• IPsec vpn access to two subnets from one

    4
    0 Votes
    4 Posts
    593 Views
    C
    @Dimitriy46 the P2 needs to exist on both ends, and you may have that. I would also try to include the entire /24 in a single P2 and see what happens. I have a connection with an ASA where they have multiple P2 for the same subnet, but I just have a /24 and it figures it out.
  • Subdomain does not working over Ipsec

    2
    0 Votes
    2 Posts
    405 Views
    V
    @Bot That's nothing that could be effected by pfSense or the VPN. It might rather be that the destination server is blocking access from outside of the local subnet.
  • Listing IPSec P2 Remote Addresses?

    1
    0 Votes
    1 Posts
    155 Views
    No one has replied
  • VPN Mobile IPSec unable to access LAN machines

    5
    4
    0 Votes
    5 Posts
    786 Views
    perikoP
    @user1089082098 If u can, send me a message and we see if we can help u.
  • RADIUS group authentication failing

    1
    0 Votes
    1 Posts
    296 Views
    No one has replied
  • Unable to save "Group Authentication"

    2
    0 Votes
    2 Posts
    272 Views
    T
    Confirmed this is fixed in 23.09.1-RELEASE
  • IKEv2 Radius groups problem (FreeRADIUS)

    2
    0 Votes
    2 Posts
    531 Views
    T
    As a follow-up, here is how I got it working. I am using OpenLDAP and FreeRADIUS on FreeBSD 14. I'm not documenting here how to get LDAP authentication working with FreeRADIUS, I'm presuming that is already done. Additionally, my LDAP schema has all users under the name ou=people, ou=domain, ou=com and groups in ou=groups, ou=domain, ou=com I do not have memberof enabled. I'm using MSCHAPv2 authentication in pfsense's RADIUS configuration. In /usr/local/etc/raddb/mods-enabled/ldap use these settings in the "group" section base_dn = "${..base_dn}" filter = '(objectClass=posixGroup)' scope = 'sub' name_attribute = cn membership_filter = "(memberUid=%{%{Stripped-User-Name}:-%{User-Name}})" cacheable_name = 'yes' In /usr/local/etc/raddb/sites-available/default add this in the "post-auth" section update reply { Class += "%{exec:/bin/sh /usr/local/etc/raddb/ldap_fix.sh %{control:LDAP-Group[*]}}" } The exec module is used. Ensure that in /usr/local/etc/raddb/mods-available/exec, "wait" is set to "yes" wait = yes Finally, I used tr to convert the comma-delimited list of groups in "%{control:LDAP-Group[*]}" to semi-colon delimited. The file /usr/local/etc/raddb/ldap_fix.sh looks like this #!/bin/sh # # turn comma-delimited list of groups into semi-colon delimited list of groups # echo "${1}" | tr "," ";" Using the pfsense authentication tester (Diagnostics > Authentication ) I can now see the list of groups users are a member of. Note that the groups need to also be present in pfsense (System > User Manager).
  • 23.09 Update and IPSec operation

    7
    1 Votes
    7 Posts
    1k Views
    T
    Confirmed this is fixed in 23.09.1-RELEASE
  • VPN on MAC issue vs. Windows Machines

    1
    0 Votes
    1 Posts
    269 Views
    No one has replied
  • EAP-MSCHAPv2 Ubuntu Client Isses.

    1
    0 Votes
    1 Posts
    269 Views
    No one has replied
  • Weird encrypted traffic (HTTPS) issue over IPSec

    8
    0 Votes
    8 Posts
    906 Views
    S
    @keyser let me start by saying that I appreciate the time you're putting into this. Right now, it's just a matter of curiosity but it bugs me to the core as I don't know why it needs MSS clamping all of the sudden. Now, I've ran the test and captured the packets (see the attached pcap files) but I am unable to determine why it's working / not working. I've included two pcaps, one with the non-working HTTPS connection, one with the working one. From my point of view (I'm sure I'm missing something), it doesn't look like an issue. I don't know why all the retransmissions in the non-working but as I said, I'm probably missing something. P.S. 10.41.199.205 is the HTTPS server, 172.31.254.251 is the client. Thank you. working.pcap non-working.pcap
  • Connecting two 192.168.5.0/24 networks with NAT on both sides

    7
    0 Votes
    7 Posts
    838 Views
    M
    SNAT and DNAT is all you need here. Either site won’t know the real IP but that’s ok obviously you will keep track but that’s all that’s needed here to get around the overlap
  • Ipsec with Ipv6

    1
    0 Votes
    1 Posts
    191 Views
    No one has replied
  • IPSec strange problem

    2
    0 Votes
    2 Posts
    460 Views
    G
    Some update on this: on the A side there are attached other networks over OVPN still in shared key mode... So from site B i can reach ALL(!) other networks fine independed of the gateway i use... Only the local attached networks of site A have problem from side B if i go through the second wan line.. Does anyone has any idea on how to trace the problem?
  • 1 Votes
    12 Posts
    2k Views
    JonathanLeeJ
    My android will not even connect to even external AP WiFi in 23.09. Other devices connect just fine.
  • 0 Votes
    4 Posts
    1k Views
    perikoP
    @anthony-breen If are trying to work with other brand, add more algo in phase 1 and phase 2, if u don't have the doc where u can see what algo he need u need to do reverse eng. Add more, maybe he is searching for less secure algorithms. The only issue is that if u are in pfsense 2.7.x and they request less secure algorithms, U will be not be able to make work. [image: 1701102144912-phase.png]
  • IPSec Status on Dashboard Incorrect.

    1
    0 Votes
    1 Posts
    185 Views
    No one has replied
  • Mobile clients keep alive?

    1
    0 Votes
    1 Posts
    317 Views
    No one has replied
  • 2 separate phase1 tunnels to same remote IP

    2
    0 Votes
    2 Posts
    454 Views
    perikoP
    @dsmoljan not possible, I ask the same!!!
  • Create Interface for IPSec connection

    2
    0 Votes
    2 Posts
    228 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.