• IPSec to LAN Clients (Can ping but cant pass TCP/UDP)

    2
    0 Votes
    2 Posts
    1k Views
    P
    I had a very similar problem last time. I could ping, but almost no other services work through the tunnel. I assume you has the right firewall settings in place? Especially when NAT-T is used for your IPSec connection, you surely can get into trouble with MTU. Do you use NAT-T? Go to IPSec -> Advanced Settings and set the Maximum MSS to 1350. This fixed the problem for me. Give it a try.
  • L2TP over IPSec not sending routes

    2
    0 Votes
    2 Posts
    800 Views
    jimpJ
    There is no mechanism to send routes over L2TP. It either sends all, or the client has to maintain its own routes.
  • Multi-wan with vpn to same remote endpoint?

    1
    0 Votes
    1 Posts
    622 Views
    No one has replied
  • Firewall rules for Road Warrior IPSEC VPN?

    4
    0 Votes
    4 Posts
    4k Views
    jimpJ
    They don't show in the GUI, but you'd see them in /tmp/rules.debug or the live pf rules (e.g. pfctl -sr)
  • Issue establishing connection: no RSA private key found

    8
    0 Votes
    8 Posts
    4k Views
    J
    Thanks for the reply! Both CA and server certs were generated in pfSense. I even tried deleting them and generating new ones. I'll try switching up the Phase 1 settings in a bit, see if that changes anything. I'll also take a looks to see what certs ipsec thinks is loaded.
  • Cisco 800 ADSL router IPSEC VPN to PFSense

    5
    0 Votes
    5 Posts
    2k Views
    P
    I have this working, will post the configs for anyone's reference..
  • IPsec doesnt work in or out of office

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • IPSEC & Carp failover

    1
    0 Votes
    1 Posts
    804 Views
    No one has replied
  • PFsense 2.2.6 - Mobile IPSEC VPN No longer works

    2
    0 Votes
    2 Posts
    3k Views
    N
    I deleted my 'Mobile Client'  under Tunnels, then went to 'Mobile Clients' tab and saw that "Create Phase 1" option was available. I re-created Phase and Phase 2 and the vpn worked again. Cheers VPN: IPsec: Edit Phase 1: Mobile Client Key Exchange version  V1 Internet Protocol      Ipv4 Interface  WAN Description Mobile Client Authentication method  Mutual PSK Negotiation mode  Aggressive My identifier  My IP Address Encryption algorithm  AES 256 Hash algorithm    SHA1 DH key group  2 Lifetime  28800 NAT Traversal  Force Dead Peer Detection  Enable  /  10  /  5 VPN: IPsec: Edit Phase 2: Mobile Client Local Network  DMZ  (mine is DMZ but yours might be LAN) Protocol  ESP Encryption algorithms  AES 256 (only) Hash algorithms    SHA1 PFS key group  2 Lifetime  3600
  • [2.2] Mobile clients not connecting anymore

    41
    0 Votes
    41 Posts
    19k Views
    N
    I deleted my 'Mobile Client'  under Tunnels, then went to 'Mobile Clients' tab and saw that "Create Phase 1" option was available. I re-created Phase and Phase 2 and the vpn worked again. Cheers VPN: IPsec: Edit Phase 1: Mobile Client Key Exchange version  V1 Internet Protocol      Ipv4 Interface  WAN Description Mobile Client Authentication method  Mutual PSK Negotiation mode  Aggressive My identifier  My IP Address Encryption algorithm  AES 256 Hash algorithm    SHA1 DH key group  2 Lifetime  28800 NAT Traversal  Force Dead Peer Detection  Enable  /  10  /  5 VPN: IPsec: Edit Phase 2: Mobile Client Local Network  DMZ  (mine is DMZ but yours might be LAN) Protocol  ESP Encryption algorithms  AES 256 (only) Hash algorithms    SHA1 PFS key group  2 Lifetime  3600
  • PSKs incorrect in ipsec.secrets bug: 4126

    11
    0 Votes
    11 Posts
    4k Views
    N
    I deleted my 'Mobile Client'  under Tunnels, then went to 'Mobile Clients' tab and saw that "Create Phase 1" option was available. I re-created Phase and Phase 2 and the vpn worked again. Cheers VPN: IPsec: Edit Phase 1: Mobile Client Key Exchange version  V1 Internet Protocol      Ipv4 Interface  WAN Description Mobile Client Authentication method  Mutual PSK Negotiation mode  Aggressive My identifier  My IP Address Encryption algorithm  AES 256 Hash algorithm    SHA1 DH key group  2 Lifetime  28800 NAT Traversal  Force Dead Peer Detection  Enable  /  10  /  5 VPN: IPsec: Edit Phase 2: Mobile Client Local Network  DMZ  (mine is DMZ but yours might be LAN) Protocol  ESP Encryption algorithms  AES 256 (only) Hash algorithms    SHA1 PFS key group  2 Lifetime  3600
  • 0 Votes
    13 Posts
    3k Views
    B
    It looks like DPD is the problem. Disabled it on 15 tunnels (both sides). All 15 connections are stable for at least a day now. DPD is still active on the "Strongswan" boxes. Not having any problems with them.
  • Win10 can't connect ipsec on pfsense 2.2.6

    4
    0 Votes
    4 Posts
    2k Views
    A
    I have test result. Client PC –> Pfsense 2.2.6 --------IPSec IKEV2------------> Remote Pfsense 2.2.6 IPSec VPN Server This is will failed and get error code 809 Client PC --> Mobile Hot Spot Internet Share ------IPSec IKEV2 ----------> Remote Pfsense 2.2.6 IPSec VPN Server This is can connect it. I don't know why my client under pfsense 2.2.6 will failed.But it's can connect if Client PC under ip sharing or mobile hot spot. How to check it?
  • Android IPsec doesn't work on 2.2.6?

    4
    0 Votes
    4 Posts
    1k Views
    jimpJ
    Configure your IPsec logs as shown here: https://doc.pfsense.org/index.php/IPsec_Troubleshooting#Common_Errors_.28strongSwan.2C_pfSense_.3E.3D_2.2.x.29 And then post (in a code block or attached .txt file) the logs generated by a connection attempt. It may be a good time to upgrade yourself to an IKEv2 VPN rather than the old-style IPsec, too.
  • Static route via VPN - is this now possible?

    6
    0 Votes
    6 Posts
    3k Views
    DerelictD
    That GRE method is very interesting to me. First time I have seen it. Are there any MTU issues with it?
  • IPSec with NAT (with two differently sizes subnets)

    1
    0 Votes
    1 Posts
    646 Views
    No one has replied
  • IPsec site to site to site full mesh path preference

    2
    0 Votes
    2 Posts
    982 Views
    C
    The first matching P2 would be the only one that would apply. You're right in that scenario is almost certainly something you'll never need to use, as if you can't get from B to A, then either C won't be able to get to A either, or B won't be able to get to C, so probably a moot point. What you can do is configure a disabled P2 to do that routing from B to A via C, then if you happen to get into a situation where you can't get from B to A but can get from B to C to A, then disable the B to A matching P2 and enable the B to C and C to A ones. Manually disabling and enabling would be necessary in that case.
  • Oracle DB 10g over IPsec

    1
    0 Votes
    1 Posts
    575 Views
    No one has replied
  • Can't access one site remotely over VPN

    7
    0 Votes
    7 Posts
    2k Views
    J
    I assume your firewall isn't blocking this? Does a packet capture show the incoming connection?
  • IPSec Mobile Clients (2.2.3) - No Connection

    2
    0 Votes
    2 Posts
    1k Views
    D
    Any ideas on this guys? If not, any suggestions on better tutorials or setups to use to give a MAc user L2TP/IPSec connection into the firewall? It just has to be dial-in, we cant use a site to site for him.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.