Hi,
this is by design^^ u cant route IPSEC.
What u have to do is to create multiple phase 2 entrys on Pfsense and sarians.
Have a look at this example:
Each Sarian has a IPSEC Tunnel to ur central pfsense. Sarian A cant reach Sarian B network because there is no route.
pfsense
192.168.5.0
| |
| |
| |
Sarian A Sarian B
192.168.6.0 192.168.7.0
Solution:
IPSEC Tunnel Pfsense <-> sarian A
Pfsense:
add phase 2 like this:
localnet: 192.168.7.0/24
remotenet: 192.168.6.0/24
use same encryption as ur first phase 2 entry.
Sarian A:
i dont know if sarian can have a second phase 2…but u can try to add a second tunnel with the same shared key...this should work.
localnet: 192.168.6.0/24
remotenet: 192.168.7.0/24
IPSEC Tunnel Pfsense <-> sarian B
Pfsense:
add phase 2 like this:
localnet: 192.168.6.0/24
remotenet: 192.168.7.0/24
use same encryption as ur first phase 2 entry.
Sarian B:
i dont know if sarian can have a second phase 2…but u can try to add a second tunnel with the same shared key...this should work.
localnet: 192.168.7.0/24
remotenet: 192.168.6.0/24
At the end create fireweallrules on pfsense to allow traffic between sarian A und B and vice versa...thats it.
If u have many sarians to connect each other u need to combine networks to minimize phase 2 entries otherwise there is much to configure.
good luck
cya