How to Configure Ivacy on pfsense (OpenVPN)
8
Pf-Sense is an open-source firewall and router that is available completely free of cost. It offers load balancing, unified threat management, multi-WAN, and other features for those particularly concerned about their online security and privacy.
Fortunately, users can further enhance their capabilities via Ivacy’s OpenVPN, which can be set up on the latest pfSense (2.4.4).
Before you begin:
- You must have an active internet connection.
- A Premium Ivacy VPN account. If you haven’t subscribed yet, click here to subscribe to Ivacy VPN.
- A VPN Supported Router.
- In order to configure OpenVPN on pfSense, first download the required OpenVPN Files from here and extract them.
- After accessing your pfSense account, look for Cert Manager under System and click + to add a new certificate.
- Now, enter the following information:
• Descriptive name: Enter CA Cert
• Certificate data: After downloading the necessary OpenVPN files, copy its content from Open CA.crt and paste it.
• Once done, click the Save button. - Select the Certificates tab and then click the + icon. Enter the following information:
• Descriptive name: Enter Client Cert.
• Certificate data: After downloading the necessary OpenVPN files, copy its content from Open Client.crt and paste it.
• Private key data: From the downloaded OpenVPN files, access Open Client.key, copy its content and paste it.
• Once done, click Save. - Select VPN and then choose OpenVPN from the drop-down menu.
- Select the Clients tab and click the + icon.
- Next, enter the following information:
• Server mode: Peer-to-Peer (SSL/TLS)
• Protocol: UDP on IPv4 only or TCP on IPv4 only
• Device mode: Tun – Layer 3 Tunnel Mode
• Interface: WAN
• Server host or address: Enter any OpenVPN server address, such as usca1-ovpn-udp.ivacy.net Server port: Depending on the protocol previously selected (80 for TCP or 53 for UDP) select the appropriate port number
• User Authentication Settings: Enter your Ivacy username and password - Under Cryptographic settings, follow these steps:
• Check the Use a TLS Key box next to TLS Configuration
• Access Open WDC.key. Copy and paste its content in the next box
• TLS Key Usage Mode: Choose TLS Authentication
• Peer Certificate Authority: CA Cert
• Client Certificate: Client Cert
• Encryption Algorithm: AES-256-CBC
• Enable NCP: Check the Enable Negotiable Cryptographic Parameters box
• Auth digest algorithm: SHA1 (160 bit)
• Hardware Crypto: Set it to No Hardware Crypto Acceleration - Under Advanced Settings, follow these steps:
• Gateway Creation: IPv4 only
• Click the Save button. - Under Firewall, click NAT.
- Select Outbound and then click Manual Outbound NAT rule generation (AON Advanced Outbound NAT) under Outbound NAT Mode. Click Save to apply changes.
- You will be presented with a mapping window. Each WAN perimeter within needs to be changed to OpenVPN. This can be done after clicking on the Edit button.
- The Interface needs to be changed to OpenVPN. Click Save.
- The above-mentioned step is repeated thrice across the board for all interfaces to OpenVPN, after which the mapping window will look something like the image below.
- Click Services under Status.
- To access the OpenVPN client, click Log Entries.
- Once initialization is complete for the logs, it will confirm your connection.
- You can check the status of the VPN connection from Status under the OpenVPN tab.