- Price is good for the VPN servers about $12 and it gets you access to NNTP servers
- Logging in not kept and many VPN endpoints
- Already have it and why not use what already paying for
- No one has a tutorial on how to setup pfSense with EasyNews VPN, so good to be the first
Creating an Internal CA
Creating a local certificate from the Internal CA
Create the CA Certificate
- Select menu item: System->Cert Manager
- Select CAs tab
- Click Plus symbol to add CA Certificate
- Configure as follows:
- Descriptive Name = EasynewsVPN
- Method = Import an existing Certificate Authority (Location of certificate is here)
--BEGIN CERTIFICATE--
--END CERTIFICATE-- - Certificate Private Key = Leave Blank
- Serial for Next Certificate = Leave Blank
- Click Save
[ref1],[ref2]
Create OpenVPN Client
- Select menu: VPN->OpenVPN
- Select Client tab
- Click Plus symbol to add client
- Configure as Follows:
- Disabled = unchecked
- Server Mode = Peer To Peer (SSL/TLS)
- Protocol = UDP
- Device Mode = TUN
- Interface = WAN
- Server Host Address = nyc-a01.wlvpn.com (or other server address from EasyNews. full list is here)
- Server Port = 1194 or 443
- Proxy Host or address = (Leave Blank)
- Proxy Port = (Leave Blank)
- Proxy Authentication Extra Options = none
- Server host name resolution = Checked
- Description = easynewsVPN (or whatever you want)
- Username = username@easynews
- Password = (Your password for easynews)
- TLS Authentication = Unchecked
- Peer Certificate Authority = easynewsVPN
- Client Certificate = None
- Encryption Algorithm = AES-256-CBC (256-bit)
- Auth Digest Algorithm = SHA1 (160 bit)
- Hardware Crypto = No Hardware Crypto Acceleration
- IPv4 Tunnel Network = (leave blank)
- IPv6 Tunnel Network = (leave blank)
- IPv4 Remote Network/s = (leave blank)
- IPv6 Remote Network/s = (leave blank)
- Limit outgoing bandwidth = (leave blank)
- Compression = No Preference
- Type of Service = Unchecked
- Disable IPv6 = Checked
- Don't Pull routes = Unchecked
- Don't add/remove routes = Unchecked
- Advanced remote-cert-tls server
resolv-retry infinite
persist-key
persist-tun
persist-remote-ip
comp-lzo
verb 3
auth SHA256
keysize 256
tls-cipher DHE-RSA-AES256-SHA
auth-nocache
- Click Save
[ref1],[ref2]
Updates of custom settings from other implementations
Other documents detailed of the advanced settings as thus:remote-cert-tls server
resolv-retry infinite
persist-key
persist-tun
persist-remote-ip
comp-lzo
verb 3
auth SHA256
keysize 256
tls-cipher DHE-RSA-AES256-SHA
but my configuration is as this:
remote-cert-tls server
resolv-retry infinite
persist-key
persist-tun
persist-remote-ip
comp-lzo
verb 3
auth SHA256
keysize 256
tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA
auth-nocache
I changed the tls-cypher because when opening connection, the logs said that DHE-RSA-AES256-SHA was depreciated and TLS-DHE-RSA-WITH-AES-256-CBC-SHA should be used.
Also there was a warning that credentials were cached and adding auth-nocache would be more secure. Since the connection still worked with these extra settings, I left them in place
Create new Interface for OpenVPN
- Go to [Interfaces -> Assign]
- Under {Interface Assignments} there will be "Available Network Ports", drop down to ovpnc1() and click ADD, the Network interface OPT1 will be created
- Click on the OPT1 interface to edit it.
- Configure as follow:
- Description: ENVPN
- IPv4 Configuration Type: None
- IPv6 Configuration Type: None
- MAC Controls: Leave blank
- MTU: Leave Blank
- MSS: Leave Blank
- Block Private Network: Unchecked
- Block Bogon Network: Unchecked
- Save this configuration
Configure NAT Rules
- Go to [Firewall -> NAT]
- Go to {Outbound}
- Change from "Automatic outbound NAT rule generation. (IPsec passthrough included)" to "Manual Outbound NAT rule generation. (AON - Advanced Outbound NAT)"
https://www.privateinternetaccess.com/pages/client-support/pfsense
http://www.giganews.com/support/vyprvpn/vpn-setup/dd-wrt/openvpn.html
https://forum.pfsense.org/index.php?topic=35292.0
https://www.easynews.com/vpn/setup.html#ubuntu
https://www.easynews.com/vpn/setup.html#routers
https://support.code42.com/CrashPlan/4/Configuring/Excluding_Networks_Used_For_Backup_And_Restore
https://www.reddit.com/r/OpenVPN/comments/3tmfjz/showing_connected_to_vpn_but_still_getting_actual/
3 comments:
Why would you need to use a vpn on your router when you could simply use a vpn client on your computer?
I could, but one, wanted whole house VPN security, and second wanted to see if it could be done.
With a VPN for Router, protect every device that connects to the internet. Get FastestVPN and open endless possibilities on all your devices.
Post a Comment