• 0 Votes
    2 Posts
    511 Views
    M
    I also found out that in /etc/inc/ipsec.inc the search domain attribute property key was changed from 28674 to 27674. In this commit: https://github.com/pfsense/pfsense/commit/3a0f6f3609dcb50e3ba927a743fb9f1990a48181 new if (!empty($a_client['dns_domain'])) { $ssconf['charon']['plugins']['attr'][] = "# Search domain and default domain"; $ssconf['charon']['plugins']['attr']['27674'] = "\"{$a_client['dns_domain']}\""; if (empty($a_client['dns_split'])) { $ssconf['charon']['plugins']['attr']['27675'] = "\"{$a_client['dns_domain']}\""; } } old if (!empty($a_client['dns_domain'])) { $pool_common[] = "# Search domain and default domain"; $pool_common['28674'] = "\"{$a_client['dns_domain']}\""; if (empty($a_client['dns_split'])) { $pool_common['28675'] = "\"{$a_client['dns_domain']}\""; } } I think this is also wrong, i've tried to change it but without any effect.
  • Missing Configuration Name

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • PFSense 2.6.0 VPN IPsec behind NAT Firewall issues

    5
    0 Votes
    5 Posts
    2k Views
    E
    @topogigio In terms of Bell admitting to anything, good luck with that! It's not like Bell is connected to us directly, our ISP is. They (Bell) will not admit to them... Imagine us. Our location REALLY limits the choice of providers; we're lucky enough that they can provide service @ 1Gbps. The tunnel @ 300Mbps is fine with day-to-day operations, but backups between sites are handled differently (Which was the big headache) as we encrypt the stuff with Veeam and carry it with our QNAPs HBS3 sync functions (With SSL encryption on) out of the IPSec tunnel (Thus at high speed). In terms of the expectations for the 100E, it is way over 300Mbps for IPSec; granted it's not 4Gbps or something with very small packets (In reference to the specs), but it's over 300. We were able to go as high as 740Mbps with a non-throttling ISP...
  • IPSec before Windows login

    vpn ipsec
    1
    0 Votes
    1 Posts
    505 Views
    No one has replied
  • 0 Votes
    3 Posts
    583 Views
    I
    I had this problem also after setting up the same config, rebooting pfsense corrected this, restarting ipsec may work also. i think it needed a restart to re-read son configs.
  • routing ipsec /wireguard

    7
    0 Votes
    7 Posts
    1k Views
    J
    @betahelix So now there's an OpenVPN tunnel too? Can you show the actually topology of both sites? When I have VPN issues I always use the Packet Capture under Diagnostics menu. Try that on the 2100 while pinging from the WireGuard clients.
  • IPSEC - Packets do not enter tunnel

    6
    0 Votes
    6 Posts
    844 Views
    M
    @michmoor said in IPSEC - Packets do not enter tunnel: @manzanoso correction you dont need a static route per se. what is the status of the tunnel? Status > IPsec [image: 1657216020303-1864035e-d178-4cef-844d-ccf752656278-image.png] What I could identify is that when the notebook is on the 192.168.150 network, I can transfer packets on the VPN, however, when the notebook is on the 172.23.0 network it does not work. I'm using a nat for output which is what is needed for the other end of the VPN. [image: 1657215918309-06400ac3-3060-49a2-a600-a536a339d54c-image.png]
  • 0 Votes
    1 Posts
    336 Views
    No one has replied
  • DNS over IPSEC VPN

    6
    0 Votes
    6 Posts
    2k Views
    J
    @bingo600 Excellent, thank you. The remote server now sees the domain controller on the other side of the IPSEC VPN. [image: 1657204074087-pfsense.jpg]
  • Mobile clients have no access to other site

    2
    0 Votes
    2 Posts
    482 Views
    V
    @mrv0 said in Mobile clients have no access to other site: Site-to-site at Site A: (The tunnel is disabled in the image because I am having this problem) But this P2 is needed to connect the remote network with the mobile clients. Also you need an additional P2 at B with the LAN as local and the A sites mobile pool as remote network.
  • 0 Votes
    5 Posts
    756 Views
    M
    Hi guys, First of all, sorry for my own self reply and thank you for your responses... I'm just very frustated. I've been creating VPNs to Oracle for some years now (even with pfSense Tunnel and VTI with other softwares) but pfSense VTI has never been an option for some reasons. This time I wanted to give a try. I have just undone everything and just given up pfSense. Firstly I went back to the usual Tunnel IPSEC that works as expected. No modifications are needed to make it work on Oracle's side so the problem might/may/must be related to pfSense. If you guys had some links to post here I'll read them all to try to find out what I've done wrong. I followed this guide https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/routed-vti.html and another thousand recipes available on the net. Not even the gateway monitoring works !!!! What on earth could be impeding the gateway monitor to work ?? I know many of you have this setup working but as far as I could find there are a lot of complaints like mine. I must be having a bad week, even posting to this forum is really hard.... akismet keeps telling my post is a SPAM :\ lost good 60 minutes trying to post.... I was trying to ask about the gateway monitoring thing. I have just given up. As you've said, this is a community forum and I should really no wait so much of it although it has already helped me lots of time (thanks guys). When I get my patience back I will try again. Thanks you, Marcus
  • pfSense to Ubiquiti IPSec P2P Tunnel

    1
    0 Votes
    1 Posts
    341 Views
    No one has replied
  • Trouble with P2 tunnel, missing packages?

    1
    0 Votes
    1 Posts
    326 Views
    No one has replied
  • Will "duplicated" IPsec tunnel work as failover ?

    4
    0 Votes
    4 Posts
    780 Views
    B
    @jimp Thank you for your clarification. You saved me time on testing this. I guess I have to try a more difficult way. @luckman212 I found the same tutorial, it looks like it describes pretty much the steps we need to go through to set up dual-wan.
  • IPsec between sites painfully slow

    2
    0 Votes
    2 Posts
    708 Views
    G
    @unsichtbarre Install the iperf package at both ends. Use that to determine what your baseline end to end speed really is. Now run it over your ipsec tunnel. If there is a substantial difference then that needs looking into.
  • IPSec local network subnet size and NAT size error

    22.01 2.6
    8
    0 Votes
    8 Posts
    2k Views
    M
    @derelict said in IPSec local network subnet size and NAT size error: @mamawe As far as I know that type of NAT has never been valid on an IPsec tunnel. You can do 1:1 or Many:1 but not Many:Some_Other_Size_Many. Maybe it wasn't clear from my answer. I used Many:1-NAT and 1 address for our side of the VPN traffic selector. The last two sentences referred to the peer VPN gateway. Some implementations allow to negotiate a smaller traffic selector in phase 2 as was configured (1 address instead of a subnet). With these you don't have to change anything at the peer VPN gateway. If the peer VPN gateway insists on using the correct traffic selector, you have to have the peer VPN configuration changed.
  • asus merlin PF sense site-to-site

    2
    0 Votes
    2 Posts
    479 Views
    R
    @betahelix Possibly What does the ASUS documentation say about S2S? What configuration attempts have you done? What do the logs show when you try it?
  • RDP over IPSec through TPLink

    2
    0 Votes
    2 Posts
    555 Views
    D
    Figured it out. I had to create a firewall rule on the Netgate to allow traffic from the TPLink LAN Network exclusively. I had thought using the "LAN net" as the source would suffice, guess not.
  • VPN IPSEC IKEv2 Client Not Working

    1
    0 Votes
    1 Posts
    451 Views
    No one has replied
  • Issue with ipsec routing.

    2
    0 Votes
    2 Posts
    622 Views
    V
    @frika Issue with ipsec routing Maybe you can tell us some more details about your IPSec connection? Which machines are these? Both pfSense? Routed IPSec or traditional phase 2? What shows Status > IPSec? Show the config.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.