• IPSec disconnects and won't reconnect

    2
    0 Votes
    2 Posts
    598 Views
    M

    @rebelscum What happens if you search those same IPsec logs but for the remote IP?

  • VIP Ipsec not working after upgrade

    1
    0 Votes
    1 Posts
    459 Views
    No one has replied
  • IPSec Phase 2 Allowing Wrong Subnets?

    1
    0 Votes
    1 Posts
    413 Views
    No one has replied
  • <Solved> - IPsec IkeV2 Cisco ASA will ony activate first P2 SA

    2
    0 Votes
    2 Posts
    917 Views
    jimpJ

    @bingo600 said in <Solved> - IPsec IkeV2 Cisco ASA will ony activate first P2 SA:

    But why did the first P2 activate without that command ???
    Is there some default/special handling of the first P2 ?

    Yes, there is.

    When connecting, the first P2 SA entry uses DH information from the parent P1, and not its own PFS value. This isn't specific to pfSense, it's part of how IPsec operates.

    It will use the P2 PFS value for the additional P2 entries and also when rekeying, so it may have failed to stay established over time as well.

    You'll see this sometimes on the IPsec status when a tunnel connects first and it doesn't show the PFS value in the P2 status for the first configured P2 initially, but it will after a while when the tunnel rekeys.

  • Site to Site and Hair-Pin

    12
    0 Votes
    12 Posts
    1k Views
    P

    @viragomann

    I'll just continue on from here. I'm not following your comments really. His UDM is managing VLANs and networks for his clients. I need a connection to his UDM to get my VPN and network routed to and from his UDM. The VPN is to get to discrete networks in two geographically dispersed locations to communicate directly. I have no idea how else it would be done.

    Appreciate everyone's input. Although I'd still be interested to know if pfSense can handle a hair-pin situation with VPN or if it really needs to cross interfaces to operate at all.

  • Make Subnet reachable over IPsec using an IP in the very same Subnet

    4
    0 Votes
    4 Posts
    966 Views
    V

    @kastenfrosch-48
    Still not really clear, what you intend to achieve.

    Unfortunately, this is the very same network those hosts are also residing in.
    I want to initiate the IPsec-Tunnel from an IP inside this subnet.

    You want to initiate an IP from one of these remote machines to your pfSense and access the ohter remote network devices through it?

  • IPSec performances

    2
    0 Votes
    2 Posts
    675 Views
    M

    @ppcm are we testing with SMB? What’s the latency for each site?

  • IPSec dns search domain / suffix

    2
    0 Votes
    2 Posts
    674 Views
    J

    As it seems this feature is not supported for IKEv2.

  • problem reaching Public IP endpoint of IPSEC with dual WAN

    5
    0 Votes
    5 Posts
    749 Views
    V

    @f-giraud said in problem reaching Public IP endpoint of IPSEC with dual WAN:

    Do you policy route the LAN out to WAN B?

    I wanted to request for WAN A.
    But the traffic also goes out on A if its the default gateway, of course.

    Is there an outbound NAT rule in place for the LAN subnet on B? (NO !!)

    So I would simply add an outbound NAT rule for the source of LAN subnet to WAN B.

    Otherwise, I think, policy routing the traffic to WAN A should work as well.

  • IPSec VTI phase2 0.0.0.0/0 bypasses firewall rule

    3
    0 Votes
    3 Posts
    730 Views
    Antonio EmilianoA

    @jimp Thank's for your time!

    Unfortunately, I don't have the experience to discuss VTI in depth. I am grateful for the observation.

    However I managed to get my gateway rule working when I set a destination. And to point to the world I use something like "!127.0.0.1". After that the rule started to obey and my LAN started to go out through the gateway described in the rule.

    However I'm afraid of the way this is configured, I don't know the impact of this for future cases. My only limitation now is my partner's sonicwall firewall that when he selects Tunnel Interface (VTI) he cannot define "Local Subnet" and "Remote Subnet". It's like it only accepts 0/0 for 0/0.

    I did another test that was to configure phase2 with a different "Remote Subnet" with any network that doesn't even exist for us, without changing the sonicwall side and phase2 connects. So it seems that sonicwall's behavior when as a tunnel interface is to accept whatever network I configure on my side. Of course, for it to work I must configure the right networks, but this explanation is just for information purposes. Ahh, and I realized that because before I tried to connect several phases2, one for each network and only one worked. So I did the test above and it worked.

    What I'm going to do now is create, together with my partner on sonicwall, several phase2s, one for each network I need to connect, and then try to redo all the phase2s I need by correctly defining the destination networks I need.

    I hope it works out like this.

    Thanks a lot for your help once again.

  • [CFG] trap not found, unable to acquire reqid

    3
    0 Votes
    3 Posts
    829 Views
    M

    @jimp understood. Happy New Year Jim!

  • IPSec VPN

    5
    0 Votes
    5 Posts
    841 Views
    T

    @viragomann - the packet sniffing and increasing the log detail for ipsec did the trick - two issues:

    I had a couple of machines with no gateway defined. This was not an issue for local traffic but creates an issue for the traffic back to the IPSec devices.

    In all of the testing I had left the Phase 2 local subnet set to just one of the networks. Changing to Network 0.0.0.0/0 did the trick.

    Thanks for the pointers.

  • Site to Site IPSec VPN - pfSense and Fortinet

    2
    0 Votes
    2 Posts
    2k Views
    C

    @timatleeTry turning the PFS key group on P2 to off and see what happens. I have a couple of IPSec connections with Fortigates, 1 with 4 SA's but that one has PFS key group set to off. Unless I am mistaken, by default, the DH for P2 inherits the DH from P1 unless specified differently.
    I also set my time lifetime 10% higher than the FortiGate, which seemed to help a lot.

  • [solved] IPv6 Traffic not routed via IPsec

    2
    0 Votes
    2 Posts
    663 Views
    B

    Ok, I was stupid.
    My Phase2 was not configured correctly.
    "Local Network" was set to ::/128 when it should have been ::/0

    It's now working

  • IPSec with public routable IPv6

    1
    0 Votes
    1 Posts
    397 Views
    No one has replied
  • VPN IPSec

    Moved
    4
    0 Votes
    4 Posts
    1k Views
    S

    @lukepicci

    Just for reference, i raised a ticket:

    https://redmine.pfsense.org/issues/13788

  • Site-to-Site IPsec VPN pfSense - Microsoft Azure VPN issues

    9
    0 Votes
    9 Posts
    2k Views
    M

    @lk777 I agree completely. it is confusing. The documentation says one thing but as you can clearly see choosing either one the tunnel still comes up. Would be helpful to have an info button somewhere that quickly shows the pros/cons of selecting each one.

  • VTI Palo --> Pfsense dynamic routing (OSPF)

    17
    0 Votes
    17 Posts
    2k Views
    H

    @heinola

    Think its like:

    broadcast = hey everyone ( please sir can i have some more )
    p2p = hey you xxx.xxx.xxx.xxx ( give me what i want )

    or am i way way off

  • I can't install IPsec

    3
    0 Votes
    3 Posts
    796 Views
    I

    @enesas

    What you might miss is an outbound nat. When all traffic for a remote user is router over VPN, then you need to make sure that client's private IP is translated on the pfsense to the wan or alternative public IP, within Firewall NAT Outbound configuration.

    On client end routing table will confirm if all client traffic is routed over the VPN (Windows command "route print", or Linux "netstat -r")

  • Tunnel "Up" if Phase 2 mismatch? Disconnect on Disable/Restart?

    1
    0 Votes
    1 Posts
    419 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.