• pfsense + 21.02-p1 ipsec problem on SG-7100 1u appliance

    1
    0 Votes
    1 Posts
    303 Views
    No one has replied
  • Multiple IPSEC VPN Tunnels work but new one doesnt...

    1
    0 Votes
    1 Posts
    259 Views
    No one has replied
  • PFSense 2.5 problems with Site-to-Site AWS VPN connection

    7
    0 Votes
    7 Posts
    3k Views
    V

    @jimp -Thanks for solution this seems to have resolved the connectivity issue. I have another issue which is causing IPSec to disconnect. Also ipsec service is not rebooting unless entire pfsense instance is rebooted. but it looks like different issue i'll troubleshoot and raise different thread if required.

    Thank you so much for the help.

  • Can't add second IPSec connection with the same remote gateway

    4
    0 Votes
    4 Posts
    1k Views
    emammadovE

    Thank you for your reply. I upgraded our current pfsense 2.4.5 p1 to 2.5.0, but then ipsec connections don't work and there is nothing in Description tab of Phase 1 any more.

  • Danger of leaked PSK (password) in IPsec tunnel

    2
    0 Votes
    2 Posts
    935 Views
    jimpJ

    The PSK could be used to decrypt traffic if someone can capture packets between the endpoints. A weak key, in theory, could be brute forced. There is a lot of info around about this on the web by people much more familiar with the crypto than I.

    The PSK could also be used by someone in the right position to MITM or intrude over the VPN, but depending on your settings they would likely have to be able to intercept and spoof addresses in between for that to happen. If you have loose/weak P1 settings (e.g. your remote is "any"/0.0.0.0.0 for example) then the danger is increased. As above, weak keys could be brute forced.

    Using certificates is much more secure, as is using strict P1 settings to ensure only specific remotes can connect.

  • mDNS over IPsec

    3
    0 Votes
    3 Posts
    1k Views
    I

    I figured that might be the case. The cloud provider doesn’t natively offer that.

    Would you have any recommendations on being able to run it on the pfSense box itself on the on-prem side?

  • v2.5.0 GRE over IPsec with stateless rule - keeps creating states

    2
    0 Votes
    2 Posts
    487 Views
    M

    I worked around the problem in this particular setup by using Routed (VTI) in the child SA. This was possible because there are pfSense on both sides.

    When using other VPN gateways, sometimes I can't use routed IPsec SA and then it would be nice when GRE over IPsec would just work.

    Kind regards,
    Mathias

  • site to site ipsec pfsense - nethsecurity

    1
    0 Votes
    1 Posts
    309 Views
    No one has replied
  • IPSEC cannot see traffic?

    2
    0 Votes
    2 Posts
    424 Views
    B

    @killmasta93
    ping between FW doesn't work without extra actions.
    see: https://docs.netgate.com/pfsense/en/latest/recipes/ipsec-s2s-psk.html#pfsense-initiated-traffic-and-ipsec

  • IPSEC tunnels monitor issue after updating to 2.5.0

    8
    1 Votes
    8 Posts
    1k Views
    B

    i updated an test pfsense to 2.6 dev version and the problem is solved.

  • This topic is deleted!

    Moved
    0
    0 Votes
    0 Posts
    49 Views
    No one has replied
  • IPsec with parallel EPS and AH phase 2 connections

    1
    0 Votes
    1 Posts
    304 Views
    No one has replied
  • IPsec on 2.5.0 uses first VIP instead of WAN address

    5
    0 Votes
    5 Posts
    739 Views
    H

    I can confirm that saving the WAN interface (without changes) indeed worked as a workaround.

    All is working now. Thank you!

  • IPS/IDS on S2SVPN

    1
    0 Votes
    1 Posts
    353 Views
    No one has replied
  • Mobile IPSec IKEv2 tunnel stops working

    3
    0 Votes
    3 Posts
    533 Views
    RMBR

    I have found the problem;

    https://redmine.pfsense.org/issues/11524

    It is related to the combination of AES-NI and P2 SHA256.

    Temporary workaround: disable AES-NI

    I hope this will be fixed soon!

  • Setting up the pfSense as a mobile client (not as a server)

    3
    0 Votes
    3 Posts
    855 Views
    artooroA

    I was just searching this topic, not for the same use case but to centrally manage a lot of pfSense appliances, I think being able to set them up as IPsec clients with a virtual IP would be useful.
    At this time I have to create a separate tunnel for each managed pfSense, instead of dynamically provisioning virtual IPs via Radius.

    I'm pretty sure the answer is no, and the strongswan virtual IP option cannot be used with pfSense as a client.

  • After upgrade to 2.5.0 IpSec connect button is not working

    Moved
    24
    0 Votes
    24 Posts
    2k Views
    jimpJ

    The difference between those screenshots is the IKE version (IKEv1 vs Auto), the missing field is only valid for IKEv2 (and Auto can use IKEv2). It's not likely to be related to any problem you are seeing.

  • 0 Votes
    1 Posts
    365 Views
    No one has replied
  • parallel encrypted and unencrypted tunnels

    2
    0 Votes
    2 Posts
    497 Views
    E

    @eric-scace Last point: Everything works fine if there is only one Phase 2 definition for the full subnet at each site — except, of course, all traffic gets encrypted.

    Another way of looking at this problem: How does one take a tunnel between two sites that encrypts traffic (10.32.0.0/12 ↔︎ 10.160.0.0/12)... and divert traffic between a specific subset pair of address ranges (source & destination... in this example 10.40.0.0/13 ↔︎ 10.168.0.0/13) to be sent (potentially through a different tunnel) in the clear?

  • FYI - WAN interface wrong after upgrade from 2.4.5 to 2.5

    Moved
    3
    0 Votes
    3 Posts
    623 Views
    D

    @msswift Thank you that fixed it for me too!

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.