Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    OpenVPN (Client) + BTGuard + Tunneling WLAN

    OpenVPN
    4
    4
    2580
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      fLoo last edited by

      Dear other members of pfSense,

      i'm successfully using pfSense to route all my traffic including 2 WANs (no load balancing) several VLANs and networks. Its running quite impressive on my ESXi (a well documented installation will be released shortly to give you guys something back). I've planned to go a step further and plan to make my Wireless Access Point publically available for the other people here in my House/Street. Todo so, i need to tunnel all WLAN traffic which is going to the internet through a VPN. This is because german law has some really annoying paragraphs which will send me to jail if anybody is doing nasty things using my public WLAN (Mitstörerhaftung).

      So i've signed up with BTGuard.com VPN Service because speed is fine and i got OpenVPN supported. The only thing i am stuck is setting the stuff up. What i did so far:

      • Imported the .crt Certificate from BTGuard (no .key given out by them)
      • Setup the OpenVPN
      • It is in fact connecting, but connection is getting terminated immediatly

      Did anyone successfully used BTGuard to build up a VPN using pfSense client ability?

      Kind regards

      Florian

      1 Reply Last reply Reply Quote 0
      • J
        joako last edited by

        I had tried something similar but it seemed the routes pushed from the vpn were conflicting with the local routing table. I'm sure there's a workaround. I basically copied a working config from the OpenVPN client (Viscosity,) it was pretty straightforward.

        1 Reply Last reply Reply Quote 0
        • P
          pkwong last edited by

          PFsense is a great security+ appliance and I definitely applaud the developers et. al.  It really comes down to overhead vs. manageability.  pfSense is definitely designed to be modular and very capable.  It's more than just a capable firewall, it's a proxy and definitely keeps up with the times and needs of the community much faster.  You can definitely fine tune pfSense, but without really getting into the guts and doing configuration of the VPNs for example (like pushing routes and running scripts) and even routing table manipulation, it's a bit tedious to do from the command line.

          I'm not saying it's not doable, just more of a challenge.  For example, understanding how MTUs and Fragmentation effect latency are important.

          Adjusting and supporting more than one Cipher is also an issue.  Generating keys and clients are much easier on the command line.  Client Config Directives from the same server are also important.  Having the ability to have multiple clients on the same port would be yet another reason.

          You can also apply pre-processing of packets prior to sending out the tunnel (OVPN or IPSEC).  There are many ways and things to do.  While pfSense is relatively lightweight, I come from the school of keeping the absolute minimum you need on the box and leveraging the rest of the resources towards performance.

          I still strongly recommend pfSense as my Firewall of Choice.  I just come from a different mindset where I believe the least amount of "weight" on a machine, the better the performance.  In some cases though, a GUI does make things easier and that is why pfSense is so successful.  It's feature rich and the development team has managed to put it all together in such a way that not only does it make it easy to manage, but it works very well together.

          So once again, for me it's Kudos to the team… but in some cases, you'll need to fine tune a specific service / server and pfsense may not be an optimal solution.

          1 Reply Last reply Reply Quote 0
          • P
            p1erre last edited by

            @joako:

            I had tried something similar but it seemed the routes pushed from the vpn were conflicting with the local routing table. I'm sure there's a workaround. I basically copied a working config from the OpenVPN client (Viscosity,) it was pretty straightforward.

            I did the same, but the tunnel didnt came up.

            I just took a look into the client config and changed the tls seeting in /var/etc/openvpn/client1.conf from

            tls-auth /var/etc/openvpn/client1.tls-auth 1
            

            to

            tls-auth /var/etc/openvpn/client1.tls-auth
            

            restarted the service and the tunnel came up

            Now i have the same issue like joako.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post

            Products

            • Platform Overview
            • TNSR
            • pfSense Plus
            • Appliances

            Services

            • Training
            • Professional Services

            Support

            • Subscription Plans
            • Contact Support
            • Product Lifecycle
            • Documentation

            News

            • Media Coverage
            • Press
            • Events

            Resources

            • Blog
            • FAQ
            • Find a Partner
            • Resource Library
            • Security Information

            Company

            • About Us
            • Careers
            • Partners
            • Contact Us
            • Legal
            Our Mission

            We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

            Subscribe to our Newsletter

            Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

            © 2021 Rubicon Communications, LLC | Privacy Policy