• Security consideration (blocking internet access)

    Locked
    8
    0 Votes
    8 Posts
    5k Views
    M
    Thanks for the directive. Of course virus will go on my enterprise network if the client is already infected. But if someone can have a remote control of the client, at least he couldn't do it while the client is connected to the VPN.
  • StrongVPN as part of OpenVPN WAN setup [(partly) SOLVED]

    Locked
    7
    0 Votes
    7 Posts
    7k Views
    0
    Thanks very much for your reply. @GruensFroeschli: Sorry i dont have anymore the time to look at the forum as much as i used to ;) I use quite something similar as you want to connect my workplace with my home. I use this to redirect certain traffic i dont want to go over my workplaces network to my home. (private traffic from my iphone as an example). How i did this: Basically the same as you describe, however with some minor differences. I dont use a PKI. For site-to-site connections i just prefer private shared key setups. I use a PKI since that's what I get from the provider (StrongVPN), there's no option to use shared keys. Some other providers have it the other way around though. I redirect traffic not with the "redirect def1" but with my policy routing. I dont think what you are after is even possible while using "redirect def1". That was my thought too and that's why I tried to manually (while testing) remove the entries from shell (worked) and then use policy routing, but it didn't work all the way. Also you dont need two entried in the failover pool. A single entry is enough. (see screenshot). Ok Just set on the OPT-config page the correct IP like in the OpenVPN config and the corresponding gateway. As monitor i use the other side of the VPN. This is just a workaround from a previous version, with 1.2.3 you can assign the VPN tunnel as interface and thus select it as gateway directly Hmm yes that's what I've done, the VPN is an interface and much seem to work, I have incoming NAT and FW rules working through the tunnel from the outside too, and verified. Pretty cool. Means I could place my web server or whatever in Hong Kong :) and since IP is static I could add that as A record in DNS too. This is actually another reason why to use a PSK and not a PKI. In a PSK you can hardcode the IP you use in the config. In a PKI you can get dynamically a different IP when you have multiple clients. (of course you can use a client specific configuration). I get the same IP etc every time from StrongVPN, in fact that's part of this service, a static IP for the duration of that specific account. In my "custom options" i forced the site-to-site connection to "dev tun10" to ensure i always have the same dev when assigning the interface. Ahh, that may be practical. In the example screenshot below i redirect my Iphone on wireless over the VPN to my home. The normal policy routing rules apply. What i would do in your case: Get rid of the PKI and set up a PSK. Get rid of the failoverpool and use the gateway directly. Change the firewall rules to redirect traffic however you want. Thanks for your input, I will try and compare and do some testing. In this case (with this account) I will have to use the PKI though. There is the problem with dead peer though, if my tunnel stops working for some reason (has happened a few times, tunnel appear up but no traffic goes through) I need to like disable/enable to get it back up but until that is done the network would be effectively offline if I have entered the VPN gateway instead of 'default' in the FW rule. Maybe one could have a cron job running, pinging some VPN exit point IP and if no answer take down tunnel, bring back up and then remove those routing entries. I'm also a bit concerned about those problems with WAN-services, like OpenVPN, PPTP, they seem not to work while tunnel is up, even though port forwarded services work fine. I'll try to do some more testing on that too. Cheers,
  • Can only ping and see some clients?

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    jimpJ
    The Road Warrior config should be fine. If you can talk to anything at all on the LAN, it should all work – unless those stations which you cannot reach have something such as: 1. Local client firewalls on LAN systems which block ping or other services from outside your local subnet 2. Incorrect/different gateway set on the LAN system. 3. Some other routing or overlapping subnet issue on the OpenVPN client side.
  • Sit to site vpn and portforwarding

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    GruensFroeschliG
    I assume the site on which the camera is has it's own internet connection? The request TO the camera arrive correctly. The problem is, that the answer goeas directly to the cameras default gateway and not back over the VPN tunnel. What you can do is: Disable automatically generated rules for the VPN. Assign the VPN interface. Enable advanced outbound NAT and create a NAT rule for the VPN interface. –> Set as destination the IP of the camera. Like this , from the camera seen, the requests originate from the pfSense on the other side of the VPN tunnel --> The answer will go back over the VPN.
  • OpenVPN Question

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    GruensFroeschliG
    I suggest you take another look at the OpenVPN config-page ;) Your OpenVPN clients get an IP out of the pool you defined in the "Address pool" field on the OpenVPN config page. It's not possible to assign an IP based on the MAC because the OpenVPN interfaces are virtual and not real. If you want to use static IP's you can use the option "Use static IPs".
  • OPENVPN TAP Interfaces + pfsense 2.0 + blocking dhcp broadcast traffic

    Locked
    9
    0 Votes
    9 Posts
    10k Views
    R
    Will TAP interfaces be supported in pfSense 2.0 ?
  • Some questions about OpenVPN components….

    Locked
    6
    0 Votes
    6 Posts
    5k Views
    X
    @XZed: @jimp: You're probably better off following this for making keys/certs: http://doc.pfsense.org/index.php/Easyrsa_for_pfSense Well i remember have used easy-rsa for pfsense, at its beginnings… but it was still in "beta"... but it seems to be right now  ;D So, i'll give it a try and will feedback here  ;D ! Just a question : I suppose there isn't any package to backup folders (to backup easyrsa4pfsense folder) ? Well, winscp will be sufficient ^^ ! Thanks I replied to this old post in order to give some feedback : Indeed, the easyrsa package is very nice ! But, pfSense 2.x brings many nice changes to OpenVPN management (CRL missing in 2.x ?? How to do ?? Perhaps will be corrected in final version ?)  ;D ! Thank you
  • Viewing Currently Connected Clients

    Locked
    10
    0 Votes
    10 Posts
    6k Views
    jimpJ
    @mazzz86: I haven't the System > Packages menu. Maybe because I'm just testing it on a LiveCD… Packages are not available on LiveCD, so that would explain why you don't see it. You have to install to the HDD first and then you can install packages.
  • Problem accessing LAN from roadwarrior (SOLVED)

    Locked
    12
    0 Votes
    12 Posts
    6k Views
    M
    OK it works !!!!!  :) My last problem was an internal routing problem. So the solution seems to be : For clients running Vista or Seven, add those two lines at the end of your client configuration file : route-method exe     route-delay 2 Thank you for your help Jimp !! See you
  • Site-to-site to openwrt

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    M
    Here is the additonal screen captures. [image: pfsense3-tomato1.JPG] [image: pfsense3-tomato1.JPG_thumb] [image: pfsense3-tomato2.JPG] [image: pfsense3-tomato2.JPG_thumb]
  • OpenVPN reconnect delays

    Locked
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • Client tunnel cannot be closed down!

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • I need Help For This Setup

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    C
    God bless and take care                             –  ll_hellBoy_ll Wow. Does this forum support sigs? 'cause that brilliant and seemingly unintended use of irony needs to be remembered  8)
  • OpenVpn server on WAN and OPT1 (site-to-site only) [SOLVED]

    Locked
    6
    0 Votes
    6 Posts
    4k Views
    J
    Hi, do this post and this one tell the same thing ? http://forum.pfsense.org/index.php/topic,21941.msg112804.html#msg112804 GruensFroeschli, when you say in the other post: "With OpenVPN you have the ability to specify multiple servers and how to connect to them (balancing/failover)." is this achieved by "binding the OpenVPN server to both interfaces and do the failover in the OpenVPN client config" i.e "using the Custom options ? Thanks for your help
  • Pinging Certain Klients / Servers - (SOLVED)

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    G
    If you guys have this problem also and running Captive Portal remember thoose clients you need to connect to needed to be added to Allowed IP Adresses.
  • Bridging Issues custom option server–bridge not over riding server

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    C
    i've got exactly the same problem! "Options error: –server and --server-bridge cannot be used together" could anyone shed some light on this? i triple checked every setting and my custom option will not override the settings :( my custom settings dev tap0;server-bridge 192.168.2.254 255.255.255.0 192.168.2.218 192.168.2.250;tls-auth /etc/openvpn1196.key 0;management 127.0.0.1 1196;
  • 0 Votes
    2 Posts
    2k Views
    J
    First place is both the server and client logs.  Is there anything in either that indicates anything remotely out of the ordinary?
  • Run OpenVPN client on pfsense, allow lan PCs to use it

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    D
    @jimp: You can setup OpenVPN on pfSense under VPN > OpenVPN, on the clients tab. You can't selectively route traffic based on firewall rules (easily, yet) but you can route whatever subnets you like down the tunnel. Unfortunately I don't want to be sending all my web traffic to the vpn from any specific machine, I could very easily flood my work's dedicated VPN line (a T1 iirc) that would be bad  :D. I am perfectly willing to set up a proxy or something that would forward any traffic it receives to the OpenVPN connection, this does not have to be on the pfsense machine.
  • 0 Votes
    4 Posts
    4k Views
    E
    @jimp: Without a WINS server your options are severely limited. I've been trying to come up with a way to proxy/relay NBNS traffic across subnets/openvpn to see if it would work, but I haven't had any luck so far. Browsing won't work at all without WINS. The only way you might get \servername to work would be to add a DNS override entry for "servername" with its remote IP address in the DNS forwarder. Be sure the use your pfSense box's domain as the domain for this entry, then your clients should resolve it with "\servername" – It's ugly, but it works. Thanks for your help, I have try the method you mention, however, I cannot get it work…. . I already tick all of the three items under Services:DNS forwards Tab Add a Static Mapping under Status:DHCP leases tab However, I have not add a DNS servers under System:General Setup tab and also I have not install the tinyDNS becuase I seen the description mention that the tinyDNS is for failover purpose. Please let me know if I omit some important step. Thanks, Kam
  • Creating Extra Client Keys… Problems

    Locked
    4
    0 Votes
    4 Posts
    7k Views
    L
    Yeah i still have the original CA ;) I found the solution anyway, was a strange problem, heres a post I left on another forum: When looking at the ca.crt file, I noticed that after "State or Province Name (full name) [LONDON]:" there was "\x09": Subject: C=UK, ST=LONDON\x09, L=LONDON, O=OpenVPN This was seen as just some spaces when trying to build a key, however \x09 is actually hex for the tab key, I must have pressed it by mistake when first creating the ca file, so basically now when building client keys, i just type LONDON then hit tab, then enter. What I dont understand is how I managed to create the first 16 keys without pressing the tab key! Anyway, thanks
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.