@SeventhSon:
Is this what you're trying to do:
http://www.seattleit.net/blog/pfsense-ipsec-vpn-gateway-amazon-vpc-bgp-routing/
LOL… Yes. I actually followed that tutorial to get to where I am.
That tutorial is fantastic as it really does walk you through the process of setting up pfSense to work with Amazon VPC. It does not however provide the information needed to allow hosts in the VPC subnet to route through the IPSEC tunnel, and then back out my pfSense to get to the internet.
That said... I have figured it out.
The solution....
After getting the IPSEC tunnel working as described in the tutorial... You need to modify the VPC route table in AWS. You need to add a default route for 0.0.0.0/0 and point the traffic to the AWS vpn gateway that is your IPSEC connection to AWS. So route 0.0.0.0/o to the vgw that was created.
Next you need to make a slight change to the IPSEC configuration on the pfSense side.
I had to change the second tunnel config to the following....
tunnel 0.0.0.0/0 10.9.0.0/16 ESP AES (128 bits) SHA1
10.9.0.0 is my VPC subnet.
Once this change was made and the IPSEC tunnels were restarted... I can now have traffic from hosts on the VPC subnet traverse my IPSEC tunnel and go out my internet gateway.
This forum thread steered me in the right direction: http://forum.pfsense.org/index.php?topic=51057.0