• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

pfsense - TLS error TLS handshake failed

Scheduled Pinned Locked Moved OpenVPN
3 Posts 3 Posters 1.9k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    Jeevan.podduturi
    last edited by Sep 3, 2019, 1:08 AM

    I have configured openVPN in pfsense server and trying to connect from windows 10 and i am getting this ERROR
    TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

    i have configured my pfsense with only one NAT ip address(WAN) no LAN ip address, i was shared the internet from WAN internet to local area network

    0a68185a-6993-4a8f-9435-98c71ed979b4-image.png

    i have created rules correctly...

    49a5ede6-8952-467c-a85c-9591d351a3ae-image.png

    i have checked the logs also...

    c500de2c-3749-431b-973f-3087e1d682ff-image.png

    not sure what is the issue, everthing look's ok but i am not able to connect the openvpn... Need public ip address to configure the openvpn in my case.

    Please help me to resolve this issue....

    1 Reply Last reply Reply Quote 0
    • R
      Rico LAYER 8 Rebel Alliance
      last edited by Sep 3, 2019, 1:37 PM

      So you're on a double NAT scenario?
      Then you first need to forward Port 1194 UDP from the Router upstream pfSense to the pfSense WAN IP.
      Second you need to disable Block private networks and loopback addresses (Interfaces > WAN)

      -Rico

      1 Reply Last reply Reply Quote 0
      • J
        johnpoz LAYER 8 Global Moderator
        last edited by johnpoz Sep 3, 2019, 1:50 PM Sep 3, 2019, 1:49 PM

        @Rico said in pfsense - TLS error TLS handshake failed:

        Second you need to disable Block private networks and loopback addresses (Interfaces > WAN)

        Not needed, since the source would be public - unless the nat router in front of pfsense was doing source natting? Which normally not the case.

        As you can see from actually looking at the rules

        block drop in quick on igb1 inet from 10.0.0.0/8 to any label "Block private networks from WAN block 10/8"
        block drop in quick on igb1 inet from 127.0.0.0/8 to any label "Block private networks from WAN block 127/8"
        block drop in quick on igb1 inet from 172.16.0.0/12 to any label "Block private networks from WAN block 172.16/12"
        block drop in quick on igb1 inet from 192.168.0.0/16 to any label "Block private networks from WAN block 192.168/16"
        

        They are only block when source matches rfc1918, not dest.. So forwarding the case of double nat to pfsense wan IP that is rfc1918 is not an issue with the default block private networks rule that is on wan. So no need to disable it - unless the source is going to be rfc1918.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        3 out of 3
        • First post
          3/3
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
          This community forum collects and processes your personal information.
          consent.not_received