Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to create an OpenVPN client to StrongVPN

    Scheduled Pinned Locked Moved OpenVPN
    157 Posts 56 Posters 229.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      JohnGalt1717
      last edited by

      Hi all, I've read this entire thread and I think I have a handle on it, but I always get this in the logs:

      May 14 12:30:18 openvpn[96614]: Local Options hash (VER=V4): '6088b372'
      May 14 12:30:18 openvpn[96614]: Expected Remote Options hash (VER=V4): '0b6efc44'
      May 14 12:30:18 openvpn[96614]: UDPv4 link local (bound): [AF_INET]192.168.3.3:50211
      May 14 12:30:18 openvpn[96614]: UDPv4 link remote: [AF_INET]173.195.6.142:4672

      192.168.3.3 is the IP of my WAN because I have to be behind their stupid LTE router.

      I have no problems with accessing the internet from clients and I've followed the instructions to the letter. I'm using 2.2 RELEASE of pfsense.

      Any ideas why it's just hanging there? It never connects.

      Thanks!

      1 Reply Last reply Reply Quote 0
      • M
        MozOz
        last edited by

        Hi
        I cannot find the StrongVPN greeting file

        Moz

        1 Reply Last reply Reply Quote 0
        • F
          fahad Ahmed
          last edited by

          Please can you help me how to make VPN between two sites?

          1 Reply Last reply Reply Quote 0
          • G
            guybrush2k4
            last edited by

            Hi guys,
            Lately I had some time to think. and finally I bought a pc-based firewall (Attom d525 and 6 gigabit inter ports)
            so I'm back with the idea of a serious router firewall using pfsense.

            but no sure if this would be posible.

            1 I can't remove my provider router (because I was not able to replace it with pfsense due to the TV packages)
            so I have my router forwarding everything to the pfsesnse box and that normally works.
            2 the question is now i'm thinking on getting  an vpn to access streaming services from abroad. (using openvpn)
            do you think it would be posible with to have the pfsense box with the vpn open 24x7 and to have all the pc on the same network but only for certain ips modify the output to internet to use the vpn the rest of the ips going throught the standard gateway? (no vpn)
            so they have access to my servers in the local network but internet they have different accesses.

            At the moment I'm just thinking but That can be a nice setup.

            Regards.
            Guybrush2k4

            1 Reply Last reply Reply Quote 0
            • P
              peterbuttler
              last edited by

              OpenVPN is the most secure VPN protocol use for highly encrypted data transfer but it slightly impacts on the internet speed because of encryption but it always hide your data successfully.

              Here is an official guide about how to setup OpenVPN https://openvpn.net/index.php/access-server/docs/admin-guides-sp-859543150/howto-connect-client-configuration.html

              1 Reply Last reply Reply Quote 0
              • M
                mcarson75
                last edited by

                I'm having some trouble with setting up StrongVPN on pfSense.  The tunnel is connects successfully and the gateway is up, but I can not get traffic to go through it.  My intent is to only have traffic from a single interface routed through it with policy based routing.  I have two other OpenVPN site-to-site tunnels up and working with policy based routing on the router, so I have been able to successfully do something similar before.  I just can't get this to work.  I think I probably have an error in my NAT settings.  On my other two clients I defined the tunnel subnet (10.0.3.1/24 and 10.0.12.1/24) in the OpenVPN settings, and these were automatically added in Outbound NAT.  The StrongVPN gateway is dynamic so nothing is added in NAT.  The tunnel comes up with an address of 10.8.2.118 with a gateway of 10.8.2.117, so I have tried adding 10.8.2.0/24 in Outbound NAT with translation to the WAN address (as the automatic rules were created for the other tunnels) and also tried adding NAT from my local subnet translated to my tunnel interface, but neither makes a difference.  I get internet access but through my default gateway (as verified with whatsmyip.org).  My setup is below.  Any help would be appreciated!  I have tried to follow this thread as best I can but some of the images are now gone and most of the setup is for older versions of pfSense.  I did try changing to AON on NAT but this didn't make any difference either.

                pfSense 2.3.4-RELEASE

                OpenVPN advanced settings

                NAT Settings

                Gateway Status

                Firewall Rules

                1 Reply Last reply Reply Quote 0
                • L
                  leonardpin
                  last edited by

                  Thank you, @ericab.

                  I have been trying to solve my connection problems for days.

                  You helped me a lot.

                  P.S. none of your images appeared to me. I could not see any of them.

                  1 Reply Last reply Reply Quote 0
                  • C
                    ctyokley
                    last edited by

                    Just for an FYI, i have found the following Custom Options work the best with strong vpn:

                    verb 4;tun-mtu 1500;fragment 1390;mssfix 1390;keysize 128;key-direction 1;persist-tun;persist-key;route-delay 2;explicit-exit-notify 2;comp-lzo yes;

                    1 Reply Last reply Reply Quote 0
                    • L
                      leonardpin
                      last edited by

                      @ctyokley:

                      Just for an FYI, i have found the following Custom Options work the best with strong vpn:

                      verb 4;tun-mtu 1500;fragment 1390;mssfix 1390;keysize 128;key-direction 1;persist-tun;persist-key;route-delay 2;explicit-exit-notify 2;comp-lzo yes;

                      @ctyokley,

                      Those are OpenVPN parameters. Could you explain each one individually?

                      Why do these work best with StrongVPN?

                      1 Reply Last reply Reply Quote 0
                      • A
                        aagaag
                        last edited by

                        I am still fighting with StrongVPN. I have managed to get the tunnel up, inasmuch as I received the message: "Initialization Sequence Completed". I have read that this means that the handshake between VPN server and client is  OK. Immediately thereafter, however, the VPN bombs.

                        Here is a log transcript. Might a good soul tell me what I am doing that is wrong? Thanks in advance! (Note that the newest entry is on the top.)

                        Apr 14 20:07:01 openvpn 56391 SIGTERM[soft,exit-with-notification] received, process exiting
                        Apr 14 20:07:01 openvpn 56391 /usr/local/sbin/ovpn-linkdown ovpnc2 1500 1546 10.8.0.86 10.8.0.85 init
                        Apr 14 20:07:01 openvpn 56391 Closing TUN/TAP interface
                        Apr 14 20:07:01 openvpn 56391 /sbin/route delete -net 10.8.0.81 10.8.0.85 255.255.255.255
                        Apr 14 20:07:01 openvpn 56391 TCP/UDP: Closing socket
                        Apr 14 20:06:59 openvpn 56391 SIGTERM received, sending exit notification to peer
                        Apr 14 20:06:59 openvpn 56391 event_wait : Interrupted system call (code=4)
                        Apr 14 20:06:56 openvpn 56391 Authenticate/Decrypt packet error: cipher final failed
                        Apr 14 20:06:47 openvpn 56391 Authenticate/Decrypt packet error: cipher final failed
                        Apr 14 20:06:37 openvpn 56391 Authenticate/Decrypt packet error: cipher final failed
                        Apr 14 20:06:36 openvpn 56391 Initialization Sequence Completed

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.