• Set up IPsec site to site. Now Pfsense blocks all traffic to that FQDN

    1
    0 Votes
    1 Posts
    371 Views
    No one has replied
  • Routing between interface after route all traffic through ipsec

    1
    0 Votes
    1 Posts
    312 Views
    No one has replied
  • IPSec bulk import?

    5
    0 Votes
    5 Posts
    2k Views
    jimpJ
    No
  • IPSec/IKEv2 VPN: How to access site-to-site VPNs within VPN?

    3
    0 Votes
    3 Posts
    537 Views
    DerelictD
    You probably need to add tunnels so sites B and C think the remote access tunnel network is interesting to IPsec so the reply traffic from there makes it back to Site A and, from there, back to the remote client. List all your networks at the sites and the tunnels (phase 2s) you have established. And the remote access tunnel network, and whether it is split-tunnel or if it sends all traffic over the VPN from the clients.
  • IPsec traffic not being passed

    2
    0 Votes
    2 Posts
    469 Views
    T
    I recently read a post where someone solved their problem right after posting here for assistance… this has now happened to me. All I had to do is add a route manually via powershell. Add-VpnConnectionRoute -ConnectionName "VPN_NAME" -DestinationPrefix "Network/Subnet" -PassThru taken from here https://forum.pfsense.org/index.php?topic=127457.0
  • 2.4.3 Breaks Mobile Client

    18
    0 Votes
    18 Posts
    3k Views
    P
    Patch application fixed the issue! Thanks!
  • Single Interface IPSec in Azure

    5
    0 Votes
    5 Posts
    2k Views
    S
    @domf: Enable "IP Forwarding" on the interface attached to the pfsense host. Bingo. I've been banging my head on my desk for two days, and this has solved my problem. Thankyou!
  • 1:1 NAT for single IP?

    1
    0 Votes
    1 Posts
    352 Views
    No one has replied
  • IPSEC Port 500 Blocked.

    6
    0 Votes
    6 Posts
    1k Views
    DerelictD
    pfSense is 2.3.5-RELEASE (i386) You are not running racoon. You are running strongswan (charon). i386? It's 2018. I would guess the phase 1 is succeeding then the phase 2 is failing and one side or the other is subsequently deleting the phase 1. Impossible to tell without looking at the IPsec logs. Guidance: https://doc.pfsense.org/index.php/IPsec_Troubleshooting
  • 0 Votes
    4 Posts
    665 Views
    L
    The IPv4 case also works for us. With IPv4 the charon also creates packets bigger than 1500 bytes, but they get fragmented at the outgoing interface as they should and as seen in a interface dump. With IPv6 a dump on the same interface simply shows nothing for the packet in question… That's why i suspect that pfSense does not do any fragmentation for IPv6.
  • VPN Site to site IPSEC

    13
    0 Votes
    13 Posts
    2k Views
    DerelictD
    No you don't. 10.2.0.0/16 <-> 10.5.0.0/16 is not the same thing as 10.2.0.0/16 <-> 10.1.0.0/16
  • Pfsense Site-to-Site IPSec IKEv2 Routing

    6
    0 Votes
    6 Posts
    901 Views
    I
    Solved by removing the RRAS in between so now DHCP and NAT live on the PfSense firewalls. Thanks for the suggestion! Also no more 24.xxx subnets for private IPs!
  • IPsec and Vlans

    1
    0 Votes
    1 Posts
    454 Views
    No one has replied
  • [solved] IPSec firewall rules ineffective

    4
    0 Votes
    4 Posts
    678 Views
    S
    Thanks for that confirmation that my memory isn't faulty. The issue is consistent and repeatable, so if I get the chance I'll dig around some. I'm going to be away for a few days though so that might take a while. And, if I run out of time, I may end up just building a new VM from scratch - this one has been through the wars while I was figuring out IPSec. ps. As this is no longer related to IPSec, as such, and is more of a firewall issue, if/when I get around to updating or solving the problem then I'll post in the firewalls topic rather than here.
  • L2TP/IPsec windows client problems

    10
    0 Votes
    10 Posts
    8k Views
    H
    @Cerberus: Update: If the windows 10 client has a public IP address it works! This makes me believe it's a NAT problem. There must be a configuration error on the pfsense router, the win10 client and the pfsense router, does not agree on how NAT-T works. Remember the same windows 10 client can successfully connect to another router via L2TP/IPsec when the client is behind nat. This is working for me. I am using Win10 Home version 1709 build 16299.125 (KB4054517, Dec. 2017). There are 12 new builds, but I couldn't test them yet. If nothing got break this year, let's imagine it still works: For Phase 1 authtentication, Win10 asks for AES-256 bits-SHA1-DH 20. Just added this algorithm and it worked. For client behind a NAT, it was needed a register tweak: include REG_DWORD key "AssumeUDPEncapsulationContextOnSendRule", with value "2", at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent". (need reboot)
  • IKEv2 IPSec on Win10 Pro can't ping remote LAN hosts

    3
    0 Votes
    3 Posts
    651 Views
    P
    Hi guys! I have the same problem. Do you have solution to this? Thank you, Peter
  • IPSEC Tunnel Drops Occasionally

    2
    0 Votes
    2 Posts
    929 Views
    S
    I can't comment on your specific case, but here are a few things I did (they may work for you, or they may make things worse!)… system > advanced > networking > all hardware offloading options: tick (disable) vpn > ipsec > advanced settings > enable maximum mss: tick vpn > ipsec > advanced settings > maximum mss: 1400 vpn > ipsec > advanced settings > make before break: tick vpn > ipsec > tunnels > edit phase 1 > disable rekey: untick vpn > ipsec > tunnels > edit phase 1 > margintime: 60 vpn > ipsec > tunnels > edit phase 2 > pfs key group: off vpn > ipsec > tunnels > edit phase 2 > automatically ping host: ip within remote subnet Good luck, and take a backup first.
  • IPsec client on pfSense

    3
    0 Votes
    3 Posts
    668 Views
    R
    OK, thanks for that. Are you aware of anything that will do what I'm after?
  • IPSec Site-to-Site VPN , about phase 2 tunneling.

    1
    0 Votes
    1 Posts
    414 Views
    No one has replied
  • Static IP address asignment for IPSec mobile clients

    3
    0 Votes
    3 Posts
    2k Views
    NogBadTheBadN
    The following works for me after doing step 1 "test-user" Cleartext-Password := "XXXXXXXXXXXXXXX", Simultaneous-Use := "1", Expiration := "Jan 01 2020", NAS-Identifier == strongSwan Framed-IP-Address = 172.16.9.254, Framed-IP-Netmask = 255.255.255.0, Framed-Route = "0.0.0.0/0 172.16.0.1 1", Remember the Simultaneous-Use := "1" if your giving them a fixed IP. https://forum.pfsense.org/index.php?topic=130715.0
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.