• Checkpoint VPN

    Locked
    4
    0 Votes
    4 Posts
    4k Views
    H
    I have not yet used a checkpoint client yet.  :( Oh, any chance you have a lifetime mismatch somewhere between the concentrator and the clients?
  • Strange log entries

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    We need more details on your setup. This is not enough to even start a wild guess.
  • Identifying IPSec sessions by Identifyer

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    I agree. This would be a nice addition. I have a pfSense acting as concentrator for 12 other pfSense's joining as mobile clients and it's pretty confusing to tell which one is which  ;)
  • IPSEC works only one time after activating it?!

    Locked
    21
    0 Votes
    21 Posts
    12k Views
    H
    Sounds like a freebsd bug then. Search the appropriate lists for similiar problems or statements on this.
  • Redundant IPSec / GRE tunnel between pfSense and Cisco

    Locked
    2
    0 Votes
    2 Posts
    7k Views
    H
    This has been discussed elsewhere already. Please search for this discussion and why it won't work. Loadbalancing over several tunnels won't work.
  • IPSec questions….

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    Guess this is untested. However I have no issues running ipsectunnels at the pfsense itself and using ipsec clients at lan to go somewhere else so far. Give it a try and let us know.
  • VPN Tunnel to Cisco VPN

    Locked
    5
    0 Votes
    5 Posts
    6k Views
    B
    I'm in the same boat. PC with Cisco VPN client, configured for Group Auth, Tunneling IPSEC over UDP. I'm unable to get the desktop client to work behind the PFSENSE box (tried 1.01 and todays CVS). If I put the VPN client in FRONT of the box, IE on the public IP, works first time, like a charm. Dialup, works find. Sprint Wireless Modem, works fine. Behind the PFSENSE box, no work. I've tried NAT/Port forwarding, TCP/UDP 500, TCP/UDP 10000, ESP, etc. No work. I'd be happy with EITHER the VPN client working, or the PFSense box establishing the connection. Either would serve what I  need to accomplish. HELP!
  • Secure WLAN with IPsec ?

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    J
    or use the vpn ptpp server on youre pfsense server and the ptpp client on youre pc's
  • Pfsense to dyndns sonicwall?

    Locked
    9
    0 Votes
    9 Posts
    5k Views
    A
    OpenVPN would be nice. Stupid sonicwalls. Are there any open source firewalls that will do dynamic ipsec endpoints?
  • PfSense to Netgear VPN

    Locked
    14
    0 Votes
    14 Posts
    17k Views
    H
    @decibel83: racoon: ERROR: such policy does not already exist: "192.168.1.0/24[0] 192.168.0.0/24[0] proto=any dir=out" This is usually only a debug message that can be ignored. If it works one way the tunnel should be up fine. Does the netgear support some filtering for the vpn traffic? Maybe you need to create a rule to allow traffic? The pfSense currently can't filter VPN traffic so it can't be an issue on the pfSense end of the connection. Are you trying to ping from behind the netgear or from the netgear itself? Usually devices encapsulating the connection can't use it directly without adding a fake static route or pinging from their LAN IP.
  • Dynamic IP changes

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    H
    try "Prefer old IPsec SAs  " from system>advanced and see if this has a positive effect on reestablishing the link.
  • Connected successfully to a Sonicwall TZ170 but…

    Locked
    25
    0 Votes
    25 Posts
    30k Views
    D
    fixed my problem with my sonicwall tz170 & pfsense.. on the pfsense side of the tunnel, when I was entering in the remote subnet, I left the subnet class with the default of 32, when it should have been 24.  When I changed that everything worked like it should!    Imagine that..
  • Only the Best –>>> PIX Static IP ---- pfSense Dynamic IP (Site to Site)

    Locked
    5
    0 Votes
    5 Posts
    6k Views
    H
    Cool  :D
  • PIX VPN –-> pfsense (Dynamic IP)

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    H
    Currently you need at least one static IP to create IPSEC Tunnels (have a look at http://pfsense.com/mirror.php?section=tutorials/mobile_ipsec/ ).
  • Connecting a pfSense and an ADSL router to another pfSense

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    D
    OK, thank you very much! I will try and I rewrite you if I will have some problem…
  • Help with error (racoon.conf:2: "500" parse error)

    Locked
    18
    0 Votes
    18 Posts
    11k Views
    A
    I reinstalled all system and now its works. I think that's a bug.
  • IPsec & Firewall rules / NAT

    Locked
    2
    0 Votes
    2 Posts
    5k Views
    jahonixJ
    Since there are so many views of this topic I post what finally worked for me and might help others. Maybe Hoba adds it to his tutorial… both sides: RULE: AH          *        *        WAN address              *      *          AH for IPsec RULE: ESP        *        *        WAN address              *      *          ESP for IPsec RULE: UDP        *        *        WAN address              500    *          UDP500 for IPsec If you use the settings from pfSense (which is ESP as Phase 2 protocol), you don't need the AH rule. Do not use any NAT rules, this is not necessary and NAT-traversal (NAT-T) of IPsec is a task on its own. This usually would require UDP4500 and other things I am not familiar with. Have a look here:  http://en.wikipedia.org/wiki/NAT_traversal
  • Connecting WinXP Cisco VPN client to PFSense IPSEC

    Locked
    6
    0 Votes
    6 Posts
    17k Views
    H
    Have a look at the free IPSEC clients mentioned here: http://forum.pfsense.org/index.php/topic,2009.msg11516.html#msg11516 For OpenVPN have a look at these GUI clients: http://openvpn.se/ http://openvpn.net/gui.html
  • Tunnel ipsec between pfsense and cisco router

    Locked
    6
    0 Votes
    6 Posts
    13k Views
    C
    I put seconds instead the IP… Now works ! thanks very much. Giacomo
  • IPSec with dynamic endpoints

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    S
    IPSEC issue.  Research aggressive mode + dynamic dns domain names.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.