVPN packets. Routers on the real internet only see the OpenVPN tunnel endpoints as source/destination.
    It will be transparent to the users at either end. and internet routers can't see the details of the user packets encrypted inside the OpenVPN tunnel comms.

    Thanks
    Cheers  :)

  • Force Specific Traffic Over VPN

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H

    easiest way todo that would be to assign an interface to the openvpn-connection. (in the interface config set type to "none")
    after you assigned an interface you should duplicate the firewall rules from the openvpn connection to the new OPT interface.

    then restart the openvpn service.

    pfsense should automagically create a gateway for the new OPT interface; now you can set that gateway in your lan-firewall rule to direct certain traffic over the openvpn

    enjoy

  • Bypassing openvpn client

    Locked
    2
    0 Votes
    2 Posts
    4k Views
    jimpJ

    Policy routing in the firewall rules. Make a rule at the top of the LAN rules to pass to/from that and select the WAN gateway.

  • [SOLVED] Bridged LAN - Interface to listen for local VPN?

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    S

    podilarius, yeah, I had bridge0 assigned. But I have changed everything (still new to pfSense and throwing configs around) and just accomplished one of my goals: having a seperate, public AP (OPT1) with VPN routing to my LAN. samba isn't working in this setup yet but that's next. :)

  • OpenVPN tap bridge not working

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    V

    Im upping this… no clue anyone?

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.