This may be off base, but wouldn't this be transport mode and not tunnel? Transport mode encrypts between public IP's, most commonly seen used when a machine floats on the Internet without a firewall but I would think could also connect to the "public" IP(s) of a firewall to simply encrypt information originating from there? The traffic would flow out of the WAN interface but that's how it should be?
@c3llc:
All-
So I have a client with an interesting issue. They are using pfSense 2.0.1 to connect to a trading partner. This partner requires the use of an IPSec encrypted tunnel using PUBLIC IP addresses.
The protected networks happen to be the IP address of the WAN interface on our end and two addresses on their end (essentially a /31 network).
We have the tunnel configured, and it shows as green in pfSense. They report that the tunnel shows up on their end as well.
The problem is that pings to either of the two IPs on their end are being routed out the WAN interface and not out the IPSec interface! ???
Is there any way to fix this?
We had this exact configuration working with a Cisco ASA5510, but that box has been retired in favor of the pfSense virtual machine.
HELP!!
Thanks in advance,
Rick