• IPSEC with GRE from pfsense to Cisco

    Locked
    1
    0 Votes
    1 Posts
    4k Views
    No one has replied
  • HTTP traffic over IPsec Tunnel

    Locked
    10
    0 Votes
    10 Posts
    5k Views
    V
    Just tried this but it wouldn't work for me, just as if the tunnel was ignored. Anyelse tried this?
  • Teleworker in same subnet as company, how to config Shrew IPSec client?

    Locked
    4
    0 Votes
    4 Posts
    4k Views
    V
    Thanks for your answers! Renumbering the client networks is virtually impossible since we'd like the mobile users to be able to connect from anywhere so you never know what subnet you'll encounter. Renumbering our own subnet is also tricky because we're in an Active Directory with six sites and a load of servers (Exchange, DC, fileservers, cvs servers, webservers, etc.). So while it's not impossible it will most likely be quite a feat to renumber our own network. It grew so historically and I inherited it from my predecessor. Still I think changing our own subnet is the most sensible thing to do. Thanks for your input.
  • Problems connecting mobile IPSEC client to PFSense 2.0

    Locked
    4
    0 Votes
    4 Posts
    4k Views
    V
    Perhaps too late, but I'll post it here anyway. You need to allow these things in your firewall: UDP port 500 for IPSec protocol ESP (or AH if set that way) UDP port 4500 for NAT-T
  • Roadwarrior IPSEC VPN

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    M
    Worked perfect! Followed the tutorial and all was up working. Thank you wery much for you work.
  • Kernel panic with RDP over IPSEC

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    F
    I have tried wireless and from remote to mine with rc1 no issues here.  Just make sure you have all the patches loaded. I am running 1.2.3. RC
  • IPSec Mobile User System Logs

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    With Mobile IPSec, you generally hardcode a client's IP address in the client configuration, so you'll have some idea of which one is which. If you have the Dashboard package installed, I've fixed it so the IPSec status widget properly shows the status of mobile clients which are connected. It will list the peer IP address as well as the VPN IP address for the client. Unfortunately, as far as I can tell there is no way to see which client is which based on the identifier. I'd really like the ability to match them up that way as well. I'd say you should check out OpenVPN, but I don't think that it has a means of getting that sort of information either, at least on 1.2.x.
  • Racoon: ERROR: not acceptable Identity Protection mode

    Locked
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • Very cool VPN device - Could be used instead of vpn client!

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    K
    Ouch!!!!
  • Established but no traffic

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    R
    @Phil: Solved… See http://forum.pfsense.org/index.php/board,16.0.html I have exactly the same problem as you described, but the link you posted does not work. Can you tell me how you solved your problem? \Ronni
  • Sonicwall Global VPN Client

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Feature Request- Need multiple Subnets (vpn selectors)

    Locked
    9
    0 Votes
    9 Posts
    5k Views
    R
    @jimp: Multiple subnets w/IPSec are possible in 1.2.x in a non-obvious way, and there are some issues, but you can try it to see if it works for you: http://doc.pfsense.org/index.php/IPSec_with_Multiple_Subnets It didn't work for me, but I think that was mainly due to the fact that I was using a mobile tunnel and not a static site-to-site tunnel. The parts of my VPN that needed multiple subnets got moved to an OpenVPN tunnel and have been working happily ever since. Parallel tunnels works.  You have to make sure ALL settings (except the network) are exactly the same, but it works.  I have this between pfSense <-> pfSense and pfSense <-> Cisco. Roy
  • Your documentation and wiki are broken.

    Locked
    8
    0 Votes
    8 Posts
    4k Views
    F
    @jimp: A little late, but better late than never: Yup! I read over it briefly. It looks good to me. It's been a while since I set it up from scratch and maybe some things have changed since 1.2.2 but everything seems to be there. Thanks for updating.
  • NAT-T

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    E
    hmmm … i'd think that the problem is, that mobile IPSec clients behind a NAT router can't conntect to your pfsense IPSec Endpoint (which should be connected direct to the internet - no NAT)!
  • Vpn ipsec, Pfsense to Netopia, net to net

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    M
    I simply can't believe it !  ??? ??? ??? This morning, without changing anything, the tunnel is up ! ??? ??? ??? Is it necessary to wait before the tunnel get up ? How many time ? Anyway, this looks like a good news. I will continue my exploration. Thanks for your help !  ;D ;D ;D
  • Connecting IPSEC subnets w/same IP range internally

    Locked
    2
    0 Votes
    2 Posts
    5k Views
    jimpJ
    Someone had posted a bounty for NAT over IPSec, the post is still there in the Bounty Forum on this site. I'm not sure this actually has a distinct name, but some people call it "NAT over IPSec", "Policy NAT for IPSec", etc. This functionality does not currently exist in pfSense, though with enough interest (and perhaps bounty money) it could be added. Basically what you need to do is NAT before the traffic enters the tunnel, and/or after it leaves, like so: Site A: 192.168.1.x <1:1 NAT> 10.0.1.x <–- IPSec ---> 10.0.2.x <1:1 NAT> 192.168.1.x :Site B Site B uses the 10.0.1.x addresses to talk to Site A, and Site A uses the 10.0.2.x addresses to talk to site B. It will appear to each side and though the other end does not, in fact, share its same subnet. If only one-way communications will be initiated, you only need to do NAT on the far side, so when you try to talk to the address your system will know to send it to the tunnel and not try to reach it locally. Some have had success with bridging networks via OpenVPN, so both sides can have addresses in the same subnet, but I believe in that case they still can't conflict, just use separate areas of the same larger subnet. Someone else more familiar with this OpenVPN tactic may be of greater help in this area.
  • Manual SAD disconnect required if internet connection hiccups

    Locked
    9
    0 Votes
    9 Posts
    5k Views
    K
    Tried the suggestion and modified the vpn.inc file but it still is unable to bring the tunnel back up.
  • Racoon error?

    Locked
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • IPSec Rules

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    D
    I am wanting to tie down some security for the VPN tunnels I have running but I am not sure wht I am doing wrong. I am having somewhat the same problems as others in this post. The IPSec rules tab is straight forward, but I am not sure what's going on with the remote site. I have IPsec site-to-site, and both ends have static public IP's. On the remote ends I have a default rule of allow all and any on the IPsec tab. This is ok for now, but I want to tie down the security on the home office by only allowing access to certain host on the network. I can establish a secusseful connection from both ends when the IPsec rule is set to allow all and any on both ends. When I tried to set the home office main rule to allow from only a single host/alias on the source being the remote public IP of the remote network and then set allow any protocol, and set the source to a single host / alias in the home office. I cannot ping that host from the remote site, but I can still ping all the host on the remote network as I exspected to still be able to do since it's rule is set to allow any and all. I am scratching my head on why I can not ping the one host at the home office network. Keep in mind that I have only one rule set at the home office for testing reasons, so there is no way that any other rules can be voiding the situation.
  • 2 client connection from same location

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    jimpJ
    @scottnguyen: 2 client computers with Shrewsoft VPN IPSEC client (2 Vista) connecting from home to work.  If I connect with computer #2, it disconnects computer #1 that's already connected and I never am able to connect using computer #2.  Can I have more that one client with same connection name, connect at the same time from same location (from home for example)? Make sure both clients have different identifiers. Multiple tunnels should work, but I'm not sure how being behind a router/NAT will affect that. I've had multiple tunnels (for multiple subnets) originating from the router to another router before, but not from client PCs. Usually the part that will disconnect one in favor of the other is using the same identifier multiple times. Can you not build a VPN tunnel directly to their router in that case? If you have multiple clients it would make more sense to terminate the tunnel at their router than at their individual PCs. @fastcon68: I have had a devil of a time getting Shew or any vpn client to connect to my pf-sense firewall.  Any words of wizdom you an share?  I have a real need to get it setup and working as well as documenting the process.  I need to add about 5 to 10 pc's at endusers sites that connect back to my VPN from time to time and need to get that working. I have already documented the process of setting up mobile tunnels and the Shrew Soft client on the Doc Wiki here: http://doc.pfsense.org/index.php/IPSec_Road_Warrior/Mobile_Client_How-To
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.