• Pfsense as VPN for iPhone, halfway there.

    Locked
    8
    0 Votes
    8 Posts
    4k Views
    S

    Uhhh well that is incorrect, it's just xauth IPSec and the Cisco client boys have issues as well so it's not…not supported there are issues I think...

    I can make split tunnel work fine but no traffic into firewall.

  • Send notifications when VPN tunnel goes down?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    C

    There isn't a monitoring system built in, that's the job of a general network monitoring system.

  • IPSec with subnet natting

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    M

    :P Ofcourse I forgot this.. then you must have two devices(one doing natting and another doing vpn) or think another solutions

  • Second IPSec VPN not starting or logging?

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    L

    @cmb:

    I wanted to update you and let you know I got this going.  You were exactly right, just had to push some traffic to start generating errors which helped me figure out what was wrong with my config.  A continuous ping wins the day.  Thanks for your help!

  • IPsec VPN not working as expected…

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • VPN Ipsec Between Windows 2008 and Pfsense 2.0

    Locked
    3
    0 Votes
    3 Posts
    5k Views
    Z

    To be honest if I were you I'd try doing a DMZ on your modems for the PFsense/Windows 2008 IP addresses (WAN). That would discount anything there….

  • Racoon: fatal parse failure???

    Locked
    7
    0 Votes
    7 Posts
    3k Views
    C

    Misconfiguration, but one we should prohibit. http://redmine.pfsense.org/issues/2201

  • Telnet idle and Ipsec woes.

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Could not see network shares over VPN

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    J

    got it. turned out to be AVG internet security firewall. thanks for your time guys.

  • IPsec mobile clients pass-through on 2.0.1-RELEASE (i386)

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • VPN routing internet traffic

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    F

    Thanks. I tried that before posting and it made by VPN unaccessible. After giving it another go and rebooting everything in between it's worked though.  ;D

  • Mobile/ipsec cant access LAN anymore

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    B

    some snippets of the the contents of the ipsec logs would probably be helpful to diagnose

    i was seeing the same problem you mention where later connections would fail to pass traffic, and i could temporarily work around the issue by disabling IPSEC and then re-enabling IPSEC on the pfsense and then reconnecting the client…the problem would eventually return

    setting the policy generation to "unique" was the longer term fix for me, and i see you have that set but you have some other settings configured non-typical (if there is such a thing for ipsec ;) )

    anyway, you might try rebuilding your connection following this
    http://dekapitein.vorkbaard.nl/tech-1/how-to-set-up-ipsec-tunneling-in-pfsense-2-0-release-for-road-warriors

    with the exception of configuring the policy generation setting to unique instead of default as is depicted in the howto

    that is how i have things setup currently and havent seen the issue return

  • Mobile client Vpn

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    B

    "mobile client" can mean alot of different things, but if you are talking about the most common mobile user scenario (windows laptop making a remote connection), thanyou might want to take a look at these

    for the 1.x era
    http://doc.pfsense.org/index.php/IPsec_Road_Warrior/Mobile_Client_How-To

    for the 2.x
    http://dekapitein.vorkbaard.nl/tech-1/how-to-set-up-ipsec-tunneling-in-pfsense-2-0-release-for-road-warriors

    if you end up using the 2.x setup article, you will probably need to configure the Phase 1 Policy Generation differently than depicted in that article (pick "unique" instead of "default" to avoid issues with subsequent connections). the firewall settings are easy to miss in that article as well so make sure to read carefully over that part.

  • Ipsec mobile clients in 2.0 not working?

    Locked
    20
    0 Votes
    20 Posts
    8k Views
    B

    i was having problems with 2.0 and 2.1 for shrew ipsec clients where the initial connection would work fine, later subsequent connections would seem to connect but would fail to pass data

    i tried disabling NAT-T and DPD as suggested elsewhere in this forum, but the ultimate fix was to setup the pfsense and shrew client per typical "road warrior" configs

    e.g. http://dekapitein.vorkbaard.nl/tech-1/how-to-set-up-ipsec-tunneling-in-pfsense-2-0-release-for-road-warriors

    with the EXCEPTION of setting the P1 Proposal Generation to "Unique" instead of "Default"

    [that setting change is noted in the redmine link mentioned in this thread, but its in a slightly different context of multiple clients coming from the same nat network]

    anyway, since making that change, i havent seen the problem where later reconnects fail, and no need to disable NAT-T and DPD

    maybe that setting will work for you

  • PfSense 2.0.1 ipsec dropping internal traffic

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    B

    on the pfsense side, try setting the P1 Policy Generation to "unique"

  • IPSEC: Hub and many spokes

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ

    As you read elsewhere, a second Phase 2 on each leg is needed. Here is an example:

    Hub:
    IPsec A
    h.h.h.h/24 -> a.a.a.a/24
    b.b.b.b/24 -> a.a.a.a/24

    IPsec B
    h.h.h.h/24 -> b.b.b.b/24
    a.a.a.a/24 -> b.b.b.b/24

    Site A IPsec
    a.a.a.a/24 -> h.h.h.h/24
    a.a.a.a/24 -> b.b.b.b/24

    Site B IPsec
    b.b.b.b/24 -> h.h.h.h/24
    b.b.b.b/24 -> a.a.a.a/24

    And so on. Add a phase 2 for each possible set of traffic src/dst network pairs.

  • IPsec tunnels died and don't come up anymore

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Problem after establishing VPN

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    X

    hi,

    there is a rule to allow traffic from the LAN behind the checkpoint to the PFsense server.
    it worked until i've started the vpn.

  • IPSec VPN from windows 7 client

    Locked
    9
    0 Votes
    9 Posts
    30k Views
    D

    Yep, under Linux one has the option of L2TP+IPsec by using openl2tp (http://www.openl2tp.org/) with racoon or StrongSWAN/OpenSWAN (note: the latter exhibit some bug which was fixed with a commit to the 3.2-rc5 linux kernel).

    StrongSWAN offers IKEv2 and has been ported to FreeBSD, but with certain limitations, see http://wiki.strongswan.org/projects/strongswan/wiki/FreeBSD

    Limitations
    Due to the lack of policy based routes, virtual IPs can not be used (client-side).
    The kernel-pfroute interface lacks some final tweaks to fully support MOBIKE.

  • 0 Votes
    9 Posts
    27k Views
    C

    Guys this is the response i was after.

    OVH Failover IPs are protected against UDP attacks, this disturbs some VPN and other UDP protocols.
    You can buy unprotected IP from your OVH Manager, search 'IP for UDP' or something, close to your "IP Failover" Icon.
    I tried on my own kimsufi, but I don't have enabled the "professional use", then I cannot try it

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.