How to create an OpenVPN client to StrongVPN
-
Good tutorial.
Have anyone tried OpenVPN over dual WAN links. The setup here is specific on which interface is being used.
-
I would not advice adding persist-tun in 2.0
-
ermal, thanks for the heads up;
i have edited the how-to to reflect your advice -
Hello
Does any have StrongVPN working in pf 1.2.3 ?
Or can point me to a primer?
Thanks -
After section 1 all traffic is routerd true the VPN.
anyone got policy routing working ?
I would like to route netflix over vpn. -
after a factory reset (i screwed some thing up in squid) it works great.
Now i need some thing to route traffic over the vpn on url base.
i found this interesting setup:
http://webcache.googleusercontent.com/search?q=cache:EuMlcG_zcmIJ:www.shawnmolnar.com/blog/tag/hulu+hulu+netflix+script+vpn&cd=2&hl=nl&ct=clnk&gl=nl
( from google cache because the realsite is offline atm) -
After section 1 all traffic is routerd true the VPN.
anyone got policy routing working ?
I would like to route netflix over vpn.+1
-
after a factory reset (i screwed some thing up in squid) it works great.
Now i need some thing to route traffic over the vpn on url base.
i found this interesting setup:
http://webcache.googleusercontent.com/search?q=cache:EuMlcG_zcmIJ:www.shawnmolnar.com/blog/tag/hulu+hulu+netflix+script+vpn&cd=2&hl=nl&ct=clnk&gl=nl
( from google cache because the realsite is offline atm)Would this work on pfsense? Has anyone tried it?
-
After section 1 all traffic is routerd true the VPN.
anyone got policy routing working ?
I would like to route netflix over vpn.I believe I have commented on this several times. I use policy routing with an OpenVPN cert tunnel with StrongVPN (to make only some clients use the tunnel or by other filtering means, which can be adjusted at any time), using tunnel as "virtual WAN interface" and the tunnel has been up close to 9 months now, I believe.
I haven't taken the time to finish my guide yet though.
-
After section 1 all traffic is routerd true the VPN.
anyone got policy routing working ?
I would like to route netflix over vpn.I believe I have commented on this several times. I use policy routing with an OpenVPN cert tunnel with StrongVPN (to make only some clients use the tunnel or by other filtering means, which can be adjusted at any time), using tunnel as "virtual WAN interface" and the tunnel has been up close to 9 months now, I believe.
I haven't taken the time to finish my guide yet though.
This would be the guide that I would be looking forward to. I will try to figure out the tunnel as a virtual wan interface, but would love to see a guide on how to set this up. I couldn't figure it out and just got my refund from StrongVPN within their 7 days. I will sign back up if I can get this setup to work.
Thanks for the post.
-
I am a complete newbie on FreeBSD and pfSense, but managing to get pfSense installed and then STrongVPN going using the various site tutorials. Suddenly pfSense has become very valuable to me for high-speed VPN connection. So thanks to ERicab and all here
Does this thread need to be updated given this post:
http://forum.pfsense.org/index.php/topic,32640.0.htmlI made similar observations as ericab, as in that post
Enabling AON uunder Firewall, NAT, outbound seems to be what was suggested in the thread linked, and seemed to work for meShould this instruction be added to tutorial to get people up and running with most recent versions? - I dont know enough to know reliably one way or the other
Again thanks
Jeff -
After section 1 all traffic is routerd true the VPN.
anyone got policy routing working ?
I would like to route netflix over vpn.I believe I have commented on this several times. I use policy routing with an OpenVPN cert tunnel with StrongVPN (to make only some clients use the tunnel or by other filtering means, which can be adjusted at any time), using tunnel as "virtual WAN interface" and the tunnel has been up close to 9 months now, I believe.
I haven't taken the time to finish my guide yet though.
I know the guide is not ready yet, but can someone point me to another guide that would help me set up PFsense 2.0 with Strongvpn with the option of routing only some clients through the VPN while allowing others to go through the default gateway.
Thanks
-
Better performance & policy routing
Performance
I am using pfsense 2.0 RC1. In my case the settings below in the "Advanced Configuration" field of the OpenVPN connection tab are resulting in a more stable connection:verb 4; mute 5;tun-mtu 1500;route-method exe;route-delay 2;explicit-exit-notify 2;fragment 1300;mssfix 1450;
With these I can stream a lot more stable.
On the other hand I was interested in tunneling some clients to some ip addresses. It was quite an operation. I followed the guide above (thanks a lot to the author!) except the "all traffic through VPN" part.
Then I added a firewall rule to the LAN interface for a specific IP address to be routed through the OpenVPN . I figured out that after some time everything went through the WAN or through the VPN gateway (can't remember exactly which one). Additionally there was NAT didn't work as expected.
Fix NAT
I turned NAT off and added it manually. Firewall -> NAT -> Outbound : Add two entries there.Interface: WAN Source: CIDR of your LAN (e.g. 192.168.1.0/24) Description: LAN -> WAN (or anything you want)
Interface: VPN Source: CIDR of your LAN (e.g. 192.168.1.0/24) Description: LAN -> OpenVPN (or anything you want)
Fix rules/gateways
After this NAT was working again. But there was still the problem with the routing of all traffic through either or the other interface. Somehow it was ignoring my rule. After some gambling around with the setting I was pretty surprised that "default" as gateway doesn't seem to work as expected. So I added to all rules a specific gateway. Now everything is working as expected. phewMy "Default allow LAN to any rule " looks now like this:
* LAN net * * * WAN
For example if you want to route the client 192.168.1.5 through VPN you have to add the following line above the default rule:
* 192.168.1.5 * * * VPN
I hope this helps and is no complete bullshit. I'm an absolute newbie to pfsense.
-
hi smirta;
these additional options are specific to windows only.
i would suggest removing them.route-method exe
mssfix 1450 -
thanks for the input (and the great tutorial btw), eric. I'll have a closer look at the options
-
I hope this helps and is no complete bullshit. I'm an absolute newbie to pfsense.
That's ok for your typical home setup, but what you're actually doing there is overriding the fact that StrongVPN is pushing you a default route and modifying your firewall's routing table so it sends everything over the VPN (unless you override it with policy routing as you're doing). That will cause a number of issues with more advanced setups, as it's going to default to sending traffic initiated from the firewall out of the VPN which is usually going to be undesirable.
-
Thanks for your reply. As I updated to the latest snapshot everything became obsolete. You just have to follow the initial guide, disable the "automatic outbound NAT" (it will fill in the rules done so far) and modify the rules described as in my post above.
-
Thanks for your reply. As I updated to the latest snapshot everything became obsolete. You just have to follow the initial guide, disable the "automatic outbound NAT" (it will fill in the rules done so far) and modify the rules described as in my post above.
I have come back after some time away, but this remains an issue for me. Glad to hear that you have had some success, just wanted to get clarification on your current set up under the latest snapshot. Which of the above posts should I look to to establish a strongvpn connection for only 1 specific internal IP with all the other IPs going through the default gateway.
Thanks
-
hi yu130960;
A) go to Firewall –> Rules
B) select the LAN tab.
C) add a new rule with the following:
D) click save and your done
***Edit
ive fixed an error. -
Thanks post #1 and #15 solved my issue and I am up and running.
I had to make the Rule to put the the target IP in the source box not the destination and then it worked.
It took a while, but it is great to see it work.
Thanks to all in the thread.