• VPN internet traffic

    3
    0 Votes
    3 Posts
    930 Views
    H
    I don’t know exactly what happend, but now I can reach the internet and my LAN host with the correct setting. But still cannot resolve FQDN within the LAN. It doesn’t matter if I fill in lists of DNS servers or a search domain in pfSense or locally on my Mac. So I think now, it’s a DNS issue, but I don’t have any clue to resolve this.
  • Multiple mobile users

    1
    0 Votes
    1 Posts
    603 Views
    No one has replied
  • Aws vpc vpn wizard us-east-2

    2
    0 Votes
    2 Posts
    1k Views
    C
    Was currious if the aws wizard package was ever going to include the new zones.
  • IPSec tunnel to cisco router using EIGRP

    1
    0 Votes
    1 Posts
    684 Views
    No one has replied
  • IPSec suddenly dies

    5
    0 Votes
    5 Posts
    3k Views
    G
    Thanks Derelict  :D Will try that when we change ISP, I'll post results when I've tried.
  • IPSEC AUTH ERROR

    1
    0 Votes
    1 Posts
    613 Views
    No one has replied
  • IPSec Site-to-site: tunnel drops randomly

    2
    0 Votes
    2 Posts
    993 Views
    S
    next time, check to see if you have 0 bytes in one direction.
  • One way traffic on the client, yet server sends data bask

    2
    0 Votes
    2 Posts
    686 Views
    S
    i frequently face this same identical issue, bytes one direction, but zero bytes opposite direction.  its reversed on the opposite pfsense.  this happens on a pfsense has has 26 or so IPSec tunnels, and just 1 tunnel will do this, the other 19 are functioning normally. sometimes it self recovers, sometimes this will go on for hours (effectively killing the tunnel and traffic from clients) until i massage it back online. i have not been able to figure out the root cause.
  • ISAKMP_N_PAYLOAD_MALFORMED(16), after upgrading pfSense 2.2.6 to 2.3.1

    3
    0 Votes
    3 Posts
    2k Views
    B
    I was struggling for more than one week to make IPSec for mobile clients to work (only Android natively worked) and disabling "Provide a list of accessible networks to clients". I don't know if it's a bug or a feature, but disabling "Provide a list of accessible networks to clients" works on 2.4-BETA too.
  • PfSense to ASA VPN Phase 2 Issue

    5
    0 Votes
    5 Posts
    1k Views
    G
    @Derelict: I would use much longer IKE (P1) and ipsec (P2) lifetimes. Something like 86400/28800 should be more than sufficient. Most IPsec incompatibilities occur during re-key. Why make it re-key far more often than is necessary? Yea, 99% of problems occurs when re-keying. About the lifetimes I think you'd have to ask Netgate support since they provided the config. But personally, I will try to use longer lifetimes.
  • Pfsense ipsec site to site ping ok but traffic not passing

    3
    0 Votes
    3 Posts
    896 Views
    G
    solved! In Interfaces->wan i set MTU to 1450 and everything work. Thanks anyway
  • IPsec site-to-site doesn't work: problems between PFsense Versions?

    4
    0 Votes
    4 Posts
    1k Views
    G
    Hello, I have a similar problem with 2.3.3 version, on pfsense 2.1.5 works fine.
  • IPSEC Tunnel Active but not working ?!

    3
    0 Votes
    3 Posts
    1k Views
    G
    Hello, I have a similar problem with 2.3.3 version, on pfsense 2.1.5 works fine. What is your pfsense version? I'm running the pfsense into  a xenserver 7.0.
  • 0 Votes
    1 Posts
    532 Views
    No one has replied
  • IKEv2 + OSX + Radius ?

    7
    0 Votes
    7 Posts
    2k Views
    S
    Elnadmin, EAP-RADIUS auth scheme just means you're using a radius server to authenticate your IKEv2 clients instead of using the pre-shared keys on IPSec pfsense tab. Your initiator becomes a supplicant and will send authentication to your vpn server, which becomes a radius client that forwards the request to the radius server, that in turn will performs authentication. I'm trying to explain it as simpler as i could in english, which is not my primary language, and i hope i understood correctly your issue. Think the RADIUS server as a sort of "authentication gateway" that receives the authentication requests from some devices (in your case the VPN server) and authenticates or redirects authentication to the right server accordingly (could be locally, against an LDAP server like a domain controller, or certificate based), and replies back with a YES or NO and eventually some other messages. It's completely transparent to the device you're connecting with, which will use the authentication configured on the radius server itself. Depending on how you configure authentication on the radius server, you need to set up clients accordingly. If you're using certificates to authenticate clients you're likely to use EAP-TLS, if you use usernames and passwords, you're very likely to use EAP-MSCHAPv2. All those protocols can be configured in the FreeRADIUS:EAP/EAP section in the package configuration section, it's up to you to decide which one. The main advantage of using a RADIUS server instead of the internal database is that you can use the same authentication server for multiple devices, such as network devices (managed switches and routers which normally don't support more complex authentication schemes), VPN servers, 802.1x networks and well, you got the idea. It's a standard protocol for Authentication, authorization and (eventually) accounting. EDIT: in your case, under mobile clients you must also select the radius server database. You can configure pfsense to use other databases for authentication under Settings / User Manager / Authentication Servers, then your vpn server to use EAP-RADIUS, and your radius server with the correct EAP authentication. From the message you posted in your first post, it seems the IPSec server is not configured to accept EAP requests. What protocol do you have under the P1 auth method and under FREERADIUS/EAP?
  • IPSec Point-To-Point Split Tunneling

    2
    0 Votes
    2 Posts
    675 Views
    T
    You're connecting to ipsec using a client or another firewall? the tunnel remote network list usually states which traffic will pass over the tunnel, if you have 0.0.0.0/0 then everything will afaik.
  • IPSec tunnel to same site with different IPs

    3
    0 Votes
    3 Posts
    739 Views
    T
    Which dyndns provider works with pfsense? I thought dyndns.org was gone now
  • PFsense tunnel/enable disable issue

    2
    0 Votes
    2 Posts
    712 Views
    jimpJ
    Define "inexpensive". A Netgear GS-108T will run $60-80-ish and has good VLAN support (and LACP and other decent things). It's not the greatest switch in the world but it gets the job done. I've seen others tossed around from HP and TP-Link that have decent VLAN support cheap but I haven't used those. I have a larger TP-Link switch and it's great but it was ~$120 for a 16-port switch.
  • IKEv1 tunnels drop when enabling mobile client IPSEC Policy

    4
    0 Votes
    4 Posts
    965 Views
    D
    @StaChris: I have multiple site to site connections, some going from PFSense to Netgear boxes via IKEv1 PSK, 2 going to other PFSense boxes using IKEv2 PSK. I have mobile client enabled and configured, I have a mobile policy for mutual psk + Xauth for road warriors. When I enable that policy no matter how it's configured, all IKEv1 tunnels going to the netgear boxes drop and don't come back up until I disable the policy. All IKEv2 tunnels going to PFSense boxes seem to be operating fine however. Does anyone have any idea why this is happening? I'm running the latest stable build of PFSense 2.3.3. Are you using IKEv1 or IKEv2 for the mobile setup?  Considering all the IKEv2 tunnels stay up but the IKEv1 tunnels go down, I wonder if there is some conflict.  If using IKEv1 for the client, have you tried using IKEv2 for the client and see if it affects anything?  Do the IKEv1 tunnels still go down, do the IKEv2 tunnels go down instead, or does everything continue working like normal.
  • 0 Votes
    1 Posts
    572 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.