• IKEv2 VPN: No routing to outside & Dual Stack?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Mobile IPSEC and BINAT

    6
    0 Votes
    6 Posts
    6k Views
    D
    A few more things we have tried without success… Adding a 1:1 NAT entry for this BINAT (this worked for OpenVPN but not IPSEC) Changing NAT-T between Force/Auto Still no love no matter what.  We have to force add the routes on the Shrewsoft VPN client for the BINAT network and we can see the traffic coming into the IPSEC tunnel but no replies and no traffic hitting the LAN so it seems like NAT is not happening.  No entries in the firewall logs showing that this is blocked either.
  • IKEv2 to Cisco ASA - no acceptable PSEUDO_RANDOM_FUNCTION found

    5
    0 Votes
    5 Posts
    4k Views
    L
    Thank you so much! I'll get on it right away!
  • Slow speed within IPSec

    9
    0 Votes
    9 Posts
    9k Views
    M
    @rlrobs: https://doc.pfsense.org/index.php/Advanced_IPsec_Settings "Enable MSS clamping on VPN traffic: Enable MSS clamping on TCP flows over VPN. This helps overcome problems with PMTUD on IPsec VPN links. If left blank, the default value is 1400 bytes. This is useful is large packets have problems traversing the VPN, or if slow/choppy connections are observed across the VPN. Ideally it should be set on both sides, but traffic will have MSS clamping applied in both directions." Change for 1350 and test Hello, having the same problem here, and changing the MSS clamping to 1400, 1350 or even 1300 didn't change anything unfortunately. As "feeling", it seems like in certain conditions the IPSec interface is limited to 10Mbps, or better, the communications between the IPSec interface are limited to 10Mbps, but this is just a feeling because I cannot find any limit anywhere. Thanks, Michele
  • IKE authentication credentials are unaccepatble

    3
    0 Votes
    3 Posts
    891 Views
    R
    Thanks for help me I attached th photos [image: 1.png] [image: 1.png_thumb] [image: 2.png] [image: 2.png_thumb] [image: 3.png] [image: 3.png_thumb] [image: 4.png] [image: 4.png_thumb]
  • IPsec/L2TP Client cannot go out pass pfSense

    3
    0 Votes
    3 Posts
    1k Views
    G
    Seems the SoftEther client is using SSTP to connect to Azure to make the connection back to my VPN server.  So it's not IPsec/L2TP connection really.  I have no issues connecting on port 443 to other web sites.  Real newbie question but what log(s) do I need to look at from the pfSense GUI to see my connection traffic/process? For reference in what I'm trying to do: https://www.softether.org/4-docs/2-howto/6.VPN_Server_Behind_NAT_or_Firewall/2.VPN_Azure Thanks,
  • IPSec v1 extremely slow download speed on client

    5
    0 Votes
    5 Posts
    1k Views
    E
    I did try 1350 as advised, no difference. 1300 also made no difference.
  • Setting up IKEv2 on pfsense firewall

    6
    0 Votes
    6 Posts
    2k Views
    K
    Are your systems in a domain environment?  If do you can push very via group policy.
  • Site to Site IPsec VPN tunnel with VPN Client - No traffic through tunnel

    2
    0 Votes
    2 Posts
    774 Views
    L
    I have the Same problem,
  • IPSec Channel created, VLAN has stopped working

    3
    0 Votes
    3 Posts
    950 Views
    K
    Hello Jimp, This is a fresh build for a new office, so there aren't many FW rules as yet.  The IPsec S/S channel is essentially a copy of the Office3 stable IPsec S/S link, so nothing really exciting to see there. VLAN3 has no specific host/port allow rules Block rules to other VLANS/interfaces. Allow all rule for internet. VLAN3 is on LAGG0 along with 2 other VLANs (LAGG0 is 2x10GbE interfaces). After stuffing around for another hour or so I gave up and rebuilt the unit from scratch last night. I don't know what is going on but everything works fine this time around… I've compared the config.xml files and they are identical. The problem is fixed but the issue is unresolved, guess we will never know.
  • 2.3.2-p1: No l2TP/IPSEC login for Windows Client behind NAT

    5
    0 Votes
    5 Posts
    2k Views
    jimpJ
    Both IPsec and L2TP work fine on their own for their intended purposes, it's the combination that fails in that situation. It wouldn't be accurate to place a warning anywhere in the pfSense GUI as it wouldn't be directly relevant, thus the warning on the wiki.
  • Add new IPsec config only after reboot possible

    2
    0 Votes
    2 Posts
    910 Views
    jimpJ
    Do you have any errors showing in the IPsec log when this happens? What if you set your logs to the following values:  IKE SA, IKE Child SA, Configuration backend on Diag. All others on Control. See also: https://doc.pfsense.org/index.php/IPsec_Troubleshooting#Common_Errors_.28strongSwan.2C_pfSense_.3E.3D_2.2.x.29 Additionally, rather than a reboot, try stopping the IPsec service and then starting it again. Don't use a restart as that only reloads the configuration.
  • IPSec route priority

    5
    0 Votes
    5 Posts
    3k Views
    M
    Hello, I have the very same problem as stated in the first post from "fabio.grasso" . From my understanding the IPSEC traffic should be intercepted before any routing is applied. And like this it is working in 5 of my 6 pfSense boxes, but not on one. All pfSenses are on 2.3.2 release and all routing and all IPSEC-tunnels are of the same kind (different ip-ranges of course). just box#6 makes this problem, resulting in a asymmetric routing, because it tunnel partner has not the problem. I disable the 10.0.0.0/8 route and traffic through the tunnel works, by adding it again the ipsec-routing is broken again…. I have no idea why it happens just on 1 box and it makes me abit nervous to see such an inconsistent behaviour. Thanks a lot for sharing a solution (Remote-IPSEC-Lan routing via "Null4 - 127.0.0.1") But should I apply this patch now alo to the working ones??? Kind regards Maddin
  • 0 Votes
    1 Posts
    879 Views
    No one has replied
  • IKEv2 Issues between PF Sense and Cisco 1941

    2
    0 Votes
    2 Posts
    1k Views
    S
    Hello, On pfSense you find this Option on the tunnelconfig: VPN/IPsec/ Tunnels/Edit Phase 1: ckeck the box "Disable rekey" to Disables renegotiation when a connection is about to expire. greez
  • IKEv2 successfully connects but doesn't route traffic through tunnel

    3
    0 Votes
    3 Posts
    6k Views
    R
    Thank you. I was only looking at settings on pfsense and never questioned the client. I solved the issue and will explain below specifically for windows clients what the problem was. Windows 10 now defaults VPN connections with Split Tunneling set to true. Split tunneling selectively only routes traffic that matches your leased address over the tunnel, while routing all your other traffic out your local machines gateway. I believe that IKEv2 requires virtual addressing pool, which has to be on a separate subnet. So the default client settings will never successfully route any traffic except to other remote VPN clients. So IKEv2 on windows without custom settings will never function. There are a few solutions. 1. Disable split networking and route all traffic through the remote gateway. (Be sure on Phase 2 to set Local Network to 0.0.0.0 / 0 to route all traffic) 2. Keep split networking enabled, and add a custom route rule on the client to force traffic desired for the remote's lan traffic to use your VPN interface. (route add command) Windows 10 has broken the conventional UI menus to change the VPN settings under the VPN network adapter's networking tab. The old checkbox was "Use default gateway on remote network", which was previously enabled by default. This checkbox when enabled is the same as split tunneling set to false. The workaround is to use a powershell command to configure your VPN. In powershell you can list your VPN connections with the command: Get-VpnConnection With the name of the VPN connection you can disable split tunneling with the following command: Set-VpnConnection -name "connectionName" -SplitTunneling $False I'm surprised with how poorly VPN's are implemented on many devices.
  • 0 Votes
    3 Posts
    3k Views
    T
    You can make Windows 10 use Group 14 as described here: https://wiki.strongswan.org/projects/strongswan/wiki/Windows7#AES-256-CBC-and-MODP2048 Then do the same for IOS using the Apple Configurator 2 (https://support.apple.com/en-us/HT205285) and this tutorial: https://forum.pfsense.org/index.php?topic=106433.0 (Use Group 14 instead of 20, which is what this tutorial has)
  • Strongswan: Where does it set the routes?

    3
    0 Votes
    3 Posts
    1k Views
    4
    Hi, thanks for that hint. Can I change them somehow? I think that solves my problem described here…. https://forum.pfsense.org/index.php?topic=119347.0 But I cannot simply change the SADs the ::0/0 part because the it should be some kind of policy based routing. I got a LAN with (lets say) 2001:fat:babe::/64 and a DMZ with (lets say) 2a01:face::/56 which "comes" with the IPSec Tunnel. Everything from the DMZ schould be routed via the IPSec Tunnel, thats why the SPDs are ::0/0 -> 2a01:face::/56  and 2a01:face::/56 ->  ::0/0. But If a packet arrives from the local Lan 2001:fat:babe::/64  it is not directly routed in the IPSec 2a01:face::/56 Network and never arrives there. I put up some static routes in the pfsense gui but that does not work - only in the moment the IPSec tunnel is stopped - then the local DMZ (without Uplink and set routes from Strongswan) it works…. but that does not really help:-) Would be nice if you got some further advice Thanks a lot! Cheers, 4920441
  • No rules needed for IPSec IKEv2 on WAN interface?

    10
    0 Votes
    10 Posts
    10k Views
    E
    IPsec has a rule, the last one is "any to any on any GO!" lol
  • Adding an additional network-range for IPSec

    2
    0 Votes
    2 Posts
    669 Views
    E
    Pretty sure I answered this here: https://forum.pfsense.org/index.php?topic=119315.0
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.