To check the status of your site-to-site OpenVPN tunnel, go to the menu: Status -> OpenVPN.
In the "Site-to-Site VPN UDP4:1194 Client Connections: 1" list that appears, you will see the list of OpenVPN clients connected with:
To see the current VPN tunnel routing table, click: Show Routing Table.
In the routing table, you will see the name of the affected OpenVPN client, its public (external) IP address, as well as local (private) IP addresses:
Notes :
To check the status of your OpenVPN tunnel on the other site, the menu is the same.
Go to: Status -> OpenVPN.
However, the information displayed is different since a client necessarily has less information to display than a server.
In the case of an OpenVPN client, you will see a "Client Instance Statistics" section with:
If there is a problem with OpenVPN, don't hesitate to consult the logs of the pfSense OpenVPN service to try to find the cause.
To do this, on the "Status / OpenVPN" page, click on the penultimate red icon or go through the "Status -> System Logs" menu and go to the "OpenVPN" tab of the page that will be displayed.
In the "OpenVPN" tab, you will find a lot of information related to the OpenVPN service.
Sort the list by clicking the "Time" column to see recent events first.
On the other physical site, the method is the same. Although the remote site uses an OpenVPN client unlike the local site which uses an OpenVPN server.
Now that your OpenVPN tunnel is established, try pinging the LAN IP address of the different pfSense machines to verify that the OpenVPN tunnel is correctly configured.
As you can see, in our case, our PC at site 1 (Brussels) manages to communicate with the pfSense LAN IP address of the local site (Brussels) and the remote site (Paris).
Same, from the remote site (Paris).
For this tutorial, we installed a web server on each physical site to show that you will be able to access the intranet (local website) of the local site, as well as that of the remote site completely transparently.
To start, we go to the Brussels site which uses the "10.0.1.0/24" subnet.
As you can see, from our PC at site 1 (Brussels), we can easily access the website hosted on a server at site 2 (Paris) where the subnet "10.0.2.0/24" is used.
Also test in the other direction by going to site 2 (Paris).
As expected, the PC on site 2 (Paris) can also access the web server on site 1 (Brussels) without problem thanks to OpenVPN's site-to-site VPN tunnel.
Finally, if you wish, you can add the "OpenVPN" widget to the pfSense dashboard.
To do this, click on the pfSense logo to return to the dashboard, then click on the "+" icon at the top right.
In the "Available Widgets" section that appears, click on: OpenVPN.
On the pfSense machine where the OpenVPN server is installed, an "OpenVPN" block will appear with a "Site-to-Site VPN UDP4:1194 (1)" section.
In this block, you will be able to see:
On the pfSense machine where an OpenVPN client is installed, this block will appear with a "Client Instance Statistics" section.
In this block, you will be able to see:
Firewall 6/11/2025
Firewall 9/3/2025
Firewall 7/25/2025
Firewall 5/30/2025
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment