burgercity 0 Posted ... Hello pfSense_fan. Thank you very much for creating and maintaining this guide. I have just renewed my AirVPN subscription for another year, and I used your referral link to do so. Please let me know if you do not receive credit for the referral and my purchase. Thank you again for this wonderful guide. Quote Share this post Link to post
securvark 16 Posted ... Hey thanks again for your guides. I am on pfSense 2.4 and this option on the OpenVPN config page no longer exists: Server Host Name Resolution = [√] Infinitely Resolve Server So I am wondering, this setting is supposed to make sure that when using a pool of servers, ie de.vpn.airdns.org, that when their DNS changes to a new DE server that pfSense picks it up and switches. I'm not sure, but I don't think 2.4 is doing that. But maybe that setting isn't doing what I think its doing. Is there a way to get pfSense do what I want? (ie, resolve the pool DNS name and switch the VPN over to a new IP if it changes?). Thanks! Edit: Nevermind, I found it in the ovpn file, resolv-retry infinite; can be placed in the advanced box. Quote Share this post Link to post
simpty 0 Posted ... Hey guys, I don't know if this was already discussed (if yes please point me to that post, saves me time to read through all the pages ) After using the instructions in the tutorial, my whole traffic is being routed through the VPN, which is exactly what I wanted.But I have a question: how can I bypass that VPN for just 2-3 domains like for example www.google.com? These shouldn't use the VPN. I guess a need an extra outgoing / outbound rule for LAN, right? Best regards,simpty Quote Share this post Link to post
go558a83nk 362 Posted ... Hey guys, I don't know if this was already discussed (if yes please point me to that post, saves me time to read through all the pages ) After using the instructions in the tutorial, my whole traffic is being routed through the VPN, which is exactly what I wanted.But I have a question: how can I bypass that VPN for just 2-3 domains like for example www.google.com? These shouldn't use the VPN. I guess a need an extra outgoing / outbound rule for LAN, right? Best regards,simpty I would create an alias for the domains I want outside VPN. You could also make an alias for the devices you want to be able to access those domains in case you don't want all devices to access those domains via the WAN. Then create outgoing NAT rule to allow your network, or your device alias, to access the allowed domains alias. Make sure the interface used for that NAT outgoing rule is your WAN. Then create LAN firewall rule(s) to allow the traffic using the aliases as well, making sure (in advanced) that the interface used is WAN. The order of your rules matters so if the same devices access VPN and WAN depending on domain you'll need to put the new rule above the rule allowing access to VPN tunnel. Quote Share this post Link to post
hackers2016 13 Posted ... I am going to use multiple WAN connection. I already setup AirVPN with pfsense 2.3.4_1any guide step by step how to do do it. I am not an expert with vpns Thank you Quote Share this post Link to post
dIecbasC 38 Posted ... I am going to use multiple WAN connection. I already setup AirVPN with pfsense 2.3.4_1any guide step by step how to do do it. I am not an expert with vpns Thank youhttps://nguvu.org/pfsense/pfsense-multi-vpn-wan/ Quote Share this post Link to post
DZMM 2 Posted ... I've managed to setup a way to route some IPs via the VPN and some not via the VPN by creating a new non-VPN gateway and then an alias for the urls I want to go via the non-VPN. However, the problem I have now is I want some some of the IPs on the VPN to be able to talk on the LAN to IPs not on the LAN e.g. IP1 on the VPN to be able to talk to Plex on the clearnet on port 32400. Has anyone solved this problem or can tell me how to please. Quote Share this post Link to post
go558a83nk 362 Posted ... I've managed to setup a way to route some IPs via the VPN and some not via the VPN by creating a new non-VPN gateway and then an alias for the urls I want to go via the non-VPN. However, the problem I have now is I want some some of the IPs on the VPN to be able to talk on the LAN to IPs not on the LAN e.g. IP1 on the VPN to be able to talk to Plex on the clearnet on port 32400. Has anyone solved this problem or can tell me how to please. I'm not sure if I understand what you've done. I have my network with some devices using VPN, some not, but they can all see eachother on the local network. I didn't create any new gateway. I do use aliases and create NAT outgoing and firewall rules to control what interface aliases can use. Quote Share this post Link to post
DZMM 2 Posted ... For Step 4B part 3, should 'Gateway Action' also be ticked? It looks similar to 'Gateway Monitoring' and I think it's a new option in pfSense. Thanks Quote Share this post Link to post
simpty 0 Posted ... Thank you go558a83nk for explaining that! But.. I'm just a beginner and don't know how to do all this The only thing I can do is following tutorials Quote Share this post Link to post
go558a83nk 362 Posted ... For Step 4B part 3, should 'Gateway Action' also be ticked? It looks similar to 'Gateway Monitoring' and I think it's a new option in pfSense. Thanks if gateway monitoring is disabled there's no reason to check option to disable gateway action as it's not monitored anyway. Quote Share this post Link to post
LazyLizard14 11 Posted ... I have pfsense running with WAN + 3 VPN connections and set up policy based routing. Certain destination IP ranges are accessed via different VPN connection ( = locations). That worked well for a few years but recently share-online stopped working and telling me that I am trying to use the account with different IP's or that my IP is already loading. They simply block VPN now or they can somehow detec that I have multiple WAN connections? Quote Share this post Link to post
dIecbasC 38 Posted ... I have pfsense running with WAN + 3 VPN connections and set up policy based routing. Certain destination IP ranges are accessed via different VPN connection ( = locations). That worked well for a few years but recently share-online stopped working and telling me that I am trying to use the account with different IP's or that my IP is already loading. They simply block VPN now or they can somehow detec that I have multiple WAN connections? They can see you are accessing from 3 different addresses as each one has a different IP address. For some services I use use a selective routing rule to enforce traffic out of a specific gateway rather than gateway group which gets round this. Quote Share this post Link to post
LazyLizard14 11 Posted ... Can you explain in detail please. Under "Firewall / Rules / LAN" I have the following rule Under the EU alias are all the destination IP ranges of the share-online servers. Worked well for but suddenly stopped and they seem to detect that I have multiple WAN setup. Quote Share this post Link to post
h3nchman24 0 Posted ... Need a little help, got the OpenVPN server working and shows to connect from outside fine, but the kicker is it has no network or internet access once I connect. I know it is a rule but I cannot figure out the rule that I need to add to make traffic pass. Also, I had to disable any rule for OpenVPN server...to make sure it worked but it did connect but that is all it does. Any help with a rule help the way it is setup would be great. Quote Share this post Link to post
onebarrell 3 Posted ... I upgraded to PFSense 2.4 today. It broke my PFSense connectivity completely. I have my PFSense configured as instructed in this thread by pfSense_fan. I do, however use a 4 port nic and utilize all 4 ports. I have a WAN, LAN (open Internet), AIRVPN 1 LAN, and AirVPN 2 LAN. Everything has been working and updating fine since PFSense 2.3. After the update today to 2.4, I have lost all internet connectivity including the open internet lan port. The internet icon on my windows 7 taskbar shows that I do have internet but no web pages will load. I backed up my pPFSense configuration before upgrading and have now reloaded PFSense 2.3.4 along with my saved configuration file. Everything works again with PFSense 2.3.4. I have tried to upgrade to 2.4 a couple of times in the last couple of hours; it just does not work me. If anyone has had the same problem, and found a solution, please post it in this thread. EDIT: I finally got it working. It seems that if OpenVPN is configured to use port 1194 no connection will occur. If I use ports 53, 80, 443, or 2018, I can connect without any problem. I was using port 1194 without issue with PFSense 2.3.4. EDIT 2: Now the only port that I can use to connect is 443. I can't get internet access using any other port. My speeds are also somewhat slower using PFSense 2.4. I'm going back to 2.3.4. It is stable and I can connect using any port that AirVpn allows. I think PFSense 2.4 may have been released before it was ready. EDIT 3: This will be my final edit. I want to now post that apparently there was something wrong with my previous PFSense 2.3.4 configuration which prevented PFSense 2.4 from updating properly. After trying to use my saved 2.3.4 configuration files on both upgrades and fresh installs, I was never able to avoid problems. Over the weekend, I did a fresh install of PFSense 2.4 and manually configured it using pfSense_fan’s 2.3 guide that I slightly modified only to use two AIRVPN interfaces as well as also an open LAN interface such as described in his PFSense 2.1 guide. PFSense is again working as it should for me. It will now connect using any of the ports that AIRVPN allows. I don’t know what was wrong with my previous configuration, since it worked perfectly and upgraded from Pfsense 2.3 to 2.3.4 without any problems or DNS leaks, but I am pleased to say that Pfsense 2.4 is indeed working perfectly with AIRVPN after the fresh install and manual configuration. Thanks again to pfSense_fan for providing this GREAT and detailed guide. 1 Feebaby reacted to this Quote Share this post Link to post
Blade Runner 4 Posted ... I upgraded to PFSense 2.4 today. It broke my PFSense connectivity completely. I have my PFSense configured as instructed in this thread by pfSense_fan. I do, however use a 4 port nic and utilize all 4 ports. I have a WAN, LAN (open Internet), AIRVPN 1 LAN, and AirVPN 2 LAN. Everything has been working and updating fine since PFSense 2.3. After the update today to 2.4, I have lost all internet connectivity including the open internet lan port. The internet icon on my windows 7 taskbar shows that I do have internet but no web pages will load. I backed up my pPFSense configuration before upgrading and have now reloaded PFSense 2.3.4 along with my saved configuration file. Everything works again with PFSense 2.3.4. I have tried to upgrade to 2.4 a couple of times in the last couple of hours; it just does not work me. If anyone has had the same problem, and found a solution, please post it in this thread. EDIT: I finally got it working. It seems that if OpenVPN is configured to use port 1194 no connection will occur. If I use ports 53, 80, 443, or 2018, I can connect without any problem. I was using port 1194 without issue with PFSense 2.3.4. EDIT 2: Now the only port that I can use to connect is 443. I can't get internet access using any other port. My speeds are also somewhat slower using PFSense 2.4. I'm going back to 2.3.4. It is stable and I can connect using any port that AirVpn allows. I think PFSense 2.4 may have been released before it was ready.It is difficult to suggest a solution without seeing your 2.3.4 configuration. Perhaps posting screenshots would be beneficial. IIRC there were issues with DNS Forwarder and DNS Resolver when upgrading from 2.3.4 (with pfBlockerNG and Suricata) to 2.4-RC. Neither pfBlockerNG nor Suricata functioned properly in 2.4-RC. I installed 2.4-RC without packages, configured AirVPN, and installed updates when released. No issues upgrading from 2.4-RC to 2.4.0-RELEASE. I have not yet installed any packages. Quote Hide Blade Runner's signature Hide all signatures Do not be afraid to fail. Share this post Link to post
Judas4all 3 Posted ... J8ust want to mention, pfSense 2.4 itself is ok. My upgrade worked without an issue Quote Share this post Link to post
smithhamadams 0 Posted ... I would like to add my thanks for the great guide to those of others before me. Quote Share this post Link to post
Wolf666 17 Posted ... Using PfSense 2.4.2....Airvpn works great and I didn’t change my config. Inviato dal mio iPad utilizzando Tapatalk Quote Hide Wolf666's signature Hide all signatures - Router/Firewall pfSense 23.01 (11th Gen Intel(R) Core(TM) i5-11320H @ 3.20GHz) - Switch Cisco SG350-10 - AP Netgear RAX200 (Stock FW) - NAS Synology DS1621+ (5 x 5TB WD Red) - ISP: Fiber 1000/300 (PPPoE) Share this post Link to post
airvpnincongnito 1 Posted ... Great guide. Given the recent WPA2 WiFi vulnerabilities, I think it would be prudent to add firewall rules to the guide as an optional section to Restrict access to management interface... The default configuration of pfSense allows management access from any machine on the LAN and denies it to anything outside of the local network WAN. There is also the anti-lockout rule enabled by default that prevents firewall rules from being configured in a way that will lock the user out of the web interface..... Given that a lot of users connect a Wireless AP to pfSense, compromising the AP will give access to the pfSense GUI thus hardening access to the GUI would be prudent... I was thinking a good way to restrict access for most users would be to allow admin user(s) to join the PfSense control panel via an approved static IP on their Desktop and ban all other users. So I guess you would need two rules on the firewall... one for approved IP and the other Block the rest. How would you go about writing something like that and add it to the guide? Cheers, Quote Share this post Link to post
JacksonLee 3 Posted ... Step 1: Disable IPv6 System Wide Hi, any plans to write a new Guide for 2.4 including IPv6, as AirVPN will enable IPv6 "later this year" ? 1 Feebaby reacted to this Quote Share this post Link to post
N3vrN3vr 0 Posted ... I am pretty new to all this stuff and I have everything up and running and am slowly learning the ins and outs.I have spent the last couple days trying to get certain IPs / ranges to bypass the VPN. After much trial and reading I have yet to find a solution. I presume this is because of settings that are unique to this guide. I found this below and I think its the answer to my problems but I am unsure where to implement these rules. "I just finished figuring out how to split my subnet so IPs in the range of 192.168.1.2 to 192.168.1.127 go through the VPN while IPs 192.168.1.128 to 192.168.1.254 bypass the VPN. As you stated, it does require NAT rules to be left in place when you switch to manual. The trick is to duplicate each of the manually generated ones and simply change the interface to the VPN connection interface. When finished, you should have pairs for:Source: subnet, Destination port 500Source: subnet, Destination port *Source 127.0.0.0/8, Destination port *The only difference between each entry in each pair is the interface. They should appear in that order, with each interface being covered by each source/destination port:Source: subnet, Destination port 500, Interface WANSource: subnet, Destination port 500, Interface VPNSource: subnet, Destination port *, Interface WANSource: subnet, Destination port *, Interface VPNSource 127.0.0.0/8, Destination port *, Interface WANSource 127.0.0.0/8, Destination port *, Interface VPNI then use firewall rules to guide each half of the subnet through either the VPN or through the WAN interface gateway. I think this is very useful for folks who want to send their media players (Apple TV, etc) through the VPN while leaving their computers passing through the regular interface. That being said, each person's setup is going to be unique. I did have to refer to the guide that worked for a previous VPN to figure out why my desired setup wouldn't work given the instructions here. That's when I realized I was missing the six NAT rules." tl;dr can someone tell me what how to do this in more detail ^ I understand the post but under NAT in the guide there is only 2 entry's instead of 3 Quote Share this post Link to post
N3vrN3vr 0 Posted ... OK I solved the issue!All I had to do was create a rule under Firewall>NAT> Outbound with interface set as WAN_DHCP and source set to any, and put this rule at the bottom of the list. After that my firewall redirect rule under the LAN tab worked just fine. I guess the guide had me deleting the default entry and that is what caused the issue, Quote Share this post Link to post
bobcat123 0 Posted ... i searched this thread and i couldnt find much but VPN OpenVPN Clients Edit america.vpn.airdns.org sometimes doesnt work, i had this problem before and had to put in the server manually, but i want it to be able to reconnect what is the correct host name now? Quote Share this post Link to post