• 2 separate phase1 tunnels to same remote IP

    2
    0 Votes
    2 Posts
    456 Views
    perikoP
    @dsmoljan not possible, I ask the same!!!
  • Create Interface for IPSec connection

    2
    0 Votes
    2 Posts
    228 Views
    No one has replied
  • pfSense to WatchGuard Firebox IPSec VPN

    1
    0 Votes
    1 Posts
    174 Views
    No one has replied
  • IPSEC with remote hosts with same Peer identifier

    1
    0 Votes
    1 Posts
    266 Views
    No one has replied
  • IPSEC Mobile setup, cannot have more than one configuration.

    3
    0 Votes
    3 Posts
    488 Views
    perikoP
    @keyser is a shame, but well is a feature that will be great to have. Any way thanks for your info!!!
  • Question about IPSEC site to site with Wireguard

    3
    3
    0 Votes
    3 Posts
    718 Views
    K
    @periko hi thanks for the reply, i ended up just putting the IP of the fortigate WAN ip and NAT
  • 0 Votes
    5 Posts
    683 Views
    H
    Got it, so is not a must to have this for reaching other side's computers :)
  • IPsec: Remote Access to Multi Site to Site.

    7
    0 Votes
    7 Posts
    918 Views
    H
    @HKFEVER Confused. Remote client's subnet is 192.168.5.0/24 Site B IP is 28.37.35.162, subnet is 192.168.2.0/24: Tunnel B <-> C: P1 is connect to Remote Gateway 38.37.35.162 P2 is connect to Remote Gateway's network 192.168.3.0/24 (this is Site A's subnet) For additional 2nd P2, what network should I put in? Tunnel B <-> A: P1 is connect to Remote Gateway 18.37.35.162 P2 is connect to Remote Gateway's network 192.168.1.0/24 (this is Site A's subnet) For additional 2nd P2, what network should I put in? Site A IP 18.37.35.162, subnet is 192.168.1.0/24: Tunnel A <-> B: P1 is connect to Remote Gateway 28.37.35.162 P2 is connect to Remote Gateway's network 192.168.2.0/24 (this is Site A's subnet) For additional 2nd P2, what network should I put in? Site C IP 38.37.35.162, subnet is 192.168.3.0/24: Tunnel C <-> B: P1 is connect to Remote Gateway 28.37.35.162 P2 is connect to Remote Gateway's network 192.168.2.0/24 (this is Site A's subnet) For additional 2nd P2, what network should I put in?
  • IPsec Logging levels can no longer be changed..

    7
    0 Votes
    7 Posts
    633 Views
    jimpJ
    @keyser said in IPsec Logging levels can no longer be changed..: @jimp Hi Jimp. thanks for the insight and analysis. Will there be a patch for this in the patch tool? Yes, eventually, might be next week or later, but you can add in a manual entry now (copy/paste that diff above) and apply it now if you don't want to wait.
  • Not able to reach P2 Tunnel IPSec VPN From another FW

    6
    2
    0 Votes
    6 Posts
    843 Views
    M
    @Redbob 172.24.38.1 doesnt have a route to 10.254.124.0/24. Your options are either to create static routes on each hop. use dynamic routing protocols such as OSPF or BGP.
  • IPSEC with more than 1 Link WAN

    1
    0 Votes
    1 Posts
    181 Views
    No one has replied
  • IPSec discoonected after some time

    1
    0 Votes
    1 Posts
    208 Views
    No one has replied
  • IPSec Mobile client internet access

    8
    1
    0 Votes
    8 Posts
    1k Views
    A
    Phase1 [image: 1699196870320-35d54499-95cc-4bc7-a19f-ee36e9d26922-image.png] [image: 1699196907335-0853b47a-24d0-4420-8a19-dc9ec1f62e37-image.png] [image: 1699196978940-502b6db4-5a9d-4491-a3dd-84362f44c8b1-image.png] Phase2 [image: 1699197020458-edf50591-7508-479b-8fb7-ba94baef191b-image.png] [image: 1699197042256-b8a82af2-cf39-4d62-9ac4-2164ef4eab88-image.png] Mobile Client section [image: 1699197113657-186d59c4-d427-48e6-a5b6-23d069f88e59-image.png] [image: 1699197089419-cc306b4c-5e64-49d5-8ee0-4f60bb14ee65-image.png] [image: 1699197128654-3068fe04-9607-470e-a8c9-d7324e97b0e9-image.png]
  • 0 Votes
    5 Posts
    2k Views
    H
    You might be able to make it work using Routed VTI interfaces. So you would need 3 distinct IPSec connection, one for each gateway. Each connection would be in Routed VTI mode under Phase2. You then define a /30 address space for each tunnel pair. You can then run OSPF on these "VTI" and assign different priorities. So when all is said and done, from your side, you would have 3 next hops to the remote network. If the IPSec tunnel is down to a gateway, obviously it won't show up in your routing table since the routing protocol would detect that. The routing protocol priority would determine which gateway you would use first if all 3 tunnels are up at the same time.
  • IPSEC site to site Openvpn site to site

    8
    5
    0 Votes
    8 Posts
    968 Views
    V
    @jba Glade that you got it working. You're right, all subnets you want to connect across the IPSec need to be stated in a phase 2 as well.
  • Phase 2 error for IPSec Tunnel to Cisco Router

    2
    0 Votes
    2 Posts
    823 Views
    P
    Hi, I'm facing exactly the same issue. I presume that after 2 years, you found the root cause. Could it be possible to let us know the solution ? Thanks for your feedback. Cheers.
  • IPSec P2 entry self-deleted after ISP Outage

    1
    0 Votes
    1 Posts
    300 Views
    No one has replied
  • Mobile OpenVPN over IPSec S2S suddenly firewalled

    1
    0 Votes
    1 Posts
    149 Views
    No one has replied
  • IPSEC failover delay with CARP

    3
    0 Votes
    3 Posts
    823 Views
    T
    @luckman212 In the sense that I found that it couldn't be done like this with the results that I wanted, yes. In effect, this seems to be how HA is intended to work. We changed our approach and avoid using the CARP interface for any IPSEC traffic. We have a separate VTI tunnel connecting from both the primary and secondary router to each of the routers at the remote location. This requires a separate public IP for each router on each WAN, of course, and if both locations have dual routers then it requires a second virtual IP (not CARP) for each router as well. For example, routers A & B are at one location, and routers C & D are at a second location. A1.1 is the primary WAN1 interface on router A, A1.2 is the secondary IP address for WAN1 on router A. A1.1 connects to C1.1, B1.1 connects to D1.1, A1.2 connects to D1.2, B1.2 connects to C1.2. Repeat for WAN2 connections. Then do it all again to cross them (A1.1 to C2.1, B1.1 to D2.1, etc.). All VTI tunnels are up all the time. Then use your routing settings to weight the routes as needed. Remember to exclude your VTI addresses from being published by your routing protocol, or you may get some weird things like routing traffic over an existing VTI tunnel to get to a second VTI endpoint address in an attempt to establish one of the other tunnels, which of course fails. The routing protocol then becomes the primary determining factor in failover time. For each situation where both locations have 2 WANS and 2 routers, I have 16 VTI tunnels connecting the 4 routers so that I have full redundancy between routers and WANs. If you have only 1 router or only 1 WAN, or if you can't get enough public IP addresses from your ISP, it gets simpler very quickly.
  • Second IPSec VTI falls

    2
    0 Votes
    2 Posts
    381 Views
    M
    I solved the problem. The problem was the duplicate session. I solved it with the help of: https://docs.netgate.com/pfsense/en/latest/troubleshooting/ipsec-duplicate-sa.html
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.