Go to Security KISS website and create an account.
Login to your client area and download archive from this link: https://www.securitykiss.com/panel/download/linux.
Now you are ready to setup your pfsense router.
System –> Cert Manager
Create new CA authority:
ca.crtfile you have downloaded before.
Certyficates tab, and import certificates:
Private key data.
VPN –> OpenVPN and click on
Now you need to observe the log. To ensure you are connected to Security KISS VPN server. Please ensure everything is fine before you proceed. This point is critical.
Interfaces and configure newly added interface:
Firewall –> NAT and click on
Manual Outbound NAT rule generation.
Firewall –> Rules.
If you do not want KISS to make itself a default gateway for your router, you just need to add
route-nopull parameter to your openVPN client.
VPN –> OpenVPN and click on Client tab. Now edit your client. Scroll to the very bottom and modify settings:
The best way to redirect your traffic through newly created VPN tunnel is:
Go to Firewall –> Rules.
Create new rule:
From now on the traffic from hosts listed in aliases will be redirected through KISS openVPN tunnel.
You should have working Security KISS right now. Make sure everything is working as intended by checking your external IP. Eg. go to google.com and search for “IP”.