• Neighbouring network behind pfsense LAN

    9
    0 Votes
    9 Posts
    893 Views
    V

    My problem was resolved once I have change IP from dynamic to static.
    DHCP was adding some records to arp table which were confusing pfSense.

  • IPSec VPN with windows DHCP

    2
    0 Votes
    2 Posts
    550 Views
    jimpJ

    There isn't a way to do that with IPsec+DHCP. You could setup a RADIUS-based auth method for IPsec and then assign addresses through RADIUS (NPS) on Windows. But not DHCP.

  • IPSEC NAT through virtual subnet

    1
    0 Votes
    1 Posts
    194 Views
    No one has replied
  • Initial site to site IPSEC not working ...

    5
    0 Votes
    5 Posts
    655 Views
    O

    The rules were automatic, the issue was the remote and local identifiers needed to be present. Any / Any did'nt cut it. All sorted although I did'nt find that answered anywhere here.

  • When enabling new ipsec tunnel, cannot connect via openvpn

    2
    0 Votes
    2 Posts
    235 Views
    D

    Please ignore, it was a configuration error during IPsec setup. Incorrect network for remote.

  • IPsec VTI dualstack

    4
    0 Votes
    4 Posts
    451 Views
    dragoangelD

    @jimp /64 in "address" is obvious. No... Will try.

  • IPSec/IKEV2 error "trap not found, unable to acquire reqid"

    17
    0 Votes
    17 Posts
    9k Views
    jimpJ

    @sblinov said in IPSec/IKEV2 error "trap not found, unable to acquire reqid":

    I have updated pfSense to 2.5 dev release and I found some connection issues, can't connect to Ikev2 IPSec mobile users. They are use PSK authentication. I tried different settings and it was ni successful for me.
    @geovaneg @jimp please double check it

    Start your own thread for that, it isn't related to the topic of this thread.

  • Pfsense To CiscoRV042 (IPSEC)

    1
    0 Votes
    1 Posts
    320 Views
    No one has replied
  • IPsec login logs

    6
    0 Votes
    6 Posts
    361 Views
    jimpJ

    Since it's a binary circular log, there is no guarantee about how long any record will be there. They will be rotated out as new entries come in.

    Storing large logs on the firewall is not a good practice. You should setup a dedicated syslog server and have pfSense deliver the logs there, where they can be properly stored/processed/archived.

  • Random issues with IPsec

    10
    0 Votes
    10 Posts
    1k Views
    M

    @marcquark Thanks for the pointed. Have switch from my /30 to the AWS set /30 and gateways are now reachable and monitoring fine!

  • VPN IPSEC Multiple WAN + OSPF (FFR)

    1
    0 Votes
    1 Posts
    137 Views
    No one has replied
  • SSH hanging through IPSEC VPN

    6
    0 Votes
    6 Posts
    941 Views
    Y

    @LucaTNT Thank you for the response.
    I’m not connected with PPPoE but behind a glassfibre box, but I’m having the same problems.

    I am pretty sure, ssh was running fine after the initial setup (few weeks ago). So I have no idea what’s going on now...

  • DNS problem with S2S PFSense IPSec, Azure and OpenVPN

    1
    0 Votes
    1 Posts
    359 Views
    No one has replied
  • Terminate VPN in DMZ or internal network?

    4
    0 Votes
    4 Posts
    1k Views
    R

    It will make more since if you see a diagram. I’ll create one tomorrow morning.

    You don’t need to assign multiple addresses to the same interface.

    In scenario 1, imagine the core edge of your network. Imagine you had multiple firewalls that all needed to share 1 or even 2 WAN connections. How would you go about it?

    A) you put a managed layer 2 switch (I refer to as a wan aggregation switch) at the edge, connect your ISP connections to it via fiber or rj45. Once you do that, you can connect all of your firewalls to the switch and they can share that connection.

    This scenario requires that the Pf sense box has a connection to the WAN separate from your Asa and another connection directly to the ASA.

    We’re using 2 interfaces per host for a total of 4 interfaces. This results in two connections which is why I suggested two /30’s where two interfaces are in one /30 and two interfaces are in the other /30

    B) everything from A, but a router instead of a switch in special cases such as mpls, atm, etc etc.

    There are no overlapping subnets or any interface with multiple IPs on either the ASA or the pfsense host.

    Scenario 1 is for more complex networks. Lol it’s ironic because it’s the easiest scenario. This scenario also accepts incoming client requests directly I.e. client requests do not have to pass through the ASA.

    Scenario 2

    Scenario 2 assumes you have 2 free interfaces on each host. You will connect the Asa and the pfsense host together through these 2 connections directly one to one. Each interface gets a separate /30 in a different network, so no overlapping there.

    Basically you are handing off the vpn function from the Asa to pfsense. In my explanation above, 172.16.99.0 (VPN user subnet) lives on the pfsense box. The Asa does not know about any openvpn or IPSec specifics or any of that. All it knows is that network 172.16.99.0/24 can be reached via pfsense on the green interface with ip 192.168.254.1. A static route accomplishes that (depicted above). Now if we were talking packet inspection... that’s a whole other post hehe

    Scenario 2 is for simpler networks, but a little more complex. All vpn traffic (client requests and authorized vpn user traffic) will pass through your Asa.

    In both scenarios, the ASA is acting as a simple router that is (for our purposes) unaware that 172.16.99.0 vpn user network is a virtual vpn network terminated by pfsense. It only sees it as a vanilla (vanilla meaning plain/ordinary) network living off of an interface like any other.

    I’m sorry if this sounds confusing. It’ll make more since when it’s drawn out on a Visio diagram.

    By chance, are you familiar with Taclanes?

  • IPSEC VPN traffic issue

    1
    0 Votes
    1 Posts
    301 Views
    No one has replied
  • IPSEC / chelsio problem

    1
    0 Votes
    1 Posts
    282 Views
    No one has replied
  • IPsec between pfSense and edgerouter

    1
    0 Votes
    1 Posts
    267 Views
    No one has replied
  • Entire PF host locks up when changing VTI MTU

    1
    0 Votes
    1 Posts
    271 Views
    No one has replied
  • My battle with Site-to-Site IPSEC (VTI): A tutorial of sorts

    1
    3 Votes
    1 Posts
    1k Views
    No one has replied
  • IPsec Mobile Clients don't receive traffic seen on IPsec interface

    1
    0 Votes
    1 Posts
    229 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.