<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[OpenVPN documentation issue for the usage with High Availability]]></title><description><![CDATA[<p dir="auto">Just a hint for all who want to use OpenVPN connections on High Availability clusters:</p>
<p dir="auto">When configuring any OpenVPN access on a single pfsense as it is described in the documentation it will work fine. The section about the <strong>firewall rules</strong></p>
<p dir="auto">[https://docs.netgate.com/pfsense/en/latest/vpn/openvpn/firewall-rules.htm](link url)l</p>
<p dir="auto">proposes to add a rule on the <strong>WAN</strong> tab  and set among others <span style="color:#065b60">Destination:</span> <strong>WAN Address</strong>. This works fine as long as the WAN address is not virtual. As soon as  a CARP VIP is set for the High Availability configuration this firewall rule will block the connection of any external OpenVPN client.</p>
<p dir="auto">Setting the destination to <strong>WAN Net</strong> or <strong>This Firewall</strong> instead allows the OpenVPN clients to pass this firewall rule. As it took me a while to find this I thought it might be helpful to mention it here. It would be nice to add such a note in the pfsense documentation.</p>
]]></description><link>https://forum.netgate.com/topic/182982/openvpn-documentation-issue-for-the-usage-with-high-availability</link><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 20:36:18 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/182982.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 22 Sep 2023 09:50:09 GMT</pubDate><ttl>60</ttl></channel></rss>