@shoggy:
I was able to resolve this by recreating the firewall rule to pass traffic for the openvpn, beats me why it didnt work before.
When you use the OPENVPN Wizard, it ends up setting an automatically generated firewall rule on your WAN interface that lets VPN traffic in. See image.
It's a simple rule that lets UDP (I choosed UDP) traffic in on port 1194 (because that's my VPN port) on my WAN.
@shoggy:
I am not able to connect to the VPN and traffic flows both ways. I appreciate the effort Gertjan
You said it was resolved.
You are not able to connect, … and traffic flows both ways, which means you are connected.
I don't understand.
edit : what are your firewall rules on the Firewall => Rules => OpenVPN tab ?
edit again : I 'checked' https://www.sparklabs.com/support/kb/article/setting-up-an-openvpn-server-with-pfsense-and-viscosity/
It will work, but why including "8.8.8.8" as a DNS still puzzles me.
You saw this part :
19. Now accept the default firewall rules by checking both the Firewall Rule and OpenVPN rule boxes and clicking Next. These rules will allow your client to connect to the OpenVPN server and allow VPN traffic between the client and server.
and
Firewall
Firewall settings are generated automatically by the wizard. However, depending on your firewall setup and version, you may have to check the setting the wizard has created. First, navigate to Firewall -> Rules and select WAN. You should see a firewall rule permitting IPv4 traffic incoming through the WAN via the OpenVPN port. This will allow clients to connect to the VPN via the external WAN interface.
If you are having issues routing traffic through the VPN, navigate to Firewall -> Nat, select Outbound and ensure the Mode is set to "Automatic outbound NAT rule generation. (IPsec passthrough included)".
openvpndefault.PNG
openvpndefault.PNG_thumb