OpenVPN | pfSense Documentation (2024)

  • Docs »
  • pfSense® software »
  • Virtual Private Networks
  • Give Feedback

Next
OpenVPN Data Channel Offload (DCO)

Previous
VPN Scaling

  • OpenVPN Data Channel Offload (DCO)
  • OpenVPN Configuration Options
  • OpenVPN Firewall Rules
  • OpenVPN clients and Internet Access
  • Assigning OpenVPN Interfaces
  • OpenVPN and Multi-WAN
  • OpenVPN and High Availability
  • Sharing a Port with OpenVPN and a Web Server
  • Controlling Client Parameters via RADIUS
  • OpenVPN Adapter Address ICMP Behavior

See also

  • OpenVPN Client Export Package

  • OpenVPN Server and Client Status

  • OpenVPN Logs

  • Connecting OpenVPN Sites with Conflicting IP Subnets

  • OpenVPN Remote Access Configuration Example

  • Authenticating OpenVPN Users with FreeRADIUS

  • Authenticating OpenVPN Users with RADIUS via Active Directory

  • Installing OpenVPN Remote Access Clients

  • Installing the OpenVPN Client on iOS

  • Adding OpenVPN Remote Access Users

  • OpenVPN Site-to-Site Configuration Example with SSL/TLS

  • Routing Internet Traffic Through A Site-To-Site OpenVPN Tunnel

  • Bridging OpenVPN Connections to Local Networks

  • OpenVPN Site-to-Site with Multi-WAN and OSPF

  • Troubleshooting OpenVPN

  • Troubleshooting OpenVPN Internal Routing (iroute)

  • Troubleshooting Windows OpenVPN Client Connectivity

OpenVPN is an open source VPN solution which can provide access to remoteaccess clients and enable site-to-site connectivity. OpenVPN supports clients ona wide range of operating systems including all the BSDs, Linux, Android, macOS,iOS, Solaris, Windows, and even some VoIP handsets.

Every OpenVPN connection consists of a server and a client, for both remoteaccess and site-to-site deployments. In the case of site-to-site VPNs, onefirewall acts as the server and the other as the client. In most cases it doesnot matter which firewall acts in a particular role. Typically the location ofthe primary firewall will provide server connectivity for all remote locations,whose firewalls are configured as clients. This is functionally equivalent tothe opposite configuration the primary location configured as a clientconnecting to servers running on the firewalls at the remote locations. Inpractice, the servers are nearly always run on a central location.

OpenVPN supports several types of authentication methods:

X.509 (also known as TLS, SSL, or PKI):

Utilizes a certificate structure (CA, certificates, and keys). This offersstrong security as it cannot be guessed or brute forced.

User authentication:

Clients authenticate using credentials such as a username and password whichare checked against a local user database, LDAP, or RADIUS server.

Some authentication sources also support multi-factor authentication viamechanisms such as mOTP.

X.509 and User authentication together:

The most secure combination, combining multiple factors of authentication thatthe user has (e.g. certificates, keys) with something they know (credentials).

Shared key:

Client and server share a single shared key known to both parties.

Danger

Shared key mode has been deprecated by OpenVPN as it is no longer consideredsufficiently secure for modern requirements.

Shared key mode will be removed from future versions of OpenVPN. Usersshould not create any new shared key tunnels and should immediatelyconvert any existing shared key tunnels to SSL/TLS mode.

When an SSL/TLS instance is configured with a /30 tunnel network itbehaves in a similar manner to shared key mode. The primary difference is theneed to create and distribute the certificate structure to peers. SeeOpenVPN Site-to-Site Configuration Example with SSL/TLS for information on configuring OpenVPN inSSL/TLS mode.

Note

While OpenVPN utlizes TLS it is not a “clientless” SSL VPN in the sense thatcommercial firewall vendors commonly state. The OpenVPN client must beinstalled on all client devices and it is not browser-based. In reality noVPN solution is truly “clientless”, and this terminology is nothing more thana marketing ploy. For more in depth discussion on SSL VPNs, this post fromMatthew Grooms, an IPsec tools and former pfSense® software developer, inthe mailing list archives provides some excellent information.

For general discussion of the various types of VPNs available in pfSensesoftware and their pros and cons, see Virtual Private Networks.

See also

Hangouts Archive to view the September 2014 Hangout on Advanced OpenVPNConcepts and the September 2015 Hangout on Remote Access VPNs

OpenVPN and Certificates

The best practice is to use certificates for remote access and site-to-site VPNsbecause it allows access to be revoked for individual clients or sites. Ideally,certificates should be unique per device or at least per user.

If a client machine is compromised, stolen, or lost, or otherwise needs revoked,a shared certificate would have to be re-issued to all clients. If a client withan individual certificate is compromised, or access needs to be revoked for anyother reason, simply revoke that certificate. No other clients are affected.

The pfSense software GUI includes a certificate management interface that isfully integrated with OpenVPN. Certificate authorities (CAs) and servercertificates are managed in the Certificate Manager in the web interface,located at System > Certificates. User certificates are also managed in theweb interface, as a part of the built-in user manager found at System > UserManager. Certificates may be generated for any user account created locally onthe firewall except for the default admin account.

See also

For further information on creating a certificate authority, certificates,and certificate revocation lists, see Certificate Management.

OpenVPN | pfSense Documentation (2024)
Top Articles
How to Split Finances When Living Together | Chase
BlackRock ploughed UK pension funds into Putin’s war chest
Satyaprem Ki Katha review: Kartik Aaryan, Kiara Advani shine in this pure love story on a sensitive subject
Restaurer Triple Vitrage
Notary Ups Hours
270 West Michigan residents receive expert driver’s license restoration advice at last major Road to Restoration Clinic of the year
Legacy First National Bank
Immediate Action Pathfinder
Persona 4 Golden Taotie Fusion Calculator
Sports Clips Plant City
Enderal:Ausrüstung – Sureai
Gmail Psu
Cbs Trade Value Chart Fantasy Football
Playgirl Magazine Cover Template Free
Midlife Crisis F95Zone
065106619
Illinois Gun Shows 2022
Abortion Bans Have Delayed Emergency Medical Care. In Georgia, Experts Say This Mother’s Death Was Preventable.
Lazarillo De Tormes Summary and Study Guide | SuperSummary
Labby Memorial Funeral Homes Leesville Obituaries
The Pretty Kitty Tanglewood
Caledonia - a simple love song to Scotland
A Biomass Pyramid Of An Ecosystem Is Shown.Tertiary ConsumersSecondary ConsumersPrimary ConsumersProducersWhich
Play Tetris Mind Bender
Discord Nuker Bot Invite
4 Methods to Fix “Vortex Mods Cannot Be Deployed” Issue - MiniTool Partition Wizard
Skymovieshd.ib
Shelby Star Jail Log
Ullu Coupon Code
Bfsfcu Truecar
10-Day Weather Forecast for Santa Cruz, CA - The Weather Channel | weather.com
Uky Linkblue Login
What does wym mean?
Wega Kit Filtros Fiat Cronos Argo 1.8 E-torq + Aceite 5w30 5l
Six Flags Employee Pay Stubs
Gerber Federal Credit
Bozjan Platinum Coins
Kstate Qualtrics
11 Pm Pst
The Mad Merchant Wow
拿到绿卡后一亩三分地
Build-A-Team: Putting together the best Cathedral basketball team
Arcadia Lesson Plan | Day 4: Crossword Puzzle | GradeSaver
Mars Petcare 2037 American Italian Way Columbia Sc
Mvnt Merchant Services
craigslist | michigan
This 85-year-old mom co-signed her daughter's student loan years ago. Now she fears the lender may take her house
Brandon Spikes Career Earnings
Lamp Repair Kansas City Mo
Hkx File Compatibility Check Skyrim/Sse
Walmart Front Door Wreaths
Latest Posts
Article information

Author: Jonah Leffler

Last Updated:

Views: 5948

Rating: 4.4 / 5 (45 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Jonah Leffler

Birthday: 1997-10-27

Address: 8987 Kieth Ports, Luettgenland, CT 54657-9808

Phone: +2611128251586

Job: Mining Supervisor

Hobby: Worldbuilding, Electronics, Amateur radio, Skiing, Cycling, Jogging, Taxidermy

Introduction: My name is Jonah Leffler, I am a determined, faithful, outstanding, inexpensive, cheerful, determined, smiling person who loves writing and wants to share my knowledge and understanding with you.