Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to create an OpenVPN client to StrongVPN

    OpenVPN
    56
    157
    222.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      ericab
      last edited by

      StrongVPN HowTo.
      – For pfSense version 2.0 (beta & RC)

      Once you have completed this tutorial, you will have a pfSense box that automatically connects to StrongVPN, and routes all traffic from your LAN,
      through the vpn gateway.


      –-Section 1---

      Step 1:

      download the StrongVPN greeting file.

      once extracted you are presented with these files:

      Step 2:

      from the pfSense interface, navigate to the dropdown menus:  System –-> Cert Manager

      Step 3:

      click the plus button as seen here:
      to create a new certificate authority

      Step 4:

      enter a descriptive name for the new CA,
      and ensure that "Import an existing certificate authority" is selected

      Step 5:

      go to the directory containing the files as seen in the first screenshot in this tutorial
      open the file called "ca.crt" in notepad, and copy and paste the EXACT contents of it into the first box.
      click SAVE. (the second box will remain empty, don't worry)

      Step 6:

      click on the "Certificates" tab:

      click on the plus button:

      Step 7:

      ensure that "Import an existing certificate" is selected, and enter a descriptive name
      go to the directory containing the files as seen in the first screenshot in this tutorial and open the file called "ovpn059.crt"
      NOTE: depending on the server you have selected upon purchase, your client cert may have a number other then '059', so do not fret.
      open in notepad, and copy and paste the contents of it into the first box.
      open "ovpn059.key" (again, note that the number '059' will probably be different) and copy/paste the contents into the second box ('Private key data')

      Step 8:

      navigate to the system dropdown menus: VPN –-> OpenVPN

      click the Client tab:

      Step 9:

      for this step; please just duplicate what you see in this screenshot, on your box.

      -Note: In the "Cryptographic Settings" section, copy and paste the contents of the "ta.key" file into "TLS Authentication"
      see here:

      -Note 2: for ease, here are the "advanced configuration" options you can copy and paste: (remember to keep the trailing ; in place.) –->

      verb 5;tun-mtu 1500;fragment 1300;keysize 128;redirect-gateway def1;persist-key;

      now, Click Save

      Step 10:

      navigate to the system dropdown menus Status –-> System Logs, and click on the OpenVPN tab.
      if the last thing you see in this log is "Initialization Sequence Completed" you are connected to StrongVPN; but, you are not done yet, as none of your traffic is traversing this line.

      move on to section 2

      –-Section 2---

      Step 1:

      navigate to the system dropdown menus Interfaces –--> (assign)

      click the plus button:

      -Note in the previous screenshot you will notice a StrongVPN interface. you will NOT have that on your box yet, so dont worry.

      Step 2:

      after clicking on the plus button pfSense will tell you it has successfully added a new interface. the network port name will most likley be named

      "ovpnc1". ensure that the new interface is selected as "ovpnc1" (it could be ovpnc2, ovpnc3, etc… depends if you have other ovpn interfaces or not)

      Step 3:

      navigate to the system dropdown menus Interfaces –-> OPT1 (or whatever your new interface from the previous step is)
      Enable the interface.
      Enter a Description --> "StrongVPN"
      "Type" ---> none
      leave everything else alone
      click Save.

      Step 4:

      navigate to the system dropdown menus System –-> Routing

      click the plus button:

      ensure the Interface selected is the new one we have just assigned to the vpn client; should be "OPT1"
      Enter the gateway name.
      for "Gateway", enter "dynamic"
      do NOT click "Default gateway"
      for monitor IP, enter 208.67.222.222 (or whater will respond to ICMP)(208.67.222.222 is openDNS fyi)
      leave "Advanced" alone
      enter a description for "Description"
      click save

      Step 5:

      navigate to the system dropdown menus Firewall –-> Rules
      click on the LAN tab.

      Step 6:

      create a new rule that looks like this:

      Action: PASS
      –
      Interface: LAN
      Protocol: ANY
      Source: LAN Subnet
      Destination: ANY
      –
      Description: LAN to Internet force through VPN

      IMPORTANT: scroll down to "Gateway" under the "Advanced features" of the rule.
      Set gateway to your VPN interface.

      it should look something like this:

      click save.

      the rule should look like this:

      at this point, i would give the box a reboot (possibly an unnecessary step)
      if this isnt an option, disable the VPN client, wait a minute and then go ahead and re-enable it.

      CHECK OpenVPN syslog for errors !

      navigate to "http://www.whatismyip.com/" and your public pacing IP will be one of strongvpn's IP's.

      you're done !

      edit - November 23 2010
      – removed persist-tun, from additional configuration options

      edit - March 9 2011
      -- from now on, in order for traffic to be routed through the vpn gateway; from the pfSense interface, navigate to the dropdown menus: FIREWALL –> NAT --> OUTBOUND --| enable "Manual Outbound NAT rule generation" and select save.

      1 Reply Last reply Reply Quote 0
      • _
        _igor_
        last edited by

        Really great tutorial! Thanks much

        1 Reply Last reply Reply Quote 0
        • 0
          0tt0
          last edited by

          I will add policy routing in mine and it will be 1.2.3-RELEASE

          1 Reply Last reply Reply Quote 0
          • L
            lordalfa
            last edited by

            Good tutorial.

            Have anyone tried OpenVPN over dual WAN links. The setup here is specific on which interface is being used.

            1 Reply Last reply Reply Quote 0
            • E
              eri--
              last edited by

              I would not advice adding persist-tun in 2.0

              1 Reply Last reply Reply Quote 0
              • E
                ericab
                last edited by

                ermal, thanks for the heads up;
                i have edited the how-to to reflect your advice

                1 Reply Last reply Reply Quote 0
                • Z
                  zoltran
                  last edited by

                  Hello

                  Does any have StrongVPN working in pf 1.2.3 ?
                  Or can point me to a primer?
                  Thanks

                  1 Reply Last reply Reply Quote 0
                  • H
                    Hidden
                    last edited by

                    After section 1 all traffic is routerd true the VPN.

                    anyone got policy routing working ?
                    I would like to route netflix over vpn.

                    1 Reply Last reply Reply Quote 0
                    • H
                      Hidden
                      last edited by

                      after a factory reset (i screwed some thing up in squid) it works great.

                      Now i need some thing to route traffic over the vpn on url base.

                      i found this interesting setup:
                      http://webcache.googleusercontent.com/search?q=cache:EuMlcG_zcmIJ:www.shawnmolnar.com/blog/tag/hulu+hulu+netflix+script+vpn&cd=2&hl=nl&ct=clnk&gl=nl
                      ( from google cache because the realsite is offline atm)

                      1 Reply Last reply Reply Quote 0
                      • Y
                        yu130960
                        last edited by

                        @Hidden:

                        After section 1 all traffic is routerd true the VPN.

                        anyone got policy routing working ?
                        I would like to route netflix over vpn.

                        +1

                        1 Reply Last reply Reply Quote 0
                        • Y
                          yu130960
                          last edited by

                          @Hidden:

                          after a factory reset (i screwed some thing up in squid) it works great.

                          Now i need some thing to route traffic over the vpn on url base.

                          i found this interesting setup:
                          http://webcache.googleusercontent.com/search?q=cache:EuMlcG_zcmIJ:www.shawnmolnar.com/blog/tag/hulu+hulu+netflix+script+vpn&cd=2&hl=nl&ct=clnk&gl=nl
                          ( from google cache because the realsite is offline atm)

                          Would this work on pfsense?  Has anyone tried it?

                          1 Reply Last reply Reply Quote 0
                          • 0
                            0tt0
                            last edited by

                            @Hidden:

                            After section 1 all traffic is routerd true the VPN.

                            anyone got policy routing working ?
                            I would like to route netflix over vpn.

                            I believe I have commented on this several times. I use policy routing with an OpenVPN cert tunnel with StrongVPN (to make only some clients use the tunnel or by other filtering means, which can be adjusted at any time), using tunnel as "virtual WAN interface" and the tunnel has been up close to 9 months now, I believe.

                            I haven't taken the time to finish my guide yet though.

                            1 Reply Last reply Reply Quote 0
                            • Y
                              yu130960
                              last edited by

                              @0tt0:

                              @Hidden:

                              After section 1 all traffic is routerd true the VPN.

                              anyone got policy routing working ?
                              I would like to route netflix over vpn.

                              I believe I have commented on this several times. I use policy routing with an OpenVPN cert tunnel with StrongVPN (to make only some clients use the tunnel or by other filtering means, which can be adjusted at any time), using tunnel as "virtual WAN interface" and the tunnel has been up close to 9 months now, I believe.

                              I haven't taken the time to finish my guide yet though.

                              This would be the guide that I would be looking forward to.  I will try to figure out the tunnel as a virtual wan interface, but would love to see a guide on how to set this up.  I couldn't figure it out and just got my refund from StrongVPN within their 7 days.  I will sign back up if I can get this setup to work.

                              Thanks for the post.

                              1 Reply Last reply Reply Quote 0
                              • J
                                jeffnoone
                                last edited by

                                I am a complete newbie on FreeBSD and pfSense, but managing to get pfSense installed and then STrongVPN going using the various site tutorials. Suddenly pfSense has become very valuable to me for high-speed VPN connection. So thanks to ERicab and all here
                                Does this thread need to be updated given this post:
                                http://forum.pfsense.org/index.php/topic,32640.0.html

                                I made similar observations as ericab, as in that post
                                Enabling AON  uunder Firewall, NAT, outbound seems to be what was suggested in the thread linked, and seemed to work for me

                                Should this instruction be added to tutorial to get people up and running with most recent versions? - I dont know enough to know reliably one way or the other

                                Again thanks
                                Jeff

                                1 Reply Last reply Reply Quote 0
                                • Y
                                  yu130960
                                  last edited by

                                  @0tt0:

                                  @Hidden:

                                  After section 1 all traffic is routerd true the VPN.

                                  anyone got policy routing working ?
                                  I would like to route netflix over vpn.

                                  I believe I have commented on this several times. I use policy routing with an OpenVPN cert tunnel with StrongVPN (to make only some clients use the tunnel or by other filtering means, which can be adjusted at any time), using tunnel as "virtual WAN interface" and the tunnel has been up close to 9 months now, I believe.

                                  I haven't taken the time to finish my guide yet though.

                                  I know the guide is not ready yet, but can someone point me to another guide that would help me set up PFsense 2.0 with Strongvpn with the option of routing only some clients through the VPN while allowing others to go through the default gateway.

                                  Thanks

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    smirta
                                    last edited by

                                    Better performance & policy routing

                                    Performance
                                    I am using pfsense 2.0 RC1. In my case the settings below in the "Advanced Configuration" field of the OpenVPN connection tab are resulting in a more stable connection:

                                    verb 4; mute 5;tun-mtu 1500;route-method exe;route-delay 2;explicit-exit-notify 2;fragment 1300;mssfix 1450;
                                    

                                    With these I can stream a lot more stable.

                                    On the other hand I was interested in tunneling some clients to some ip addresses. It was quite an operation. I followed the guide above (thanks a lot to the author!) except the "all traffic through VPN" part.

                                    Then I added a firewall rule to the LAN interface for a specific IP address to be routed through the OpenVPN . I figured out that after some time everything went through the WAN or through the VPN gateway (can't remember exactly which one). Additionally there was NAT didn't work as expected.

                                    Fix NAT
                                    I turned NAT off and added it manually. Firewall -> NAT -> Outbound : Add two entries there.

                                    
                                    Interface:    WAN
                                    Source:       CIDR of your LAN (e.g. 192.168.1.0/24)
                                    Description:  LAN -> WAN (or anything you want)
                                    
                                    
                                    
                                    Interface:    VPN
                                    Source:       CIDR of your LAN (e.g. 192.168.1.0/24)
                                    Description:  LAN -> OpenVPN (or anything you want)
                                    
                                    

                                    Fix rules/gateways
                                    After this NAT was working again. But there was still the problem with the routing of all traffic through either or the other interface. Somehow it was ignoring my rule. After some gambling around with the setting I was pretty surprised that "default" as gateway doesn't seem to work as expected. So I added to all rules a specific gateway. Now everything is working as expected. phew

                                    My "Default allow LAN to any rule " looks now like this:

                                     * LAN net * * * WAN
                                    

                                    For example if you want to route the client 192.168.1.5 through VPN you have to add the following line above the default rule:

                                     * 192.168.1.5 * * * VPN
                                    

                                    I hope this helps and is no complete bullshit. I'm an absolute newbie to pfsense.

                                    1 Reply Last reply Reply Quote 0
                                    • E
                                      ericab
                                      last edited by

                                      hi smirta;

                                      these additional options are specific to windows only.
                                      i would suggest removing them.

                                      route-method exe
                                      mssfix 1450

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        smirta
                                        last edited by

                                        thanks for the input (and the great tutorial btw), eric. I'll have a closer look at the options

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          cmb
                                          last edited by

                                          @smirta:

                                          I hope this helps and is no complete bullshit. I'm an absolute newbie to pfsense.

                                          That's ok for your typical home setup, but what you're actually doing there is overriding the fact that StrongVPN is pushing you a default route and modifying your firewall's routing table so it sends everything over the VPN (unless you override it with policy routing as you're doing). That will cause a number of issues with more advanced setups, as it's going to default to sending traffic initiated from the firewall out of the VPN which is usually going to be undesirable.

                                          1 Reply Last reply Reply Quote 0
                                          • S
                                            smirta
                                            last edited by

                                            Thanks for your reply. As I updated to the latest snapshot everything became obsolete. You just have to follow the initial guide, disable the "automatic outbound NAT" (it will fill in the rules done so far) and modify the rules described as in my post above.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.