• IPsec site to site and multiple networks

    2
    0 Votes
    2 Posts
    975 Views
    jimpJ
    It's necessary in most every IPsec device but the methods are different. Some define the Phase 2 networks as we do. Ethers define them using ACLs, policies, or "routes" of sorts – no matter what you need to have a list of networks to allow on your side and IPsec destinations on the far side. Some try to automate or hide parts of it, but it makes diagnosing tunnel issues much more difficult than it needs to be. In the future it may be simplified somewhat by using aliases for Phase 2 networks, but that isn't possible yet.
  • Does wildcard ssl required dedicated IPs for each sub-domains

    1
    0 Votes
    1 Posts
    662 Views
    No one has replied
  • Will switch to strongswan allow for High Availability?

    6
    0 Votes
    6 Posts
    2k Views
    C
    @kapara: Yeah not sure either.  I guess the best way to find out is I will post a bounty.  I am sure others will also be interested in a true IPSec failover solution. Or ask in the strongswan / freebsd communities.
  • PfSense Racoon as VPN client

    2
    0 Votes
    2 Posts
    641 Views
    jimpJ
    No.
  • IPsec to Azure

    1
    0 Votes
    1 Posts
    899 Views
    No one has replied
  • Ipsec die when no client is in the network

    5
    0 Votes
    5 Posts
    1k Views
    P
    @l123456: So what shoould i ping in this case ? I usually ping the LAN interface address of the remote box. Why I couldn't ping from server to server ? I'd think it is because something in your configuration prevents it.
  • Endpoints different configurations

    2
    0 Votes
    2 Posts
    864 Views
    U
    Mostly, in my experience, IPsec connections need to match exactly on both endpoints. Problems arise when connecting pfSense to hardware like Cisco and Sonicwall (for which there are many good tutorials online). I have done both successfully, but it is always a challenge making pfSense terminology match-up to vendor terminology. -J
  • Mystified by iperf results across IPsec tunnel

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • VPN Ipsec : random disconnections

    3
    0 Votes
    3 Posts
    1k Views
    A
    I changed the timeout of the VPN both sides and it works better.  It happens less times but still problems sometimes.  I need to disconnect it from remote side, then VPN is automatically up. Really strange…
  • Reboot required when IPSEC drops

    4
    0 Votes
    4 Posts
    1k Views
    C
    You running PPTP on there? That's the log you end up with in the misconfiguration described here. https://redmine.pfsense.org/issues/1421 Jim's suggestion is the other likely possibility. When it's happening, check Diag>States, filter for ESP, :500 and :4500. What do those look like?
  • Local Network WAN

    1
    0 Votes
    1 Posts
    585 Views
    No one has replied
  • Reconnect after failure

    3
    0 Votes
    3 Posts
    1k Views
    M
    Anyway to tell pfsense to just reconnect if a failure happens?
  • Direct traffic through IPSEC tunnel

    3
    0 Votes
    3 Posts
    2k Views
    A
    @breakaway: Hello, I have 192.168.254.0/24 at Site A, and 192.168.253.0/24 at Site B. Site A pfSense has 3 interfaces. WAN – Static IP from my ISP LAN -- 10.0.0.0/24 OPT1 -- 192.168.254.0/24 Site B pfSense has 4 interfaces WAN -- static IP from my ISP WAN2 -- static IP from my ISP LAN -- internal stuff (not relevant to this) OPT1 -- 192.168.253.0/24 I've got a tunnel up between OPT1 (Site A) <-> OPT1 (Site B) I am wanting all traffic that goes into OPT1 at Site A to be directed through the IPSEC tunnel to OPT1 at Site B. Site B contains NAT rules to allow 192.168.253.0/24 to access the internet. What sort of settings do I need on the tunnel @ Site A pfSense to make this happen? PS, I've found a guide on how to send ALL traffic through the IPSEC tunnel but this is not what I want – I just want traffic out of OPT1 to go through the IPSEC tunnel. [image: 8quUL.jpg] Out of curiosity, have you tried setting up an additional phase 2 entry on the tunnel config at Site A to Site B for Source=OPT1 Net, Dest=Net 0.0.0.0/0? In theory this would tell all the traffic at Site A that is not local to route through the tunnel. On the other end, you likely don't even need a complementary Phase 2 entry. If you do this, keep in mind that you may need a firewall rule for IPSec traffic at Site B to allow this traffic in order for it to work.
  • Mobile IPSec VPN Statuses

    1
    0 Votes
    1 Posts
    676 Views
    No one has replied
  • Hint: IPSEC for IPv6

    1
    0 Votes
    1 Posts
    809 Views
    No one has replied
  • Azure Ipsec tunnels ERROR: failed to get sainfo.

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Dual WAN IPSec failover on 3G link

    1
    0 Votes
    1 Posts
    635 Views
    No one has replied
  • Site - Site IpSec http and UDP traffic dies

    1
    0 Votes
    1 Posts
    466 Views
    No one has replied
  • 0 Votes
    3 Posts
    962 Views
    A
    I corrected an important mistake in my last post.  It is the overview ipsec page that shows the incorrect IP (shows the IP Alias instead of the Carp IP).  The SAD page shows the correct IP (Carp IP).
  • Traffic on VPN or gateway ??

    3
    0 Votes
    3 Posts
    785 Views
    L
    my problem is solved. The problem was the opening of the ports on the FW for the ESTABLISHMENT VPN . Port 500 and 4500 was open for the VPN but other port were necessary so the traffic did not pass but the VPN was seen as up .
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.