Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problem with VPN configuration, please help

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    31 Posts 5 Posters 3.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      Yes the openvpn can do that, you just put them in the ovpn file..

      And yes just run another instance on your other 2nd wan. You can run as many instances of openvpn you need. I run 3.. 1 on tcp 443, one on 1194 udp and another as client too my vps, etc.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      I 1 Reply Last reply Reply Quote 0
      • I
        icomaznev @johnpoz
        last edited by

        @johnpoz Sorry to ask "stupid " questions, but teacher teached me that "it is better to ask how to do things right than to do stupid things and after that to fееl sorry".
        So speaking about the config file - do you mean to have something like:

        dev tap
        persist-tun
        persist-key
        cipher AES-128-CBC
        ncp-ciphers AES-256-GCM:AES-128-GCM
        auth SHA1
        tls-client
        client
        resolv-retry infinite

        remote xxx.xxx.xxx.xxx 1194 udp

        remote yyy.yyy.yyy.yyy 1195 udp

        verify-x509-name "myserver" name

        pkcs12 whatevername1-UDP4-1194-myclient.p12
        tls-auth whatevername1-UDP4-1194-myclient-tls.key 1

        pkcs12 whatevername2-UDP4-1195-myclient.p12
        tls-auth whatevername2-UDP4-1195-myclient-tls.key 1

        remote-cert-tls server

        Will this make the client if xxx.xxx.xxx.xxx (WAN1 public address) is not reachible to try to connect to the yyy.yyy.yyy.yyy (WAN2 public address)?
        Or I have to add something else in the configuration file?

        I red the documentation, but the description of this is vague and almost not clear.
        So again sorry to ask, but it is better to ask experience people than to conduct series of experiments with not clear exit :).

        1 Reply Last reply Reply Quote 0
        • I
          icomaznev
          last edited by

          And one more question.
          When I added the second instance (server) for the WAN2 and try to export the configuration for the OpenVPN client, in the configuration file there is no lines for the second WAN.
          I mean there is :
          pkcs12 whatevername1-UDP4-1194-myclient.p12
          tls-auth whatevername1-UDP4-1194-myclient-tls.key 1
          But there are missing:
          pkcs12 whatevername2-UDP4-1195-myclient.p12
          tls-auth whatevername2-UDP4-1195-myclient-tls.key 1
          Is this normal?

          1 Reply Last reply Reply Quote 0
          • I
            icomaznev
            last edited by

            Or may be I missed to issue manually certificates for the second server instance?

            1 Reply Last reply Reply Quote 0
            • I
              icomaznev
              last edited by

              No, I just took a look at the server certificate options - there is no place where you to point to which server you issue the certificate. May be all instances using one server certificate?

              1 Reply Last reply Reply Quote 0
              • RicoR
                Rico LAYER 8 Rebel Alliance
                last edited by Rico

                Hi,
                @jimp did some VERY great pfSense Videos on OpenVPN RAS combined with MultiWAN.
                I recommend you check them out to get some things clear.
                https://www.youtube.com/embed/qscIIZ10WTQ
                https://www.youtube.com/embed/iJ5GACqfIGs
                https://www.youtube.com/embed/ku-fNfJJV7w
                https://www.youtube.com/embed/svZ6PKqGdtg

                -Rico

                I 1 Reply Last reply Reply Quote 0
                • I
                  icomaznev @Rico
                  last edited by

                  @rico Thanks Rico. I will take a look right now.

                  JeGrJ 1 Reply Last reply Reply Quote 0
                  • RicoR
                    Rico LAYER 8 Rebel Alliance
                    last edited by

                    This post is deleted!
                    1 Reply Last reply Reply Quote 0
                    • JeGrJ
                      JeGr LAYER 8 Moderator @icomaznev
                      last edited by

                      @icomaznev just to add two cent to your problem: you have to upstream connections and want the OVPN instance to be available via both, right? Then you don't need to setup two servers or need other things in your clients configuration rather than the second "remote" statement as fallback. All you have to do (now with 2.4.4 there are other possibilities but this still works very nice for MultiWAN):

                      1. configure your OVPN server instance running as localhost on udp/1194 (not WAN or WAN2)
                      2. add a port forward on WAN and WAN2 (your ADSL line) for incoming traffic on WAN(2) address and port 1194 and forward that to localhost/1194
                      3. check both forwards are active
                      4. (optional) create DNS entries (if the IPs on WAN/WAN2 are static ones) for vpn1/vpn2.domain.example
                      5. in OpenVPN client export choose "host name resolution" as "other" and enter IP or DNS for the WAN IP below
                      6. in the "additional configuration options" box below enter the second "remote" statement needed für dns2/IP on WAN2
                      7. export some client config and check both remote settings are in there

                      Now test that (connection to WAN1) and to test WAN2 simply edit the config and switch the remote lines to connect directly to WAN2. If both work, you're done and can rollout that configuration to your clients :)

                      Greets
                      Jens

                      Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                      I 1 Reply Last reply Reply Quote 1
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        @Rico that was a spammer - their post has been removed and account banned (should be deleted but I don't have ability as only mod)... They had a link hidden in their post to nonsense.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        I 1 Reply Last reply Reply Quote 0
                        • I
                          icomaznev @johnpoz
                          last edited by

                          @johnpoz Who is the spammer?

                          1 Reply Last reply Reply Quote 0
                          • I
                            icomaznev @JeGr
                            last edited by

                            @jegr Thank you I will try this solution too

                            1 Reply Last reply Reply Quote 0
                            • I
                              icomaznev
                              last edited by

                              BTW guys I have another issue with my two internet lines.
                              When the "master one" (the FO one) goes down for some reason the pfsense acts as I expected - switches very fast to the second line (the ADCL one). BUT when the FO one is back (up and running) the pfsense doesnt switch back to the faster line, doesn't matter I have set up the FO as tear1 and the ADCL as 2 and they've been monitoring by different DNS servers.
                              I red tons of posts and watchet more then 10 videos concerning this issue. Obviously it is not only me who have such a problem.
                              So if somebody knows the solution ... please let share it.
                              Best regards to the community.

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by johnpoz

                                The post above yours that assumed you were responding too asking for details and start their own thread ;) Its gone now.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 1
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.