• Help with Squid and IPSec

    3
    0 Votes
    3 Posts
    2k Views
    B
    @burlugoz: Services > Proxy server > General You have to check field "Bypass proxy for Private Address Space (RFC 1918) destination". If unsuccessfull, input address  spaces of all your local networks (or just lan-IPs of yours routers) into field "Bypass proxy for these destination IPs" (for example, "192.168.1.0/24;192.168.1.0/24" or "192.168.0.0/16"). Also check your NAT settings. It will be a good idea to configure Outbound NAT traffic rules manually. This settings work good for me: "Interface=WAN; Source=192.168.0.0/16; Source port,Destination address and Destination port=any; NAT address=WAN Address; Static port=YES". Good luck;) thank you! :D one last question is it possible to setup squid and squidguard at the main  and have all traffic pass though the IPsec vpn? I want to setup squid and squidguard at the main office only and be able to filter though the vpn. does that make sense?
  • 2.2.5: ikev2 tunnel up, but pfSense not responding to ARP request

    3
    0 Votes
    3 Posts
    2k Views
    D
    That did it!  Proxy ARP to the rescue. Added the subnet under Virtual IPs and BAM!  A tunnel I had previously established that was constantly pinging and printing failures all of a sudden started returning ping times.  :D Thank you very much for the quick reply and the hint!
  • Site to Site Dropping

    5
    0 Votes
    5 Posts
    1k Views
    B
    @cmb: brevilo: your issue is different, please start your own thread. Fair enough. It looks similar to this and I'm gathering logs right now…
  • 2.2.1 multiple SAs and SPIs

    12
    0 Votes
    12 Posts
    4k Views
    C
    @brevilo: I'm still having connection issue after rekeying (incl. multiple SAs) with 2.2.5 at both ends. I understood that the workaround above shouldn't be required anymore. Is it sill? No it's not. There are no longer any general issues along those lines (though any number of config issues could potentially result in symptoms like that). Start a new thread describing what you're seeing, and what your logs show.
  • Amazon Public IP for local network

    2
    0 Votes
    2 Posts
    838 Views
    C
    By "local network address", you mean the IP that actually gets assigned to the AWS instance? AWS doesn't allow that, it must be NATed.
  • Azure VPN - one one comms

    2
    0 Votes
    2 Posts
    1k Views
    C
    @ocset: Hi I have successfully set up a VPN connection between my pfsense firewall and an Azure 2012 Server. I can see the server from within my network (ping, view shared folders etc) but I am unable to see my network from the Server. The network setup is as follows: Office network - 192.168.0.0/24 Azure network  - 10.0.0.0/24 (IP range 10.0.0.4 - 10.0.0.254) Azure Subnet 10.0.0.0/27 (IP range 10.0.0.4 - 10.0.0.30) Gateway 10.0.0.32/29 (IP range 10.0.0.36 - 10.0.0.38) The Azure server has a DHCP address of 10.0.0.4 and a gateway of 10.0.0.1. I don't understand why a gateway of 10.0.0.1. Based on my network config above, I would have expected the gateway to be 10.0.0.36 or higher. I can't ping 10.0.0.1 but can ping 10.0.0.36 from both networks. I have tried changing the Server's default gateway to 10.0.0.36 without any luck. I have disabled the firewall on the Server and created a firewall IPsec rule on the pfsense box to allow all TCP/UDP traffic from everywhere on all port. Still no luck Anyone know what may be wrong? Thanks O. Try setting your firewall rule to be for protocol "any" instead of TCP or UDP. That way pings can get through (they use ICMP). Also, does your LAN have a firewall rule allowing inbound traffic?
  • Unable to connect windows 7 client to l2tp/ipsec on pfsense

    2
    0 Votes
    2 Posts
    2k Views
    D
    L2TP/IPsec is troublesome. You are better off deploying IKEv2, which works fine with the client built in to Windows 7.
  • L2tp ipsec with native Windows 7 client & PSK, does it work?

    3
    0 Votes
    3 Posts
    6k Views
    S
    @doktornotor: Basically, no… https://redmine.pfsense.org/issues/475 i hope this is no longer a limitation with pfsense 2.2 Refrence : https://doc.pfsense.org/index.php/L2TP/IPsec I will try implemnting it and see if it works.
  • IKEv2 and Active Directory

    20
    0 Votes
    20 Posts
    14k Views
    I
    @lctech Allowing to select multiple servers for your use case (load balancing, high availability) could be easily implemented because strongSwan can do that already. I opted against allowing multi-selection in April because in my understanding multiple defined servers would mean asking each of them in turn, which is what the xauth-generic script does. So the selection there would have been ambiguous.
  • VPN multi client to site IPsec

    1
    0 Votes
    1 Posts
    888 Views
    No one has replied
  • Lost of traffic on IPsec tunneling

    2
    0 Votes
    2 Posts
    901 Views
    C
    Not that I've seen or heard of. Check status on both sides, including the SPIs under Status>IPsec, SAD tab, which should match. Make sure you have DPD enabled on both sides. Beyond that, would need IPsec logs from both sides a bit before and after it stops working.
  • So now, with 2.2.5…does L2TP/IPSec work?

    3
    0 Votes
    3 Posts
    898 Views
    jimpJ
    Guide is on the wiki linked already. It works in some cases, not in others, all depends on the client. No better or worse on 2.2.5 than other 2.2.x releases. Some clients are OK, others (Like Windows behind) are not. IKEv2 is the best way forward. Ignore L2TP/IPsec if at all possible.
  • Route specific traffic only though ipsec?

    2
    0 Votes
    2 Posts
    963 Views
    jimpJ
    Unfortunately that isn't possible with policy-based IPsec. It will grab anything and everything that matches the Phase 2 network(s), and will only accept traffic that matches the Phase 2 network(s). If we ever gain route-based IPsec (which we may, eventually, lots of us would like to see it) then it would be possible if both sides can do it.
  • Alix unstable under IPSEC Load on PFSense 2.2.5

    6
    0 Votes
    6 Posts
    1k Views
    D
    I cannot see what suggestions exactly you expect. There have been shitloads of complaints about strongswan since 2.2 release. If you want a stable VPN, ditch this IPsec thing. Waste of time. (And. if throughput it your concern, then sorry to say but Alix is NOT a fit for purpose device in the first place. As noted above, with AES128 and cryptodev, the difference is absolutely marginal. If it was "pretty big" then you need to configure OpenVPN properly.)
  • Tunnel not stable

    2
    0 Votes
    2 Posts
    1k Views
    D
    I may have found my problem…looking like apinger and the draytek router. I'll report back if no avail. Cheers
  • 2.2.5: IPsec Mobile Client .. Ping Client From Network

    1
    0 Votes
    1 Posts
    647 Views
    No one has replied
  • Hub and Spoke help

    4
    0 Votes
    4 Posts
    1k Views
    K
    Nothing was wrong - it works! Menu: Status - IPSec: Disconnect/Reconnect have to be used! Uwe
  • [solved] Mobile stopped working after modem upgrade

    5
    0 Votes
    5 Posts
    1k Views
    C
    Thanks for the follow up. The ones that were working had to have been initiators rather than responders in that case, as your modem likely was only blocking inbound, not outbound, traffic.
  • Receive buffer too small, packet discarded. Can I edit strongswan.conf?

    3
    0 Votes
    3 Posts
    2k Views
    C
    @David_W: If possible, I would try to edit the configuration to reduce the maximum packet size needed. Indeed, ipfire is almost certainly doing something wrong, or has a poor config, where it's sending 10000+ bytes there. What David noted will work around the issue, and we ought to have that available as a tunable value. But you should really figure out why that's happening and fix the config on the ipfire side.
  • 0 Votes
    2 Posts
    780 Views
    M
    Upon looking at this further, I can see that the phase two entry I setup is not coming up as the rest of the tunnels are. I have verified, by turning on logging on the pass rule on the LAN interface, that my traffic is hitting the PFsense box and that the traffic is being passed. What I can't find a way to see, is where that traffic goes. Why doesn't the phase two entry come up after matching that traffic. I am digging into the IPsec logs, but it's difficult to read. there are a few tunnels working already, so there is a bunch of stuff in there.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.