• IPSec block internet

    1
    0 Votes
    1 Posts
    461 Views
    No one has replied
  • NAT addressing problem

    4
    0 Votes
    4 Posts
    671 Views
    D

    Aaaannnndd it started working, somehow.

    I played a little with "Rekey Time" and " Reauth Time" but didn't get the results I expected, so I disabled them (which is what I had before). But somehow, icmp translation started to work. Now it works but I don't know why..... :-P

    Tks.

    Roberto

  • Pfsense L2TP over IPSEC server and TP-Link ER605 router L2TP client.

    1
    0 Votes
    1 Posts
    902 Views
    No one has replied
  • freeradius static ip assignment causes very slow speeds&packet losses

    1
    0 Votes
    1 Posts
    399 Views
    No one has replied
  • Block unwanted IPsec connection attempt

    3
    0 Votes
    3 Posts
    634 Views
    J

    @johnpoz
    Thanks for the reply.
    I think I've done that, i've also added it to the LAN and IPsec section for good measure.
    9c297238-893b-4bf2-9ccf-7f8a6c17a83d-image.png
    eaeb2008-15cf-4338-b279-787330cc6462-image.png
    89ec900d-fe2a-4896-8a41-35813600e913-image.png

    And still I get the following in the IPsec log:
    a21db9c7-c0b4-4ec2-96d6-b785f499734b-image.png
    I've blacked out my IP.

    Thanks
    Jacob

  • Win10 IKEv2 Connects, but No Network Access

    7
    0 Votes
    7 Posts
    1k Views
    T

    @thewaterbug said in Win10 IKEv2 Connects, but No Network Access:

    @keyser

    Thanks! Does putting the config file in the /conf/ folder work for all pfsense installs? It didn't work for me.

    My problem may have been that I didn't rename the config file. I just put it in there with its full filename, e.g.:

    config-hostname.domain.tld-20221007121918.xml

    After doing some reading, I renamed it as just config.xml. I didn't know whether to put it at the root or at /conf/, so I put it in both, and it worked this time. 🤷

  • PFSense - IPSEC to Fortigate - Too Many Phase 2 SA's kills Tunnel

    2
    0 Votes
    2 Posts
    2k Views
    B

    I have fixed it for now.

    The Current tunnel configurations was setup as IKEv1. I have converted both sides of the tunnels to IKEv2 and I can now see all the SA's on the PFSENSE SIDE and they match the networks on the Fortigate Side.

    I am able to pass traffic on my 2 test networks. I will add more networks on Monday....If I can pass traffic on all 14 of the networks ....then I am good. if not, IKEv2 on the PFSENSE Side provided the Ability to split connections. You can read more about split connections in this document.

    https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/configure-p1.html#advanced-options

    Thank You

  • 0 Votes
    3 Posts
    570 Views
    T

    @thewaterbug

    Fixed:

    Add-VpnConnectionRoute -ConnectionName "PI-IKEV2-VPN" -DestinationPrefix 192.168.0.0/24 -PassThru

    with the Use Default Gateway . . . unchecked.

  • IPSec Firewall not allowing SNMP

    1
    0 Votes
    1 Posts
    558 Views
    No one has replied
  • Ipsec Configuration not Working!

    66
    0 Votes
    66 Posts
    16k Views
    G

    @gary-lopez viva la raza carnal!

  • IPSec Site to Multi-Site VPN (Established but cannot ping local hosts)

    1
    1 Votes
    1 Posts
    338 Views
    No one has replied
  • Question about Site to site

    1
    0 Votes
    1 Posts
    327 Views
    No one has replied
  • Pfsense IPSEC LAN to LAN VPN: low bitrate output by iperf2

    2
    0 Votes
    2 Posts
    489 Views
    M

    Anyone already experienced and solved this issue?

    Additional info:
    both the pfsense instances are running on two VMware ESXi virtual machines (each one has 4 cores + 4GB RAM)

    Mauro

  • Restrictions on IPSEC clients

    3
    0 Votes
    3 Posts
    562 Views
    C

    @steveits said in Restrictions on IPSEC clients:

    https://docs.netgate.com/pfsense/en/latest/firewall/time-based-rules.html

    Thanks, I did try to create some scheduled firewall rules, but they don't seem to have any effect once a IPSEC connection is established. When blocking traffic, they stop the VPN connection from happening. But if the connection is already established, then the iPhone is still able to browse the internet through the VPN.

    I think this needs to be set up a specific way with firewall rules, but I don't know how to do that. It could also be that having pfSense in a VM makes a difference to how this is done.

  • IPSEC with Nat Translation - no route

    2
    0 Votes
    2 Posts
    652 Views
    S

    @sdedurana a error in config. Solved. Please close.

  • Problem with connectivity outside of IPSEC when member is down.

    1
    0 Votes
    1 Posts
    312 Views
    No one has replied
  • Traffic not Routed Properly when i use Pfsense Lan IP

    1
    0 Votes
    1 Posts
    318 Views
    No one has replied
  • Can't connect IPSec if other IPSec connected

    1
    0 Votes
    1 Posts
    341 Views
    No one has replied
  • Mobile client failing to connect

    1
    0 Votes
    1 Posts
    373 Views
    No one has replied
  • IPsec tunnels not connecting during CARP HA failover

    3
    0 Votes
    3 Posts
    1k Views
    T

    Wanted to add a bit more info here as this issue remains even after upgrading to 2.6.0 today.

    My tunnels are IKEv2 in VTI mode.

    Under Phase 1 Advanced Options, I set "Child SA Start Action" to "Initiate at start (VTI or Tunnel Mode)"
    and
    "Child SA Close Action" to "Restart/Reconnect"

    Under Phase 2 > Keep Alive, I use a host on the other side of the tunnel with Keep Alive "Enable periodic keep alive check".

    The tunnels do not establish if I shut down the MASTER CARP node or "Enter Persistent CARP Maintenance Mode" on the MASTER CARP node. I have to click Connect to manually establish the tunnels.

    Seeing these messages in the IPsec System Log
    charon[43289]: 04[CFG] trap not found, unable to acquire reqid 5002

    Have anyone else seen this issue?

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.