• IPSec Tunnel Granting One Way Traffic

    2
    0 Votes
    2 Posts
    332 Views
    DerelictD
    Firewall rules on the IPsec tab on pfSense?
  • VPN IS down after a time period

    3
    0 Votes
    3 Posts
    625 Views
    S
    I have the same problem right now…all works until they start dropping like flies and won't reconnect!
  • Direct traffic in IPSECVPN Site to Site "Phase 2 Tunnels"?

    5
    0 Votes
    5 Posts
    753 Views
    I
    That worked!!! Thank you very much.
  • [SOLVED] cross platform IKEv2 VPN - no DNS on Linux/Mac/IOS

    7
    0 Votes
    7 Posts
    12k Views
    T
    @shpokas: I fixed the DNS issue on OS X and IOS by using Apple Configurator to create VPN profile and manually adding DNS section in it. Here's how to do it: https://lists.strongswan.org/pipermail/users/2015-October/008842.html This is definitely the key for split DNS with macOS and iOS!  More details can be found in Apple's Configuration Profile Reference https://developer.apple.com/library/content/featuredarticles/iPhoneConfigurationProfileRef/Introduction/Introduction.html#//apple_ref/doc/uid/TP40010206-CH1-SW612 Look for the DNS Dictionary Keys section and it explains the use of SupplementalMatchDomains to control spilt DNS.  Not sure why this isn't available from the Configuration GUI, but… there you go.
  • No outgoing UDP traffic

    1
    0 Votes
    1 Posts
    494 Views
    No one has replied
  • VPN user group missing

    2
    0 Votes
    2 Posts
    1k Views
    D
    Answered my own question.  Below groups are effective permissions, you can add the permission to that for IPSEC Xauth dialin.
  • No matching peer config found

    1
    0 Votes
    1 Posts
    673 Views
    No one has replied
  • (Sort of off-topic) Connecting pfsense <-> Unifi USG

    5
    0 Votes
    5 Posts
    1k Views
    C
    Hey, I eventually (this friday) gave up. I even tried running openVPN on the USG directly (command line) which worked but the transfer speed was abyssmal slow. I installed a tiny Intel NUC (12 Watt) that does OpenVPN just fine with the pfsense. Even with double-Nat :) -Chris.
  • IPSec phase2 with NAT/BINAT both sides fails to communicate

    1
    0 Votes
    1 Posts
    413 Views
    No one has replied
  • Additional Details for IPSec Mobile Clients

    3
    0 Votes
    3 Posts
    696 Views
    J
    Thanks for the reply! I'm checking those tabs, and I only see the remote public IP, not the local IP that the client is receiving from pfsense. The scenario is, I'm rolling this out to a company of multiple users, and I would like to be able to identify each client on the router, but it seems like that info is obfuscated from me at this point. Appreciate your help!
  • SG-3100 IPSec –-

    3
    0 Votes
    3 Posts
    688 Views
    P
    One more part – Feb 7 14:07:00 charon 13[NET] <con1000|3>sending packet: from 172.16.200.20[500] to xxx.xxxx.xxx.x[500] (180 bytes) Feb 7 14:07:00 charon 13[NET] <con1000|3>received packet: from xxx.xxx.xxx.x[500] to 172.16.200.20[500] (160 bytes) Feb 7 14:07:00 charon 13[ENC] <con1000|3>parsed ID_PROT response 0 [ SA V V V V ] Feb 7 14:07:00 charon 13[IKE] <con1000|3>received XAuth vendor ID Feb 7 14:07:00 charon 13[IKE] <con1000|3>received DPD vendor ID Feb 7 14:07:00 charon 13[IKE] <con1000|3>received FRAGMENTATION vendor ID Feb 7 14:07:00 charon 13[IKE] <con1000|3>received NAT-T (RFC 3947) vendor ID Feb 7 14:07:00 charon 13[ENC] <con1000|3>generating ID_PROT request 0 [ KE No NAT-D NAT-D ] Feb 7 14:07:00 charon 13[NET] <con1000|3>sending packet: from 172.16.200.20[500] to xxx.xxxx.xxx.x[500] (244 bytes) Feb 7 14:07:00 charon 13[NET] <con1000|3>received packet: from xxx.xxx.xxx.x[500] to 172.16.200.20[500] (244 bytes) Feb 7 14:07:00 charon 13[ENC] <con1000|3>parsed ID_PROT response 0 [ KE No NAT-D NAT-D ] Feb 7 14:07:00 charon 13[IKE] <con1000|3>local host is behind NAT, sending keep alives Feb 7 14:07:00 charon 13[ENC] <con1000|3>generating ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ] Feb 7 14:07:00 charon 13[NET] <con1000|3>sending packet: from 172.16.200.20[4500] to xxx.xxx.xxx.x[4500] (108 bytes) Feb 7 14:07:01 charon 13[NET] <con1000|3>received packet: from xxx.xxx.xxx.x[4500] to 172.16.200.20[4500] (92 bytes) Feb 7 14:07:01 charon 13[ENC] <con1000|3>parsed INFORMATIONAL_V1 request 907020096 [ HASH N(AUTH_FAILED) ] Feb 7 14:07:01 charon 13[IKE] <con1000|3>received AUTHENTICATION_FAILED error notify Feb 7 14:09:19 charon 00[DMN] signal of type SIGINT received. Shutting down</con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3></con1000|3>
  • IPsec Packet Loss, Dropped RDP Connections

    1
    0 Votes
    1 Posts
    454 Views
    No one has replied
  • Microtek and Pfsense Ipsec

    1
    0 Votes
    1 Posts
    455 Views
    No one has replied
  • Ipsec performance

    1
    0 Votes
    1 Posts
    515 Views
    No one has replied
  • Ipsec phase 2 not working

    9
    0 Votes
    9 Posts
    8k Views
    DerelictD
    What do you mean NAT? Based on this: access-list acl-vpn-NJB permit ip host 172.17.0.254 172.17.7.0 0.0.0.255 access-list acl-vpn-NJB permit ip host 172.17.0.4 172.17.7.0 0.0.0.255 access-list acl-vpn-NJB permit ip host 172.17.0.51 172.17.7.0 0.0.0.255 You would make three phase 2 tunnel entries: Local Network: Network: 172.17.7.0 /24 Remote Network: Address: 172.17.0.254 Local Network: Network: 172.17.7.0 /24 Remote Network: Address: 172.17.0.4 Local Network: Network: 172.17.7.0 /24 Remote Network: Address: 172.17.0.51
  • Pfsense IPsec webpages not working

    2
    0 Votes
    2 Posts
    467 Views
    T
    Ok I think I found a solutions. Somehow my HTTP(s) got dropped when using SHA512/AES256 to the Mikrotik box. When I use SHA1 and AES128 http(s) requests works fine and I am able to access the webconfigurator. Spend a lot of time finding this out, because only http(s) connections got dropped somehow.
  • PfSense not using IPSec site-to-site tunnel for routing

    6
    0 Votes
    6 Posts
    5k Views
    DerelictD
    In Status > Interfaces you will see the second interface. That is the internal interface (lan). It does not matter what the interface description is.
  • IPsec High CPU

    2
    0 Votes
    2 Posts
    1k Views
    M
    Not quite an answer to your question, but I'm watching this thread with curiosity. First of all, if you want to use AES you should activate it (in pfSense Advanced-Misc-Cryptographic hardware) My very limited experience with AES-NI (I just installed the proper hardware 2 days ago and am still running tests) is that with AES crypto active and using AES-GCM128 it doesn't actually push a lot more data thorough, but it does let the CPU breath for other stuff. In other words, before I had AES-NI the router became unresponsive during large transfers, but  in the end the transfer went through through sheer CPU-power. Right now, with AES-NI, the transfer is slower (even with a much faster CPU!!!) but the router stays 100% responsive to everything (SNNP, run of the mill routing, etc) - the CPU actually hovers at 3% usage during transfer, as reported by the pfSense dashboard. It used to hit 90%+ on the older non-AES-NI hardware. I have no idea if this is what to expect (and if so, it's disappointing, I wanted faster transfer). I don't want to hijack your thread but additional hints and tips would be welcomed and would probably help you too.
  • PFSense IPsec to Sonicwall - SMB working, DNS/PING not working

    5
    0 Votes
    5 Posts
    1k Views
    NogBadTheBadN
    You'll either need to add a rule for ICMP or change the top protocol to any if you want pings to work as per Derelicts post. Status -> System Logs -> Firewall -> Normal View if you click on the + it will add a rule if your not sure.
  • Pfsense as L2TP/IPSec client for VPN service provider

    3
    0 Votes
    3 Posts
    2k Views
    J
    Same question here again. Is there a definitive "No, it doesn't work" yet?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.