Use PuTTY or another terminal program of your choice to create a connection to OPNsense and pick option 8) Shell.
Visit the website https://github.com/ddowse/opnsense-vpn-dns and install the opnsense-vpn-dns script.
The script registers the DNS servers of the VPN provider, which are announced when a VPN connection gets established, to be used and removes them later when the connection is terminated.
In the field Descriptive name enter
At Method choose Import an existing Certificate Authority.
Open one of the *.conf files from the opnsense_op24_udp_v4_AES128CBC_AU_in_ci.zip archive and copy the content between the <ca></ca> tags into the field Certificate data, as shown in the picture on the left.
Afterwards click on the Save button.
Deactivate the option Automatically generate a shared TLS authentication key and copy the text between the <tls-auth></tls-auth> tags from the *.conf file into the field below.
Tip: Depending on the CPU performance on your router you may want to use the weaker encryption AES-128-CBC to get better speed and bandwidth. In this case choose AES-128-CBC for Encryption algorithm.
Copy the following text block into the field Advanced:
hand-window 120 mute-replay-warnings persist-remote-ip reneg-sec 3600 resolv-retry 60 tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSAWITH-AES-256-CBC-SHA256:TLS-DHE-RSA-WITH-CAMELLIA-256-CBCSHA:TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-RSA-WITH-CAMELLIA256-CBC-SHA:TLS-RSA-WITH-AES-256-CBC-SHA tls-timeout 5 tun-mtu 1500 fragment 1300 mssfix remote-cert-tls server
Now click on the Save button.
This step is only required for an IPv6 connection. Skip it if you don't want to use IPv6.
Navigate to the menu Firewall → Rules → WAN and create an ICMP rule for the IPv6 protocol with the following options:
If you want to access the Internet without VPN as well you should configure public name servers, for instance those from Cloudflare, Google or any from the OpenNIC-Project. If the VPN is connected, DNS requests will be sent anonymously over the VPN tunnel.
Go to the menu System → General Settings and enter at least two DNS servers of your choice. In this example we are using the DNS servers 18.104.22.168 and 22.214.171.124.
To configure DNS servers for IPv6 too, optionally add at least two DNS servers (for example 2606:4700:4700::1111 and 2606:4700:4700::1001).
Deactivate the option Allow Override of DNS server list by DHCP/PPP on WAN. Leave the other settings as they are.
Next to Advanced click on Show Advanced Options and at Outgoing Network Interfaces select
Note: With the default settings DNS queries are sent directly to the internet servoce provider, therefore it is important to select a VPN interface as outgoing network interface for DNS queries to prevent DNS leaks.
Navigate to Firewall → Rules → LAN and deactivate the rule for IPv6 (if the use of IPv6 is not desired).
Add a new firewall rule above the existing ones with the following settings:
Save with a click on the Save button.
Then open the IPv4 rule by clicking on the pen-symbol (edit). Choose
CAUTION: This step will activate the firewall protection (leak protection or „kill switch“).
If you proceed with these steps, the Internet connection will only work when a VPN tunnel has been established.
Open the IPv4 rule by clicking on the pen symbol (Edit). Activate Advanced options by clicking on Hide/Show.
At Set local tag enter:
If needed repeat this step for the IPv6 rule. Otherwise deactivate the IPv6 rule.
The traffic thereby is happening via the selected gateways only.
Now a floating rule is required to ensure all traffic is blocked in case the OpenVPN connection is offline.
Change to Firewall → Rules → Floating and create a new block-rule with the following settings:
Activate Advanced options by clicking on Hide/Show.
Use the menu to go to Firewall → NAT → Outbound and select the option Manual Outbound NAT rule generation and click on Save.
Create the following rules, as shown in the image on the left. The first two NAT rules are with the interface
The following NAT rules are needed for smooth process (connections from the router itself to the internet).
You can verify that the VPN connection is working properly by visiting our Check IP website on any device connected to the Internet via the router.
If the VPN connection doesn't work, the cause is most likely the opnsense-vpn-dns script. There is an easy workaround: At the end of configuring terminate the OpenVPN client using the menu VPN → OpenVPN → Connection status and then start the VPN connection again.