Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VPN service on a PC

    Scheduled Pinned Locked Moved General pfSense Questions
    40 Posts 6 Posters 6.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      Bellzemos
      last edited by

      It would already be a success for me just to get in here:

      Is an UTP cable connecting the pfSense box with a laptop enough to get to the dashboard? Or do I have to have WAN link/signal?

      I am unable to log in…

      1 Reply Last reply Reply Quote 0
      • V
        viragomann
        last edited by

        After installation if you haven't assign any IP to interfaces the screen looks like that in my first attachment below.
        Under "Valid interfaces are:" pfSense lists recognized interfaces with MAC addresses an names. Here it is just one: re0

        You can assign the interfaces manually. If you also have just one assign this to WAN. In my case I had to enter "re0" to manually assign the NIC to WAN.
        When you are asked for LAN just press Enter to skip.

        After that is done pfSense finishes configuration and shows the screen in the second attachment. This is the console menu.
        Here it shows an IP assigned to WAN per DHCP.
        To change the WAN IP, press "2" and assign an IP and mask to WAN and respond to the other questions.

        After that you can connect to WebConfigurator over WAN interface by typing the WAN IP in the browser of a connected computer.
        There should be no complexity.

        pfSense_freshinstall.png
        pfSense_freshinstall.png_thumb
        pfSense_console_menu.png
        pfSense_console_menu.png_thumb

        1 Reply Last reply Reply Quote 0
        • B
          Bellzemos
          last edited by

          Thank you very much for this. I went through all those stages before. I now manually set the bfe0 for WAN and assigned an IP (no DHCP) and I was able to log, I came to the log screen. But then since I didn't know the password it threw me out and even if I rebooted and set a new IP I couldn't log back in. It could well be an obscure hardware issue on my side so I'm going to install pfSense in VMWare and try there as soon as I have some time. Again, thank you a lot!

          1 Reply Last reply Reply Quote 0
          • B
            Bellzemos
            last edited by

            I have installed pfSense in VMWare Player and then figured out I have to have a bridged WAN connection. I was finally able to log into the pfSense web interface. It's overwhelming. :D

            How do you recommend me, as a beginner, to start with setting up a VPN service?

            Thank you! :)

            1 Reply Last reply Reply Quote 0
            • KOMK
              KOM
              last edited by

              How do you recommend me, as a beginner, to start with setting up a VPN service?

              The same way the rest of us do it:  lots of reading, lots of video-viewing, lots of trial & error, lots of questions.

              1 Reply Last reply Reply Quote 0
              • B
                Bellzemos
                last edited by

                I know, I know, as with anything. But still, can I use pfSense as a VPN server even though it's not connected to the real WAN? It's in the LAN segment of my network. I've read somewhere up there that one ethernet connection is enough for VPN - so how would I go about it then?

                Thank you.

                1 Reply Last reply Reply Quote 0
                • V
                  viragomann
                  last edited by

                  @Bellzemos:

                  But still, can I use pfSense as a VPN server even though it's not connected to the real WAN? It's in the LAN segment of my network. I've read somewhere up there that one ethernet connection is enough for VPN - so how would I go about it then?

                  I've run such a set-up with 2.1 at the time I moved from other firewall product to pfSense to provide continuous VPN service. I see no reason why it shouldn't work with current version, at least in case you use openVPN.
                  You have to forward the OVPN port to pfSense at the DSL router and configure the VPN server to listen on the only one interface.

                  If you run a VPN server on pfSense it adds a virtual interface for the VPN tunnel network, so you have than 2 interfaces. At these interfaces you can configure firewall rules to control traffic in both directions.

                  1 Reply Last reply Reply Quote 0
                  • P
                    phil.davis
                    last edited by

                    And you need to do something so that devices in the LAN know how to reply to packets coming from across the OpenVPN. LAN devices (like some server that OpenVPN users want to connect to) are going to have some other default gateway - e.g. the DSL router.
                    a) Add a static route in the DSL router pointing traffic for the OpenVPN tunnel to the pfSense interface. Introduces asymmetric routing at the DSL router (the packets from the OpenVPN tunnel to LAN servers will not be seen by the DSL router). If the DSL router does not care then this option will work.
                    or
                    b) Add a static route to the OpenVPN tunnel to each server on the LAN. If there are only 1 or a few then this can be an easy option.
                    or
                    c) NAT traffic from the OpenVPN tunnel out the pfSense interface that goes to your LAN. Then all traffic appears to come from the pfSense address on your LAN. LAN servers reply fine and all is well. Disadvantage is that the LAN servers cannot distinguish the various clients inside the OpenVPN tunnel - if you care about that.

                    As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
                    If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

                    1 Reply Last reply Reply Quote 0
                    • B
                      Bellzemos
                      last edited by

                      Thank you for your help guys, but this is a bit beyond the scope of my currnet knowledge. Let me clarify how things are set here and what I'd like to achieve. Thank you for bearing with me!

                      This is how things are set in my house and sadly I can not change it. It would be ideal to remove the router and replace it with the pfSense machine but it's impossible. So the pfSense machine is in the LAN. It has 2 NICs, a wired one and a wireless one. I have also installed pfSense on my PC (in VMware), so whatever will be easier to do.

                      What I'd like to achieve (just to learn stuff, not to have the VPN server running 24/7) is: 1. Be able to safely surf the web from a public unsecure WiFi connection, tunneled into my house, throught the DSL interface and router, into the pfSense and then securely to the internet - as if i was home. 2. Make the pfSense also act as a wireless point - using the 2nd (wireless) NIC, alongside it being the VPN server.

                      I was thinking OpenVPN or IPSec (since for IPSec there's no additional softare needed on the Windows clients). What would you recommend, I'm guessing OpenVPN?

                      So, how would achieve what I want in the easiest way, without modifying/compromising the current network setup (the Cheap router being the firewall protection as everything goes through it and pfSense is just an experiment for me right now - just for the VPN, not to act a firewall).

                      Thank you!

                      1 Reply Last reply Reply Quote 0
                      • V
                        viragomann
                        last edited by

                        I think, an IPSec server is more difficult to set up and to route. However, I've never set up one at pfSense, but openVPN.

                        If you add the "Open VPN client export utility" you can export a OpenVPN client and the required settings and install it on Windows with a single stroke.

                        I don't want to discuss your hardware set-up any more. You may have your reasons.
                        However, you can achieve your intention also this way. As said above, you have to forward the VPN port to pfSense. If your DSL modem is not in bridged mode you have to forward it here and a second time at the router.
                        For routing the VPN traffic right in your LAN, you should have nothing further to do. The necessary rules should be automatically created if you have just WAN and WLAN interface. To check that go to Firewall > NAT > Outbound and look for a rule where interface is WAN, source is your VPN tunnel network, source port, destination and destination port are any (*) and NAT address is WAN address.
                        If you can't find such a rule, select "Hybrid Outbound NAT rule generation" and click save and than add it by clicking +.

                        1 Reply Last reply Reply Quote 0
                        • B
                          Bellzemos
                          last edited by

                          I just realised that I could in fact connect from pfSense to the DSL modem. I can't believe I haven't tought of it before. My ISP is supposed to provide me two IP addresses, not one. So I'll disconnect the cable that's connecting my dumb swithc to the router and connect it directly to the DSL modem. I'll try it tomorrow or when I'll have some time and hopefully it will work with the 2nd IP leased.

                          Can I have 3 NICs in the old PC box? I think I'll need another wired NIC to make it all work properly. Thank you for all the tips, I can't wait to try and make it work.

                          PS: Another question - I've read that pfSense supports WOL so that it can wake up computers on the LAN. But what about pfSense itself, is it possible to turn on the pfSense box itself with WOL? The PC supports WOL (in checked the BIOS), does pfSense support it too?

                          1 Reply Last reply Reply Quote 0
                          • ?
                            Guest
                            last edited by

                            But what about pfSense itself, is it possible to turn on the pfSense box itself with WOL?

                            If pfSense is installed on the PC and you wake up the PC with WoL then the PC boots and also the on the
                            PC installed OS, that means also pfSense will starting if it is the installed OS on the PC.

                            1 Reply Last reply Reply Quote 0
                            • B
                              Bellzemos
                              last edited by

                              Yep, that was a stupid question from me. It was a while since I last dealed with WOL - one has to set the things in the OS of the computer that will be waking the other one up (regarding NIC's settings for WOL). My pfSense box has WOL functionality in the BIOS so that should work.

                              More importantly, will an old Lenovo box work with three NICs? The integrated one (in the MOBO), an additional wireless one and an additional wired one? If yes, I'll buy another wired one for cheap so that I can do more stuff with it.

                              Another thing: the pfSense installation in my VMware just keeps on rebooting when I start it up. It won't stop, it's just rebooting on and on, do you know what might be causing it and how to fix it?

                              Thank you!

                              1 Reply Last reply Reply Quote 0
                              • ?
                                Guest
                                last edited by

                                More importantly, will an old Lenovo box work with three NICs?

                                This can be a Xeon E5-26xxv3 and 128 GB RAM or a Celeron Dual Core @3,0GHz
                                So a little bit closer to the point what is in the "old Lenovo"!

                                If yes, I'll buy another wired one for cheap so that I can do more stuff with it.

                                Buy a Intel Quad Port NIC for ~$60 so that is ~$15 for each Port but not consumer grade!

                                Another thing: the pfSense installation in my VMware just keeps on rebooting when I start it up.
                                It won't stop, it's just rebooting on and on, do you know what might be causing it and how to fix it?

                                ???

                                • I prefer running it on bare metal
                                • if not able to run it on Hyper-V
                                1 Reply Last reply Reply Quote 0
                                • B
                                  Bellzemos
                                  last edited by

                                  My "old Lenovo" is a Celeron D with 512 MB of RAM. I will use this box to provide internet connection for only a couple of PCs and it's mainly for me to learn hot pfSense works and to learn more about networking in general.

                                  I will buy an used one-port NIC cause it's disgustingly cheap, it will be for learning only. What I'd like to achieve is use the onboard NIC for WAN, the coming NIC for LAN (or vice versa) and the wireless NIC as an wireless access point (WLAN basically). So I hope that the old Lenovo will work with three NICs.

                                  pfSense worked fine in my VMware Player before. And now I think it says something like that it wasn't dismounted properly and the just reboots and keeps rebooting… I don't know how to fix that.

                                  Thank you for helping me.

                                  1 Reply Last reply Reply Quote 0
                                  • B
                                    Bellzemos
                                    last edited by

                                    I'll be getting another NIC soon and will be able to finish the hardware part of the pfSense box.

                                    All I have to set right on it is assign the interface and it's IP address so that I can connect to it via the web interface, right? Everything else I can then set through the web interface?

                                    Another question: is there something like a default template or default settings so that when I replace my home router with the pfSense box and connect to the internet I am already safe & secure? And then I can tweak the settings in peace?

                                    Thank you!

                                    1 Reply Last reply Reply Quote 0
                                    • V
                                      viragomann
                                      last edited by

                                      If you intent to permit traffic coming in the new interface you have to add firewall rules.

                                      The pfSense settings can be exported and restored over the WebGUI Dignostics > Backup/Restore. Or you can reset all settings in Dignostics > Factory defaults as well as in the console.

                                      1 Reply Last reply Reply Quote 0
                                      • ?
                                        Guest
                                        last edited by

                                        Everything else I can then set through the web interface?

                                        Yes.

                                        Another question: is there something like a default template or default settings so that when I replace my home router with the pfSense box and connect to the internet I am already safe & secure?

                                        There is a default config and will be also some rules for the WAN interface if you set it up, but after this
                                        you must also setting up rules for any other interface then!

                                        And then I can tweak the settings in peace?

                                        You can do so no one is pressing you to be going fast.

                                        1 Reply Last reply Reply Quote 0
                                        • B
                                          Bellzemos
                                          last edited by

                                          I have installed another NIC into the pfSense box and it wouldn't recognise the new NIC. Then I reinstalled pfSense and now it works, all three NICs are recognised!

                                          I've set the new NIC as WAN, the onboard NIC as LAN and the wireless nic as WLAN. When I set the WLAN NIC as an access point the pfSense box started having some trouble and my internet connection was unstable.

                                          I was getting this displayed on the pfSense box monitor:

                                          swap_pager_getswapspace(3): failed
                                          swap_pager_getswapspace(3): failed
                                          swap_pager_getswapspace(5): failed
                                          swap_pager_getswapspace(16): failed
                                          swap_pager_getswapspace(9): failed
                                          swap_pager_getswapspace(16): failed
                                          swap_pager_getswapspace(3): failed
                                          swap_pager_getswapspace(3): failed
                                          swap_pager_getswapspace(3): failed
                                          swap_pager_getswapspace(3): failed
                                          (it goes on and on…)

                                          And I was getting this displayed in the pfSense WebGUI notice:

                                          Acknowledge All Notices
                                          [There were error(s) loading the rules: /tmp/rules.debug:19: cannot define table bogonsv6: Cannot allocate memory - The line in question reads [19]: table persist file /etc/bogonsv6]

                                          Could it be related to the fact that the box only has 512 MB of RAM? It has an 80 GB HDD though.

                                          1 Reply Last reply Reply Quote 0
                                          • B
                                            Bellzemos
                                            last edited by

                                            …and now pfSense is unable to boot up. It stops at Starting DHCP service... and I can hear the HDD but it won't go past that line and boot up. Do I have to reinstall pfSense? What caused this? How can avoid it in the future?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.