• IPSec not stopping initiator role, even if reset to respond only

    1
    0 Votes
    1 Posts
    550 Views
    No one has replied
  • IKE algorithm not matching in backup HA node

    1
    0 Votes
    1 Posts
    473 Views
    No one has replied
  • IPsec phase 2 traffic selectors inacceptable

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Does all internet traffic have to go through the VPN once connected?

    3
    0 Votes
    3 Posts
    926 Views
    K

    Are you using IPSec client built into Windows running Windows 10 ikev2?

  • Unable to bring phase 2 with custom Local Address up

    1
    0 Votes
    1 Posts
    584 Views
    No one has replied
  • Troubleshooting help

    3
    0 Votes
    3 Posts
    911 Views
    F

    Doh! The ipsec firewall rule on remote. Fsck, forgot about that little gem. Thanks!

  • Access webGUI using DDNS address

    3
    0 Votes
    3 Posts
    780 Views
    ?

    I already use OpenVPN BUT I like IPSec at lot more. I like that it's intergrated in my devices and I don't need third party software for like Mac and etc. I actually have this problem with my OpenVPN as well.

  • IPsec is dead, can't even control it via web-UI

    2
    0 Votes
    2 Posts
    616 Views
    S

    Small update: I've tried now adding a Virtual IP on HQ, it's the exact same behaviour as for IPsec (i.e. settings are not saved/updated).

    What's even stranger is that HQ is actually a pair of Netgate SG-4860 in an HA pair. They both behave like this.

    AGain, any help would be greatly appreciated

  • 2.3 UI defect, 3DES128

    6
    0 Votes
    6 Posts
    1k Views
    C

    Yep, finally saw what was happening there. I'm not sure how it didn't happen to me previously. In that case it affects several pages. I was looking for a bug ticket for this, remembering this thread but misremembered it as a redmine ticket.

  • IPSec Tunnel Still Active

    1
    0 Votes
    1 Posts
    598 Views
    No one has replied
  • Blank IKEv2 P1 showing after 2.3.1

    3
    0 Votes
    3 Posts
    838 Views
    C

    Yeah there's a status display issue in that case. There is a bug ticket open on general issue there.
    https://redmine.pfsense.org/issues/6335

    It'll work fine, the status output's just wrong on the "down" one.

  • IPSec clients can not access virtual box interfaces

    4
    0 Votes
    4 Posts
    1k Views
    J

    Good suggestions.

    Below is the iptables output from the host that runs all the VM's. There are two address ranges in use here:
    192.168.5.0/24 which is the intended network, all devices should operate on this one ideally
    192.168.12.0/24 the second ip range created for the VM guests to operate in as a work around to this issue.
    192.168.122.0/24 I have not idea what this is, given the limited range I assume it would not be causing any issues.

    Does this seem correct?

    service iptables status Table: nat Chain PREROUTING (policy ACCEPT) num  target    prot opt source              destination        Chain POSTROUTING (policy ACCEPT) num  target    prot opt source              destination        1    MASQUERADE  tcp  --  192.168.122.0/24    !192.168.122.0/24    masq ports: 1024-65535 2    MASQUERADE  udp  --  192.168.122.0/24    !192.168.122.0/24    masq ports: 1024-65535 3    MASQUERADE  all  --  192.168.122.0/24    !192.168.122.0/24    Chain OUTPUT (policy ACCEPT) num  target    prot opt source              destination        Table: mangle Chain PREROUTING (policy ACCEPT) num  target    prot opt source              destination        Chain INPUT (policy ACCEPT) num  target    prot opt source              destination        Chain FORWARD (policy ACCEPT) num  target    prot opt source              destination        Chain OUTPUT (policy ACCEPT) num  target    prot opt source              destination        Chain POSTROUTING (policy ACCEPT) num  target    prot opt source              destination        1    CHECKSUM  udp  --  0.0.0.0/0            0.0.0.0/0          udp dpt:68 CHECKSUM fill Table: filter Chain INPUT (policy ACCEPT) num  target    prot opt source              destination        1    ACCEPT    udp  --  0.0.0.0/0            0.0.0.0/0          udp dpt:53 2    ACCEPT    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:53 3    ACCEPT    udp  --  0.0.0.0/0            0.0.0.0/0          udp dpt:67 4    ACCEPT    tcp  --  0.0.0.0/0            0.0.0.0/0          tcp dpt:67 5    ACCEPT    udp  --  192.168.5.0/24      0.0.0.0/0          state NEW multiport dports 111,892,2049,32769 6    ACCEPT    tcp  --  192.168.5.0/24      0.0.0.0/0          state NEW multiport dports 111,892,2049,32803 Chain FORWARD (policy ACCEPT) num  target    prot opt source              destination        1    ACCEPT    all  --  0.0.0.0/0            192.168.122.0/24    state RELATED,ESTABLISHED 2    ACCEPT    all  --  192.168.122.0/24    0.0.0.0/0          3    ACCEPT    all  --  0.0.0.0/0            0.0.0.0/0          4    REJECT    all  --  0.0.0.0/0            0.0.0.0/0          reject-with icmp-port-unreachable 5    REJECT    all  --  0.0.0.0/0            0.0.0.0/0          reject-with icmp-port-unreachable Chain OUTPUT (policy ACCEPT) num  target    prot opt source              destination       
  • Cannot get iOS to tunnel into mobile VPN

    3
    0 Votes
    3 Posts
    722 Views
    W

    The same issue here.

    Upd. Solved it by adding appropriate p2 entries.

  • Pings to Tunneled LAN Drop After 1 Packet

    3
    0 Votes
    3 Posts
    801 Views
    C

    Guessing you probably have a static route pointing to the LAN IP to force the box itself to source traffic to the VPN to the right IP. That sends an ICMP redirect that causes some Linux kernels to ARP that as a local subnet. System>Advanced, System Tunables, set net.inet.ip.redirect to value 0. Save and apply changes. Might need to reboot the NAS for it to lose the route it picked up.

  • Help! L2TP/IPsec not working as of 2.3 upgrade

    1
    0 Votes
    1 Posts
    907 Views
    No one has replied
  • How to start one tunnel IPSEC if another tunnel IPSEC is down

    1
    0 Votes
    1 Posts
    673 Views
    No one has replied
  • 0 Votes
    2 Posts
    881 Views
    nzkiwi68N

    No comments at all?

    NOBODY has ever met this issue, seeing TSP resets during a failover and state lost?

    Anyone???

  • NAT before IPSec

    1
    0 Votes
    1 Posts
    827 Views
    No one has replied
  • Only tunnel specific traffic over VPN

    1
    0 Votes
    1 Posts
    645 Views
    No one has replied
  • Draytek to pfsense ipsec problem

    3
    0 Votes
    3 Posts
    1k Views
    J

    Hi,

    I have this working with multiple DrayTek firewalls. If you are willing to provide me remote access to both your firewalls I'm happy to get this up and running for you.

    Jonathan.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.