Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN and static IP for ALL clients

    Scheduled Pinned Locked Moved OpenVPN
    27 Posts 7 Posters 13.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      ThePieMonster @noplan
      last edited by

      @noplan said in OpenVPN and static IP for ALL clients:

      ifconfig-push 1.2.3.4 255.255.255.0;

      What is wrong with the below setup?
      The domain username is not TEST (it is DOMAIN\USERNAME, actually I don't even enter the DOMAIN\ part when authenticating with the OpenVPN prompt), but that shouldn't matter correct? It's just based off the CN name?

      alt text
      alt text

      1 Reply Last reply Reply Quote 0
      • noplanN
        noplan
        last edited by noplan

        i use this here (and remember i use exact copy n paste) in:
        b3fe2653-81b9-4020-b8ff-2096bb15a01f-grafik.png

        32be2a08-56ba-49b8-b45a-dae112fbe841-grafik.png

        88abe489-c330-432d-b0c9-dcc03db99575-grafik.png

        7207580c-cfa6-4e1d-b055-cba87ac31ff1-grafik.png

        and still in User Management:
        u have to klick Crate a user certificate

        1886a7ef-0c9f-40d0-afa4-e2164e65c2c2-grafik.png

        4e49475d-bdf0-4b1f-8eef-2e9ed19c9a64-grafik.png

        and in client spec overrides :
        47af0467-1e18-4d2a-880b-ee9964c352f3-grafik.png

        2a2bcc29-5922-46ed-b017-8104cd0b7f60-grafik.png

        and it works ...
        read my other comments in this post why i use Advanced / ifconfig-push...

        (edit 10/04/20 more screenshots as requested)

        brNp

        1 Reply Last reply Reply Quote 0
        • T
          ThePieMonster
          last edited by

          @noplan said in OpenVPN and static IP for ALL clients:

          i use this here (and remember i use exact copy n paste) in:

          32be2a08-56ba-49b8-b45a-dae112fbe841-grafik.png

          88abe489-c330-432d-b0c9-dcc03db99575-grafik.png

          7207580c-cfa6-4e1d-b055-cba87ac31ff1-grafik.png

          and in:

          4e49475d-bdf0-4b1f-8eef-2e9ed19c9a64-grafik.png

          and in client spec overrides :

          2a2bcc29-5922-46ed-b017-8104cd0b7f60-grafik.png

          and it works ...
          read my other comments in this post why i use Advanced / ifconfig-push...

          brNp

          Can you take larger screenshots to see more of the page? I'm not sure where this username field would be...

          noplanN 1 Reply Last reply Reply Quote 0
          • noplanN
            noplan @ThePieMonster
            last edited by

            @ThePieMonster

            done added more screenshots

            T 1 Reply Last reply Reply Quote 0
            • T
              ThePieMonster @noplan
              last edited by ThePieMonster

              @noplan said in OpenVPN and static IP for ALL clients:

              @ThePieMonster

              done added more screenshots

              So my users are domain users. How would using the User Manager certificate work?

              This link shows that using User Certificates is not part of the process.
              https://fastinetserver.wordpress.com/2013/03/09/pfsense-openvpn-static-ip-for-clients/

              Pictures for location reference

              User Manager User Certificate
              9d3b7c69-b57b-4d27-aa3d-b466f4309c1e-image.png

              Certificate Manager Certificate
              de92502c-92b0-4cce-ad85-5af8ed041501-image.png

              1 Reply Last reply Reply Quote 0
              • noplanN
                noplan
                last edited by

                hey @ThePieMonster

                dont get me wrong ...
                add a user / click to add a user certificate
                and follow the instructions here in that post. and test it if it works for you then go to the next step.
                (all of the information you need is provided here)

                as far as i m concerned the link --> klick you provided is a) from 2013 and b) mentions as u can see in the screenshot
                that User Certificates is part of the process.

                28b5366a-093c-40f4-81d1-1ae015b9b058-grafik.png

                possibly the next step my be
                check how to import the DOMAIN User Cert to pfS ore use the domainUserDB as Backend in pfS
                and test the whole loop again, let me mention that it would be pretty sweet when you keep us all informed how it works / or even not. But this is not part of this topic i think, cuz static IP for VPN-clients is pretty much solved here.

                br nP

                1 Reply Last reply Reply Quote 0
                • viktor_gV
                  viktor_g Netgate
                  last edited by

                  If you need per-client firewall rules, a more efficient way is to use Cisco-AVPair RADIUS ACLs:
                  https://docs.netgate.com/pfsense/en/latest/book/openvpn/controlling-client-parameters-via-radius.html

                  noplanN 1 Reply Last reply Reply Quote 0
                  • noplanN
                    noplan @viktor_g
                    last edited by

                    @viktor_g

                    oh yeah i like that, but lack of useCase :(

                    i think @ThePieMonster needs a static IP for his vpn-clients
                    but a static Ip only helps when rules are set ;) so whats NEXT !

                    1 Reply Last reply Reply Quote 0
                    • T
                      ThePieMonster
                      last edited by

                      @noplan @viktor_g

                      As I mentioned the user cert is from the the Certificate Manager / Certificates section of pfSense, not from the User Manager section. There are two locations where a user certificate can be created.

                      I also found out today, that the common name, is not the CN name of the cert, that can be whatever you like, but the username of the domain user. Switching this info around in the client override solved the issue for me.

                      TLDR: CN = Domain Username, not Certificate name.

                      viktor_gV 1 Reply Last reply Reply Quote 0
                      • noplanN
                        noplan
                        last edited by

                        @ThePieMonster said in OpenVPN and static IP for ALL clients:

                        Switching this info around in the client override solved the issue for me.

                        so please mark this posting als SOLVED !

                        T 1 Reply Last reply Reply Quote 0
                        • T
                          ThePieMonster @noplan
                          last edited by

                          @noplan I would but I'm not OP. :)

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            There seems to be some mis-information in this thread.

                            You do not need to add the custom push line in a Client Specific Override. Adding the tunnel network as an IP address already does exactly that.

                            You often do need to restart the OpenVPN server to read in the CSOs: https://redmine.pfsense.org/issues/10337
                            That should probably be marked a feature though, nothing has changed there.

                            Steve

                            noplanN 1 Reply Last reply Reply Quote 2
                            • noplanN
                              noplan @stephenw10
                              last edited by

                              @stephenw10 said in OpenVPN and static IP for ALL clients:

                              You do not need to add the custom push line in a Client Specific Override

                              as i mentioned earlier
                              the reason why i added it and still doin it

                              there are clinets out there in the wild where the CSO is not working without
                              the custom push added.

                              thanks for pointin me to issue 10337

                              brNP
                              #staysafe

                              1 Reply Last reply Reply Quote 0
                              • viktor_gV
                                viktor_g Netgate @ThePieMonster
                                last edited by

                                @ThePieMonster said in OpenVPN and static IP for ALL clients:

                                @noplan @viktor_g

                                I also found out today, that the common name, is not the CN name of the cert, that can be whatever you like, but the username of the domain user. Switching this info around in the client override solved the issue for me.

                                TLDR: CN = Domain Username, not Certificate name.

                                You can change this behavior on 2.5 branch,
                                or by applying patch https://redmine.pfsense.org/issues/8289 on 2.4.4/2.4.5

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by stephenw10

                                  I would suggest those clients must have typo or similar because adding the custom line does exactly the same thing.
                                  For example I created a CSO for a user with a cert CN of test and added only this:

                                  Selection_821.png

                                  If I check what that actually creates:

                                  [2.4.5-RELEASE][admin@google.stevew.lan]/root: cat /var/etc/openvpn-csc/server2/test
                                  ifconfig-push 10.10.10.5 255.255.255.240
                                  

                                  If I now add the custom line in addition:

                                  Selection_822.png

                                  I now get:

                                  [2.4.5-RELEASE][admin@google.stevew.lan]/root: cat /var/etc/openvpn-csc/server2/test
                                  ifconfig-push 10.10.10.5 255.255.255.240
                                  ifconfig-push 10.10.10.5 255.255.255.240
                                  

                                  Clearly both those lines are not required! 😉

                                  Steve

                                  1 Reply Last reply Reply Quote 0
                                  • noplanN
                                    noplan
                                    last edited by

                                    @stephenw10

                                    tested it with some older android clients right now
                                    without the ifconfig-push not working on device
                                    added the lines working
                                    maybe / pretty shure it is the client not the config on the Server

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.