• PfSense 2.3.2 Ipsec site to site ok but can't access LAN

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • How does strongswan route?

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ

    It still works the same way, except there is a bypass for the LAN network itself.

    Otherwise it still matches based on the contents of the SPD table (Status > IPsec, SPD tab). If a connection matches the SPD table entries, it's put into IPsec. There is no "routing" in the classical sense.

  • Large data transfers stalling over VPN

    11
    0 Votes
    11 Posts
    4k Views
    0

    I think you can forget about me, it looks like it's a problem with our network and not pfSense.

    Sorry for wasting your time, I feel embarrassed for not working this out before manically posting here.

  • IPSec IKEv2 Connection Succeeds but Can't Access LAN

    3
    0 Votes
    3 Posts
    1k Views
    S

    Aaaaand I had the firewall rule wrong. I was only allowing TCP across IPSec and then wondering why I couldn't ping anything or do DNS lookups .  ::)

    Thanks for helping me check my work.

  • Attack

    2
    0 Votes
    2 Posts
    1k Views
    nsi-fusionN

    Is it from the WAN interface logs??

  • Phase 1 negotiation failed due to time Up

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Add group vpn

    1
    0 Votes
    1 Posts
    713 Views
    No one has replied
  • Disconnecting Individual Mobile IKEv2 Connections

    1
    0 Votes
    1 Posts
    724 Views
    No one has replied
  • PFSense 2.3 & Greenbow IPSec Client

    4
    0 Votes
    4 Posts
    1k Views
    DerelictD

    I would start here:

    https://doc.pfsense.org/index.php/IKEv2_with_EAP-MSCHAPv2

  • Tunnel drop

    3
    0 Votes
    3 Posts
    2k Views
    U

    Thank you for posting this it was driving me crazy and I didn't see it.

  • Issues with IPSec VPN between PFSense and Juniper SRX

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • 1pfsens 6 remote routers

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • How to configure Windows 10 -> ipsec -> freeradius/ldap -> samba4

    3
    0 Votes
    3 Posts
    4k Views
    F

    Thanks for pointing me in the right direction Jim.  I've gotten it working.  This makes is possible to have a windows PC authenticate over the VPN through pfSense to a Samba4 / AD controller before login using the native windows VPN client.

    The process is as follows.

    You should already have Samba4 and FreeRadius installed on the same machine.  Samba4 should already be joined to a domain and / or configured as an AD controller.

    Validate Samba4 and give radius access

    After joining the domain, test the connection using wbinfo.

    wbinfo -a <username>% <password>A successful response should show something like the following:

    plaintext password authentication failed
        Could not authenticate user <username>% <password>with plaintext password
        challenge/response password authentication succeeded

    The critical part is the "challenge/response password authentication succeeded".
    The plaintext password authentication error is expected as no plain-text passwords are stored in Active Directory.

    Now attempt an NTLM authentication:

    ntlm_auth –request-nt-key --domain= <netbios domain="" name="">--username= <username>You are prompted for a password, and on successful authentication, you should see this output:

    NT_STATUS_OK: Success (0x0)

    The radiusd user needs access to the winbindd_privileged directory.
    This directory is typically found at /var/lib/samba/winbindd_privileged/.
    Check to see if any group besides root has access to the directory.

    ls -lh /var/lib/samba/

    If root is the group as well as the owner, create a new group. If a group already exists, make note of the group name and skip the next two steps.

    groupadd wbpriv

    Grant access for the group to the winbindd_privileged directory.

    chown :wbpriv /var/lib/samba/winbindd_privileged

    Add the radiusd user to the group that has read access on the winbindd_privileged directory. 
    usermod -a -G wbpriv radiusd

    Configuring FreeRadius

    Edit the freeradius modules/mschap file. It can typically be found at /etc/freeradius/modules/mschap or /etc/raddb/modules/mschap depending on your distribution.

    Make sure the following lines are uncommented.
    require_encryption = yes
    require_strong = yes
    ntlm_auth = "/path/to/ntlm_auth …"
    with_ntdomain_hack = yes

    Modify the ntlm_auth line to point to the location of the ntlm_auth program you used earlier to test NTLM authentication.
    ntlm_auth is often found at /usr/bin/ntlm_auth.

    Add "–domain=%{%{mschap:NT-Domain}:-MYDOMAIN}" to the ntlm_auth line (replace MYDOMAIN with the correct domain) so that if finally looks something like:

    ntlm_auth = "/usr/bin/ntlm_auth –request-nt-key --username=%{mschap:User-Name:-None} --domain=%{%{mschap:NT-Domain}:-TESTDOMAIN} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"

    Save the file.

    In the freeradius sites-available/default and sites-available/inner-tunnel, ensure mschap is enabled in the authentication section.
    Disable the files module in each of these files if you do not use any of the information in the users file, and if necessary, comment out any uncommented test users in the users.conf file.

    In the freeradius eap.conf, change default_eap_type to peap .
    Change the "ttls" section as follows to use EAP-TTLS with EAP-MSCHAPv2 as the inner method.

    default_eap_type = mschapv2
    copy_request_to_tunnel = yes
    use_tunneled_reply = no

    Create a new entry in freeradius clients.conf to allow access from pfSense.

    client pfSense_IP_HERE {
    secret = REPLACE_THIS_WITH_A_SHARED_SECRET_KEY_THAT_WILL_BE_KNOWN_BY_PFSENSE
    shortname = pfsense_firewall
    nastype = other
    }

    Change the default secret for the localhost client in clients.conf file.

    Save the file and restart the FreeRadius service.

    Validate authenticating via FreeRadius

    radtest -t mschap TestUser@domain.com Users_Password localhost 0 SecretKeyForLocalHost

    Should return
    rad_recv: Access-Accept

    Setup a new Authentication Server in pfSense.
    System > User Manager > Authentication Servers
    Click "Add"
    Give the server a name - "test-domain-radius-mschapv2"
    Type = "RADIUS"
    Hostname = ipaddress of the radius server.
    Shared Secret = THE_SHARED_SECRET_KEY_CREATED_IN_THE_FREERADIUS_CLIENTS.CONF_FILE
    Services offered = Authentication

    Click Save

    Follow the instructions found at https://doc.pfsense.org/index.php/IKEv2_with_EAP-MSCHAPv2 with the following exceptions.

    Under Mobile Clients, Set User Authentication to the newly created radius authentication method.
    Under Phase 1, set the Authentication Method to EAP-MSChapv2
    Don't create any Client Pre-Shared keys

    You should now be able to connect to the pfSense VPN using windows native VPN client and Samba4 / AD credentials.

    Credit for various pieces of this to the following sites:
    http://wiki.freeradius.org/guide/FreeRADIUS-Active-Directory-Integration-HOWTO
    https://www.eduroam.us/node/89
    https://blog.practichem.com/configuring-freeradius-for-wpa2-enterprise-with-active-directory-integration-on-ubuntu-1404/
    http://deployingradius.com/documents/configuration/active_directory.html
    http://confluence.diamond.ac.uk/display/PAAUTH/Using+Active+Directory+as+authentication+source</username></netbios></password></username></password></username>

  • Phase 1 Secondary\Backup Remote Gateway

    3
    0 Votes
    3 Posts
    1k Views
    J

    I am just checking to see if this is possible yet?  Is it on the roadmap for a future release that anyone is aware of?

    I can't just "require" the other end of the tunnel to setup DDNS in my case.

    TIA!

  • Issue with AD traffic

    1
    0 Votes
    1 Posts
    960 Views
    No one has replied
  • Traffic from pfsense box not going over ipsec tunnel

    2
    0 Votes
    2 Posts
    1k Views
    B

    It seems this might be the answer.
    https://doc.pfsense.org/index.php/Why_can't_I_query_SNMP,_use_syslog,_NTP,_or_other_services_initiated_by_the_firewall_itself_over_IPsec_VPN

  • IPSEC BINAT , blocking TCP

    1
    0 Votes
    1 Posts
    955 Views
    No one has replied
  • Sonicwall/PFSense - VPN with IPSEC

    2
    0 Votes
    2 Posts
    2k Views
    B

    My sonicwall/pfsense tunnel was working fine but now I'm having a similar problem.

    I can ping from the sonicwall side to the pfsense side but not pfsense to sonicwall.

    …and AFAIK nothing has changed! I can't find anything in the logs either. Hmm

  • Mobile IKEv2 Child SA Rekeying Issue on Windows 7

    2
    0 Votes
    2 Posts
    1k Views
    L

    Seems that upping the lifetime to two hours simply made it drop less often. I set it back to one hour and disabled rekeying as a test.

  • IPSEC packet capture

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.