• pfsense ipsec browser lan problem

    1
    0 Votes
    1 Posts
    238 Views
    No one has replied
  • 0 Votes
    2 Posts
    349 Views
    CodeNinjaC
    UPDATE: I think it may good to know that each IPSec network has its own ip range, 10.130.x.0/24 where x is unique for each site. The phase 2 are currently running in "Tunnel IPv4" modus. When possible, we want to keep using 1 network for each site. I mean, not 1 network for router-to-router and another one for the network of the site them selve. I'm not sure if this is possible as i may need to change the IPsec P2 mode??? An example of my IPSec configuration which is similar for each site. IPSec examples.txt
  • Pfsense with fritzbox ipsec client

    1
    0 Votes
    1 Posts
    234 Views
    No one has replied
  • Different Virtual IP Pool Mobile VPN users

    1
    0 Votes
    1 Posts
    266 Views
    No one has replied
  • AZURE Pfsense IPsec tunnel

    1
    0 Votes
    1 Posts
    350 Views
    No one has replied
  • Inbound ACK to IPSEC interface blocked

    1
    2
    0 Votes
    1 Posts
    181 Views
    No one has replied
  • Random port during VPN IPsec communication

    1
    3
    0 Votes
    1 Posts
    403 Views
    No one has replied
  • Bandwidth IPSEC / AES-NI / Bad perf

    9
    0 Votes
    9 Posts
    1k Views
    N
    @Yazur said in Bandwidth IPSEC / AES-NI / Bad perf: Are our P1 and P2 configurations good? I can only note they do not match mine exactly, but I do not know if they are wrong and if they should be working or not. I only know that my exact settings works. :-/
  • Mobile IPsec VPN and Group Rules

    2
    0 Votes
    2 Posts
    371 Views
    keyserK
    Hmm, not much response on this issue... I have been doing a lot of further investigation, and it seems it's impossible to do any kind of firewall filtering based on users/groups if you are using Mobile IPsec VPN. I'm very disappointed by this as Mobile IPsec VPN has the MAJOR advantage it works with the built in VPN client in Windows, MacOS, iOS, Android.... There are some "workarounds" if you start using OPENvpn instead, but even that is not implemented very effectively. You either have to send ACL rules from Radius, or assign static IP's/user, or implement several OPENvpn instances (Each with it's own Firewall ruleset, and assign users to the fitting OPENvpn instance). Quite choking that pfSense does not have a mobile VPN solution that supports user/group based rules.... Feature request: How about implementing a little service that add's a clients VPN ipaddress to a builtin FW Alias group if the user authenticated with a user belonging to a usergroup? Then we could make VPN usergroup firewall rules by using aliases as usual. If this was done upon VPN connect, and removed on VPN disconnect (needs a bit of state handling as well), it should work regardless if the user authenticates with a local database user, or via a Radius user if the Radius returns the groupname with CLASS attribute.
  • ipse pfsense asa with 2 local networks

    1
    0 Votes
    1 Posts
    234 Views
    No one has replied
  • IPsec Phase 1 wont come up

    1
    0 Votes
    1 Posts
    273 Views
    No one has replied
  • Resolve hostnames over IPsec site-to-site

    1
    0 Votes
    1 Posts
    258 Views
    No one has replied
  • No Route to Virtual Pool

    4
    0 Votes
    4 Posts
    639 Views
    DaddyGoD
    @vvasilev said in No Route to Virtual Pool: No, I didn't mean routed IPSec. Nice... Many times a full "states" killing is enough
  • IPSEC HTTP/HTTPS on the end not reachable.....

    2
    0 Votes
    2 Posts
    187 Views
    M
    Play around with TCP MSS clamping. Start with a relatively safe, low value like 1350. If you use VTI, check your MTUs aswell.
  • IPSEC VTI Iperf3 and UDP troubleshooting

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Ipsec roblem

    1
    0 Votes
    1 Posts
    306 Views
    No one has replied
  • 0 Votes
    1 Posts
    227 Views
    No one has replied
  • Multiple IPsec Phase2 connections - No link

    2
    1
    0 Votes
    2 Posts
    330 Views
    P
    as jimp wrote, set your tunnel to the following modes: Side 1: IKEv2, Rekey configured, Reauth disabled, child SA close action set to restart/reconnect Side 2: IKEv2, Rekey configured, Reauth disabled, responder only set, child SA close action left at default (clear) See also: https://redmine.pfsense.org/issues/10176
  • Can IPSec ePDG WiFi Calling be routed via more secure VPN protocols?

    1
    0 Votes
    1 Posts
    450 Views
    No one has replied
  • IPsec Failover

    1
    0 Votes
    1 Posts
    326 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.