• How can I limit the number of connections in openvpn

    Locked
    3
    0 Votes
    3 Posts
    4k Views
    jimpJ
    There is a box on the server config: Concurrent connections Specify the maximum number of clients allowed to concurrently connect to this server. That limits the how many total connections can exist to the server.
  • OpenVPN Routing to other sites - Solved

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    R
    Thanks for the reply. The windows firewall was disabled on the server. I've tried it in reverse, and that worked. tracert 10.0.101.3 Tracing route to W7WS [10.0.101.3] over a maximum of 30 hops:   1    <1 ms    <1 ms    <1 ms  172.28.1.1   2    41 ms    41 ms    40 ms  10.0.2.1   3    77 ms    76 ms    76 ms  W7WS [10.0.101.3] Trace complete. I then tried accessing a non Windows Server and that worked too. After a bit more hunting round (as I said it's a network that I've inherited very recently) there was a firewall enabled on windows servers at the remote sites by the Endpoint Security with trusted networks that didn't include the VPN Network.
  • OpenVPN tunnel through LAN and no WAN

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    P
    I have an example install like this. The real internet comes through a Tp-link ADSL router (also has WiFi builtin) to an internal network - 10.49.120.0/24. The TP-Link is 10.49.120.41/24 and also has its wireless enabled so people with WiFi devices can connect to the LAN. But DHCP on the TP-Link is turned off. The pfSense is an Alix box with just the WAN port connected to this internal LAN and has address 10.49.120.250/24, and default gateway 10.49.120.41 (the TP-Link). pfSense DHCP is enabled, it gives out a range of addresses 10.49.120.100-199/24 with itself as the gateway. Manual Outbound NAT is enabled, and a rule added so that traffic from the clients comes into pfSense and then is NAT'd out through the TP-Link to the internet. (see screenshot - last rule) The advantage of this is that the TP-Link sees all the traffic as originating from the pfSense WAN IP 10.49.120.250 - so when traffic comes back in response, it is routed back to the pfSense, which can "unNAT" it and deliver to the original client. This means that pfSense can work properly (traffic flow in both directions goes through it) and you can do whatever filtering there. The pfSense has OpenVPN clients connecting out to other offices. The DNS Forwarder has Domain Overrides added to refer internal names to other office DNS Servers for internal resolution. Because the clients on the LAN (which to this pfSense is WAN) are using pfSense completely as their gateway, they can happily talk internally to things across the internal OpenVPN links, or externally to the real internet. The pfSense does all that for them. The main requirement is that you have a way to NOT get DHCP from the current default gateway (equivalent of the TP-Link in this example) - either disable DHCP on the current default gateway, or manually configure IP on the clients that you care about, so they use pfSense as their default gateway and DNS. (Note: in the screenshot 10.49.122.0/24 is the pfSense LAN port - there is nothing connected to that, but it would work as another routable subnet if needed/useful) [image: IJP-Manual-NAT.png] [image: IJP-Manual-NAT.png_thumb]
  • Trying to connect to Network Share fails - tap works/tun fails

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Setup remote access: remote host not accessible

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    M
    Couple things: In the Cryptographic Settings section, make sure you have a Peer Certificate Revocation List listed If the remote host has a software firewall enabled, make sure it is configured to respond to icmp What is the IP of the machine you are coming from?  Make sure it's not on the 192.168.101.0/24 network
  • OpenVPn no longer working, maybe config damaged

    Locked
    6
    0 Votes
    6 Posts
    2k Views
    C
    It looks like my cluster configuration is somehow "crippled", the openvpn problem i have must be a collateral damage. I'll update as soon as i'll have resolved.
  • OpenVPN in load balancing/failover scenario

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    In that way, if HDSL link goes down, all services will be still reachable via VPN / WAN2 link, even WAN2 is a private/natted connection. yes probably Also, if the WAN2 link goes down, VPN can be activated via WAN1, and again all services are available on both public IP. this might be a little tricky … there is, by my knowledge, no way to "activate" an openvpn connection upon failure. two things that might be worth a shot: -run the openvpn client (pfsense) on a virtual ip on the LAN interface and use a failover group to decide what WAN interface the client should connect to the server <-- perhaps someone has done this allready -perhaps the vpn provider is willing to offer 2 seperate openvpn connection, attached to the same public-ip ? Do you think is it possible ?  How I can manage the VPN as a WAN3 ?  Have someone any other suggestion ? most of it yes, some detail are a maybe. assign an interface to openvpn (interfaces–>assign). Lots of folks will probably have suggestions about the details :)
  • [SOLVED] Bad openVpn client config ?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    S
    Solved : A /30 will only work if you set up this with a shared key. For site-to-site you should use a shared key. Yes you will have to set an interface IP, because with a shared key no routes/IPs/DHCP-settings/anything will be pushed from the server. The configuration is only what you put into the config file. The reason why a /30 with a PKI won't work: In a PKI you have the x.1 IP for the server. Every time a client connects a new dynamic /30 subnet is added to the virtual interface. So x.0/30 initial IP of the Server. x.4/30 first client (x.5 server, x.6 client) x.8/30 second client (x.9 server, x.10 client) etc. This ensures that the clients can talk only with the server and not with each other directly.
  • OpenVPN server listening on 1194 - my connections is not on 1194

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    A
    HA! I feel dumb now :) Thank you for the quick response, and for the link!
  • Openvpn and few subnets

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Route or Firewall issue? (Simple setup)

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    E
    Thanks, fixed.  I had to create both WAN and LAN rules specifying the correct gateway interface.
  • Openvpn 1.2.3-RELEASE to openvpn 2.0.2-RELEASE (i386)

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    The keys to operate the VPN are kept in config.xml and will upgrade. If you want to start managing the keys from the GUI rather than easyrsa, then see this: http://doc.pfsense.org/index.php/Using_EasyRSA_Certificates_in_2.x
  • Communicate across different Gateways

    Locked
    8
    0 Votes
    8 Posts
    2k Views
    P
    I have no experience in making an OpenVPN connection be NAt'd on arriving into the local LAN. Someone who has some idea (or can say why it is not possible), please feel free to advise!
  • Issue with accessing a server share from openvpn to the opt2 network

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • [SOLVED] Access intranet through VPN

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    C
    Thankyou, an entry in site B domain overrides pointing the domain to site B's DNS server did trick.
  • Multiple users - one OpenVPN server

    Locked
    8
    0 Votes
    8 Posts
    7k Views
    H
    @AlanMAC: Thanks guys! I did a write up, which is attached. Hopefully someone will find it useful. Thanks Much for the write up, i haven't tried it yet (will do in the coming days) appreciate the effort  ;)
  • Pfsense in a Linux Masquerade Network.

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • [SOLVED]Openvpn connects but no local lan access

    Locked
    14
    0 Votes
    14 Posts
    31k Views
    S
    Thanks again, you are my hero!
  • OpenVPN tap bridge works with 1st site, not 2nd.

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C
    Site to site VPNs should never be bridged, that's a bad network design that's begging for problems. Not related to the problem, but I'd stop trying to fix something that shouldn't be done, and put a proper routed setup in place.
  • Routing and Ping issue

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    A
    I have solved one issue.  To get Host C to route 10.224.34.0/24 over OpenVPN for the 10.111.79.0/24 network I had to go to make changes in the outbound tab (Firewall->NAT->Outbound).  I changed it to manual and added an OpenVPN rule. [image: ManualOutbound.png] However the issue were I can not pint 10.224.34.254 from the 10.111.79.0/24 network remains.  I believe this is probably due to some pfsense setting on that particular box.  Although I am not sure what else to move since I have already removed  "Block private networks" (Interfaces->WAN). Another issue that has since developed, is that I am sometimes able to ping and sometimes not if I turn on an OpenVPN Server on HOST C. For Instance if I am on any of the the computers on 10.111.79.0/24 , I can ping 10.224.34.2, 10.224.34.100, 10.224.34.107, and 10.224.34.109. If I then go to (VPN->OpenVPN-Server) and I enable the server. I will sometimes lose pings to some of the 10.224.34.0/24 IPs , but it's not permanent.  Randomly, they some times work.  If I keep trying to ping them at different times some IPs will reply.  During this setup however I can still SSH into any of those machines.  Which means OpenVPN is still sort of working.  There is nothing special about my server config, I did use a different tunnel network, Diffrent CA and certificates.  This is my personal office network that I would sometimes like to access when I am somewhere else. [image: sconf1.png] [image: sconf2.png] [image: sconf3.png] [image: sconf4.png]
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.