• Mobile IPSec VPN with Squid Issue

    2
    0 Votes
    2 Posts
    908 Views
    S
    Did you ever find a solution for this problem? I face the exact same problem and tried pretty much every single approach described here and none worked  :(
  • Unable to get ipv6 to work over ipsec

    1
    0 Votes
    1 Posts
    431 Views
    No one has replied
  • Multi IPSEC to 3 Branch offices

    2
    0 Votes
    2 Posts
    715 Views
    jimpJ
    Yes, that works fine, provided you setup all of the appropriate Phase 2 entries in IPsec and routes in OpenVPN. For example, your IPsec tunnels would need to have phase 2 entries such as: Site A<->B: P2 for A-B, OpenVPN-B Site A<->C: P2 for A-C, OpenVPN-C OpenVPN: Local network set for A, B, and C And if you want B and C to reach each other through A, you'll need additional P2 entries to cover B-C / C-B on the appropriate tunnels and in the proper direction.
  • IPSEC can't connect to internet.

    1
    0 Votes
    1 Posts
    341 Views
    No one has replied
  • Local traffic on a VLAN with a remote gateway

    25
    0 Votes
    25 Posts
    3k Views
    johnpozJ
    Ah.. Yeah that is a problem…
  • Made a script to test IPSec connections and reconnect tunnel if they fail

    1
    2 Votes
    1 Posts
    2k Views
    No one has replied
  • IPSEC Windows 10 client.

    5
    0 Votes
    5 Posts
    2k Views
    K
    Thank you for the suggestion. IKEv2 from what I'm reading involves shipping certs to your users and installing them. (correct me if I'm wrong on this) And for that reason, If I go with IKEv2, I may as well go with OpenVPN. Regards.
  • Newbie: Forward a Single Port Over Tunnel, Linux Host on the Other Side

    2
    0 Votes
    2 Posts
    437 Views
    D
    Hi, With IPsec the easiest solution is filter by port in transport mode. A Linux host with Strongswan or Libreswan supports it. However I think the Pfsense GUI doesn't support that setting yet (I would need it also). So you could create a GRE tunnel over an IPsec tunnel and forward that port to/from the GRE tunnel interface. For example with a rule in your LAN which that remote port would translated (NAT) to the GRE tunnel IP.
  • Cisco GRE IPSEC Transport NAT

    9
    0 Votes
    9 Posts
    4k Views
    A
    Hmm, Seems this is similar to my problem… https://forum.pfsense.org/index.php?topic=134812.msg738845#msg738845 Well, here is my, late, contribution to this thread: 1. A crypto map does the trick with transport mode. 2. Crypto map with Tunnel mode works only if a Crypto Access-list matching the one on PfSense is applied to the Cisco map (restricted to IPv4 or IPv6 range selection) 3. If an "IPsec Profile" on the Tunnel interface (Tunnel Protection..) is used instead of a Crypto Map on the Physical interface then the auto generated Crypto Access List on the Cisco selects only GRE protocol traffic instead of IP. This has no chance to match the IP protocol traffic selection on the PFSense side and this is why I believe the Tunnel Protection Cisco config fails. This can be verified on the cisco side using the commands: "debug crypto ipsec" "show crypto ipsec sa" (the command "debug crypto isakmp" will show that although phase 2 attributes are accepted the proposal is rejected "No_Proposal_Chosen". The reason can be found in the output of the "debug crypto ipsec" command) 4. Not sure if Tunnel protection can work with Transport mode between Cisco and PFSense. Will be happy to try once "3" is solved This is why I am asking for a way to configure PFSense in a way that I can select only GRE protocol traffic instead of IP as IPsec Phase2 interesting traffic.  This will also make possible to narrow  down the selection of packets to be encrypted by IPsec on the PFSense WAN interface to GRE and allow for WAN sourced non GRE packets to leave the interface unencrypted. Would be nice to see this in a future update. More options in selecting IPsec interesting traffic Until then..  Is there a way to tweak PFSense configuration file to achieve this? Regards, Alexandros
  • 0 Votes
    3 Posts
    913 Views
    D
    Hi, I'm not sure about open a new topic for this feature. Is it already implemented? Could it be achieved with any rule? Regards.
  • IPsec tunnel UP but unable to ping remote site

    44
    0 Votes
    44 Posts
    50k Views
    D
    I finally found a solution! On the remote PFsense router I went to VPN -> IPSec -> Advanced Settings and disabled "Enable bypass for LAN interface IP" (scroll all the way down) and I finally can connect to the remote host! Check if your windows firewall on that host is on, as it likely will recognize the incoming traffic as non-private traffic and thus might filter it (to test it, shut down the firewall for public networks).
  • Any plans to support Virtual Tunnel Interfaces (VTI) for IPSEC VPNs?

    15
    0 Votes
    15 Posts
    6k Views
    jimpJ
    @tweek: If you could please consider BIRD for inclusion.  My router expert friend assures me BIRD is much more powerful and better architected than FRR. Our router expert employees prefer FRR/Quagga and assure us it's better than BIRD in various ways.
  • IPsec Interesting traffic problem

    1
    0 Votes
    1 Posts
    549 Views
    No one has replied
  • MULTI IPSEC CONNECTION / PFSENSE A - B - C

    10
    0 Votes
    10 Posts
    1k Views
    G
    @Derelict: If your OpenVPN Tunnel network is 192.168.100.0/24, do something like this substituting the proper remote network, of course. That will need the reciprocal settings on the other side. You`re totaly right I just added my open pn tunnel network to ipsec phase 2 It works !
  • IpSec tunnel not working on SMB and HTTP

    3
    0 Votes
    3 Posts
    1k Views
    L
    I have the EXACT same issue. What's strange is the problem is only occurring one way. I decreased MSS clamping on both sides to 1300 and everything is working now.
  • IPSec with multiple Phase2 behind pfSense not work.

    1
    0 Votes
    1 Posts
    467 Views
    No one has replied
  • Diffie Hellman Group - phase 2

    3
    0 Votes
    3 Posts
    1k Views
    M
    Thank jimp for your speed reply. I will go to contact the another company for up this value.
  • Site to site

    10
    0 Votes
    10 Posts
    2k Views
    DerelictD
    OpenVPN is pretty much never faster than IPsec. Not sure where you would have read otherwise. It can, however, be more flexible. If raw performance was not the #1 requirement, I would lean toward OpenVPN SSL/TLS so I could centrally-manage things.
  • Help me identify IPsec speed bottleneck

    1
    0 Votes
    1 Posts
    498 Views
    No one has replied
  • VIP on Loopback breaks auto IKE 500 rule

    1
    0 Votes
    1 Posts
    345 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.