pfsense:vpn:openvpn:configure_an_openvpn_server:using_a_wizard
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pfsense:vpn:openvpn:configure_an_openvpn_server:using_a_wizard [2021/02/17 11:28] – [Create the Server Certificate] peter | pfsense:vpn:openvpn:configure_an_openvpn_server:using_a_wizard [2021/02/17 13:41] (current) – [Install the Client Certificate] peter | ||
---|---|---|---|
Line 56: | Line 56: | ||
===== Configure the VPN Server ===== | ===== Configure the VPN Server ===== | ||
- | Now Create the actual VPN server configuration. | + | In **General OpenVPN Server Information**: |
- | + | ||
- | General OpenVPN Server Information: | + | |
* Interface: | * Interface: | ||
Line 69: | Line 67: | ||
---- | ---- | ||
- | Cryptographic Settings: | + | In **Cryptographic Settings**: |
* TLS Authentication: | * TLS Authentication: | ||
Line 82: | Line 80: | ||
---- | ---- | ||
- | Tunnel Settings: | + | In **Tunnel Settings**: |
* Tunnel Network: | * Tunnel Network: | ||
Line 92: | Line 90: | ||
* Inter-Client-Communication: | * Inter-Client-Communication: | ||
* Duplicate Connections: | * Duplicate Connections: | ||
+ | |||
+ | <WRAP info> | ||
+ | **NOTE: | ||
+ | |||
+ | Any local address, could be used here. i.e. RFC1918 Compliant. | ||
+ | |||
+ | * **RFC1918 Compliant**: | ||
+ | |||
+ | Take care not to choose 10.10.10.1 as this could conflict with pfBlockerNG | ||
+ | |||
+ | </ | ||
{{: | {{: | ||
Line 97: | Line 106: | ||
---- | ---- | ||
- | Client Settings: | + | In **Client Settings**: |
* Dynamic IP: **Checked**. | * Dynamic IP: **Checked**. | ||
Line 123: | Line 132: | ||
===== Success ===== | ===== Success ===== | ||
+ | |||
+ | ==== OpenVPN Server ==== | ||
+ | |||
+ | Navigate to **VPN -> OpenVPN -> Servers**. | ||
{{: | {{: | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Firewall Rules - WAN ==== | ||
+ | |||
+ | Navigate to **Firewall -> Rules -> WAN**. | ||
+ | |||
+ | {{: | ||
+ | |||
+ | {{: | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Firewall Rules - OpenVPN ==== | ||
+ | |||
+ | Navigate to **Firewall -> Rules -> OpenVPN**. | ||
+ | |||
+ | {{: | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Cert Manager - CAs ==== | ||
+ | |||
+ | Navigate to **System - Cert Manager - CAs**. | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Cert Manager - Certificates ==== | ||
+ | |||
+ | Navigate to **System - Cert Manager - Certificates**. | ||
+ | |||
+ | {{: | ||
---- | ---- | ||
Line 142: | Line 192: | ||
* Lifetime: | * Lifetime: | ||
- | In this way we will have created | + | <WRAP info> |
+ | **NOTE: | ||
+ | </ | ||
+ | {{: | ||
+ | |||
+ | ---- | ||
<WRAP info> | <WRAP info> | ||
Line 158: | Line 213: | ||
Search for **openvpn-client-export**. | Search for **openvpn-client-export**. | ||
+ | |||
+ | {{: | ||
Install the Package. | Install the Package. | ||
+ | |||
+ | {{: | ||
<WRAP info> | <WRAP info> | ||
Line 165: | Line 224: | ||
</ | </ | ||
+ | ---- | ||
- | Under **Remote Access Server** we select our created VPN server. | + | ===== Configure the Client Certificate ===== |
- | In the **Client Connection Behavior** | + | Navigate to **VPN -> OpenVPN -> Client Export** |
+ | |||
+ | In **OpenVPN Server**: | ||
+ | |||
+ | * Remote Access Server: | ||
+ | |||
+ | In **Client Connection Behavior**: | ||
* Host Name Resolution: | * Host Name Resolution: | ||
* Host Name: **Enter the Public IP address of the network**. | * Host Name: **Enter the Public IP address of the network**. | ||
- | * Verify Server CN: **Automatic - Use verify-x509-name | + | * Verify Server CN: **Automatic - Use verify-x509-name where possible**. |
+ | <WRAP info> | ||
+ | **NOTE: | ||
+ | There is no need to click on the **Save as default** button, but if you do it is easy to update and save as a new default. | ||
+ | </ | ||
- | Once the parameters are configured, we can export our users configuration file to be installed on the clients. | + | {{: |
- | To do this we have various choices, the most recommended below: | + | ---- |
+ | |||
+ | ===== Export the Client Certificate ===== | ||
+ | |||
+ | Export the user configuration file which is to be installed on the clients. | ||
+ | |||
+ | There are many choices.To do this we have various choices, the most recommended below: | ||
* **Most Clients**: Generates an .ovpn file containing both the configuration and the certificates and the easily imported keys, compatible with clients: OpenVPN for Windows, Tunnelblick for OS X. | * **Most Clients**: Generates an .ovpn file containing both the configuration and the certificates and the easily imported keys, compatible with clients: OpenVPN for Windows, Tunnelblick for OS X. | ||
* **OpenVPN Connect**: | * **OpenVPN Connect**: | ||
- | * **Archive**: | + | * **Archive**: |
- | * Under the **Current Windows Installer** | + | * **Current Windows Installer**: Generate |
+ | |||
+ | {{: | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Install the Client Certificate on an actual Client ===== | ||
+ | |||
+ | Copy the Client Certificate (the .ovpn file) to the specific client. | ||
+ | |||
+ | Connect to the OpenVPN Server using this Client Certificate. | ||
+ | |||
+ | For example on an Android phone, the OpenVPN app is used and shows successful connection. | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Show OpenVPN Widget on the pfSense Dashboard ===== | ||
+ | |||
+ | Navigate to the pfSense Dashboard. | ||
+ | |||
+ | Click on the **+** at the top of the dashboard and select **OpenVPN**. | ||
+ | |||
+ | When a client connects via the VPN this will show: | ||
+ | {{: | ||
---- | ---- |
pfsense/vpn/openvpn/configure_an_openvpn_server/using_a_wizard.1613561283.txt.gz · Last modified: 2021/02/17 11:28 by peter