Unable to install OpenVPN client behind NG pfSense

I have been working to connect via OpenVPN client to a remote OpenVPN served by NetGate 2100 and pfsense.
Local win11 desktop <-----> local Netgate 2100 <----> OpenVPN Client <-----> Remote NG2100 <----> NG2100 admin.

Local NG2100/pfsense configured per default Lawrence Systems Youtube video in home operation for approximately on year. No public IP attached to WAN . No previous FW wan rules. Basic LAN rules before OpenVPN client installed.

System firewall logs indicate the following:

May 9 15:35:01 LAN Default deny rule IPv6 (1000000105) [fe80::ccf:561b:79c:adef]:5353 [ff02::fb]:5353 UDP
May 9 15:35:00 LAN Default deny rule IPv6 (1000000105) [fe80::ee67:df24:1b80:a0da]:56016 [2600:1901:0:f8b::]:443 TCP:S
May 9 15:35:00 LAN Default deny rule IPv6 (1000000105) [fe80::ee67:df24:1b80:a0da]:56014 [2600:1901:0:5723::]:443 TCP:S
May 9 15:35:00 LAN Default deny rule IPv6 (1000000105) [fe80::ee67:df24:1b80:a0da]:56011 [2600:1901:0:4ba4::]:443 TCP:S

I have added the appropriate FW rules via the EasyRule function from the FW log entries. (7 LAN and 3 WAN) but continue to be blocked by the default deny error as follows:

May 9 15:41:20 LAN Default deny rule IPv6 (1000000105) [fe80::2249:4a1a:daf7:8161]:17169 [2600:1901:0:4ba4::]:443 TCP:S
May 9 15:41:12 LAN Default deny rule IPv6 (1000000105) [fe80::2249:4a1a:daf7:8161]:17169 [2600:1901:0:4ba4::]:443 TCP:S
May 9 15:41:09 LAN Default deny rule IPv6 (1000000105) [fe80::ccf:561b:79c:adef]:5353 [ff02::fb]:5353 UDP

The OpenVPN client logs indicate the following:

Thu May 9 15:39:27 2024 SIGUSR1[soft,tls-error] received, process restarting
Thu May 9 15:43:24 2024 SIGHUP[hard,init_instance] received, process restarting
Thu May 9 15:43:24 2024 OpenVPN 2.6.7 [git:v2.6.7/53c9033317b3b8fd] Windows [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Nov 8 2023
Thu May 9 15:43:24 2024 Windows version 10.0 (Windows 10 or greater), amd64 executable
Thu May 9 15:43:24 2024 library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10
Thu May 9 15:43:24 2024 DCO version: 1.0.0
Thu May 9 15:43:25 2024 TCP/UDP: Preserving recently used remote address: [AF_INET]170.247.154.236:1194
Thu May 9 15:43:25 2024 UDPv4 link local: (not bound)
Thu May 9 15:43:25 2024 UDPv4 link remote: [AF_INET]170.247.154.236:1194
Thu May 9 15:44:25 2024 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Thu May 9 15:44:25 2024 TLS Error: TLS handshake failed
Thu May 9 15:44:25 2024 SIGUSR1[soft,tls-error] received, process restarting
Thu May 9 15:44:26 2024 TCP/UDP: Preserving recently used remote address: [AF_INET]170.247.154.236:1194
Thu May 9 15:44:26 2024 UDPv4 link local: (not bound)

My route print list is as follows:

===========================================================================
Interface List
17…Wintun Userspace Tunnel
21…ExpressVPN TUN Driver
20…b0 7b 25 27 20 d2 …Killer E2600 Gigabit Ethernet Controller
11…00 ff 5e 84 ba 4f …TAP-Windows Adapter V9
7…OpenVPN Data Channel Offload
6…44 af 28 ba fa 13 …Killer(R) Wi-Fi 6 AX1650i 160MHz Wireless Network Adapter (201NGW)
14…44 af 28 ba fa 14 …Microsoft Wi-Fi Direct Virtual Adapter
12…46 af 28 ba fa 13 …Microsoft Wi-Fi Direct Virtual Adapter #2
9…44 af 28 ba fa 17 …Bluetooth Device (Personal Area Network)
1…Software Loopback Interface 1

In summary, I have been working for several days to connect to the remote Netgate 2100 via the openVPN client export it generated for Windows 11 desktop but seem to be blocked by my local gateway Netgate 2100 pfSense firewall.

Any suggestions?
Thank you.

Why not setup wireguard site to site vpn - https://youtu.be/7_gLPyipFkk, as you have ng2100 as both locations

You can restrict which ip can use the vpn tunnel

We used wireguard for site to site vpns and openvpn for client remote access

Thank you for your reply. We installed the 2100 at both locations, with the remote location an unmanned security gate hut with a few servers requiring access and monitoring. The vendor has installed his access via the OVPN client export with no issues. My local 2100/pfSense and client export is blocking my access leaving via default as follows:

May 10 05:39:30 WAN Default deny rule IPv4 (1000000103) 194.5.XX.XXX:47854 192.168.88.245:53045
Cannot resolve
UDP
May 10 05:39:29 LAN Default deny rule IPv6 (1000000105) [fe80::8b1:d4d4:c06c:2421]:5353 [ff02::fb]:5353 UDP

I haven’t tried to set up OVPN at my home location as I didn’t want to add complexity to an otherwise seemingly straightforward install. I do not need remote access into my home servers at present.

Again, thank you for your assistance, new to firewall rules, etc.

Post your screen shot of the firewall rules, for the network you are connected on

Are you using snort of pfblocker

Thanks Paul,

No, I haven’t activated Snort yet.

Hope you can open these.

You have me lost, I do not understand IPv6.

Are you using a VPN provider for outboud traffic - what is Easyrule ?

As you are creating outbound traffic, wan settings are not used

What happens for a test, if you move IPv4 Default allow Lan to any rule to second place in the table - guessing your machine has an IP4 address

I have not installed OVPN on the 2100, only the OVPN client on the desktop behind my local 2100. The logs and rules added from the basic pfsense install were generated by the Easyrule function provided in the syslog firewall logs to assist in adding appropriate rules in the LAN and WAN firewall rules.

The logs seem to indicate both WAN and LAN default denials, but adding the WAN rules via Easyrule have eliminated those denials (I think).

Still receiving LAN denials in the firewall log.

Stop using EasyRule,

Are you using IPv6 internally, if not disable it on pfsense.

Your internet provider is this a ip4 or ip6 address.

If you are using IP4 on both wan and internally i would delete all the rules you have created on the lan except no 1 and just enter the following on your lan

Replace Management with Lan i.e. Lan Subnet and Lan address

RFC1918 is an alias

Do you access any servers externally from the internet, if the answer is no delete all the wan rules and any rules under nat

PFSense setup videos

This is for home, rules still apply to office use - https://youtu.be/bjr0rm93uVA

Great! Thank you. I didn’t think I had to add so much complexity. I think I will restore the last known good config and start again. The only reason I added the IPv6 was due to errors generated.

Thanks again. I will go with your suggestions and get back to you shortly.

Do not complicate things, just use IPv4 and use the rules in my snippets or the videos I have highlighted

Paul, I applied the rules above and deleted IPv6 settings in System–>Advanced–>Networking -->IPv6 Options.

Still getting IPv4 default blocking and cannot access the internet via the wireless router mesh system previously set to access point mode. Head scratcher! Can you think of a reason for this?

Internet is available through the wired (ethernet) interfaces of the same network.

Problem solved. The internet provider gave me a public IP address (for a planned remote access project) and optioned the circuit for PPPoE. I changed the gateway interface to PPPoE, and the Ovpn client problems went away.