• No logging

    1
    0 Votes
    1 Posts
    463 Views
    No one has replied
  • Having problems with Site-to-Site

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Filtring IPSEC traffic by using squid

    1
    0 Votes
    1 Posts
    436 Views
    No one has replied
  • Mobile Client help - Much appreciated - Traffic not passing

    3
    0 Votes
    3 Posts
    819 Views
    K
    Haha. Just got it working.  I was using manual outbound NAT rules.  Switched back to automatic and then back to manual to pfSense would regenerate NAT rules including those for IPSEC. All traffic flows now!
  • IPsec site-to-site maximize throughput

    2
    0 Votes
    2 Posts
    900 Views
    jimpJ
    You haven't provided any details about the hardware or the VPN configuration so it's impossible to speculate what the bottleneck might be. It could be CPU, it could be the encryption settings, it could be hardware acceleration in the ER-X helping it out, etc.
  • IPsec to Cisco ASA – not stable or good

    3
    0 Votes
    3 Posts
    844 Views
    W
    Thanks for the suggestion. Not the solution here, but was worth experimenting with.
  • Netgate CPIC-8955 to speed up IPsec VPN

    2
    0 Votes
    2 Posts
    806 Views
    J
    Not yet, but soon.
  • IKEv2 IPsec clients connect all with the same IP address

    3
    0 Votes
    3 Posts
    1k Views
    V
    Sorry for taking so long, I thought I checked to be notified for responses over email, I guess I didn't. Anyway, I had already done that, I'm starting to think my install is defective somehow. I think it's dropping information, I tried an internal VPN server and connections can't be made, they pass the firewall and are logged and reach the final server but this server reports it's missing stuff like username, I just nuked the server so I can't paste logs anymore but I found the same thing happening with VoIP traffic, no matter what I do I just can't get it to work. Something's off. This VPN server used to work before, now [if] the tunnel comes up, clients will be missing some information like default gateways and no traffic will pass. I tried with several ISPs yielding the same results and the only thing that's different is the gateway itself. I'm loving pfSense so far but I think I'll have to go back to my Ubiquiti gateway if this doesn't work. :( Thanks for you help anyway, I really appreciate it.
  • IPsec and Tiered Gateway Groups

    6
    0 Votes
    6 Posts
    2k Views
    B
    After much troubleshooting on and off the last few weeks, I think I have this working "good enough". Our old ASA 5505s handle failing over slightly more reliably, but in the end the cost and flexibility of the pfsense devices seem to be worth it. I think one of the main issues was DNS resolution. The firewall was unable to update the dynamic dns service when it failed over to the backup wan. One way to resolve that is to configure "Enable default gateway switching" under advanced, but that seemed to cause issues with a static route I had setup to allow the firewall itself to reach the remote lan of the ipsec tunnel. My resolution was to: 1. Make sure DNS servers are configured on all interfaces under System-> General Setup. (Why can't there be duplicates?) 2. Under Services->DNS Resolver, check "enable forwarding mode" 3. Set DPD to a lower retry rate to cause broken tunnel to be torn down quicker. 4. Enabled Cisco Extensions under vpn advanced. Not sure if this helped anything. 5. Installed cron and changed the rc.dyndns.update task to run every 3 minutes. This probably didn't fix anything, but it helped troubleshoot. Remaining issues: 1. When the primary WAN comes back online, the tunnel never seems to renegotiate on that circuit automatically (maybe im not waiting long enough?). This isn't critical in my view. 2. IPsec is currently using not very secure aggressive mode, more testing needed to check main mode. And maybe someday I'll be able to look into some sort of ipsec over gre connection that handles failures more gracefully, but that looks quite complex since I don't have much knowledge in the field. Hope this helps someone.
  • IPSEC as a failover route

    1
    0 Votes
    1 Posts
    468 Views
    No one has replied
  • BINAT for IPSEC Only Works Outbound

    15
    0 Votes
    15 Posts
    4k Views
    R
    The ACL/Routing in Azure is allowing all traffic between pfSense and VM for troubleshooting purposes, so its definitely not getting blocked. I've had a capture running on the target for the last 24-hours and have not received a single packet from the remote side - it is getting lost in the Azure fabric, it seems. I have opened a ticket with Azure referencing this Forum Post to see if we can get some debugging done between the Azure Gateway and our target VM.
  • IPSec both site-to-site and stretched LAN

    1
    0 Votes
    1 Posts
    484 Views
    No one has replied
  • 0 Votes
    1 Posts
    440 Views
    No one has replied
  • Setup in non-critical environment

    5
    0 Votes
    5 Posts
    1k Views
    M
    syncing, encryption and decryption
  • Partially working link between PfSense and Allied Telesis Router

    1
    0 Votes
    1 Posts
    563 Views
    No one has replied
  • Help with Routing one IPSEC traffic to Another IPSEC tunnel

    1
    0 Votes
    1 Posts
    341 Views
    No one has replied
  • IPSEC - routing

    1
    0 Votes
    1 Posts
    445 Views
    No one has replied
  • Connections from site 1 to site 2 only work partly

    3
    0 Votes
    3 Posts
    940 Views
    Y
    I have just checked, and there are no firewalls enabled on those machines.
  • L2TP/IPSEC - Mobile Clients traffic from outside gets blocked by firewall

    1
    0 Votes
    1 Posts
    467 Views
    No one has replied
  • Possible bug - IKEv2 Phase2 entry using crypto that isn't enabled?

    3
    0 Votes
    3 Posts
    1k Views
    Z
    @jimp: Look at the config that shows up in /var/etc/ipsec/ipsec.conf, especially "esp =", what does that look like? If you have multiple P2s on that P1, this bug might be a possibility: https://redmine.pfsense.org/issues/6263 I do have multiple P2s on the P1, so that bug is probably why I can't get it to use GCM (since I haven't gone through and disabled all of the other crypto types). Doesn't fully explain why the selection / ordering isn't working though.  The Palo Alto is supposed to be offering GCM first and then CBC last.  Only thing I can think of is that the GCM is failing for some reason, and it's falling back to CBC? Woah, this is kind of ugly.  I guess this is due to "auto" for the length, maybe combined with the fact that I have so many P2 entries (the same config line might be repeated for each P2)? esp = aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384,aes256-sha384-ecp384,aes192-sha384-ecp384,aes128-sha384-ecp384,aes256gcm128-sha384-ecp384,aes256gcm96-sha384-ecp384,aes256gcm64-sha384-ecp384! I'm seeing each P2 entry in there as individual "con1xxx" and each one has an identical esp= line. I could pare down to like 3-4 P2 entries if I had a way to "carve out" (exclude) individual /24s from a /16 tunnel… I think this is something strongswan can do but it isn't exposed in pfSense and I'm not about to start mucking around behind the scenes and breaking stuff.  ;) A routed /30 style tunnel would also do the trick (and I'd even prefer it)... I know strongswan can do this too (it's possible with Ubiquiti) but ISTR there are tunnel interface problems in BSD that make this not an option.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.