Sie sind auf Seite 1von 10

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

Stefcho's Blog
Mostly Technical Topics Related to pfSense 2.0 Home About Contacts

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior with TLS and User Authentication
17/04/2011 / Stefan posted in Technical / 5 Comments VPN is very important service nowadays. The possibility to connect to remote network is very powerful feature used by single user accessing files at home to thousands of business users working remotely with applications and services available previously only on their desktops in the office. Because of that there are many alternative on the market providing such service. In this post I will focus on the OpenVPN running on the new version of pfSense 2.0 RC1. The goal is to compare the new features with the capabilities of the older 1.2.3 version. One of the reasons choosing OpenVPN was for the rich feature set, small system requirements the level of control. You can easily setup is up on virtual machine or on SoHo router. The possibility to authenticate users not by insecure usernames and passwords, but by certificates was very compelling. On 1.2.3 version of pfSense, instead of generating the certificates on the router, I was generating them on a Windows Machine. Following guidance from this sources: http://www.runpcrun.com/howtoopenvpn http://openvpn.net/index.php/open-source/documentation/howto.html#pki After generating all the required certificates, it was just a matter of copy / paste in the configuration. In the new 2.0 version of pfSense there is a Cert Manager. Using it you can manage your certificate on the box, not just pasting pre-generated certificates. The other new feature that we will use is User Manager. You have three options for central location of your users: local database, LDAP and RADIUS.For this post we will use local database, as it is the easiest way.

As a first step, lets install the OpenVPN Client Export Utility package, from System > Packages. We will need it later.

Then go to System > Cert Management. On the CA (Certificate Authority) leaf, create new one. Take a note of the Descriptive and Common names you give it, we will need them later. Enter the rest of the details for the CA.

1 of 10

09-01-2012 1:25

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

Now under System > User Management, create new user account.

2 of 10

09-01-2012 1:25

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

Tick in the Certificate section Click to create a user certificate., or after the user is created, enter the newly created user account and generate a certificate for the user. As a Method select Create an Internal Certificate, enter the Distinguished name details. Now is time to configure the OpneVPN server. Go under VPN > OpenVPN, select the Wizard leaf. For type of Server, select Local User Access

For Certificate Authority Select the name of the one we created earlier, in our case Road Warrior CA

For Server Certificate, select Add New Certificate, type in something memorable for Descriptive name, because we will use it right away.

3 of 10

09-01-2012 1:25

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

Now edit the configuration of the OpenVPN server. On this page you can enable TLS.

4 of 10

09-01-2012 1:25

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

Select the size of DH, Encryption Algorithm.

5 of 10

09-01-2012 1:25

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

for Tunnel Network choose a subnet that different from your LAN subnet. In the Local Network enter your LAN subnet. Decide on the number of Concurrent Connections, and if you want to use compression.

As this is a very basic configuration, we wont enter DNS servers, and Default Domain, but you should consider these options, depending on your environment.

6 of 10

09-01-2012 1:25

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

Now go to VPN > OpenVPN, select the Client Export leaf. The package that we have installed in the beginning gives us the possibility to automatically export archive with the user configuration files. Find the user for whom you want to export configuration, and click on the Configuration archive link.

7 of 10

09-01-2012 1:25

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

If you havent already download the OpenVPN client, download and install OpenVPN Client with GUI from Here Now open the Configuration Archive and extract the files in this location on the machine from which you are going to establish the VPN connection. C:\Program Files\OpenVPN\config\

You should be able to successfully connect to your VPN from outside. The management of users and certificate is much easier in pfSense 2.0. You dont have to keep a Certificate Authority on separate box, and the discomfort with transferring the CRLs is gone. The utility that generates bundles with the required certificates and configuration for each user automate most of the tedious manual work from the previous version. As a bonus I have recorded the process of configuration, you can check it out here:

Free Vm Monitor Complete End-to-End Virtual Machine Monitoring. Free Trial!


www.PHDVirtual.com/Monitor

< OpenVPN, pfSense > 1 : 1 NAT in pfSense and DD-WRTOpenVPN with LDAP authentication on pfSense 2.0 RC1

Comments (5)
1. 5:21 am, 28/07/2011Trooper / Reply Stefan, great tutorial, thanks! But in my scenario I want access other internal subnets in interfaces OPT1 and OPT2. In your tutorial the VPN access only LAN subnet. How I can access computers on ALL subnets? Thanks. 2.

8 of 10

09-01-2012 1:25

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

5:27 pm, 15/08/2011 / Reply , , ! . ! 3. 3:34 am, 19/08/2011Momo / Reply Hi Trooper, If you need to access other internal subnets, try to add them in advanced section: push route XXX.XXX.XXX.XXX MMM.MMM.MMM.MMM;push route YYY.YYY.YYY.YYY MMM.MMM.MMM.MMM; each internal should be followed by its mask (example: push route 10.10.20.0 255.255.255.0; Good luck. 4. 6:35 am, 21/08/2011Ry / Reply Awesome thanks been looking for something like this. 5. 10:52 pm, 21/11/2011Jean / Reply THANKS! Saved me like 2 days to figure it out.

Leave a Reply
Name (*) Email (*) Website

CAPTCHA Code * Allowed Tags - You may use these HTML tags and attributes in your comment.
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Pingbacks (5)
1. 2. 3. 4. 5. 1:20 pm, 22/04/2011 4:32 pm, 26/04/2011 4:39 pm, 04/06/2011 11:36 am, 13/08/2011 10:16 pm, 07/09/2011 OpenVPN with LDAP authentication on pfSense 2.0 RC1 OpenVPN with RADIUS authentication on pfSense 2.0 RC1 Routing Road Warriors clients through a Site-To-Site VPN with pfSense 2.0 RC1 and OpenVPN OpenVPN on pfSense 2.0 RC3 with OpenLDAP Authentication on CentOS 5.6 Using your OpenVPN Road Warrior setup as a Secure Relay

Search... Translate

Tags
ADDS Asterisk ASUS Captive Portal Cell Phone CentOS Creative
OpenWrt pfCenter 8

DD-WRT Hyper-V LDAP Linksys Microsoft Mikrotik RouterBoard RB250G Network OpenLDAP OpenVPN
Routing Site

pfSense pfSense 2.0 RC1 pfSense 2.0 RC3 PKI RADIUS

To Site Technical Uncategorized VLAN VMWare VoIP Vyatta Windows Server

Windows Server 2008 R2 Wireless Workstation 8

9 of 10

09-01-2012 1:25

pfSense 2.0 RC1 configuration of OpenVPN Server for Road Warrior wi...

http://blog.stefcho.eu/?p=492

January 2012 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Oct Archives October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 July 2010 Meta Log in Entries RSS Comments RSS WordPress.org

Microsoft Office 365


Sus Programas de Office Disponibles Dnde y Cundo quieras.
www.microsoft.com/office3

internet satellite vpn


Broadband Internet on NSS10 T11N, IS14, W6, W2A, IS902
LinkSystems-UK.Com

Ofertas para ti
Regstrate y Accede a Ofertas de hasta un 70% descuentos!
www.GROUPON.cl

Supermicro SuperBlade
Intel Xeon based SuperBlade ! Powered by up to 28 Quad-Core CPUs
supermicro.com/CloudServe

Premium OpenVPN Services


U.S. Servers - Free Test Accounts Quick And Easy, One Click Signups
www.vpnpop.com

Powered by WordPress / Theme SimpleDark by Justice

10 of 10

09-01-2012 1:25

Das könnte Ihnen auch gefallen