• IPSec Mobile Clients + Site2Site VPN doesn´t work

    2
    0 Votes
    2 Posts
    602 Views
    B
    Nobody an idea?
  • Issues with RV340 VPN

    3
    0 Votes
    3 Posts
    840 Views
    stephenw10S
    The original post was spam, Split this off and moved to IPSec. Steve
  • Errors using MacOS server LDAP as backend auth for iOS and MacOS clients

    2
    0 Votes
    2 Posts
    618 Views
    S
    Hey gang - just a quick check in to see if anyone has experience with IPsec and LDAP or tips on where to start troubleshooting?
  • Ipsec ikev2 more than 20 simultan connections

    2
    0 Votes
    2 Posts
    704 Views
    T
    Hi, I have found out what file the strongswan.conf is assembled. It is the /etc/inc/vpn.inc. Best regards Tino
  • Pfsense 2.3.2 ipsec vpn mobile configuration not correctly generated

    18
    0 Votes
    18 Posts
    8k Views
    nodauN
    seems so, i have the same issue. the patch posted above cannot be applied. i have multiple p2 configured lan, wlan, dmz. i can only access lan subnet. and i have no idea why. i don't even know if my problem is related to this topic.
  • IPsec VPN Site to Site (Sonicwall <-> pfsense)

    7
    0 Votes
    7 Posts
    12k Views
    B
    I have done it like below (full testing was not possible) and it seems to work: http://zee.linxsol.com/system-administration/pfsense-2-site-to-site-vpn-with-dell-sonicwall-nsa-3500.html I have put in some additional rules on the WAN Interface, see screenshot. [image: Rules_IPSEC.JPG] [image: Rules_IPSEC.JPG_thumb]
  • 0 Votes
    3 Posts
    951 Views
    C
    I did think that if it worked it would break all routing. It was a long shot, as i thought each interface would have it's own routing table, so i could have 192.168.1.0 <<ipsec a="" nailed="" to="">> 123.123.123.120 <<lan to="">> 10.0.0.0 <<routing rule="" for="" outbound="" ipsec="" a="">> 192.168.1.0 <<ipsec b="" nailed="" to="">> 123.123.123.121 <<lan to="">> 10.0.1.0 <<routing rule="" for="" outbound="" ipsec="" b="">> 192.168.1.0 <<ipsec c="" nailed="" to="">> 123.123.123.122 <<lan to="">> 10.0.2.0 <<routing rule="" for="" outbound="" ipsec="" c="">> All on one pfsense firewall with each</routing></lan></ipsec></routing></lan></ipsec></routing></lan></ipsec>
  • MOVED: Disable class

    Locked
    1
    0 Votes
    1 Posts
    340 Views
    No one has replied
  • Route ip traffic from mobile client to site to site vpn

    1
    0 Votes
    1 Posts
    494 Views
    No one has replied
  • Can Ping, Not Access

    1
    0 Votes
    1 Posts
    538 Views
    No one has replied
  • VPN passtrought for multiple Ipsec / L2TP clients to same host

    2
    0 Votes
    2 Posts
    822 Views
    A
    While I have been stalling for days, I have made some progress on the issue tonight. It seems the problem is related to the UDP sessions timeouts. Because I have some VOIP phones and their sessions were expiring, I had to set the firewall optimization options to "conservative", thus my UDP states were taking someting between 300 to 900 seconds to expire. And L2TP/Ipsec is UDP traffic as well, making me beleive that was a concurrent session problem. Now that I have set the firewall optimization options back to "normal", and adjusted the specific timeout of udp states to a much shorter delay than "conservative", but longer delay than "normal", I am able to connect l2tp sessions much more frequently and sometimes concurrently. The wait penalty is still painfull though. And my phones seem to remain online so far. I know the best option would be to shorten the SIP phones polling interval and let the UDP state delay to normal, but my VOIP provider has locked this control on the phones, so it is complicate. An ideal solution would be to be able to tune the following properties inside firewall rules if there is a match : UDP First, UDP Single, UDP Multiple. This way, it would be possible to increase the UDP state timeout only for the VOIP traffic, but I don't know if it is doable at low level. There exists a state timeout setting in the advanced firewall rules GUI, but unfortunately it is for TCP only.
  • Assigning fixed IP addresses to IKEv2 Clients

    10
    0 Votes
    10 Posts
    5k Views
    NogBadTheBadN
    Yea working a treat thanks dude. I was missing the static routes and the Framed-Route = "0.0.0.0/0 172.16.0.1 1" I've split my 172.16.9.0/24 into 2 /25s blocks the first /25 has full access everywhere the second /25 internet only.
  • IPSEC Changes Require Reboot

    5
    0 Votes
    5 Posts
    1k Views
    K
    Nothing special about them, just adding another host or network to the tunnel.  I haven't stopped and started the IPSEC service, just used the icon that shows restart service.  We'll try that. This config has been running around 7 years and this behavior started around 2 years ago.
  • 0 Votes
    2 Posts
    714 Views
    A
    The issue was down to a bug with the modem from our ISP fragmenting packets. New ISP, problem solved!
  • IPSEC - Pfsense to Endian

    1
    0 Votes
    1 Posts
    673 Views
    No one has replied
  • IPSec Mobile Client Internet Access

    2
    0 Votes
    2 Posts
    640 Views
    B
    So I'm the dummy, as expected. Setting is found in the VPN adapter on the Windows side: VPN Adapter Properties –> Networking --> Select TCP/IPv4 Properties --> Advanced --> Uncheck "Use default gateway on remote network" Hope this helps a few other dummies out there!
  • Road Warrior Cofig broken?

    4
    0 Votes
    4 Posts
    755 Views
    T
    I can't fix this mismatch, any help?
  • IPSEC WAN interface subnet unreachable

    1
    0 Votes
    1 Posts
    466 Views
    No one has replied
  • 0 Votes
    1 Posts
    1k Views
    No one has replied
  • Multiple peers for a single phase 1

    1
    0 Votes
    1 Posts
    392 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.