• Cannot resolve local DNS Resolver from IPSec client

    4
    0 Votes
    4 Posts
    2k Views
    K
    Hi, nevermind, I found the issue, some time ago I installed BIND, I think its conflicting. I stopped BIND and it works now. thanks.
  • How to dis/connect VPN from shell?

    1
    0 Votes
    1 Posts
    713 Views
    No one has replied
  • IPSec over GRE and OSPF

    5
    0 Votes
    5 Posts
    2k Views
    A
    I Have this same issue. I have read some articles which lead to this https://doc.pfsense.org/index.php/Asymmetric_Routing_and_Firewall_Rules as theology have TCP:SA in them which indicates asymmetric routing Jul 14 16:04:15 ► gre0   172.16.15.30:179   172.16.15.29:65116 TCP:SA Jul 14 16:04:23 ► gre0   172.16.15.30:179   172.16.15.29:65116 TCP:SA I've added tcp flaps and sloppy states to all my rules under floating and the traffic is still getting blocked which is rather frustrating! anyone come across a fix or things to check?
  • SAD issue

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Routing with IPSec Tunnel

    3
    0 Votes
    3 Posts
    708 Views
    D
    Thank you.
  • [RESOLVED]: Disconnects seemingly when under load

    2
    0 Votes
    2 Posts
    2k Views
    C
    FYI this appears to have been resolved as per below and does not appear to have been load related; The Sonicwall Syslog was more revealing - "IKEv2 IPsec proposal does not match: DH Group mismatch" & "VPN Policy: GHtoBH; ESP TFC Padding not Supported". I'm not sure why but checking "Enable Perfect Forward Secrecy" appears to have fixed it, although "ESP TFC Padding not Supported" still appears in the logs. Article here https://www.sonicwall.com/en-us/support/knowledge-base/170505666326684. If anyone can offer an explanation that would be appreciated. I'm not 100% convinced is resolved as I feel it may just have renegotiated and worked - However this is a finger in the air feeling and does not come from any solid fact!
  • IPSEC single host Phase 2

    1
    0 Votes
    1 Posts
    540 Views
    No one has replied
  • Windows 10 1703 Native VPN Client Failing

    6
    0 Votes
    6 Posts
    3k Views
    M
    @Bengatzu: Had same Problem: PfSense 2.3.4 and lot of Clients which running Win10 (1607). Connect via Open VPN or via TheGreenBow IPsec works without problems. Then Client Updates Win10 (1703) killed all. No possible VPN Connection. Changed HDD and Restored Veeam Backup on Test Client to Win10 (1607) - VPN works successful After HDD replace to old one with Win10 (1703) - no possible VPN Connection. Workaround that solved my Problem: Deaktivate on Win10 (1703) Clients the following Services: IKE- and AuthIP Ipsec Keymodule, IP-Helpservice, IP-sec Rule Agent after reboot all VPN Connections working successful This worked…although all I did was disable the "IP Helper" service by setting to "Manual" Startup Type.  My VPN would not connect unless the "IKE and AuthIP IPSec Keying Modules" were set to Automatic and I did not have an "IP-sec Rule Agent" Service. Thanks so much for the help!
  • Connect my whole home network to my work vpn

    2
    0 Votes
    2 Posts
    753 Views
    A
    No one? :( I (maybe wrongly) figured I'd try 1. Interfaces> (Assign) 2. PPPs > New (pptp) 3. Link (tried both wan and lan), input one of the IP's I usually get from my server as local with /24 network mask. Gateway typed in the public IP of the pptp server 4. Interface assignments > Assigned the pptp to OPT1 5. Interfaces > OPT1. Enabled it 6. Status > Interfaces. Hit connect.. nothing happens Am I on the right track here?
  • MySQL, Snort and Barnyard2

    1
    0 Votes
    1 Posts
    519 Views
    No one has replied
  • IPSEC not working now with NPS radius Auth

    2
    0 Votes
    2 Posts
    677 Views
    K
    Firewall reboot took care of the issue
  • Tunneling between 2 site to site ipsec

    2
    0 Votes
    2 Posts
    727 Views
    Y
    i found this but it doesn't work. can anyone else chime in. he's describing the same situation im facing. but i find that it dosnt work when i try to replicate it. https://forum.pfsense.org/index.php?topic=109524.0
  • Possible bug with multiple phase 2 entries

    2
    0 Votes
    2 Posts
    914 Views
    jimpJ
    https://redmine.pfsense.org/issues/6263
  • IPSEC VPN tunnel on two dynamic IP Addresses

    1
    0 Votes
    1 Posts
    533 Views
    No one has replied
  • Route another subnet through ipsec tunnel

    1
    0 Votes
    1 Posts
    580 Views
    No one has replied
  • Gateway monitors for IPsec

    1
    0 Votes
    1 Posts
    545 Views
    No one has replied
  • 0 Votes
    1 Posts
    492 Views
    No one has replied
  • IPSEC Configuration cache not flushing properly in some instances

    1
    0 Votes
    1 Posts
    524 Views
    No one has replied
  • Reach remote side over VPN from SELF

    1
    0 Votes
    1 Posts
    482 Views
    No one has replied
  • IPSEC VPN AT&T U-verse

    4
    0 Votes
    4 Posts
    2k Views
    C
    Contacted AT&T support and managed to get to Tier 3, but they could still not help me.  I asked if I could get an older modem that supports bridge mode and they told me my service level doesn't support the older modems.  There is a higher level of support, but requires you to pay! I have no reason to believe that the pay support can make any changes to the modem that will allow the IPSec VPN to work.  I asked if they could do a packet capture on their router so we could see what is happening to the ESP packets that get returned from the remote pfSense firewall.  I'm not sure the tech understood how a packet capture works.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.