• Mobile VPN does not add udp/esp rules if using IP Alias as responder

    3
    0 Votes
    3 Posts
    813 Views
    L
    Not sure what you mean by IP alias of localhost. It's a Virtual IP Address/IP Alias configured on the WAN interface. It is then chosen in the interface entry of Phase 1, instead of the WAN interface. The reason I do this is to avoid exposing the Mobile VPN on the router's primary IP address.
  • IPsec gigabit throughput

    7
    0 Votes
    7 Posts
    3k Views
    T
    @gustavo7w: Googling I found that the problem with smb protocol can be fixed changing MTU value. We've also transferred large files with SFTP or SCP and it doesn't have the same speed issues as SMB.  That may be an option for you too.
  • IPSEC Connections in 2.2.3 fail after a couple of days.

    12
    0 Votes
    12 Posts
    5k Views
    K
    The problem still exists in 2.2.5.  Upgraded from the Development stream to the production version on Friday and today the tunnels are inoperative and can not be restarted.  The IPSEC task can not be stopped from the GUI or from the command line and the only option is to reboot pfsense.
  • IKEv2 and iOS 9

    12
    0 Votes
    12 Posts
    5k Views
    D
    Thanks for the info. I just used the Apple configurator to use AES256/SHA2…but it seems my Windows 10 VPN wants to use DH group2 (1024). Is there an easy way I can change win10 VPN client to use group 21 DH?
  • Security

    1
    0 Votes
    1 Posts
    508 Views
    No one has replied
  • IPSEC IkeV2 Mobile client with EAP-MSCHAPv2 - not connecting.

    10
    0 Votes
    10 Posts
    6k Views
    D
    Thanks Itctech. Added 256. I have discovered that the issue is that the iPhone does not like ".me" addresses. Perhaps it does some pre-validation on the device.  I have just registered a .com address and it connects to the server. However using the .me (which is with the same registry and the sme dynamic ns provider and pointing to the same IP) it fails to connect at all. Looks like an Apple issue. So, now I can connect no problems!  Both from my windows tablet AND my iPhone!  YAY!!!!! Thankyou so much for your help.
  • AWS VPC pfSense IPSec setup

    7
    0 Votes
    7 Posts
    2k Views
    L
    Ensure that you have put in static routes in AWS VPC for the network on pfSense. Ensure that they have propagated into your routing table on AWS. Check that your Network ACLs and Security Groups allow traffic from the pfSense network to your AWS subnets. Check that the AWS instances don't have a firewall configured that blocks your traffic too.
  • MOVED: IPSEC / L2TP

    Locked
    1
    0 Votes
    1 Posts
    616 Views
    No one has replied
  • Multiple Phase 1 Encryption Proposals for Mobile Client

    2
    0 Votes
    2 Posts
    883 Views
    L
    Just realized I posted it in the wrong subforum. If a mod can move it to IPSEC that would be great. Looks like someone requested this functionality four months ago: https://redmine.pfsense.org/issues/4826 Something as simple as "Auto" in AES selection box on Phase 1 that replicates the proposals for each strength would probably work too.
  • Normal charon memory usage?

    18
    0 Votes
    18 Posts
    6k Views
    J
    @cmb: The most significant leaks are now fixed in 2.2.5. Well, we've patched around them, anyway.
  • Create a L2TP/IPSec server in pfSense?

    5
    0 Votes
    5 Posts
    1k Views
    jimpJ
    What exactly didn't work? And are you certain it was the firewall that didn't work? L2TP/IPsec client support is extremely inconsistent and in some cases broken. Move on to IKEv2… L2TP/IPsec isn't worth the trouble.
  • Questions migrating Linux Strongswan IKEv2 setup

    2
    0 Votes
    2 Posts
    805 Views
    jimpJ
    EAP-TLS is IKEv2 with per-user certificates.
  • IPSec from pfSense 2.2.4 to Fortigate (don't know the version) flakey

    3
    0 Votes
    3 Posts
    990 Views
    awebsterA
    Check your phase 1 and phase 2 lifetimes, sounds like there is a mismatch.
  • Glorious Error 789 or 13801 for IKEv2

    3
    0 Votes
    3 Posts
    2k Views
    F
    @David_W: As jimp has stated in the forums several times recently, IPsec using IKEv2 is probably a better option than L2TP/IPsec at this point. I have no problems using Windows 7 Professional clients with pfSense's IKEv2 support. Ok did that, and it worked ^^
  • PFSense 2.2.4 - ASA 5520 IPSEC

    1
    0 Votes
    1 Posts
    741 Views
    No one has replied
  • Draytek - setting up IPsec client

    6
    0 Votes
    6 Posts
    2k Views
    R
    i am doing it another way now, i am just using "mutual PSK" for authentication but i still cant get it to connect got screenshots incase it helps ipsec_site.zip
  • Site-to-Site IPSec VPN between PFSense 2.2.4 and Cisco ASA5505

    3
    0 Votes
    3 Posts
    1k Views
    D
    I believe it has to do with the nat rules in the asa you need to tell the asa that any traffic destined for the tunnel cannot go out the wan interface. I did it once don't remember the exact steps however.
  • Routing from A to B to C using IPsec tunnels

    2
    0 Votes
    2 Posts
    769 Views
    L
    Assuming that A, B, and C are all running pfSense it's relatively straightforward. Example LANs: Router A -> 10.10.0.0/24 Router B -> 10.20.0.0/24 Router C -> 10.30.0.0/24 Router A –--------- Phase 1 on A heading to B has two child Phase 2 1. 10.10.0.0/24 -> 10.20.0.0/24 2. 10.10.0.0/24 -> 10.30.0.0/24 Router B (B must know what to do with transiting traffic, this is probably what you're missing) Phase 1 on B heading to A has two child Phase 2 1. 10.20.0.0/24 -> 10.10.0.0/24 2. 10.30.0.0/24 -> 10.10.0.0/24 (C -> A Transit) Phase 1 on B heading to C has two child Phase 2 1. 10.20.0.0/24 -> 10.30.0.0/24 2. 10.10.0.0/24 -> 10.30.0.0/24 (A -> C Transit) Router C Phase 1 on C heading to B has two child Phase 2 1. 10.30.0.0/24 -> 10.20.0.0/24 2. 10.30.0.0/24 -> 10.10.0.0/24 Also make sure that under Firewall -> Rules -> IPSEC that you pass IPSEC traffic for anything (all asterisks in all columns) on all routers. After getting the tunnels up you can make finer grained rules if you want.
  • Ipsec Tunnel

    1
    0 Votes
    1 Posts
    646 Views
    No one has replied
  • L2TP/IPsec - site to site tunnels

    2
    0 Votes
    2 Posts
    1k Views
    C
    That's probably not what you want for a site to site connection. There are a variety of potential routing complications. The Draytek should support a proper site to site IPsec connection without L2TP's inherent complications, use that instead.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.