Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Remote Access VPN Setup

    Scheduled Pinned Locked Moved General pfSense Questions
    18 Posts 3 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NogBadTheBadN
      NogBadTheBad
      last edited by NogBadTheBad

      I use the following Freeradius on pfSense.

      Andy

      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

      1 Reply Last reply Reply Quote 0
      • C
        cre8toruk
        last edited by

        Right so I finally have a connection... I had to export the root CA cert and import that so that the generated cert was trusted... (I'm not sure it mentioned that in the documents!).

        Next up is to A. make RADIUS work and b. be able to do something once I'm connected (which I'm not able to at the moment)…

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          It's the first part of the Windows client section 😉
          https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/configuring-an-ipsec-remote-access-mobile-vpn-using-ikev2-with-eap-mschapv2.html#import-the-ca-to-the-client-pc

          But Windows often updates stuff etc. Please let us know if that needs updating to match whatever the current Windows requirements are.

          Steve

          C 1 Reply Last reply Reply Quote 0
          • C
            cre8toruk @stephenw10
            last edited by

            @stephenw10 Aha, yes... I must have misread that... so I didn't need to download the certificate I created only the CA one?

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              You don't need the server cert on the client, no. It needs the CA so it can verify the identity of the server when it connects.

              Steve

              1 Reply Last reply Reply Quote 0
              • C
                cre8toruk
                last edited by

                So next up then … I have a connection and an IP address of 192.168.205.1 subnet mask of 255.255.255.255 and no gateway address. As a result I'm connected but I can't get to any resources (typically found on my network at 192.168.10.0 and 192.168.200.0)….
                I added the 192.168.205.0 network to my static routes pointing it at the LAN interface on 192.168.254.254 which seems to be where the other internal LAN's point.... but obviously without the client getting a gateway address that could prove tricky... Should I add a gateway of 192.168.205.254 ?

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Hmm, no it should not be necessary to add anything. Windows is assigning the vpn adapter as /32?

                  Do all clients behave like that?

                  We're probably going to need to see some screenshots of your setup to verify it.

                  Steve

                  C 1 Reply Last reply Reply Quote 0
                  • C
                    cre8toruk @stephenw10
                    last edited by

                    @stephenw10 ok i'll see what I can do...
                    cc09f222-3f4d-446f-b81a-41c058ffd0db-image.png

                    8b63258a-3b8f-4b6d-86d5-51bf1be0bcbb-image.png

                    Let me know if you need anything further....

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Nope, that seems good. It's been a while since I configured that. Windows might have changed something I guess....

                      1 Reply Last reply Reply Quote 0
                      • C
                        cre8toruk
                        last edited by

                        Right think I've got this bit solved now.... The problem was in Phase 2 where I had the local network settings set to 0.0.0.0 /24 as opposed to 0.0.0.0 /0 - I changed it to 192.168.10.0 /24 (our server network) and I can connect and ping … you guessed it, the servers... I've changed it now to 0.0.0.0 /0 and it still seems to hang together.... Next up getting it to use RADIUS authentication on our NPS ! :-) - Thanks to everyone for their assistance.

                        1 Reply Last reply Reply Quote 0
                        • NogBadTheBadN
                          NogBadTheBad
                          last edited by NogBadTheBad

                          RTFM 😉

                          https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/configuring-an-ipsec-remote-access-mobile-vpn-using-ikev2-with-eap-mschapv2.html

                          Screenshot 2020-01-30 at 11.00.39.png

                          When you have 0.0.0.0/0 everything will go over the VPN tunnel from the local client, if you have 192.168.10.0 /24 only 192.168.10.0 /24 will pass over the VPN tunnel.

                          Andy

                          1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                          C 1 Reply Last reply Reply Quote 1
                          • C
                            cre8toruk @NogBadTheBad
                            last edited by

                            @NogBadTheBad Yes sounds about right... the penny finally dropped ! ;-)

                            1 Reply Last reply Reply Quote 2
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Nice. Not sure how I missed that /24. Must have been low on coffee!

                              1 Reply Last reply Reply Quote 1
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.