Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN Connect - Clients have it on when on premises

    Scheduled Pinned Locked Moved OpenVPN
    9 Posts 5 Posters 968 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      vsaad
      last edited by

      Hey,
      Im trying to think a way of blocking openvpn connect for when the clients are on-premises, because it floods our pfsense logs and we get so many UNDEF connections.

      If they try a new connection from the wireless network, they can't connect, however, if they hibernate the laptop from home and come to the office with it on, it will stick to the server creating multiple entries for each one of them.

      Perhaps a rule on lan dropping our external openvpn dns/ip as destination or wan rule dropping 1194 from our ISP IP?
      It looks a bit silly, if someone has a better idea please let me know.

      Thanks,
      Victor

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @vsaad
        last edited by Gertjan

        @vsaad

        Why would these clients, connected to local Wifi, use you WAN IP, to connect 'back in' the network ? They are already 'in the network' ?

        imho, OpenVPN should be used when trusted users, members of your local network, are outside, and need to reconnect to your network to use local resources ?

        Or are these users mostly on the outside; and they have the OpenVPN app kick in on windows start and auto start the connection ? If so, disable this. They will remember to connect VPN when needed, as it is as phoning someone first when you need to talk to him. Hanging up the phone when done is also ... well ... like locking the door when you leave.
        I guess auto reconnecting is biting you.

        edit : adding a firewall rule on the WAN => wrong : LAN, see below - that blocks connection from a LAN will also give your OpenVPN server some relieve.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        johnpozJ V M 3 Replies Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @Gertjan
          last edited by

          @Gertjan said in OpenVPN Connect - Clients have it on when on premises:

          adding a firewall rule on the WAN that blocks connection from a LAN

          I think you mean on the lan ;)

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • V
            vsaad @Gertjan
            last edited by

            @Gertjan

            Actually is not the auto-connect, they just close the laptop with the vpn on, and they open the lid, it reconnects, if u are inside and try to establish a new connection, it wouldn't allow, its like keeping the connection state. but for each of them, it creates a big amount of UNDEF errors and generates logs, and when we need to actually troubleshoot something, its a pain.

            So the rule would be:

            block/drop destination: my.vpn.domain to the dest port : xxxx,
            somehow it wouldnt get past the LAN and it will relief the ovpn interfaces, is that right?

            Thanks heaps,
            Victor

            GertjanG 1 Reply Last reply Reply Quote 0
            • GertjanG
              Gertjan @vsaad
              last edited by

              Something like (second rule) :

              798325ff-b2d9-498b-a265-969db483cb69-image.png

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @Gertjan
                last edited by

                @Gertjan said in OpenVPN Connect - Clients have it on when on premises:

                Why would these clients, connected to local Wifi, use you WAN IP, to connect 'back in' the network ? They are already 'in the network' ?

                I have this set up on purpose. We are moving to a hotel model where users come in , pick a desk and VPN to get on the network.
                DIA circuits at each office location. Technically they are "on" the network but its an Internet only VLAN.

                Granted the OP has a different use case in which simply creating a rule rejecting their WAN IP on port 1194 (or whatever port used for their ovpn implementation).

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @michmoor
                  last edited by

                  @michmoor said in OpenVPN Connect - Clients have it on when on premises:

                  DIA circuits at each office location

                  Hope they are faster then their home internet - and your internet connection into where they are vpn to.. Or you prob going to get complains its faster at home - I will just stay home ;) heheh

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                  M 1 Reply Last reply Reply Quote 1
                  • M
                    michmoor LAYER 8 Rebel Alliance @johnpoz
                    last edited by

                    @johnpoz 1Gb dual internet More than enough. I think we are utilizing split-tunnel for this but not entirely sure.
                    When the bosses say its time to come back into the office at least 4 days a month its time. I'll never understand those decisions :(

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    1 Reply Last reply Reply Quote 0
                    • T
                      Tetz
                      last edited by

                      Yup. The rule blocking openvpn from the LAN side is what I have to do for the same reason. Without the rule, the VPN would connect and cause strange network connectivity issues. With the rule, the VPN doesn't work and it's easier to troubleshoot.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.