Sam has over 10 years of experience working with pfSense firewalls and has written over 30 articles on the subject.
Secure Remote Network Access Using OpenVPN
In this article, you will learn how to set up remote access to your network using OpenVPN on pfSense.
Using a VPN, or virtual private network, is the most secure way to remotely access your home or business network. VPNs provide strong security by encrypting all of the traffic sent between the network and the remote client.
Since pfSense is open source and available for free this project won't cost you anything to complete.
This guide assumes you already have a functional pfSense firewall running. If you don't have one yet you can easily build one using an old computer, or even run a virtual one using VirtualBox.
OpenVPN Configuration Wizard
The simplest way to configure OpenVPN on pfSense is to use the built in VPN configuration wizard. The wizard will guide you through the process of creating a certificate authority, issuing a server certificate, and configuring the OpenVPN server settings.
To start the configuration open the VPN menu in the web interface and select OpenVPN, then click on the wizards tab.
For the first step of the configuration wizard you will need to choose the authentication backend type. OpenVPN provides three different authentication methods.
Local user access is the simplest method since it does not require an external authentication server.
OpenVPN Authentication Backends
Local User Access
Manage VPN users using the pfSense local user manager.
Manage user access using Windows active directory services.
Manage users on an external RADIUS authentication server.
Creating a Certificate Autority
The next configuration step is to create a certificate authority for issuing certificates. If there is already an existing CA configured in pfSense you can choose to use it for OpenVPN instead of creating a new one.
If you are creating a new CA then you will need to fill out all of the fields in the wizard in order to continue.
The default key length of 2048 bits is sufficient but you can use a longer length key if more security is required. Larger key sizes are more secure but they will require more CPU resources.
Creating a Server Certificate
After creating the certificate authority a server certificate must be issued for OpenVPN. Again you will need to select a key size that meets your security needs and CPU resources.
The default certificate lifetime is 3650 days (10 years). For higher security environments you should consider reducing the certificate lifetime. For home users the default lifetime is fine.
OpenVPN General Settings
In the general settings, you will need to select the interface OpenVPN will listen for connection on. In most cases, this will be the external-facing interface (WAN) which is connected to the internet.
The recommended protocol for most users is UDP on IPV4. UDP is faster than TCP but can be less reliable since packet delivery is not guaranteed. TCP will provide higher reliability but can be slower since there is more protocol overhead.
Use the default listening port of 1194 unless you have a specific need to use a different port.
The cryptographic settings can all be left on default, advanced users may want to tweak these settings as needed for their specific security needs.
If you are using a hardware cryptographic accelerator be sure to select it in this section.
OpenVPN Tunnel Settings
The two most important settings in the tunnel settings section are the tunnel network and the local network.
The tunnel network should be a new network that does not currently exist on the network or the pfSense firewall routing table. When clients connect to the VPN they will receive an address in this network. For example, you could enter 10.0.0.0/24 as long as this does not already exist on your network.
Enter the address of the network that clients will connect to in the local network box. By default pfSense uses 192.168.1.0/24 as the local network so most users will enter that as the network address unless they specified a different network.
The rest of the settings in the tunnel section can be left on their default settings.
OpenVPN Client Settings
The settings in the client settings section will be assigned to OpenVPN clients when they connect to the network.
Most users will only need to worry about entering a DNS server in the client settings section. If you are also using pfSense as your local DNS server you would enter the local address of the pfSense firewall (usually 192.168.1.254). If you are using separate DNS servers you can enter them here as well.
Optionally a default DNS domain and NTP servers can be provided to clients as well.
One nice feature of the OpenVPN wizard is its ability to automatically generate the necessary firewall rules in pfSense to permit connections to the VPN server. In most basic setups you should enable both of these options. If you do not use the automatic rules then you must manually create rules to allow clients to connect to the VPN.
Traffic from Clients to Server
Enabling this option will automatically generate firewall rules to permit incoming connections to the OpenVPN server from clients anywhere on the internet.
Traffic from Clients Through VPN
This option will create an automatic firewall rule which allows traffic from clients connected to the VPN to anywhere on the local network.
After entering all of the required settings the setup wizard is complete. Click finish to apply all of the settings to pfSense.
Creating VPN Users With Certificates
After the OpenVPN configuration has been completed you are ready to start adding VPN users. If selected the local user access option during the configuration wizard then users can be added using the pfSense user manager (System Menu \ User Manager).
Enter a username, password, and click the certificate checkbox to generate a user certificate. Be sure to set a name in the descriptive name field, then click the save button to complete the process of adding the user.
Installing the OpenVPN Client Export Package
I recommend installing the OpenVPN client export package available in pfSense to make the process of setting up clients much easier.
Install the package using the pfSense package manager found under the system menu. Enter openvpn-client-export in the search term box of the package manager and click on install.
After the package has been installed there will be a new tab called client export in the OpenVPN menu.
Client Connection Behavior
In the client export settings, you can adjust several settings that will effect client connection behavior. The main setting you may want to modify here is the host name resolution field. By default, this field is set to the IP address of the interface running OpenVPN. You can select the option 'other' if you want to enter a DNS name such as a dynamic DNS hostname.
After making any changes click the save as default button to store the settings.
Downloading OpenVPN Client Packages
After the client export settings have been configured you can export client configuration files and bundled clients using the utility.
The client export tool supports several different operating systems and clients including Windows, Mac, Android, and iOS.
Testing VPN Connectivity
After you've exported a client package you are ready to begin testing connectivity. To test connectivity from Windows simply install the client package and run through the installation wizard.
The best part of using the OpenVPN client export utility is that the client will automatically be configured to connect to your VPN. You will only need to enter your username and password in order to connect.
OpenVPN Connect Mobile Client
Android or iOS users can easily connect by installing the OpenVPN connect package through the app store. After installing the app generate a client export settings file and transfer it to your mobile device. Opening the settings file will automatically open the OpenVPN app and import the profile.
For additional security, I strongly recommend implementing two-factor authentication. Two-factor authentication (2fa) requires logging in using a password and a second code which usually expires after a short period of time or is a one-time use password.
Setting up 2fa is a complicated topic that is outside the scope of this article but I will offer a couple of suggestions below.
This article is accurate and true to the best of the author’s knowledge. Content is for informational or entertainment purposes only and does not substitute for personal counsel or professional advice in business, financial, legal, or technical matters.
© 2018 Sam Kear
devendra Kr Pl on May 19, 2020:
hi, I have a problem OPENVPN is working properly but VPN user not able to connect the local network please help me if you have a solution.
Chris on November 28, 2019:
Excellent guide - thanks!
mehdi on June 30, 2019:
i have a question,
is need install openvpn server before install pfsense and config?
or pfsense integrated openvpn server and we just need config it?
Alessio on May 12, 2019:
Provided resources are a cherry bonus.
Duo is really interesting, thinking to implement it for the charity am volunteering for!
Thanks for the inspiration!
ArkMighty on April 17, 2019:
Solved my dns problem, my pfsense dns server was not accepting dns requests from TLS. Ticked the check box in dns Resolver section and it worked. Thank you so much Sam for great guides.
ArkMighty on April 15, 2019:
Thanks so much, great guide. However, I can not access internet while I’m connected to OpenVPN. I can ping to openvpn client from LAN and I can access pfsense from openvpn client. Please help.
Nithin on April 12, 2019:
Thanks. Worked like a charm !!
alex on April 02, 2019:
This article is spot on.
ali on January 29, 2019:
can i set period of time in openvpn on pfsense?
for example the connection timeout after 1 hour and require to reconnect
Pako on December 04, 2018:
Thanks very good
Fillip on December 01, 2018:
I have the exact same problem.
I can connect to GW address of my LAN but that's it.
Bos on October 30, 2018:
It works but I can not access anything on the LAN, clients not getting gateway
SunilPunjabi on October 03, 2018:
Great write up. I’d like to use this to create a personal VPN, when my family is on public WiFi. But, I have the same question/issue as @Lgrier. How do I allow clients to get out to the internet from pfSense VPN?
Lgrier on September 07, 2018:
Hi Sam - great guide! Works very well. I'm able to connect without issue. Only problem is I'm unable to access websites while connected to the VPN server. I'm not seeing anything obvious in the fw logs... Any idea where to start to diagnose the problem?
Yannick on August 21, 2018:
It works on PC but not on mobile on version 2.4.3.
OpenVPN Connect Mobile Client stuck on "Connecting" and finish on "connection timeout".
Everything works fine with my previous version (2.3.2) on an old server (x86 only).
Any idea ?
Mitch on July 26, 2018:
This works perfectly!! Thank you.
We are experiencing a follow up issue.
The first user to authenticate and connect to the vpn works great, can ping local network.
When multiple users connect to this VPN, they are authenticated however they are unable to ping.
Any ideas please?
Sam Kear (author) from Kansas City on July 16, 2018:
You would then install the VPN client on your laptop or mobile device. Once the VPN client is connected you can access the web GUI as you normally would from within your network.
kalane on July 16, 2018:
So. After doing all this steps, how can i access my web gui if i am in anyother coutry, for instance ?
Mo on July 11, 2018:
Thank you very much this is very useful, I can’t connect from outside my LAN I could only connect when I am home not outside the house any help
Sam Kear (author) from Kansas City on July 11, 2018:
Thanks for pointing that out! I have added a note to the article regarding entering a descriptive name for the certificate.
fotidim on July 10, 2018:
Amazing guide. One minor improvement is that when clicking the "certificate checkbox to generate a user certificate" it is required to enter a "Descriptive name" otherwise the certificate does not get created without giving any error.
Sith Trader on July 07, 2018:
Awesome write up! I’ll setup a test environment.