• Help me to config Ipsec VPN between pfsense and cyberoam 200ing

    1
    0 Votes
    1 Posts
    770 Views
    No one has replied
  • DNS, Domainctrl and IPsec??

    1
    0 Votes
    1 Posts
    774 Views
    No one has replied
  • Issues with site to site vpn sonicwall pfsense

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ

    Did you allow traffic in on Firewall > Rules, IPsec tab?

    When it comes to NAT, the sonicwall doesn't know about your actual internal network. So their tunnel P2 is built to the NAT network and on the sonicwall side when they try to ping the pfSense side, they ping the NAT network addresses instead.

  • [SOLVED] IPSEC up but no traffic?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • IPSec three sites configuration

    4
    0 Votes
    4 Posts
    1k Views
    A

    Not resolved, so adopted another solution for the 2nd tunnel.

  • IPSEC behind NAT

    3
    0 Votes
    3 Posts
    2k Views
    J

    according to the WISP, it's is prefered alternative instead of the bridge mode, which gave i'm some problems

    I'm still trying to solve this

    I tried openvpn tunnel, same thing.

  • Routes

    5
    0 Votes
    5 Posts
    1k Views
    F

    I finally fixed it using:

    http://phil.lavin.me.uk/2013/04/how-to-disable-icmp-redirects-in-pfsense/

    Thanks

  • Note: pfSense 2.2 + Ipsec psk Xauth + Radius; Must restart service

    3
    0 Votes
    3 Posts
    1k Views
    DerelictD

    When you are making a change to a server with dozens of tunnels in production, stopping and restarting IPsec because of a change made to one tunnel can be a real downer.

  • PSA: If IPSec stops working after upgrading to 2.3.1, try 3DES

    6
    0 Votes
    6 Posts
    3k Views
    M

    Same problem here, but I had to use OpenVPN until 2.3.2 before I could use 3DES.

  • 2.3.2 nanobsd Can't add new P2 entry

    2
    0 Votes
    2 Posts
    834 Views
    K

    gahh, I'm sorry to say, I think it's related to some errant Group Permissions.

    I've removed and recreated the group (and reassigned permissions), and it now works.

  • Mobile VPN - IPSec - Traffic to Tunnel into VPN

    2
    0 Votes
    2 Posts
    883 Views
    K

    You would create a separate P2 entry for each subnet you need to access.  Also verify that the firewall rules for IPSec are not blocking your traffic.

  • ERROR: unknown Informational exchange received.

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Ipsec for mobile clients on 2.3.2

    3
    0 Votes
    3 Posts
    2k Views
    jimpJ

    Do you see the traffic from clients leaving the WAN in a packet capture? Does that traffic have NAT applied?

    Check the state table and see what the outgoing states look like for the traffic as well.

  • Encryption domains with Cisco Vpn

    2
    0 Votes
    2 Posts
    947 Views
    jimpJ

    "Encryption domain" in Cisco-speak is a Phase 2 entry. Something in there must not match their side exactly.

    Set your IPsec logging as shown under https://doc.pfsense.org/index.php/IPsec_Troubleshooting#Common_Errors_.28strongSwan.2C_pfSense_.3E.3D_2.2.x.29 and see what shows up when the Cisco side tries to initiate the tunnel.

  • Hundreds of IPSEC SA's with pfSense & Check Point VPN

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • 0 Votes
    1 Posts
    1k Views
    No one has replied
  • Site-to-site IPsec problem - no connection

    Locked
    6
    0 Votes
    6 Posts
    9k Views
    M

    Now that you mentioned, it could be NAT problem indeed.

    Here is the setup anyway:
    HOST-A (behind nat)

    private IP: 10.x.x.x. (translated into public IP) LAN: 192.168.5.x

    HOST-B (no nat)

    public IP WAN: x.x.x.x LAN: 192.168.10.x

    On HOST-A I have disabled outbound NAT, as it's managed on the vmware side and on the host-b outbound NAT is set to auto.

    EDIT:
    Thanks jlevesque. It seems to be NAT issue indeed. I've tried to add third host who is not behind NAT and ipsec connectivity is working out-of-the-box with default settings. I've even tried to change between different encryption methods and change p1 and p2 a bit, but it was working.

    I will investigate this more further.

  • IPSec Mobile Client and OSPF

    2
    0 Votes
    2 Posts
    719 Views
    jimpJ

    You can distribute a route for any network you like, just add it to the list on the main page of the quagga OSPF settings.

    Your IPsec Phase 2 definitions will need to cover the additional possible local/remote network combinations though (unless you're using something like transport mode with GRE/GIF…)

  • Site to Site pfSense Sonicwall

    2
    0 Votes
    2 Posts
    1k Views
    J

    Did you try the "dynamic dns" option in peer identifier?

  • Unstable VPNs since 2.2 and even worse with 2.3.2

    2
    0 Votes
    2 Posts
    880 Views
    DerelictD

    IPsec has gotten nothing but better between 2.2 and 2.3.2.

    The answers to what is ailing you lie in the configurations on both sides and the logs on both sides. It is impossible to make a recommendation without seeing those.

    In VPN > IPsec, Advanced set all the logging to Control except IKE SA, IKE Child SA, and Configuration backend. Set those to Diag.

    Then look at Status > System Logs, IPsec and match up the logs with a failure and see what it complained about.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.