• OpenVPN - full vs split tunneling (vs Untangle 9.3)

    Locked
    8
    0 Votes
    8 Posts
    29k Views
    C
    The fact they're marketing "full tunneling" as some big deal feature, something you've been able to do with pfSense since day 1 OpenVPN was implemented ~7 years ago, really shows how desperate they are for marketing material. Welcome to last decade, Untangle!
  • OpenVPN firewall block

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    AhnHELA
    Has nothing to do with OpenVPN.  Most likely its your ISP's DHCP Server.  It can be safely blocked and a firewall rule created to surpress it from being logged.
  • Multiple tunnels, joining multiple sites at a 'hub'

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    S
    Thanks jimp - I got it working with multiple server endpoints on the one pfsense box. When time allows I'll look into the method you've listed to see if it offers any advantages, and I'll report back here with a comparison.
  • OpenVPN on ICS (Android 4, without root) - now even easier!

    Locked
    17
    0 Votes
    17 Posts
    11k Views
    C
    @jimp: Perhaps, the real fix is of course to not use spaces in CA/cert names to begin with, but either way, it should work with the quotes I thought. I do agree. Not sure why that one cert of mine had a space in it, none of the others do. As a linux user I don't normally use spaces.
  • Openvpn client connects but can only see 3 clients out of 50

    Locked
    15
    0 Votes
    15 Posts
    6k Views
    M
    I found it… the problem is with the iphone app "Bria" it has an option for using with VPN and by default this was disabled. After enabling it .. everything works like magic :D
  • Open VPN

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    S
    @heper: the command line is no longer needed for openvpn if you use pfsense 2.0.x (there is a client exporter package available to create a setup for windows/osx clients) So what do I do just install the open vpn package on my router and follow the promts to connect my laptop? If you could walk me through this that would be great.
  • Two local networks

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    A
    Just tried this and the``` push "route 10.0.2.0 255.255.255.0" I can now reach both subnets from my client….. :-)
  • OpenVPN requirements…

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    C
    yes
  • 0 Votes
    24 Posts
    9k Views
    C
    I'm locking this thread as the promotion (mostly deleted, from users with only 1 post) is getting out of hand, smells fishy and this isn't a place for random consultant advertisements.
  • Timeout?

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • 0 Votes
    16 Posts
    18k Views
    P
    Issue is with the DD-wrt NAT, but DD-wrt forum is not the friendliest place on earth :-) So I was wondering if anyone here can give a helping hand with DD-WRT nat….
  • OpenVPN - NAT - DMZ

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    N
    Hi Heper, You have found my error ! I forget to change de gateway in the firewall rule. Thx
  • OpenVPN Rules and DNS

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    W
    <smacks head="">  Thank you!  Worked perfectly.</smacks>
  • OpenVPN peer to peer routing

    Locked
    10
    0 Votes
    10 Posts
    8k Views
    Y
    Just to update. This does work, but there was a client configuration issue - I had –tls-client but this doesn't imply or --pull (--client does), which is required in order to pull routing information from the server. Adding --pull to the client connection command solved the problem.
  • OpenVPN with DUO Security Authentication Proxy and Active Driectory

    Locked
    2
    0 Votes
    2 Posts
    5k Views
    A
    OK, I think I found the problem - two of them actually, and theese have to be solved before the OpenVPN would work or further troubeshooting can be done. First issue turned out to be CentOS having a builtin firewall ( ::)) Quite embarrased I dind't catch that earlier actually. I've opened the ports now - atleast an easy solve. :P Next issue is way more major. It seems the entire Duo Auth Proxy service is not working. It was built and installed following a procedure from Duo Security (to the letter) and there were no errors - nevertheless, the service says it's running, but it's actually not listening. - There is nothing on the server listening on port 1812. Running "netstat -plant" shows nothing on port 1812 - and telnet'ing to the server on port 1812 - gets me no connection…. So actually the problem with VPN not authenticating is quite understandable, as the RADIUS is not listening for it's requests! :-\ I've sent an supportticket to Duo Security, and I'm awaiting their response.
  • MOVED: Repeating disconnect and connect on 2.1 BETA0

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • How to use broadcast service over OPENVPN

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    For that, both sides would have to be in the same subnet, and you'd need to setup OpenVPN for a tap bridge. It's been discussed many times here on the forum, search a bit and you'll find it.
  • OpenVPN site to site - no joy- VPN up but no talk

    Locked
    6
    0 Votes
    6 Posts
    9k Views
    H
    entering the remote an local networks on both ends should do the trick for simple site-2-site vpn's using openvpn. i've done this a dozen times without fail
  • Cant pass traffic between VPN tunnels

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN Shared Key Bridged Site-to-Site Strangeness

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    P
    You're not alone, but using Shared Key is a REALLY BAD IDEA.  Use Certs and create the tunnel that way.  On the openvpn server, allow the clients to contact each other. Another interesting question I have to ask is why Bridge?  It just causes unnecessary traffic.  If you need to Access Windows shares, either call them by IP or better yet, set up a NetBios Server. Bridging has it's uses, but you're eating bandwidth for absolutely no reason. Pre-shared key is a bad idea as there is no real way to transmit the preshared key successfully unless you pre-encrypt the file and that can be done with AES crypt. Remember Deep Packet Inspection will be able to see the key. (If they are monitoring for that).. If they have the key, they can snoop.  Not exactly secure.  Defeats the purpose of VPNs. Lots of VPN and cloud info. :) Read more on my blog about these issues:  http://swimminginthought.com Cheers.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.