• VPN ok, but no traffic on it…

    Locked
    20
    0 Votes
    20 Posts
    14k Views
    P

    Ok… You're in an exception and this is not a security hole.
    If you use only "any" as source, it could be a security hole but not with authentication.

    BTW, good news your tunnel is working.

  • Meaning of "received broken Microsoft ID: FRAGMENTATION"

    Locked
    2
    0 Votes
    2 Posts
    4k Views
    P

    Same here. Would love to know what it means, even if it is benign.

  • Remote Subnet

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    R

    I think a second tunnel is the only way to make this work.  also, 2.0 now supports multiple P2 tunnels.

    Roy…

  • IPSEC VPN expires

    Locked
    2
    0 Votes
    2 Posts
    9k Views
    R

    I believe the phase 1 lifetime should be larger than the phase 2 lifetime.  also, have you tried "Prefer old IPsec SAs" under "System: Advanced functions" ?

    Roy…

  • IPSec tunnel to virtual IP

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Simple vpn site to site

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    ?

    IPSEC being set up will handle the routing properly between the two protected subnets.

  • IPSEC Tunnel from LAN to Virtual Server

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    J

    I have a similar setup and am having the exact same problem…anyone out there have suggestions?

  • MOVED: Open VPN easyrsa setup fails

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • 1.2.3 RC3 - Site to Site - NAT-T appears to work! but only pings one way

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    R

    Ok, just tried it with a 1.2.3 Release box and I get the same story!

  • Static route VPN overide

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • PfSense 2.0, CARP, IPSEC Failover

    Locked
    3
    0 Votes
    3 Posts
    6k Views
    J

    Check Dead Peer Detection. If you put 30 seconds the failed Remote peer will be deleted and a new Phase 1 negotiation will start.

  • IPSec Logging Customization

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • How to configure binat for a VPN tunnel?

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    jimpJ

    It's still BETA (BETA5 actually) and there are a couple of issues that some people hit in the last few weeks that are problematic.

    I'd say it's worth trying as a proof of concept but I would hesitate to put a current snapshot into production as-is for the moment.

  • IPSEC connect three routers in triangle?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    R

    Yes.

    Roy…

  • IPsec Mobile Client auth on RADIUS

    Locked
    10
    0 Votes
    10 Posts
    7k Views
    jimpJ

    Looks like it may have to wait for 2.1.

  • IPSec No traffic passed from LAN but traffic passed from router

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    M

    That is correct the PFSense box is the gateway for the LAN

    Config was PFSense Box
    NIC1 WAN1 – VPN to Public Network
    NIC2 WAN2 -- Load Balance to WAN1
    NIC3 LAN -- Internal Network

    Yes I was able to see the packets on the LAN side but they always tried to go out the WAN1 interface not the IPSec tunnel - I have added a 2nd PFSense Box now and it's working as expected

    New Config

    Original Box
    NIC1 = WAN1 (/28 Network Public)
    NIC2 = WAN2 (/28 Network Public)
    NIC3 = VPN Link (/30 Network Public)
    NIC4 = LAN (/24 Network Internal)

    2nd Box
    NIC1 = WAN1 / VPN Public (/28 Network Public)
    NIC2 = VPN Link to 1st Server (/30 Network Public)

    Now when I send traffic to that subnet I added a rule to send all traffic out VPNGW on the 1st router and it's passing it to the VPN box (2nd router) then passing along to the VPN Subnet as expected

  • Multiple gateways on same subnet

    Locked
    3
    0 Votes
    3 Posts
    5k Views
    R

    Thanks a mil SeventhSon, sorted my problem :) cant believe i missed it :P

  • Best way to accomplish this?

    Locked
    8
    0 Votes
    8 Posts
    4k Views
    Cry HavokC

    @Blind:

    The cisco ASA does the PAT/NAT necessary for the tunnel, I just need the pfsense to firect traffic to the tunnel for the clients.

    But if your pfSense isn't doing NAT then all the hosts behind it will count towards that client limit as they'll be visible.

    @Blind:

    I have not setup the IPsec tunnel on the pfsense box so Im not understanding why my thread was moved here.

    Because your post made it sound like you've set up an IPsec tunnel between the Cisco and the pfSense. I think it's time for a diagram so we know exactly what your setup is.

    @Blind:

    As I understand the IPsec implementation on pfsense does not support my config as IP ranges on either side of the tunnel match.

    The ASA is working perfectly with the static routes added that I mentioned in my previous post, so the tunnel setup is fine, I just need to go through the pfsense as gateway to trick the ASA into allowing more than 10 clients to go through it.

    From where? How is the pfSense host connected to the Cisco? How are the clients connected to the pfSense host?

  • 0 Votes
    5 Posts
    5k Views
    S

    @jimp:

    If you connect with ssh, you can do a tcpdump on enc0, which is the IPsec interface, so you can see what traffic is or isn't hitting the tunnel.

    tcpdump on enc0 is not showing the rtp packets at all on either side (capturing on the incoming/outgoing interface does show them as well as the ones that make it from local->remote)

    No clue why it is not capturing the rtp packets that I know are getting through. (SIP packets are being captured fine).

    Am just doing a tcpdump -ienc0 -wtcpdump.cap
    ….. =o\

  • [NEWBIE]IPsec VPN Roadwarrior

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    E

    @spiritbreaker:

    Hi,

    u would suggest this solution:

    Internet <=> { ADSL Router in Bridge Mode } <=> [Public IP via PPPoE] PFSense [192.168.2.254] <=> LAN 192.168.2.0/24

    Create dyndns account if u have dynamic ip. Then its easy to get VPN to work, either Ipsec based or Openvpn.

    Cya

    I agree with spiritbreaker. This is the most desired setup. Also.. Ive done this with a MikroTek routerboard as well as a PFsense system without issue. You will however have to make your PFsense system be your PPP authenticator (your modem will act more like a cable modem/dumb device) Ive got a very basic tutorial here that documents how to do this with a routerOS based device. It should at least get you started.
    http://www.fusionnetwork.us/index.php/articles/general-tutorials/qwest-net-static-ip-transparent-bridging-routerboard-solved/

    -E

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.