How to create an OpenVPN client to StrongVPN
-
after a factory reset (i screwed some thing up in squid) it works great.
Now i need some thing to route traffic over the vpn on url base.
i found this interesting setup:
http://webcache.googleusercontent.com/search?q=cache:EuMlcG_zcmIJ:www.shawnmolnar.com/blog/tag/hulu+hulu+netflix+script+vpn&cd=2&hl=nl&ct=clnk&gl=nl
( from google cache because the realsite is offline atm)Would this work on pfsense? Has anyone tried it?
-
After section 1 all traffic is routerd true the VPN.
anyone got policy routing working ?
I would like to route netflix over vpn.I believe I have commented on this several times. I use policy routing with an OpenVPN cert tunnel with StrongVPN (to make only some clients use the tunnel or by other filtering means, which can be adjusted at any time), using tunnel as "virtual WAN interface" and the tunnel has been up close to 9 months now, I believe.
I haven't taken the time to finish my guide yet though.
-
After section 1 all traffic is routerd true the VPN.
anyone got policy routing working ?
I would like to route netflix over vpn.I believe I have commented on this several times. I use policy routing with an OpenVPN cert tunnel with StrongVPN (to make only some clients use the tunnel or by other filtering means, which can be adjusted at any time), using tunnel as "virtual WAN interface" and the tunnel has been up close to 9 months now, I believe.
I haven't taken the time to finish my guide yet though.
This would be the guide that I would be looking forward to. I will try to figure out the tunnel as a virtual wan interface, but would love to see a guide on how to set this up. I couldn't figure it out and just got my refund from StrongVPN within their 7 days. I will sign back up if I can get this setup to work.
Thanks for the post.
-
I am a complete newbie on FreeBSD and pfSense, but managing to get pfSense installed and then STrongVPN going using the various site tutorials. Suddenly pfSense has become very valuable to me for high-speed VPN connection. So thanks to ERicab and all here
Does this thread need to be updated given this post:
http://forum.pfsense.org/index.php/topic,32640.0.htmlI made similar observations as ericab, as in that post
Enabling AON uunder Firewall, NAT, outbound seems to be what was suggested in the thread linked, and seemed to work for meShould this instruction be added to tutorial to get people up and running with most recent versions? - I dont know enough to know reliably one way or the other
Again thanks
Jeff -
After section 1 all traffic is routerd true the VPN.
anyone got policy routing working ?
I would like to route netflix over vpn.I believe I have commented on this several times. I use policy routing with an OpenVPN cert tunnel with StrongVPN (to make only some clients use the tunnel or by other filtering means, which can be adjusted at any time), using tunnel as "virtual WAN interface" and the tunnel has been up close to 9 months now, I believe.
I haven't taken the time to finish my guide yet though.
I know the guide is not ready yet, but can someone point me to another guide that would help me set up PFsense 2.0 with Strongvpn with the option of routing only some clients through the VPN while allowing others to go through the default gateway.
Thanks
-
Better performance & policy routing
Performance
I am using pfsense 2.0 RC1. In my case the settings below in the "Advanced Configuration" field of the OpenVPN connection tab are resulting in a more stable connection:verb 4; mute 5;tun-mtu 1500;route-method exe;route-delay 2;explicit-exit-notify 2;fragment 1300;mssfix 1450;
With these I can stream a lot more stable.
On the other hand I was interested in tunneling some clients to some ip addresses. It was quite an operation. I followed the guide above (thanks a lot to the author!) except the "all traffic through VPN" part.
Then I added a firewall rule to the LAN interface for a specific IP address to be routed through the OpenVPN . I figured out that after some time everything went through the WAN or through the VPN gateway (can't remember exactly which one). Additionally there was NAT didn't work as expected.
Fix NAT
I turned NAT off and added it manually. Firewall -> NAT -> Outbound : Add two entries there.Interface: WAN Source: CIDR of your LAN (e.g. 192.168.1.0/24) Description: LAN -> WAN (or anything you want)
Interface: VPN Source: CIDR of your LAN (e.g. 192.168.1.0/24) Description: LAN -> OpenVPN (or anything you want)
Fix rules/gateways
After this NAT was working again. But there was still the problem with the routing of all traffic through either or the other interface. Somehow it was ignoring my rule. After some gambling around with the setting I was pretty surprised that "default" as gateway doesn't seem to work as expected. So I added to all rules a specific gateway. Now everything is working as expected. phewMy "Default allow LAN to any rule " looks now like this:
* LAN net * * * WAN
For example if you want to route the client 192.168.1.5 through VPN you have to add the following line above the default rule:
* 192.168.1.5 * * * VPN
I hope this helps and is no complete bullshit. I'm an absolute newbie to pfsense.
-
hi smirta;
these additional options are specific to windows only.
i would suggest removing them.route-method exe
mssfix 1450 -
thanks for the input (and the great tutorial btw), eric. I'll have a closer look at the options
-
I hope this helps and is no complete bullshit. I'm an absolute newbie to pfsense.
That's ok for your typical home setup, but what you're actually doing there is overriding the fact that StrongVPN is pushing you a default route and modifying your firewall's routing table so it sends everything over the VPN (unless you override it with policy routing as you're doing). That will cause a number of issues with more advanced setups, as it's going to default to sending traffic initiated from the firewall out of the VPN which is usually going to be undesirable.
-
Thanks for your reply. As I updated to the latest snapshot everything became obsolete. You just have to follow the initial guide, disable the "automatic outbound NAT" (it will fill in the rules done so far) and modify the rules described as in my post above.
-
Thanks for your reply. As I updated to the latest snapshot everything became obsolete. You just have to follow the initial guide, disable the "automatic outbound NAT" (it will fill in the rules done so far) and modify the rules described as in my post above.
I have come back after some time away, but this remains an issue for me. Glad to hear that you have had some success, just wanted to get clarification on your current set up under the latest snapshot. Which of the above posts should I look to to establish a strongvpn connection for only 1 specific internal IP with all the other IPs going through the default gateway.
Thanks
-
hi yu130960;
A) go to Firewall –> Rules
B) select the LAN tab.
C) add a new rule with the following:
D) click save and your done
***Edit
ive fixed an error. -
Thanks post #1 and #15 solved my issue and I am up and running.
I had to make the Rule to put the the target IP in the source box not the destination and then it worked.
It took a while, but it is great to see it work.
Thanks to all in the thread.
-
Hey guys,
I hate to drag this post out of the depths - it's better than starting a new thread when this is exactly the topic I need help w/, but I'm dying here. I've been using pfsense boxes for about 4 years but that, by no means, should be read to suggest that I know what I'm doing. I know very little, unfortunately and what I do know is probably wrong.
I've followed this exact tutorial before w/ success, but I think some things have changed in recent releases causing me to…basically, have to make changes to things I don't really understand. I am using 2.0-RC2 (i386) - Built on May 18th.
Here's the basic situation. I live in China and have 5 VPN accounts for business purposes as well as getting anything done here. 3 Are specifically for work in different locations and 2 are for play and backup. One of those is an OpenVPN account w/ StrongVPN.
My home network looks like the following:
A pfsense box built around 5 nics, each separting an area in my home
_**- 1 WAN Nic
- 1 LAN Nic (my office computer)
- 1 Wifi Nic, dedicated to a wireless router - DD-WRT
- 1 Media - goes to my tv an entertainment system
- 1 VOIP - use a voip phone/adapter for business. DMZ'd basically…**_
I know that seems like overkill, but I really like to dedicate the NICs to each work area/task and I can really see the separation when it comes to data usage - plus I like to keep track of what the Chinese government is doing to my network.
My Media section of the house is really where Im dying. I have an Xbox, AppleTV, Computer, Wii all attached to a Hub that all goes into the media nic. Needless to say, to really be able to use these gaming and entertainment boxes, I really need these all to be connected to a VPN. Thus this tutorial. I'd like to keep the other segments off the VPN because I have PPTP accounts that I use for my 3 home computers that are much faster.
So here's where I'm having issues. I follow this tutorial to a T, get the VPN to connect, set up the firewall rule to pass the VPN data to the WAN data, just like is mentioned in the tutorial… and nothing! I set the VPN up as a DHCP interface like the review asks for but I still get NOTHING across the board. At the point I'm not even connected to the WAN. I don't have any firewall rules infront of the VPN gateway rule. I'm at a complete loss here after trying to fix this for the last 6 hours.
I fear it has a lot to do w/ the NAT settings
I've attached screenshots to my setup. Just as an FYI, Im testing it out on the WIFI nic here, I've done the exact same setup on the LAN nic. Also, under NAT, AON (Manual Outbound NAT rule generation) is on.
Guys, I'd really appreciate some help with this :). Any thoughts on what I'm doing wrong?
If I need to clarify anything, please let me know. I tried to stuff what I could into this post, but its 1am here and Im sure I missed something
Also, I can get the VPN to connect but I have to use BF-CBC(128-bit) encryption to make it work - id prefer no encryption since this really is just for a media center to get the US IP address so I can download games, watch netflix, etc. Does anyone know how to do this… or could point me in the correct direction?
Very much appreciate your help!!!
http://www.brianhirschy.com/vpn/1.png
http://www.brianhirschy.com/vpn/2.png
http://www.brianhirschy.com/vpn/3.png
http://www.brianhirschy.com/vpn/4.png
-
hi Arisian;
first, i see you mentioned your using a HUB on your MEDIA nic… if your really using a HUB, you should seriously consider updating to a switch, but...
as for your vpn issue, can you go back to my tutorial and see the "edit - March 9 2011" note at the bottom? i believe that will fix you right up; if not please report back and i or someone else will gladly assist you. (also check and make sure the strong vpn device is using TUN mode) -
hi Arisian;
first, i see you mentioned your using a HUB on your MEDIA nic… if your really using a HUB, you should seriously consider updating to a switch, but...
as for your vpn issue, can you go back to my tutorial and see the "edit - March 9 2011" note at the bottom? i believe that will fix you right up; if not please report back and i or someone else will gladly assist you. (also check and make sure the strong vpn device is using TUN mode)Hi Ericab,
Thanks so much for your response. A few comments:
First, It is a switch - sorry, wasn't accurate on that
Second - I got it to forward over the VPN w/ your suggestions! Thanks so much. Not sure why it worked THIS time and not the other times, but it's working great. Now to setup my DNS forwarding and so onAll other settings are just like you posted
One last question:
The configuration you have listed here is for using some simple encryption and security on the openVPN setup. Is there a way to make this work w/ using very little encryption or NO encryption so that I can just get the US ip address. Not worry about security w/ my entertainment system. Any thoughts you have on that would be much appreciated.Again, thanks for your reply! Very eager to get this working
Brian -
Brian;
during the negotiation process you and the server decide what methods are acceptable.
since the whole point of using StrongVPN (openvpn) is to encrypt your traffic over an insecure public internet, your going to be stuck with an encrypted payload.what would be the reason you'd want to use "very little encryption" ?
there are of course proven weak algorithms, but its still encrypted and protected from a casual viewing from a packet dump if this is what youd want to accomplish (monitoring employees/family members).
are you worried about CPU usage of the encryption process or…? maybe your on a high bandwidth link and your PC cant cope with the load ?
in either of those cases your solution is a hardware upgrade. -
Totally understand w/ the encryption point. StrongVPN's service does include a port 443/8080 non compressed, non encrypted option which should be the fastest. Of course, they are using a TCP option, which might not be as fast. The only point for me is to skirt around the geoip issues that come w/ using services like Xbox Live, Hulu & Netflix, which is the main point of my entertainment center.
The rest of the house is on a highly encrypted line that I use for work. These superfluous (xbox, etc) items simply need to be the fastest they possible can. Unfortunately Im on a really crappy chinese connection that maxes out at 600 kb/sec and generally runs in the 400-500kb / sec range, which, despite how it may sound, is extremely fast for where I live (Think middle of nowheresville China).
I'm running my pfsense on a 2.4ghz intel box.
-
This guide is great. Easy to follow. everything you want in a guide.
However I cant get the connection to establish properly. I have this config in place on a 2.0 RC2 box.
I have worked with IPSec in the past but, an relatively new to open VPN.
MY reason to implement this is to circumvent geo tagging / the anonymity they provide. I have tested Private Internet Access (User/Pass Auth) access via my PC's & it works great at that level. I haven't tried to implement it on the 2.0 RC2 box.
I decided to go with Strong VPN on the 2.0 RC2 box due to the great detail in the guide & the great feedback it has recieved.
BTW - This is a fresh install with no additional packages, firewall rules or other vpns running.
Here is my log…
Jun 14 08:13:55 openvpn[42636]: Restart pause, 2 second(s)
Jun 14 08:13:57 openvpn[42636]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jun 14 08:13:57 openvpn[42636]: NOTE: the current –script-security setting may allow this configuration to call user-defined scripts
Jun 14 08:13:57 openvpn[42636]: Re-using SSL/TLS context
Jun 14 08:13:57 openvpn[42636]: Control Channel MTU parms [ L:1545 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jun 14 08:13:57 openvpn[42636]: Socket Buffers: R=[42080->65536] S=[57344->65536]
Jun 14 08:13:57 openvpn[42636]: Data Channel MTU parms [ L:1545 D:1450 EF:45 EB:4 ET:0 EL:0 ]
Jun 14 08:13:57 openvpn[42636]: Fragmentation MTU parms [ L:1545 D:1300 EF:45 EB:4 ET:0 EL:0 ]
Jun 14 08:13:57 openvpn[42636]: Local Options String: 'V4,dev-type tun,link-mtu 1545,tun-mtu 1500,proto UDPv4,mtu-dynamic,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jun 14 08:13:57 openvpn[42636]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1545,tun-mtu 1500,proto UDPv4,mtu-dynamic,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jun 14 08:13:57 openvpn[42636]: Local Options hash (VER=V4): '885414e3'
Jun 14 08:13:57 openvpn[42636]: Expected Remote Options hash (VER=V4): '8bcc3b84'
Jun 14 08:13:57 openvpn[42636]: UDPv4 link local (bound): [AF_INET]myip:50211
Jun 14 08:13:57 openvpn[42636]: UDPv4 link remote: [AF_INET]strongvpnip:4672
Jun 14 08:14:57 openvpn[42636]: [UNDEF] Inactivity timeout (–ping-restart), restarting
Jun 14 08:14:57 openvpn[42636]: TCP/UDP: Closing sockeThanks in advance for your Replies…
2CaP
-
hi 2CaP;
2 things:
what is the build date of your 2.0 RC2
also, will you paste your "Advanced Configuration" options here ? (the very bottom of the OpenVPN Client page).
-
;D
Update on my previous post–--
I couldnt get that build of pfsense to work as expected. Checked everything I could think of DNS, NAT etc nothing would work.
I rebuild the box on to the latest stable release & got everything to work great for about 24hours (until appox 4:30 EST) when the speeds dropped from 5-6 Mbps to 100 - 200 kbits on the server that I was on. I tested my connection via my default gateway & all was fine 5-6Mbps.
On the suggestion of the StrongVPN folks I swapped servers - no change. they then suggested it was the firewall of my ISP throttling the speeds. I use a VPN connection everyday & haven't experience any kind of speed throttling to that extent.
I decided that I would try to rebuild the pfsense box to the most current snap shot using the guide provided to the letter. I changed the server as well in an effort to start completely from scratch. I have successfully as of a few minutes ago confirmed that everything is working.
The wierdness has started again however. The speed has dropped to about 400 kbits as of approx 4:30pm while streaming from hulu & to add to it when I try to login to netfl*x It says that it isnt available in my country. I am logging in via the US.
I have saved my configs & will continue to work on it but, any suggestions are welcome.
Thanks Again for the guide...
-
I have tried disabling the OpnVPN connection via & going with a Local connection OpnVPN on my PC with the same speed results.
Should I try other UDP port i.e: 1194 etc? or switch to a TCP config as StrongVPN suggests.
-
Just another update…. I have done some research and found that the ISP is throttling speeds for vpn connections that are outside the ports 1701-1723.
I changed my port to within that range & the speed came right back.
Now I have to figure out this issue with Netflix...
-
;D ;D ;D ;D ;D ;D ;D ;D ;D ;D ;D
Issue Solved!
I swapped from US Based Server to one another US Based server & that has fixed the Netflix Issue.
thanks again for the guide!
-
I have had netflix operating through StrongVPN for a few months. Netflix works great on my laptops, however through my WDTV Live Plus I often get the messages that "movie not available at this time please try a different one or try again later"
Sometimes it will start playing if I try 3 times, sometimes it never does. Some movies play on the first try.
It is quite frustrating and was just wondering if there is a setting in pfsense that would help with this sensitivity on this particular embedded device. I think I recall reading somewhere about a setting for HTTP resume, but have no idea.
Any similar experience would be appreciated
Edit: I never did get a solution to this until I switch providers from Rogers to Teksavvy (a third party ISP that leases Rogers lines) and now Netflix works perfectly. Go figure, I wondering what they are doing to make it difficult for the embedded device. In any event, it works perfect now and I haven't changed anything else.
-
I have an issue with this how to. i'm not sure if it's a bug in pfsense…
i get this error when i try to enable the strongvpn interface :
The following input errors were detected:
The DHCP Server is active on this interface and it can be used only with a static IP configuration. Please disable the DHCP Server service on this interface first, then change the interface configuration.
I have nothing configured in the dhcp server for this interface....
Any idea ?
-
I have an issue with this how to. i'm not sure if it's a bug in pfsense…
i get this error when i try to enable the strongvpn interface :
The following input errors were detected:
The DHCP Server is active on this interface and it can be used only with a static IP configuration. Please disable the DHCP Server service on this interface first, then change the interface configuration.
I have nothing configured in the dhcp server for this interface....
You did at one point and probably deleted the interface without disabling that is my suspicion. Backup your config, manually edit it out, and restore.
-
@cmb:
You did at one point and probably deleted the interface without disabling that is my suspicion. Backup your config, manually edit it out, and restore.
Glad i didn't factory default ! that was the case. I deleted the entry for this interface, now everything is working.
Should i fill a bug ?
-
Does this configuration guard against DNS leaking?
-
Hope someone can help me with my issue.
I'm trying to make one of my clients (Logitech Revue) to use a StrongVPN connection, but seem to fail. I have used the guide to configure the VPN connection successfully, but I'm guessing I fail somewhere in setting up the routing.
I have created a firewall rule for the client, that under advanced settings uses the VPN gateway defined as per the guide. Still, if I check with a site like whatsmyip.org, I still have my regular IP showing.
I have setup AON according to a post in this thread, but it doesn't seem to help.
Do I have to use virtual IP's or is there something else I can check on? Any help is appreciated.
-
Bergling;
snap a photo of the settings you've set for that client. -
Hi,
These are the settings for firewall on LAN:
I'm trying it out on my phone first, hence the setting for Nexus being the one with the VPN GW.
Here are my gateways settings:
and Outbound NAT routing:
When setting the outbound NAT rules, there is another selectable interface, OpenVPN, should this be set instead of the VPN interface? Or both maybe?
Any more settings I should check?
-
everything there looks fine to me from what see there….instead of using an alias, try the devices IP.
the other openvpn interface is for the vpn server. -
I tried using the IP, but no luck.
Any other suggestions? Could it be DNS settings that need to be configured?
Do I need to set up any rules for the VPN interface in the firewall? To allow incoming traffic on the VPN interface?
Any help is appreciated.
edit: If I try with one of my PC:s or my entire network, are there any diagnostics tools I can try to get more info?
-
edit: If I try with one of my PC:s or my entire network, are there any diagnostics tools I can try to get more info?
not really because we already know where the problem is.
the OpenVPN 'interface' you see on the firewalls rule screen is for the server portion of openvpn. that wont have any effect on this issue.
im not completely sure what the issue is, maybe someone else will jump in here.btw, what build are you running ? whats it dated ?
-
The build is 2.0-RC3 (i386)
built on Tue Jun 21 16:50:25 EDT 2011I don't know if it will help, but here are the route table:
The 148.160.. range is my WAN ip/gateway
Can I do something from my pfsense box if I SSH into it? Like pinging or perform dns lookups to try to resolve it?
edit: Just tried to do a traceroute in the pfsense shell by using SSH. But I'm unable to find any route!
On a client PC connected to the pfsense box, traceroute works perfectly. Seems strange… -
More updates (forgive me if I seem desperate, just want go get it working):
I'm just a newbie when it comes to unix-like systems, but I've been searching the net for different suggestions, and just wanted to share some findings, so that maybe we can get closer to a solution.
I tried using tcpdump on my vpn interface, and saw dns traffic. Maybe not that strange, but since i tried adding a dns server on the VPN gateway, this means that some traffic gets routed out my vpn connection. Just not the traffic I want:
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ovpnc1, link-type NULL (BSD loopback), capture size 96 bytes
22:17:29.877110 IP 10.8.0.86.16951 > 8.8.8.8.53: 39536+ A? www.fritidsresor.se. (37)
22:17:29.877304 IP 10.8.0.86.16951 > 98.158.112.6.53: 39536+ A? www.fritidsresor.se. (37)
22:17:30.325436 IP 10.8.0.86.34056 > 8.8.8.8.53: 25217+[|domain]
22:17:30.325540 IP 10.8.0.86.34056 > 98.158.112.6.53: 25217+[|domain]
22:17:33.439298 IP 10.8.0.86.13739 > 8.8.8.8.53: 58026+ A? p4web.freebsd.org. (35)
22:17:33.439465 IP 10.8.0.86.13739 > 98.158.112.6.53: 58026+ A? p4web.freebsd.org. (35)
22:17:33.440737 IP 10.8.0.86.48344 > 8.8.8.8.53: 30409+ A? forums.freebsd.org. (36)
22:17:33.441609 IP 10.8.0.86.48344 > 98.158.112.6.53: 30409+ A? forums.freebsd.org. (36)
22:17:33.442590 IP 10.8.0.86.59308 > 8.8.8.8.53: 39845+ A? cvsweb.freebsd.org. (36)
22:17:33.442809 IP 10.8.0.86.59308 > 98.158.112.6.53: 39845+ A? cvsweb.freebsd.org. (36)
22:17:33.489111 IP 10.8.0.86.32009 > 8.8.8.8.53: 52364+ A? security.freebsd.org. (38)
22:17:33.489530 IP 10.8.0.86.32009 > 98.158.112.6.53: 52364+ A? security.freebsd.org. (38)
22:17:33.491161 IP 10.8.0.86.46316 > 8.8.8.8.53: 29314+ A? svn.freebsd.org. (33)
22:17:33.491205 IP 10.8.0.86.46316 > 98.158.112.6.53: 29314+ A? svn.freebsd.org. (33)
22:17:33.524131 IP 10.8.0.86.45570 > 8.8.8.8.53: 6443+ A? wiki.freebsd.org. (34)By this I draw the conclusion that this must be some sort of routing problem. Does anyone agree?
The question is just exactly what is wrong?
-
Even more updates.
I solved the ping issue by disabling the OpenVPN client, and then the new default route (0.0.0.0/1 10.8.0.85) was removed and I could ping freeley using my ISP gateway.
From my perspective it all seems like I don't get any incoming packets in return from the VPN connection, but I still need to verify this with StrongVPN, but I seem to be able to route packets out on the VPN interface.
-
How can I configure pfSense to only route traffic through the VPN? Meaning if the VPN goes down, you cannot get out to the internet, only pfSense can to re-connect the VPN.
I assumed that the LAN rule that was created forcing traffic through the VPN gateway would take care of this, but testing shows that is not in fact the case and a bad assumption. I get routed out through my ISP for some reason, even though the only rule that exists is the LAN to Any through VPN Gateway. What am I missing?I also figured out the answer to my previous DNS leaking question. In System > General Setup I configured 3 DNS servers, the first 2 with the gateway set to VPN and the third with gateway set to none. Through wireshark I am able to verify that my dns lookups do not get routed out my ISP configured like this, but rather through the VPN. If I change the third DNS server to WAN gateway then all my DNS does go out ISP gateway and is thus leaked. So to recap a little, you have to have at least 1 DNS server set to none so that your VPN can lookup the DNS name you have configured for your vpn, otherwise you won't be able to connect. Also any aliases you have configured as hostnames will be looked up through your ISP gateway, just FYI.
-
I am trying to set up an OpenVPN connection to my StrongVPN account using pfSense 2.0 release. While I had success with earlier 2.0-RC3 builds, I have been unable to get the system to work with the release build.
I can connect to StrongVPN using a Mac and a Windows machine, so I am pretty sure that the problem is with my pfSense configuration.
I can establish a connection to StrongVPN but as soon as the connection is made, I lose the ability to connect to the internet with a browser. I seem to have issues similar to those of Bergling.
When I am connected to the StrongVPN server (the dashboard shows the VPN gateway as being up), the gateway status window shows the VPN gateway offline. Traffic logs show outbound traffic but nothing inbound. The firewall seems to be blocking all inbound connections per the firewall log. When I shut off the OpenVPN client, internet access is restored.