• How can I set up IKEv2 interfaces?

    1
    0 Votes
    1 Posts
    493 Views
    No one has replied
  • AWS IPSEC VPN with BGP, both need to be restarted every 24 hours.

    6
    0 Votes
    6 Posts
    2k Views
    B
    Ok, but I seem to not be able to have QuaggaOSPF and OpenBGP installed, and I am not able to tear down our OpenBGP configuration and move to Quagga without taking serious down time.
  • LAN routing after subnet change

    2
    0 Votes
    2 Posts
    528 Views
    J
    Not sure why but the config change was never picked up even after restarting the service. Rebooted the firewall and it's now sending the clients the right subnet so probably something is cached and not reloaded on restart.
  • 0 Votes
    1 Posts
    488 Views
    No one has replied
  • Mobile IPSec VPN with Squid Issue

    2
    0 Votes
    2 Posts
    962 Views
    S
    Did you ever find a solution for this problem? I face the exact same problem and tried pretty much every single approach described here and none worked  :(
  • Unable to get ipv6 to work over ipsec

    1
    0 Votes
    1 Posts
    450 Views
    No one has replied
  • Multi IPSEC to 3 Branch offices

    2
    0 Votes
    2 Posts
    763 Views
    jimpJ
    Yes, that works fine, provided you setup all of the appropriate Phase 2 entries in IPsec and routes in OpenVPN. For example, your IPsec tunnels would need to have phase 2 entries such as: Site A<->B: P2 for A-B, OpenVPN-B Site A<->C: P2 for A-C, OpenVPN-C OpenVPN: Local network set for A, B, and C And if you want B and C to reach each other through A, you'll need additional P2 entries to cover B-C / C-B on the appropriate tunnels and in the proper direction.
  • IPSEC can't connect to internet.

    1
    0 Votes
    1 Posts
    346 Views
    No one has replied
  • Local traffic on a VLAN with a remote gateway

    25
    0 Votes
    25 Posts
    4k Views
    johnpozJ
    Ah.. Yeah that is a problem…
  • Made a script to test IPSec connections and reconnect tunnel if they fail

    1
    2 Votes
    1 Posts
    2k Views
    No one has replied
  • IPSEC Windows 10 client.

    5
    0 Votes
    5 Posts
    2k Views
    K
    Thank you for the suggestion. IKEv2 from what I'm reading involves shipping certs to your users and installing them. (correct me if I'm wrong on this) And for that reason, If I go with IKEv2, I may as well go with OpenVPN. Regards.
  • Newbie: Forward a Single Port Over Tunnel, Linux Host on the Other Side

    2
    0 Votes
    2 Posts
    484 Views
    D
    Hi, With IPsec the easiest solution is filter by port in transport mode. A Linux host with Strongswan or Libreswan supports it. However I think the Pfsense GUI doesn't support that setting yet (I would need it also). So you could create a GRE tunnel over an IPsec tunnel and forward that port to/from the GRE tunnel interface. For example with a rule in your LAN which that remote port would translated (NAT) to the GRE tunnel IP.
  • Cisco GRE IPSEC Transport NAT

    9
    0 Votes
    9 Posts
    4k Views
    A
    Hmm, Seems this is similar to my problem… https://forum.pfsense.org/index.php?topic=134812.msg738845#msg738845 Well, here is my, late, contribution to this thread: 1. A crypto map does the trick with transport mode. 2. Crypto map with Tunnel mode works only if a Crypto Access-list matching the one on PfSense is applied to the Cisco map (restricted to IPv4 or IPv6 range selection) 3. If an "IPsec Profile" on the Tunnel interface (Tunnel Protection..) is used instead of a Crypto Map on the Physical interface then the auto generated Crypto Access List on the Cisco selects only GRE protocol traffic instead of IP. This has no chance to match the IP protocol traffic selection on the PFSense side and this is why I believe the Tunnel Protection Cisco config fails. This can be verified on the cisco side using the commands: "debug crypto ipsec" "show crypto ipsec sa" (the command "debug crypto isakmp" will show that although phase 2 attributes are accepted the proposal is rejected "No_Proposal_Chosen". The reason can be found in the output of the "debug crypto ipsec" command) 4. Not sure if Tunnel protection can work with Transport mode between Cisco and PFSense. Will be happy to try once "3" is solved This is why I am asking for a way to configure PFSense in a way that I can select only GRE protocol traffic instead of IP as IPsec Phase2 interesting traffic.  This will also make possible to narrow  down the selection of packets to be encrypted by IPsec on the PFSense WAN interface to GRE and allow for WAN sourced non GRE packets to leave the interface unencrypted. Would be nice to see this in a future update. More options in selecting IPsec interesting traffic Until then..  Is there a way to tweak PFSense configuration file to achieve this? Regards, Alexandros
  • 0 Votes
    3 Posts
    984 Views
    D
    Hi, I'm not sure about open a new topic for this feature. Is it already implemented? Could it be achieved with any rule? Regards.
  • IPsec tunnel UP but unable to ping remote site

    44
    0 Votes
    44 Posts
    50k Views
    D
    I finally found a solution! On the remote PFsense router I went to VPN -> IPSec -> Advanced Settings and disabled "Enable bypass for LAN interface IP" (scroll all the way down) and I finally can connect to the remote host! Check if your windows firewall on that host is on, as it likely will recognize the incoming traffic as non-private traffic and thus might filter it (to test it, shut down the firewall for public networks).
  • Any plans to support Virtual Tunnel Interfaces (VTI) for IPSEC VPNs?

    15
    0 Votes
    15 Posts
    6k Views
    jimpJ
    @tweek: If you could please consider BIRD for inclusion.  My router expert friend assures me BIRD is much more powerful and better architected than FRR. Our router expert employees prefer FRR/Quagga and assure us it's better than BIRD in various ways.
  • IPsec Interesting traffic problem

    1
    0 Votes
    1 Posts
    573 Views
    No one has replied
  • MULTI IPSEC CONNECTION / PFSENSE A - B - C

    10
    0 Votes
    10 Posts
    1k Views
    G
    @Derelict: If your OpenVPN Tunnel network is 192.168.100.0/24, do something like this substituting the proper remote network, of course. That will need the reciprocal settings on the other side. You`re totaly right I just added my open pn tunnel network to ipsec phase 2 It works !
  • IpSec tunnel not working on SMB and HTTP

    3
    0 Votes
    3 Posts
    1k Views
    L
    I have the EXACT same issue. What's strange is the problem is only occurring one way. I decreased MSS clamping on both sides to 1300 and everything is working now.
  • IPSec with multiple Phase2 behind pfSense not work.

    1
    0 Votes
    1 Posts
    492 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.