• IKEv2 and WPA2-Enterprise with EAP-RADIUS on Win10 1607\. Finally working!

    12
    0 Votes
    12 Posts
    5k Views
    S

    @TMA-3:

    I'm curious - is this a Microsoft problem or a pfSense problem?  Both?

    I'm a little concerned that I've created an installation that will break at the next upgrade, but I hope ECDSA support will be added soon so I don't have to worry.

    Thanks again for sharing all this information - it is invaluable!

    Sorry I haven't replied soon, I had some issues in the last months and I had very little time to connect to anything. I'm pretty sure it's a microsoft issue and specific with IKEv2. IKEv1 works perfectly with fragments. Probably (and hopefully) next versions will fix it.

    FYI, it's very possible to fix the ECDSA even on latest version. I tested it this week. I'll update this post soon using public certificates from letsencrypt.

  • Force certain traffic over IPsec

    1
    0 Votes
    1 Posts
    329 Views
    No one has replied
  • GRE is not being encapsulated

    2
    0 Votes
    2 Posts
    594 Views
    M

    So I found when it occur, after you first time create a gre over ipsec everything works great, but after reboot it created GRE, and then IPsec, so GRE is not being encrypted. Is it a bug?

  • Confused: RADIUS server certs

    1
    0 Votes
    1 Posts
    426 Views
    No one has replied
  • VPN L2TP/IPSEC

    1
    0 Votes
    1 Posts
    607 Views
    No one has replied
  • Mobile ipsec client reauthentication

    2
    0 Votes
    2 Posts
    580 Views
    L

    Looks like NAT and reauthentication is giving this issue in a certain case. The clients will start to get double virtual ip's if the NAT device expires/reboots/crashes. If I disable reauthentication on both sides it solves the issue.

    I still can't explain why this works but for me it looks like it could be a bug in strongswan. It's 100 percent reproduceable with the follow setup

    RW(client) -> Pfsense(nat) -> Pfsense(endpoint)

    Rebooting the NAT will give double virtual ip's to the RW where one of the ip given doesn't work

  • IPSEC / CARP - Re-Keys on failover

    1
    0 Votes
    1 Posts
    323 Views
    No one has replied
  • IPsec with EAP-MSCHAPv2 fails for iOS clients

    1
    0 Votes
    1 Posts
    871 Views
    No one has replied
  • PfSense (Proxmox) to Fortigate IPSEC tunnel fragmentation problem 2.4.3_x

    1
    0 Votes
    1 Posts
    718 Views
    No one has replied
  • Road Warrior, IPSec, external IP used in tunnel

    1
    0 Votes
    1 Posts
    498 Views
    No one has replied
  • IPSec and gateway groups

    1
    0 Votes
    1 Posts
    463 Views
    No one has replied
  • Set up IPsec site to site. Now Pfsense blocks all traffic to that FQDN

    1
    0 Votes
    1 Posts
    368 Views
    No one has replied
  • Routing between interface after route all traffic through ipsec

    1
    0 Votes
    1 Posts
    312 Views
    No one has replied
  • IPSec bulk import?

    5
    0 Votes
    5 Posts
    2k Views
    jimpJ

    No

  • IPSec/IKEv2 VPN: How to access site-to-site VPNs within VPN?

    3
    0 Votes
    3 Posts
    524 Views
    DerelictD

    You probably need to add tunnels so sites B and C think the remote access tunnel network is interesting to IPsec so the reply traffic from there makes it back to Site A and, from there, back to the remote client.

    List all your networks at the sites and the tunnels (phase 2s) you have established. And the remote access tunnel network, and whether it is split-tunnel or if it sends all traffic over the VPN from the clients.

  • IPsec traffic not being passed

    2
    0 Votes
    2 Posts
    466 Views
    T

    I recently read a post where someone solved their problem right after posting here for assistance… this has now happened to me.

    All I had to do is add a route manually via powershell.

    Add-VpnConnectionRoute -ConnectionName "VPN_NAME" -DestinationPrefix "Network/Subnet" -PassThru

    taken from here

    https://forum.pfsense.org/index.php?topic=127457.0

  • 2.4.3 Breaks Mobile Client

    18
    0 Votes
    18 Posts
    3k Views
    P

    Patch application fixed the issue! Thanks!

  • Single Interface IPSec in Azure

    5
    0 Votes
    5 Posts
    2k Views
    S

    @domf:

    Enable "IP Forwarding" on the interface attached to the pfsense host.

    Bingo. I've been banging my head on my desk for two days, and this has solved my problem. Thankyou!

  • 1:1 NAT for single IP?

    1
    0 Votes
    1 Posts
    350 Views
    No one has replied
  • IPSEC Port 500 Blocked.

    6
    0 Votes
    6 Posts
    1k Views
    DerelictD

    pfSense is 2.3.5-RELEASE (i386)

    You are not running racoon. You are running strongswan (charon). i386? It's 2018.

    I would guess the phase 1 is succeeding then the phase 2 is failing and one side or the other is subsequently deleting the phase 1.

    Impossible to tell without looking at the IPsec logs.

    Guidance:

    https://doc.pfsense.org/index.php/IPsec_Troubleshooting

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.