Menu
InformatiWeb Pro
  • Index
  • System admin
  • Virtualization

Login

Registration Password lost ?
FR
  • Windows Server
    • WMS 2012
    • WS2012 R2
    • WS2016
  • Citrix
    • Citrix NetScaler Gateway
    • Citrix XenApp / XenDesktop
    • Citrix XenServer
  • VMware
    • VMware ESXi
    • VMware vSphere
    • VMware Workstation
  • Microsoft
    • Hyper-V
  • RAID
    • Adaptec SmartRAID
    • Broadcom MegaRAID
  • UPS
    • APC Back-UPS Pro
  • Firewall
    • pfSense
  • InformatiWeb Pro
  • System admin
  • Firewall
  • Create a VPN server (remote access) via OpenVPN (in L3 mode) secured via SSL/TLS on pfSense 2.6

Create a VPN server (remote access) via OpenVPN (in L3 mode) secured via SSL/TLS on pfSense 2.6

  • Firewall
  • pfSense
  • 05 September 2025 at 19:07 UTC
  • InformatiWeb
  • 2/4
Previous page

3. Check firewall rules

If you checked the 2 boxes at the end of the OpenVPN wizard, the rules must have been created in the firewall.
However, to check that these have been created, go to: Firewall -> Rules.

In the "WAN" tab, you will see that an "OpenVPN OpenVPN server for remote access wizard" rule has been created to allow IPv4 network traffic to UDP port 1194 (OpenVPN) of the pfSense WAN address.
Which allows OpenVPN clients to access your OpenVPN server from the Internet.

In the "OpenVPN" tab of the firewall, you will see that an "OpenVPN OpenVPN server for remote access wizard" rule has been created to allow all IPv4 network traffic into the OpenVPN tunnel.

4. Change OpenVPN server mode

To change the server mode and more specifically the way your users will be authenticated, go to: VPN -> OpenVPN.

In the "Servers" tab, click on the small pencil to the right of your OpenVPN server.

In the "Configuration Mode" section, locate the "Server mode" setting.
As you can see, at the moment your customers must log in with a local account in pfSense (User Auth) and have a user type certificate (SSL) in their account on pfSense.

If you wish, you can choose one of the other "Remote Access" modes:

  • Remote Access (SSL/TLS): requires only one SSL certificate per user and one TLS key (common to OpenVPN server and clients).
  • Remote Access (User Auth): only requires a user account (local to pfSense in this case).
  • Remote Access (SSL/TLS + User Auth): SSL certificate, TLS key + user account (as explained previously).

Warning : only requiring the SSL certificate can cause problems when a laptop on which it was located is stolen, for example.

5. Revoke a certificate (optional)

If you think that a certificate has been understood (during the theft of a computer where an OpenVPN client was configured, for example), you can revoke the certificate concerned so that it is no longer valid.
To do this, go to: System -> Cert. Manager.

Warning : you will then need to tell your OpenVPN server to use the revocation list created. Because by default, there is none.
To do this, locate the "Peer Certificate Revocation list" parameter in the configuration of your OpenVPN server.

In the "Certificate Revocation" tab, you will be able to select a certificate authority (CA) for which you want to create a new revocation list.

6. Add a user account on pfSense with a certificate (for OpenVPN)

To add a user account on pfSense, go to: System -> User Manager.

In the "Users" tab, click: Add.

Specify a Username and Password for this user.
Then, check the "Click to create a user certificate" box for the "Certificate" parameter.

In the "Create Certificate for User" section that appears, indicate:

  • Descriptive name: the same as for the username.
  • Certificate authority: the internal certification authority (CA) to use.
    In our case: OpenVPNRACA.
  • Lifetime: by default, the user certificate is valid for 10 years.

Click Save.

Your user has been created.

Next page

Share this tutorial

Partager
Tweet

To see also

  • pfSense 2.6 - Configure a LACP link (LAGG)

    Firewall 8/8/2025

    pfSense 2.6 - Configure a LACP link (LAGG)

  • pfSense 2.6 - Create a DMZ and configure the firewall

    Firewall 6/11/2025

    pfSense 2.6 - Create a DMZ and configure the firewall

  • pfSense 2.6 - Create a site-to-site (S2S) VPN tunnel via OpenVPN secured with SSL/TLS (L3 mode)

    Firewall 9/17/2025

    pfSense 2.6 - Create a site-to-site (S2S) VPN tunnel via OpenVPN secured with SSL/TLS (L3 mode)

  • pfSense 2.6 - Load balancing via HAProxy

    Firewall 8/27/2025

    pfSense 2.6 - Load balancing via HAProxy

Comments

No comment

Share your opinion

Pinned content

  • Software (System admin)
  • Linux softwares
  • Our programs
  • Terms and conditions
  • Share your opinion

Contact

  • Guest book
  • Technical support
  • Contact

® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.

Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.