Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfsense and openvpn

    Scheduled Pinned Locked Moved General pfSense Questions
    17 Posts 2 Posters 1.8k Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N Offline
      nick.loenders @stephenw10
      last edited by

      @stephenw10
      My server.ovpn is set like:
      port 1194

      proto udp

      dev tun

      ca "C:\Program Files\OpenVPN\config\ca.crt"
      cert "C:\Program Files\OpenVPN\config\server.crt"
      key "C:\Program Files\OpenVPN\config\server.key"

      dh "C:\Program Files\OpenVPN\config\dh2048.pem"

      server 10.8.0.0 255.255.255.0

      ifconfig-pool-persist ipp.txt

      ;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100

      push "route 172.16.17.0 255.255.255.0"
      push "route 10.8.0.0 255.255.255.0"

      push "dhcp-option DNS 172.16.17.254"
      push "dhcp-option DNS 10.8.0.2"

      client-to-client

      duplicate-cn

      keepalive 10 120

      tls-auth ta.key 0 # This file is secret

      cipher AES-256-GCM

      compress lz4-v2
      push "compress lz4-v2"

      max-clients 60

      persist-key
      persist-tun

      status openvpn-status.log

      verb 3

      explicit-exit-notify 1

      -------------

      I only hope it is using this server.ovpn file? :)

      The setup is that
      I have a windows 10 vm with openvpnserver.
      I have a pfsense at anothe location which is running openvpn-client, which connects to the openvpserver.
      On the LAN network of the pfsense I have client pcs and from there I need to map a shared folder which is located on the openvpnserver.

      So my openvpnserver is 10.8.0.1
      My pfsense openpvn client ip is 10.8.0.6
      The pc has ip in the range 172.16.17.0/24 and it can ping to 10.8.0.1, but not make a mapping.

      The tunnel does not have to be going to the internet. the client-pc's only need to be able to map the shared folder.

      1 Reply Last reply Reply Quote 0
      • stephenw10S Offline
        stephenw10 Netgate Administrator
        last edited by

        You shouldn't be pushing a route to the local subnet (172.16.17.0/24) over the tunnel. The client end is local to that subnet. It will be refusing that route anyway.
        You should have a route to the servers internal IP not just the tunnel subnet which may or may not respond.

        How are you trying to map the shares?

        Steve

        N 1 Reply Last reply Reply Quote 0
        • stephenw10S Offline
          stephenw10 Netgate Administrator
          last edited by

          I see on your other thread that the server is using 10.0.0.0/24 as it's internal IP and you are not pushing that as a route so pfSense has no route to it.

          I also see there you list the pfSense LAN subnet as 172.14.10.0 which is not what you wrote here and also not a private subnet.

          Steve

          1 Reply Last reply Reply Quote 0
          • N Offline
            nick.loenders @stephenw10
            last edited by

            @stephenw10
            ok, so I put
            push "route 10.8.0.0 255.255.255.0"
            push "route 10.0.0.0 255.255.255.0"

            in the server.ovpn file and restarted the tunnelservices.

            I do a mapping using:
            net use q: \10.8.0.1\test /user:pcname\username password

            but nothing.

            N 1 Reply Last reply Reply Quote 0
            • N Offline
              nick.loenders @nick.loenders
              last edited by

              by the way, how can I know it is certainly using this file:
              C:\Program Files\OpenVPN\easy-rsa\keys\server.ovpn ??

              and is it ok if I just change that file, or do I need to do anything else when I change the contents of this file?

              1 Reply Last reply Reply Quote 0
              • stephenw10S Offline
                stephenw10 Netgate Administrator
                last edited by

                You don't actually need to push a route to the tunnel subnet since the client has an interface in it.

                The tunnel IP is a virtual interface that may not respond like other interfaces. You should try to map the drive to the real server IP in the 10.0.0.0/24 subnet.

                Since it's a TLS/SSL server you might also need a client specific override for the pfSense client so the server knows where the 172.16.17.0/24 subnet is.

                Steve

                N 1 Reply Last reply Reply Quote 0
                • N Offline
                  nick.loenders @stephenw10
                  last edited by

                  @stephenw10
                  I appreciate the fast response.
                  But I really need more info on where to add/change what :(
                  It is the first time I do this kind of advanced thing

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S Offline
                    stephenw10 Netgate Administrator
                    last edited by

                    I've never tried to configure that in Windows so I can't really help you there.

                    N 1 Reply Last reply Reply Quote 0
                    • N Offline
                      nick.loenders @stephenw10
                      last edited by

                      @stephenw10
                      But you can tell me how it should look like in the openvpnclient on the Netgate?
                      maybe I need to put some ip's there as well? or do some weird nat ruling?

                      plus, the openvpn server, whether if it is running on Windows or Linux, the parameters stay the same, no?

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S Offline
                        stephenw10 Netgate Administrator
                        last edited by

                        If the server is configured as SSL/TLS with a tunnel subnet larger than /30 then all values are passed from the server to the client when it connects.
                        As long as the client in pfSense is not configured with 'do not pull routes' then it should get a route to 10.0.0.0/24 when it connects. You can check the system routing table to make sure though.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.