• IPSec and DHCP Relay

    5
    0 Votes
    5 Posts
    2k Views
    S

    @cmb:

    If the described route is there, it should go out the tunnel as that'll determine its source IP selection. I don't recall anything with DHCP relay that's any different.

    The ICMP redirect you're describing would not happen with the described route. It does cause an ICMP redirect to be sent, but it's one that tells the client "to reach the remote IPsec network, hit my LAN IP", which is what they're doing anyway so it effectively does nothing. You can disable the ICMP redirects under System>Advanced, Tuning, if you don't need or want them in general. But that description makes it sound like the route wasn't right to begin with.

    Yeah, it did seem weird to me, so I checked it several times, and had a colleague check it for me as well just in case someone spiked something I drank, but the route was fine and that's the redirect the host got. In either case, installing the FreeBSD package mentioned in this post it worked without the route. The only difference I see between the two of them network wise is that the "unofficial" relay binds to a specific address as well as the interface, while the included daemon binds to * on the selected interface.

  • IPSec Mobile traffic passthrough

    6
    0 Votes
    6 Posts
    1k Views
    jimpJ

    When checked, the server takes the list of networks on the mobile Phase 2 and sends them to the client as a "net list" or "split network" list, so that only the networks provided will be sent across the tunnel and others go to the Internet directly, rather than tunneling everything.

    It's up to the client to obey that setting. Some don't support it at all and always require a manual list, others respect it, others ignore it on purpose and send everything no matter what you do.

  • Site-to-site VPN bandwith problem

    7
    0 Votes
    7 Posts
    2k Views
    S

    OK, it looks like the problem was with the COX router.  We where getting routed to a level 3 network that, was throttling our traffic.  The new path is still throttling our traffic but at only at ~20, which is enough to do our replication in about 8 to 10 hours, which meets our business requirement.  It would be nice if we could get the full 50, but it's not as high a priority now.

    That e-mail about the service level guarantees got the ball rolling again.  Thanks for the help.

    ![status_rrd_graph_img.php.05-16-2014 - Copy.png](/public/imported_attachments/1/status_rrd_graph_img.php.05-16-2014 - Copy.png)
    ![status_rrd_graph_img.php.05-16-2014 - Copy.png_thumb](/public/imported_attachments/1/status_rrd_graph_img.php.05-16-2014 - Copy.png_thumb)

  • Racoon: [Unknown Gateway/Dynamic]: DEBUG: 92 bytes from

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • IPSec VPN Between Cisco 881 and Pfsense 2.1.3 not working

    5
    0 Votes
    5 Posts
    3k Views
    M

    Just to let you know…

    after tinkering with rules and testing, I just came up with this:

    One rule, Lan to IPSec Subnet in the LAN tab.
    The other rule, any to any in the IPSec tab.

    and I just got the DHCP ip helper address working...so I'm using my DHCP server. :D.

  • Some servers unreachable through VPN

    3
    0 Votes
    3 Posts
    1k Views
    C

    First guess, wrong subnet mask on the affected hosts (/16 instead of /24, so it thinks the remote network is local).

  • Monitoring and Alerting When IPSEC Tunnel is Down or Fails

    2
    0 Votes
    2 Posts
    1k Views
    C

    The general purpose network availability monitoring system you use to monitor servers, switches, routers, firewalls, etc. A ping to the remote end would suffice.

  • Client can not connect to external L2TP/ipsec server+

    3
    0 Votes
    3 Posts
    1k Views
    K

    Hi Mykey,

    Did you connect pfsense 2 your ISP using L2TP?

  • IPSEC tunnel wont run

    6
    0 Votes
    6 Posts
    2k Views
    ?

    On my (retired, now openVPN) IPsec tunnels I had:

    My identifier: My IP address
    Peer identifier: Peer IP address

    …and some higher encryption as the main difference to your setup for phase 1, on first glance

  • 2.1 ipsec broken

    9
    0 Votes
    9 Posts
    3k Views
    M

    THIS thread also has problems with IPSec and CARP. Likely the issue is related.

  • Opt1 interface at remote site

    6
    0 Votes
    6 Posts
    1k Views
    M

    That seems like a routing issue. The IPsec tunnel will probably not know where the 10.0.0.0/8 network is, and so it can't send any traffic there.
    You will probably need to add another phase 2 setting to propagate 10.0.0.0/8

  • IPsec tunnel between pfsense and Zywall

    2
    0 Votes
    2 Posts
    2k Views
    M

    Check your settings again. The ZyWall and the pfSense are compatible, I have a tunnel working.

  • Ipsec started using the wrong IP after WAN switch rebooted

    1
    0 Votes
    1 Posts
    985 Views
    No one has replied
  • IPsec with Android Problems

    8
    0 Votes
    8 Posts
    4k Views
    T

    Anything I could try?

    I have never been able to get a successful ipsec connection, but openVPN is working.

  • Pfsense <-> monowall help

    1
    0 Votes
    1 Posts
    928 Views
    No one has replied
  • Bonjour

    3
    0 Votes
    3 Posts
    1k Views
    J

    It doesn't.

  • An Other IPsec Tutorial

    1
    0 Votes
    1 Posts
    604 Views
    No one has replied
  • Openswan to PFSENSE

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Site to Site VPN

    5
    0 Votes
    5 Posts
    1k Views
    J

    Thank you
    this noted for the future use !

  • SOLVED: Pfsense 2.1.2 with CARP IPSEC VPN PROBLEM

    2
    0 Votes
    2 Posts
    2k Views
    C

    I solved.

    I'm not sure that is this the problem but now is working.

    Change the My identifier with CARP IP.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.