• Full Tunnel to Sophos XG

    1
    0 Votes
    1 Posts
    338 Views
    No one has replied
  • IPSEC VPN Windows11

    4
    0 Votes
    4 Posts
    969 Views
    S

    @keyser

    i found the issue after changing the Phase1 settings.
    The CA import from wasn't successful.

    After reimport... all works fine...

    THX for your time and support...

    Stefan

  • 1 Votes
    3 Posts
    1k Views
    Alejo 0A

    We figured it out thus I will be posting our solution here in case anyone finds the same issue in the future.

    Basically once the DoT option is enabled unbound changes behavoir because of the way is implemented in pfSense software. See: https://redmine.pfsense.org/issues/13393

    To make sure enabling DoT works, you should choose specific network interface(s) to which the DNS Resolver will bind when listening for queries from clients and not listening on ALL interfaces, i.e DNS Resolver > Network Interfaces > ALL , which is the default option for pfSense.

    In short changing our DNS Resolver's listening interfaces from ALL to just the LAN, DMZ and localhost solved the issue.

    Hope this helps,

    Alejandro

  • Mobile User VPN failed w/Cert Expired; New Cert doesn't fix

    4
    0 Votes
    4 Posts
    915 Views
    GertjanG

    I'm not an IPSEC expert, never actually used it.

    In your log I could see any 'cert' related errors.
    Only this one :

    @thewaterbug said in Mobile User VPN failed w/Cert Expired; New Cert doesn't fix:

    Aug 15 15:15:36 charon 07[IKE] <93> DH group MODP_2048 inacceptable, requesting MODP_1024

    Who/what is charon ?

  • IPsec Site-to-Site Tunnel Periodically Disconnects/Reconnects

    1
    0 Votes
    1 Posts
    482 Views
    No one has replied
  • Problem with VTI / routed IPSEC + BGP in a hub and spoke arrangement

    2
    0 Votes
    2 Posts
    621 Views
    B

    @bp81

    I solved my own problem, and wanted to record the answer in case others have similar.

    First, my initial assessment that the IP address of a Neighbor entry had to match the Router ID that was set on that neighbor's BGP service was wrong. It didn't work for me initially because I had some other things set wrong.

    Here's how it's now working:

    I setup the IPSEC connection between Hub and Branch 1 as described above. The transit network for this link is 172.16.0.0/30. Hub gets 172.16.0.1, Branch 1 get 172.16.0.2.

    The connection between Hub and Branch 2 is similar. The transit network is set to 172.16.0.4/30. Hub gets 172.16.0.5, Branch 2 gets 172.16.0.6.

    The router ID for all routers is set to the LAN IP address in BGP, NOT the transit network IP address.

    Each Neighbor entry specifies the transit network IP. Ergo, Hub 1 has neigbor entries that specify 172.16.0.2 (Branch 1) and 172.16.0.6 (Branch 2).

    The last setting, and this turned out to be the trick that made it work, is in the Neighbor settings in the Next Hop section. Took me a bit to find and identify this as the solution to my 'chicken and the egg' problem in my OP. In the Next Hop action, I set Next Hop Action to "Set (Peer Only)" and I set Peer to "Peer Address (set only)".

    This setting is what got things going as expected.

    7c08b0b6-27b0-4f6b-9303-d428db2ab2be-image.png

  • IPsec Site-to-Site Tunnel Periodically Disconnects/Reconnects

    1
    0 Votes
    1 Posts
    250 Views
    No one has replied
  • Packet loss using VTI and Tunnel mode

    1
    0 Votes
    1 Posts
    250 Views
    No one has replied
  • Routed IPsec to Azure

    1
    0 Votes
    1 Posts
    634 Views
    No one has replied
  • Multiple sites served by a single P1?

    3
    0 Votes
    3 Posts
    867 Views
    B

    @keyser Oof. Sounds like I'm in unsupported configuration territory here.

    I'll see how it performs in a lab.

  • IPSEC + VTI + IKEV2 - will not auto-reconnect

    26
    0 Votes
    26 Posts
    5k Views
    jimpJ

    @bbrendon said in IPSEC + VTI + IKEV2 - will not auto-reconnect:

    Hi @jimp .

    Regarding the "Keep Alive - Enable periodic keep alive check" option, should that be enabled on both sides or just the side initiating the connection?

    Usually just the side initiating

  • IPSEC between pfsense and Sophos XG

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • A Guide to assign VPN group and User IP Pool from Radius in 22.01/2.6 :-)

    4
    2 Votes
    4 Posts
    1k Views
    keyserK

    @keyser @stephenw10 - I hope this little fix is not forgotten? I have seen no acceptance of the redmine ticket.

  • IP sec site to site and wireguard

    4
    0 Votes
    4 Posts
    630 Views
    J

    @betahelix You say your tried adding a phase 2, did you use the wireguard tunnel network? That's what you would need.
    You can do a packet capture on the remote site and ping from the local. I'm guessing the packets are getting there but don't know how to get back. Adding the tunnel network will fix that.

  • Planning IPSEC changes - dynamic routing questions

    9
    0 Votes
    9 Posts
    1k Views
    T

    @thale
    You are most welcome and good luck with your implementation.
    Happy to provide further feedback on my setup if you have specific questions.

  • Multiple VTI tunnels between sites on HA & multi-WAN routers

    3
    0 Votes
    3 Posts
    507 Views
    T

    @dotdash thanks for the feedback.

    Just to follow up on this in case it helps someone else, I did get this working. I had upgraded my lab routers to 2.6.0 (which it looks like I left out of my original message), and then restored a backup from an earlier version (2.4.5 I think). Either the upgrade or the restore of the previous version's backup seems to have caused this (or the combination). I did a completely fresh install of version 2.6.0 and manually reconfigured it, and I didn't have any more problems.

  • not able to connect site to site vpn between fortigate and pfsense

    Moved
    7
    0 Votes
    7 Posts
    860 Views
    F

    @thale Thanks for giving me time really appreciate ur effort

  • IPSec - Different Routes for different clients

    4
    0 Votes
    4 Posts
    593 Views
    V

    @admiral_ackbar
    Yes, you can have multiple phase 2 for different local subnets.
    I think, that should work with routing the whole upstream traffic for only one subnet.

  • Can't connect IPSec if other IPSec connected

    1
    0 Votes
    1 Posts
    310 Views
    No one has replied
  • IKEV1 Site to Site VPN - Cannot ping Remote Lan

    2
    0 Votes
    2 Posts
    673 Views
    V

    @shahidge4
    The tcpdump from WAN is pretty useless, since the connection is established already.

    Your P2 has a single remote IP. So the VPN will only allow access to this one.
    Do a packet capture on the IPSec interface.

    Ensure that the remote host does not block access from the remote network.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.