• WAN Rule blocking access to VPN

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    J
    Thanks. I got it to work when I rebooted pfSense. Not sure why that needs to happen.
  • Possible OpenVPN feature?

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Openvpn routing to ipsec

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    Z
    Hi, tnx for the quick answer, i've just tried to set openvpn with the remote subnet as you say, but the problem remain. Still no routing… probably i'm missing some settings on the openvpn server to route traffic of the openvpn tunnel through the ipsec tunnel. I'll investigate a little more  (or could give a try to pptp  :-\ ) Yes, I know that with the actual config only local office (192.168.200.0/24) can access through every other subnet, but for now is what we want. Do you think this could be a problem for the mobile user? tnx for your help PS: does anyone know if it's possible do configure openvpn client with username/password?
  • New at openvpn

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    I think OpenVPN can accomodate your needs. pfSense provides a wonderful implementation of OpenVPN. There are still some kinks to be ironed out, namely the firewall rules for the OpenVPN interface, but they will get it working. Regardless, it works anyway with some manual steps. I recommend that you go to www.openvpn.net and read-up on OpenVPN before jumping into it. It is a very powerful and versatile package and along with that comes a bit of a learning curve.
  • Not connecting through Openvpn

    Locked
    4
    0 Votes
    4 Posts
    7k Views
    J
    @fernandotcl: @moffl: Dec 23 05:38:27 openvpn[371]: WARNING: 'ifconfig' is used inconsistently, local='ifconfig 192.168.30.1 192.168.30.2', remote='ifconfig 10.190.115.1 10.190.115.2' @jette: Jan 19 09:49:40    openvpn[377]: WARNING: 'ifconfig' is used inconsistently, local='ifconfig 10.0.10.1 10.0.10.2', remote='ifconfig 10.0.200.1 10.0.200.2' Your address pool must be the same in both client and server. Thanks a lot for your reply.  The problem is fixed now.  But I still have problem in accessing the remote network.  I can ping 10.0.200.253 in the firewall (10.0.100.254) but I can't ping 10.0.200.253 in my lan (10.0.100.0/24).  Is there anything I missed in the setting?  Thanks a lot. Regards, Jette
  • ICMP through OpenVPN

    Locked
    6
    0 Votes
    6 Posts
    7k Views
    H
    @sullrich: @Helix26404: There IS a way to directly configure OpenVPN firewall rules, but it's not widely known nor talked about. It's through the LAN interface. Make a firewall rule on the LAN interface that is specific to this particular situation and put it on top. See if that helps. Most likely because that only handles one side of the conversation.  We do not talk about it because its not a real fix. Unless you control both ends of the tunnel you will feel secure but the oppisite is true.  Therefore we simply say there is no firewall rules possible on 1.0 across OpenVpn and IPSEC tunnels, but, we are working on this. Gotcha. So this is why anyone in the remote network can access anything in the local network (pfSense-side if we're assuming it's the server) provided the routes are set up correctly on the client-side. I was racking my brain trying to figure out why I could get traffic IN through the tun0 interface, but I couldn't get OUT unless I was using the pfSense box itself. At first I thought it was a route issue, but then realized that the firewall was locking it down. Setting up explicit rules permitting traffic from any source to destination OPVN interface and destination OPVN remote network did the trick. Thanks for the elaboration from the "inside". :)
  • Can someone tell me what this means?

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • OpenVPN executable

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    N
    at the terminal, type: which openvpn
  • 0 Votes
    2 Posts
    12k Views
    H
    Nice, I'll link it from the tutorials site later when I get time. Thanks!
  • OpenVPN not reliable, use VPNCHECK

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    S
    Look in the package area.  There is a rc.d thread that is a sticky.
  • Configuration Question

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Questions regarding openvpn

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    M
    thanks I read the stickys and searched but didn't come up with those answers. i have a openvpn connection running.
  • Problems routing all traffic through tunnel

    Locked
    15
    0 Votes
    15 Posts
    9k Views
    T
    @dairaen: cheers, tpunder, could you please send me or upload a screenshot of your working outbound NAT rules so i can add them to the tutorial? thanks. kind regards dairaen No problem, I just sent a PM with a screenshot.
  • Latest snapshot 12-11 and OpenVPN server

    Locked
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • Shared Key Invalid?

    Locked
    2
    0 Votes
    2 Posts
    7k Views
    B
    Follow this nice tutorial http://www.uplinksecurity.de/data/pfsense-ovpn.pdf
  • Multiple PFsense openvpn clients connecting to one PFsense openvpn server

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    T
    me to :) (ipsec is easy) but i want it with Openvpn
  • Securing WLAN with OpenVPN

    Locked
    13
    0 Votes
    13 Posts
    7k Views
    T
    If I'm understanding what you want…. On your WLAN... only create a rule to allow the OVPN connection. Then you'll push DNS,WINS, and GATEWAY via OVPN also add a push route to your LAN, if you want a connection there.
  • Pfsense and other firewalls

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    H
    I haven't used openvpn yet but I have several locations running ipsectunnels. Biggest network consists of 12 locations that are all connected to each other through the mainoffice (only location that has a static IP) which acts as vpn concentrator. This setup is only using pfSense's everywhere. I also have another setup where a pfSense CARP cluster has VPN connections to a cisco pix, another pfSense and a sonicwall. Everything works smooth :-) For some examples how to configure the non pfSense systems see http://doc.m0n0.ch/handbook-single/#Example.VPN . Before you start to set this up you need to do some subnetcalculations. If you use IPSEC for that and need the remote locations to talk to each other through the central location you need to use some bigger subnetmasks at the central unit.
  • Connected Users

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    S
    Someone was working on a status page.  Search the forum.
  • Site 2 site vpn question

    Locked
    8
    0 Votes
    8 Posts
    5k Views
    T
    the site 2 site is very simple to set up (with the pdf document)…. but is it also possible to connect 3 pfsense client machines to one openvpnserver-pfsensemachine and routed the networks behind the 3 pfsense machines......(i don't want to open to much external (firewall) ports PC1                                              PC2       |                                                | NETWORK1                                NETWORK2                                NETWORK3       |                                                |                                          | OPENVPNCLIENT1                    OPENVPNCLIENT2                        OPENVPNCLIENT3       |                                                |                                          | PFSENSE1                                  PFSENSE2                                  PFSENSE3       |                                                |                                          |     ---------------------------------------------------------------------                                                       |                                                                                    OPENVPNSERVER                                                 PFSENSE4                                                       |                                                       PC3 So that PC2 can ping PC1 and PC3 and PC3 can ping PC2 and PC1 and PC1 can ping PC2 and PC3
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.