• DYNAMIC PUBLIC IP in pfesense IPSEC?

    2
    0 Votes
    2 Posts
    1k Views
    V

    It is possible to do this.

    Probably the easiest way is to ensure that you have resolvable DNS hostnames for each public facing endpoint interface. I use a DynamicDNS provider with pfSense. Get this working first.

    Don't use any public IP addresses in your Phase 1 config unless they are static IP addresses. Use the DynamicDNS hostnames instead.

    E.g. on one end…

    Remote Gateway: farfaraway.dynamic.dns
    My Identifier: Distinguished Name: thisbox.dynamic.dns
    Peer Identifier: Distinguished Name: farfaraway.dynamic.dns
    Pre-Shared Key: OurSecret

    on the other end...

    Remote Gateway: thisbox.dynamic.dns
    My Identifier: Distinguished Name: farfaraway.dynamic.dns
    Peer Identifier: Distinguished Name: thisbox.dynamic.dns
    Pre-Shared Key: OurSecret

    The Phase 2 configs will have the IP network addresses of your internal network, typically private addresses. No dynamic dns required here.

  • Imported certificates with passphrase for private-RSA-Key

    5
    0 Votes
    5 Posts
    2k Views
    V

    cmb,

    Is there a current howto for setting up a site-to-site IPsec VPN using RSA certs on pfSense 2.2.3?

    I found my own way of doing this by experimentation and it's been working fine up to 2.2.2 but it I cant get certs to work on 2.2.3 . PSK works OK.

    I wondered if the problems I have with certs not working on 2.2.3 is actually a misconfiguration that didn't cause a problem in earlier releases.

  • Site to Site to Site IPSec VPN Connection

    4
    0 Votes
    4 Posts
    846 Views
    C

    All 3 actually. The one on site A has to know to go via EC2 to reach site B, same in reverse for site B, and the EC2 instance needs both setup so each site will work.

  • Dummy XAuth Authentication (xauth-noauth plugin)

    1
    0 Votes
    1 Posts
    612 Views
    No one has replied
  • Macro IPsec not defined

    3
    0 Votes
    3 Posts
    1k Views
    D

    I am having the same problem with 2.2.2. I have IPSEC enabled. Disabling IPSEC, and trying to remove all IPSEC firewall rules, did not fix the problem. I am not using IPSEC at this point.

  • [resolved]IPSec Site-to-Site VPN passes only some Traffic

    2
    0 Votes
    2 Posts
    2k Views
    M

    Hello community,

    we resolved this issue with help from the pfSense support.

    First of Steve pointed out that our LAN and VLAN10 interfaces were on the same subnet which may cause problems, thus we removed the VLAN10 from our bonded interface to be on the safe side.

    The actual problem was caused by firewall rules blocking access to RFC1918 subnets from the local VLANs to our remote networks.

    We had a pass rule for the remote subnets, but this rule was on the wrong interface group. We enabled logging on every block/reject rule that we had in place and those packets appeared as rejected by another interface group's reject-rule. Moving the pass-rules to the correct interface group fixed the issue.

    Kind regards

  • Mobile Tunnels Fail After 2.2.2 upgrade

    9
    0 Votes
    9 Posts
    3k Views
    C

    There are either issues in vpnc when connecting to strongswan, or in strongswan itself. Configs that work fine with the built-in IPsec client in iOS and OS X, Shrewsoft, and others fail with vpnc where it should function the same as the others. My gut feel is it's a vpnc issue of some sort that racoon just didn't trigger for some reason, given all the other similar clients work fine in the same circumstance. There are a number of instances of people using vpnc with strongswan, though many of those date back quite some time. I updated the bug ticket and will revisit as soon as time permits (in the process of getting 2.2.3 to release this week).
    https://redmine.pfsense.org/issues/4784

  • PSKs incorrect in ipsec.secrets - Still an Issue in 2.2.1

    12
    0 Votes
    12 Posts
    3k Views
    A

    @cmb:

    The issue was this:
    https://redmine.pfsense.org/issues/4781

    it works now. I applied that change to the 2.2.3 system you brought up, and can connect fine now. If you can confirm as well that'd be appreciated.

    Thanks for your help!

    I'll check this afternoon when I make it back to a location I can check it from. Thanks, cmb!

  • 0 Votes
    1 Posts
    644 Views
    No one has replied
  • VPN between two 2.2.1 (alix and esxi based) - Not stable

    5
    0 Votes
    5 Posts
    1k Views
    N

    Well I'll wait till 2.2.3 is released as a stable version then :)

  • VPN for Road warrior (Windows, iOS, Mac OS) use

    2
    0 Votes
    2 Posts
    799 Views
    V

    Yes.

    You can use IPSec for mobile cleints, and works perfectly :)

  • No traffic after a random time

    2
    0 Votes
    2 Posts
    574 Views
    C

    What do your IPsec logs show at the time? What's the router you're connecting to?

  • IPSec site-to-site to Cisco RV220 not passing traffic

    2
    0 Votes
    2 Posts
    919 Views
    C

    Your logs show it's up, so should be safe to assume everything at the IPsec level is correct. Maybe missing firewall rule to allow traffic in on IPsec tab. Maybe a host issue, like having a wrong subnet mask, or a local firewall that's dropping the traffic.

  • IPSec No Connectivity

    1
    0 Votes
    1 Posts
    567 Views
    No one has replied
  • IPSec performance using 1 gigabit /second WAN

    4
    0 Votes
    4 Posts
    1k Views
    T

    @ermal:

    You should start by loading AESNI module.

    In pfSense 2.2.x surely its confirmed you can get 800Mbit/s with lower boxes with AES-GCM.
    In 2.3 its improved a bit more.

    Can you please post your numbers and what ipsec configuration you are using?

    Re-testing with AES-128 and I can see that computer #1 (the less powerful of the 2 pfsense computers) is showing much higher loads on the interrupt than on the first snapshots taken, seems like the interrupt is ranging between 70-90% of utilization

    computer1.jpg
    computer1.jpg_thumb
    dashboard1.jpg
    dashboard1.jpg_thumb
    dashboard2.jpg
    dashboard2.jpg_thumb

  • IPSec VPN site-to-site pfSense + Cisco ISA500

    2
    0 Votes
    2 Posts
    748 Views
    V

    Hello to all, we have fixed the problem. It was due to another VPN active with same subnets. We changed networks and all is working perfectly now!

  • Layer 2 Tunneling Protocol with IPsec

    6
    0 Votes
    6 Posts
    2k Views
    M

    Anyone?

  • 0 Votes
    5 Posts
    1k Views
    F

    Finally back from vacation and back to my IPsec issue  ;)

    @ermal:

    Probably should try disable the unity plugin!

    Sorry, but I can't see that setting on the IPsec tab. Where should it be?

  • IPSEC Issues between Cisco ASA 5510

    6
    0 Votes
    6 Posts
    1k Views
    P

    I verified that while status did not show connected, I was able to pass traffic and then the status updated to reflect 2 subnets.

  • Encrypt specific protocols only

    5
    0 Votes
    5 Posts
    1k Views
    G

    I end up doing it myself.

    Read a little of php, touching here and there on a test enviroment and voila.

    Being testing a few protocols and ports and seems to be ok.

    No idea how to make a pull request, but i've left the modified files attached to this post just in case someone needs them.

    ipsec_status.JPG
    ipsec_status.JPG_thumb
    vpn_ph2.JPG
    vpn_ph2.JPG_thumb
    protoport.zip

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.