• IPSec only one phase 2 working

    5
    0 Votes
    5 Posts
    803 Views
    M
    @spearhead1 As you say that both phase 2 SA are connected, can you see packets going out when you go to Status / IPsec / Overview and click on + Show chiild SA entries? If not, can you see the unencrypted traffic coming from 10.225.172.0/24 in a packet capture? If yes, can you confirm that this is the right traffic by doing a packet capture on the IPsec interface?
  • 0 Votes
    3 Posts
    1k Views
    S
    @rex2020 as a quick workaround, i muted all logging controls by setting them to silent: [image: 1636650955367-a9470e32-0f66-44fc-a0b0-80d3faca2e9f-grafik.png]
  • 2.5.2 Update has broken Mobile Client IPSec

    ipsec mobile
    4
    0 Votes
    4 Posts
    977 Views
    L
    https://forum.netgate.com/topic/163221/constraint-check-failed-rule_crl_validation-is-stale-but-requires-at-least-good/3 Same issue as this one, which had no responses. @lst_hoe
  • IPSEC PHASE 2 Add 2 PFS KEY GROUP

    1
    0 Votes
    1 Posts
    342 Views
    No one has replied
  • VPN IP Sec with VPN Client by connect a other FW Meraki

    1
    0 Votes
    1 Posts
    277 Views
    No one has replied
  • Pfsense 2.5.2 - split-tunneling issue using windows clients

    4
    0 Votes
    4 Posts
    952 Views
    S
    @periko I would like to know if it is planned to add route pushing to Windows clients using DHCP option? Thanks.
  • IPsec tunnel with FQDN identifiers and "DNS on one site down" scenario

    2
    0 Votes
    2 Posts
    506 Views
    E
    @jimp I'd love to see an opinion from Netgate about this scenario when you got some time; can't be that I'm the only one running site to site IPsec tunnels with dynamic IPs and FQDNs as identifiers.
  • VTI interfaces 21.05.x MTU MSS

    1
    0 Votes
    1 Posts
    352 Views
    No one has replied
  • TAP mode possible w/ ipsec?

    1
    0 Votes
    1 Posts
    399 Views
    No one has replied
  • pfSense IPsec Microsoft Azure MTU

    13
    0 Votes
    13 Posts
    6k Views
    R
    @rai80 Thank you - I saw that bug report but still couldn't get things working. However, on this thread @stephenw10 answered a general query I had about PMTUD not appearing to work. It seems that PMTUD with policy-based IPSec does not work, but it does work with route-based IPSec. In my case, I have been using a policy-based IPSec tunnel. As soon as I set up route-based IPSec (with static routes at the moment, but I'm sure BGP will work too) then my RADIUS/EAP-TLS issue disappeared - and with scrubbing enabled (i.e. default pfSense settings).
  • 1 Votes
    18 Posts
    3k Views
    S
    @tomwork Thank you for sharing this great script, we have the same problem with the AWS tunnels ;-) We have a CARP HA setup and wanted to have it on both nodes. Therefore we need a check, that the script only starts down tunnels only if the CARP state is MASTER and is not active on the BACKUP node. Here it is - there may be better solutions but it works #!/bin/sh # check for MASTER master=`ifconfig | grep "carp: MASTER"` if [ -z "$master" ]; then echo "CARP Backup => exit script" exit; fi echo "CARP Master verifying IPSec tunnels..." tunnels=$( /usr/local/sbin/ipsec statusall | /usr/bin/grep dpddelay | /usr/bin/cut -d':' -f1 | /usr/bin/tr -d ' ' ) for i in $tunnels; do if /usr/local/sbin/ipsec status $i | /usr/bin/grep -q 'no match'; then echo "tunnel $i down" /usr/local/sbin/ipsec up $i fi
  • clear text packets dropped

    7
    0 Votes
    7 Posts
    950 Views
    R
    Much obliged !
  • ikev2 windows inbuilt EAP-RADIUS vpn is not working.

    2
    0 Votes
    2 Posts
    462 Views
    R
    @nikhilsalunke Is it possibly linked to this? https://forum.netgate.com/topic/89558/ipsec-pmtu/17?_=1634945881916 EAP / RADIUS can cause UDP packets that need to be fragmented and relies on PMTUD working.
  • Migrate VPN tunnel

    1
    0 Votes
    1 Posts
    373 Views
    No one has replied
  • High CPU usage

    3
    0 Votes
    3 Posts
    578 Views
    M
    @steveits Thank you very much, I just changed the setting. Let's see if that helps. Seems this issue pops up after some days or running. I appreciate such fast response.
  • IPSec VPN PFSense and Palo Alto

    1
    0 Votes
    1 Posts
    875 Views
    No one has replied
  • Mobile VPN routing to local network

    1
    0 Votes
    1 Posts
    296 Views
    No one has replied
  • Best solution Road warrior to IPSec SITE toSITE

    2
    0 Votes
    2 Posts
    388 Views
    R
    The 1 step was to push this config to clients, so the packet on VPN ipse is routed inside the Open VPN tunnel [image: oC3sEPA.png] Under local networks there are : Lan, the remote net identified in phase2 n.1 the remote net identified in phase2 n.2
  • Running two IPSEC tunnels between two multi-wan sites

    2
    0 Votes
    2 Posts
    512 Views
    jimpJ
    You can't do that with policy-based tunnels. You have two choices: Keep the policy-based tunnels and setup Dynamic DNS and gateway groups on both sides so that if a WAN fails, the switches the hostname and single IPsec tunnel to the other WAN. This works, but takes a long time to switch since it relies on DNS (several minutes, most likely) Ditch the policy-based tunnels and use VTI. Configure two tunnels (1.1.1.1<->3.3.3.3, 2.2.2.2<->4.4.4.4) and use FRR with either OSPF or BGP to handle the routing. When setup properly, dynamic routing protocols are smart enough to detect when a path is down and use the other alternate path in a timely manner.
  • VPN SITE to SITE with NAT

    6
    0 Votes
    6 Posts
    1k Views
    R
    Strange i had to add a rule tha is not generating any traffic. [image: Z2F2FjI.png] it is not generating any traffic but a big amount of evaluation. I'll try later to disable it. Other params are ok.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.