• OVPN reports up, but cannot route between site-to-site

    Locked
    11
    0 Votes
    11 Posts
    6k Views
    K
    The problem with the route is that when the openvpn tunnel is up, traffic destined to the remote network should be going to tunX interface, not the normal gateway. This is what I have on my pfsense box that is a client on a site-to-site tunnel, my local LAN is 192.168.13.0/24, remote LAN is 192.168.42.0/24, transfer net is 10.13.42.0/24. Destination Gateway Flags Refs Use         Mtu Netif Expire 192.168.42 10.13.42.1 UGS 0 32133 1500 tun1 (tun1 because tun0 is used by another site-to-site tunnel) At the other end (the server): 192.168.13 10.13.42.2 UGS 0 1000282 1500 tun1 (tun1 in this case because the other end also has a server for roadwarriors at tun0)
  • VPN communication with each other and main site

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C
    Wow - I need sleep.  Thanks for pointing that out…
  • OpenVPN client thru non-default Gateway?

    Locked
    5
    0 Votes
    5 Posts
    11k Views
    B
    I have the same problem, I try to use an static route with the server ip connection (openvpn) but when I go to system logs - openvpn, I see the gw of wan1, I don´t know how to use the gateway of wan2 with openvpn (client side). Somebody help? Sorry for my bad english…...
  • OpenVPN between pfsense and WRT54G

    Locked
    4
    0 Votes
    4 Posts
    10k Views
    C
    i know this is not recommended but i am using the same setup for pfsense as a server and the ddwrt as the client. is there any way that i can just assign an (vpn ip) to the ddwrt and then set a static route of 192.168.1.0/24 and use the vpn ip as the gateway? i would like to do this because i really like the fact that the ddwrt is a good platform for soho but a real pain in the ass to get the right syntax in for vpn site to site connect.
  • Pfsense and openvpn for new users tutorial <– with Site-To-Site now

    Locked
    37
    0 Votes
    37 Posts
    63k Views
    GruensFroeschliG
    I already mailed him. No answer. In the meantime you can find it here: http://www.pfsense.org/mirror.php?section=tutorials/openvpn/pfsense-ovpn.pdf Also note that on page 21 is a typo. The field "Interface IP" should be 192.168.10.0/24 and NOT 192.168.1.0/24
  • OpenVPN Client/User Management?

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    GruensFroeschliG
    Your questions have already been answered in the forum before. To summarize: Key managment should come in a future version. Until then you have to do it manually. Read the sticky to that. You can revoke single clients with the CRL (look at the webinterface for that and read about it on http://openVPN.net ) pfSense is not much else than a GUI to the creation of the server-config-files. I you really want to use it you wont come around knowing how OpenVPN works. OpenVPN can run in two "modes". Shared Key and PKI. In a shared key setup you connect two computers. Not more. This is for site-to-site. In a PKI every client has his own key and vertificate. (you cant have the same key for multiple clients) This is for a RoadWarrior setup.
  • Openvpn Multi-Wan failover

    Locked
    2
    0 Votes
    2 Posts
    5k Views
    M
    Why don't you put all the addresses of your pfSenses (the main and the failover backup) into the configuration of your clients? Then the client would just try to connect one server after the other until it works. You can even tell the client to randomly choose an IP to connect (which would more look like loadbalancing).
  • Road warrior on port 1194 and 1195

    Locked
    12
    0 Votes
    12 Posts
    7k Views
    B
    Ok I wont….... Thanks for all your help. hockey ;D
  • OpenVPN on Multiple Ports

    Locked
    4
    0 Votes
    4 Posts
    20k Views
    A
    While I can't speak specifically to running multiple instances of OpenVPN, as someone who runs sshd on 80, 443, and 5190 (AIM; Continental Airlines used to allow 5190 through to any address, not just AOL), I can suggest that you want to move the management interface to another port and run an OpenVPN listener there - places that are big on the walled garden often have cacheing proxies in the middle for http (https is impractical to proxy, so it is more likely to go straight through). -rob
  • Site-to-Site VPN need to access network openvpn server is on through VPN

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    GruensFroeschliG
    Then I added a 64.208.129.0/24 route with the OpenVPN link as the gateway. I wouldnt add routes like these static. You can just add the -route command to your config. OpenVPN adds these routes dynamically when the tunnel comes up and removes them when it goes down.
  • Where do i insert the password of the vpn ?

    Locked
    7
    0 Votes
    7 Posts
    3k Views
    A
    I have discovered that the password is needed for the decryption of the private key(my private key, the file with .key extension). So i have removed the password with a tool. Now, using OpenVPN it does not request a password to connect. so, i'm trying to configure pfsense but it does not work ! On the logs of pfsense i see this [image: pfsensewi7.jpg] any idea ? thank you PS:I have noticed that my .key file begin and end with –--BEGIN PRIVATE KEY-----, instead pfsense need a key with ----BEGIN RSA PRIVATE KEY----. Trying to copy and paste my key it does not work, so i have added the word RSA.
  • OpenVPN Nat trouble

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    S
    @Cry: You should have searched the forum… Currently there is no way of applying NAT or firewall rules to the OpenVPN traffic.  ISTR that this will change in 1.3, but you should search the forum for details. I assume I can make openvpn run an "up" script that creates things behind the scene to do this, though I haven't tried yet.
  • MultiWAN and OpenVPN

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    W
    If you dont do anything, the openVPN server will bind to all interfaces to which it can bind. Can you view the Bindings anywhere?
  • OpenVPN server and PPTP clent simultanious usage leads to pfSense hang

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN server/client route messed up

    Locked
    8
    0 Votes
    8 Posts
    5k Views
    GruensFroeschliG
    I'm sorry. I didnt read right. kpa describes it a bit better than i did :) What i mean: in a shared key setup: you have on the server-log something like openvpn[2560]: /sbin/ifconfig tun0 172.16.40.1 172.16.40.2 mtu 1500 netmask 255.255.255.255 up and on the client something like openvpn[2560]: /sbin/ifconfig tun0 172.16.40.2 172.16.40.1 mtu 1500 netmask 255.255.255.255 up While in a PKI setup the client usually has something like openvpn[2560]: /sbin/ifconfig tun0 172.16.40.6 172.16.40.5 mtu 1500 netmask 255.255.255.255 up
  • OpenVPN Road Warriors and determining assigned VPN IP's

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    H
    Yes, making the client use the company dns through the tunnel should usually be enough.
  • Openvpn fails while using CARP?

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    F
    Yes, I saw this today. I edited the configuration today and made a mistake. I moved it to the previous configuration but I still had the same problem. I redid the vpnconfig from source, I reconfigured the Rule and I found a bug in my config (one device used a gateway who wasn't anymore in use). I managed to get it working. So it was a silly mistake of me. Thank you anyway for the help.
  • Tunneling all WAN Traffic Over OpenVPN that Connects from WAN?

    Locked
    10
    0 Votes
    10 Posts
    6k Views
    GruensFroeschliG
    Thats the way openVPN in routing PKI mode behaves. rtm on http://openVPN.net
  • Cannot Wake On Lan from OpenVPN

    Locked
    2
    0 Votes
    2 Posts
    7k Views
    H
    Wake on lan won't work for routed subnets. You have to be in the same layer2 subnet. Version 1.3 will have a user manager where you can add webgui users with specific rights (for example only access to the wake on lan page). This way you could allow your users to wake up the machines from the webgui. Just had a weird thought but maybe it will work: enable the captive portal at an interface that you don't use (could be even a vlan). generate and upload a php page that has the remote machines listed and that uses the php script to wake up the clients (just copied a link from a client that I created in my webgui): services_wol.php?mac=01:23:45:67:89:00&if=lan "mac" is obviously the macadress of the client and "if" the interface name that the client sits behind. You also could try to just embedd the code of services_wol.php in your page. users can access the page by going to http://<captive-portal-interface-ip>:8000. You can make that easier by adding some nice dns name like "http://caffeine:8000"  ;) For this to work make sure that you route the traffic to the captive portal IP through the tunnel as well. Btw, if you get this working please provide the code of the php page that you use for your captive portal  :)</captive-portal-interface-ip>
  • Problem with VPN since upgrading to 1.2 final

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.