• 2.5.2 Update has broken Mobile Client IPSec

    ipsec mobile
    4
    1
    0 Votes
    4 Posts
    1k Views
    L
    https://forum.netgate.com/topic/163221/constraint-check-failed-rule_crl_validation-is-stale-but-requires-at-least-good/3 Same issue as this one, which had no responses. @lst_hoe
  • IPSEC PHASE 2 Add 2 PFS KEY GROUP

    1
    0 Votes
    1 Posts
    356 Views
    No one has replied
  • VPN IP Sec with VPN Client by connect a other FW Meraki

    1
    0 Votes
    1 Posts
    289 Views
    No one has replied
  • Pfsense 2.5.2 - split-tunneling issue using windows clients

    4
    0 Votes
    4 Posts
    1k Views
    S
    @periko I would like to know if it is planned to add route pushing to Windows clients using DHCP option? Thanks.
  • IPsec tunnel with FQDN identifiers and "DNS on one site down" scenario

    2
    0 Votes
    2 Posts
    543 Views
    E
    @jimp I'd love to see an opinion from Netgate about this scenario when you got some time; can't be that I'm the only one running site to site IPsec tunnels with dynamic IPs and FQDNs as identifiers.
  • VTI interfaces 21.05.x MTU MSS

    1
    0 Votes
    1 Posts
    386 Views
    No one has replied
  • TAP mode possible w/ ipsec?

    1
    0 Votes
    1 Posts
    437 Views
    No one has replied
  • pfSense IPsec Microsoft Azure MTU

    13
    0 Votes
    13 Posts
    7k Views
    R
    @rai80 Thank you - I saw that bug report but still couldn't get things working. However, on this thread @stephenw10 answered a general query I had about PMTUD not appearing to work. It seems that PMTUD with policy-based IPSec does not work, but it does work with route-based IPSec. In my case, I have been using a policy-based IPSec tunnel. As soon as I set up route-based IPSec (with static routes at the moment, but I'm sure BGP will work too) then my RADIUS/EAP-TLS issue disappeared - and with scrubbing enabled (i.e. default pfSense settings).
  • 1 Votes
    18 Posts
    4k Views
    S
    @tomwork Thank you for sharing this great script, we have the same problem with the AWS tunnels ;-) We have a CARP HA setup and wanted to have it on both nodes. Therefore we need a check, that the script only starts down tunnels only if the CARP state is MASTER and is not active on the BACKUP node. Here it is - there may be better solutions but it works #!/bin/sh # check for MASTER master=`ifconfig | grep "carp: MASTER"` if [ -z "$master" ]; then echo "CARP Backup => exit script" exit; fi echo "CARP Master verifying IPSec tunnels..." tunnels=$( /usr/local/sbin/ipsec statusall | /usr/bin/grep dpddelay | /usr/bin/cut -d':' -f1 | /usr/bin/tr -d ' ' ) for i in $tunnels; do if /usr/local/sbin/ipsec status $i | /usr/bin/grep -q 'no match'; then echo "tunnel $i down" /usr/local/sbin/ipsec up $i fi
  • clear text packets dropped

    7
    1
    0 Votes
    7 Posts
    1k Views
    R
    Much obliged !
  • ikev2 windows inbuilt EAP-RADIUS vpn is not working.

    2
    1
    0 Votes
    2 Posts
    503 Views
    R
    @nikhilsalunke Is it possibly linked to this? https://forum.netgate.com/topic/89558/ipsec-pmtu/17?_=1634945881916 EAP / RADIUS can cause UDP packets that need to be fragmented and relies on PMTUD working.
  • Migrate VPN tunnel

    1
    0 Votes
    1 Posts
    409 Views
    No one has replied
  • High CPU usage

    3
    1
    0 Votes
    3 Posts
    630 Views
    M
    @steveits Thank you very much, I just changed the setting. Let's see if that helps. Seems this issue pops up after some days or running. I appreciate such fast response.
  • IPSec VPN PFSense and Palo Alto

    1
    0 Votes
    1 Posts
    899 Views
    No one has replied
  • Mobile VPN routing to local network

    1
    0 Votes
    1 Posts
    328 Views
    No one has replied
  • Best solution Road warrior to IPSec SITE toSITE

    2
    0 Votes
    2 Posts
    418 Views
    R
    The 1 step was to push this config to clients, so the packet on VPN ipse is routed inside the Open VPN tunnel [image: oC3sEPA.png] Under local networks there are : Lan, the remote net identified in phase2 n.1 the remote net identified in phase2 n.2
  • Running two IPSEC tunnels between two multi-wan sites

    2
    0 Votes
    2 Posts
    564 Views
    jimpJ
    You can't do that with policy-based tunnels. You have two choices: Keep the policy-based tunnels and setup Dynamic DNS and gateway groups on both sides so that if a WAN fails, the switches the hostname and single IPsec tunnel to the other WAN. This works, but takes a long time to switch since it relies on DNS (several minutes, most likely) Ditch the policy-based tunnels and use VTI. Configure two tunnels (1.1.1.1<->3.3.3.3, 2.2.2.2<->4.4.4.4) and use FRR with either OSPF or BGP to handle the routing. When setup properly, dynamic routing protocols are smart enough to detect when a path is down and use the other alternate path in a timely manner.
  • VPN SITE to SITE with NAT

    6
    0 Votes
    6 Posts
    1k Views
    R
    Strange i had to add a rule tha is not generating any traffic. [image: Z2F2FjI.png] it is not generating any traffic but a big amount of evaluation. I'll try later to disable it. Other params are ok.
  • Poor performance Starlink/IP6 endpoint routing ip4

    5
    5
    0 Votes
    5 Posts
    1k Views
    T
    In the end I switched over to WireGuard - smashing it in around 6-8 MB/s. Tried everything with IPSec but gave up. I think I might have to investiage Wireguard further and switch the other VPNS over too.. The WireGuard seems to really forgiving of the StarLink latency/dropped packets. Here is a file copy from a remote server to local along with 20x robocopy in the background doing file compares (no actual transfers) [image: 1634368161001-fc.jpg] [image: 1634368165462-wg.jpg]
  • Possible bug report

    dns resolution ipsec
    2
    1 Votes
    2 Posts
    952 Views
    B
    @bp81 I believe we have found the resolution, and I wanted to post it here for anyone else encountering the issue. In our DNS forwarder, we had a domain override set for our company's domain. This is the same domain in the hostname for the remote gateway listed above. The domain override was pointing at a DNS server that is not accessible without the tunnel up. Clearly this was causing the IPSec service to fail repeatedly to establish its tunnel. So there was a misconfiguration on our part which we have fixed. I still maintain that it's a bug if the ipsec service causes the web gui to crash / become unresponsive even when it's a self induced failure state due to misconfiguration. I understand it's possible this may be a limitation of the ipsec service, but it is worth looking at even if it is an edge case.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.