• Pfsense To CiscoRV042 (IPSEC)

    1
    6
    0 Votes
    1 Posts
    345 Views
    No one has replied
  • IPsec login logs

    6
    0 Votes
    6 Posts
    400 Views
    jimpJ
    Since it's a binary circular log, there is no guarantee about how long any record will be there. They will be rotated out as new entries come in. Storing large logs on the firewall is not a good practice. You should setup a dedicated syslog server and have pfSense deliver the logs there, where they can be properly stored/processed/archived.
  • Random issues with IPsec

    10
    0 Votes
    10 Posts
    2k Views
    M
    @marcquark Thanks for the pointed. Have switch from my /30 to the AWS set /30 and gateways are now reachable and monitoring fine!
  • VPN IPSEC Multiple WAN + OSPF (FFR)

    1
    0 Votes
    1 Posts
    148 Views
    No one has replied
  • SSH hanging through IPSEC VPN

    6
    0 Votes
    6 Posts
    1k Views
    Y
    @LucaTNT Thank you for the response. I’m not connected with PPPoE but behind a glassfibre box, but I’m having the same problems. I am pretty sure, ssh was running fine after the initial setup (few weeks ago). So I have no idea what’s going on now...
  • DNS problem with S2S PFSense IPSec, Azure and OpenVPN

    1
    1
    0 Votes
    1 Posts
    412 Views
    No one has replied
  • Terminate VPN in DMZ or internal network?

    4
    0 Votes
    4 Posts
    1k Views
    R
    It will make more since if you see a diagram. I’ll create one tomorrow morning. You don’t need to assign multiple addresses to the same interface. In scenario 1, imagine the core edge of your network. Imagine you had multiple firewalls that all needed to share 1 or even 2 WAN connections. How would you go about it? A) you put a managed layer 2 switch (I refer to as a wan aggregation switch) at the edge, connect your ISP connections to it via fiber or rj45. Once you do that, you can connect all of your firewalls to the switch and they can share that connection. This scenario requires that the Pf sense box has a connection to the WAN separate from your Asa and another connection directly to the ASA. We’re using 2 interfaces per host for a total of 4 interfaces. This results in two connections which is why I suggested two /30’s where two interfaces are in one /30 and two interfaces are in the other /30 B) everything from A, but a router instead of a switch in special cases such as mpls, atm, etc etc. There are no overlapping subnets or any interface with multiple IPs on either the ASA or the pfsense host. Scenario 1 is for more complex networks. Lol it’s ironic because it’s the easiest scenario. This scenario also accepts incoming client requests directly I.e. client requests do not have to pass through the ASA. Scenario 2 Scenario 2 assumes you have 2 free interfaces on each host. You will connect the Asa and the pfsense host together through these 2 connections directly one to one. Each interface gets a separate /30 in a different network, so no overlapping there. Basically you are handing off the vpn function from the Asa to pfsense. In my explanation above, 172.16.99.0 (VPN user subnet) lives on the pfsense box. The Asa does not know about any openvpn or IPSec specifics or any of that. All it knows is that network 172.16.99.0/24 can be reached via pfsense on the green interface with ip 192.168.254.1. A static route accomplishes that (depicted above). Now if we were talking packet inspection... that’s a whole other post hehe Scenario 2 is for simpler networks, but a little more complex. All vpn traffic (client requests and authorized vpn user traffic) will pass through your Asa. In both scenarios, the ASA is acting as a simple router that is (for our purposes) unaware that 172.16.99.0 vpn user network is a virtual vpn network terminated by pfsense. It only sees it as a vanilla (vanilla meaning plain/ordinary) network living off of an interface like any other. I’m sorry if this sounds confusing. It’ll make more since when it’s drawn out on a Visio diagram. By chance, are you familiar with Taclanes?
  • IPSEC VPN traffic issue

    1
    1
    0 Votes
    1 Posts
    340 Views
    No one has replied
  • IPSEC / chelsio problem

    pfsense
    1
    0 Votes
    1 Posts
    293 Views
    No one has replied
  • IPsec between pfSense and edgerouter

    1
    0 Votes
    1 Posts
    293 Views
    No one has replied
  • Entire PF host locks up when changing VTI MTU

    1
    0 Votes
    1 Posts
    300 Views
    No one has replied
  • My battle with Site-to-Site IPSEC (VTI): A tutorial of sorts

    1
    3 Votes
    1 Posts
    2k Views
    No one has replied
  • IPsec Mobile Clients don't receive traffic seen on IPsec interface

    1
    4
    0 Votes
    1 Posts
    279 Views
    No one has replied
  • NAT with multiple Phase2 entries does not seem to work correctly

    3
    2
    0 Votes
    3 Posts
    297 Views
    M
    I am seeing the same thing here. I have the split connections box checked. Remote side has x8 P2's to our side which has x1 NAT'd IP Tunnel will come up with all x8 P2's up and working... after a period of time one or two or three will disappear and will not show in IPSEC status as a child that is down. I also note that the widget in the portal does not display the correct number of tunnels that are up and active. ver 2.4.5 rel + XG1537HA
  • Multiple Phase2 entries does not seem to work in IPSec.

    4
    0 Votes
    4 Posts
    671 Views
    S
    @jimp said in Multiple Phase2 entries does not seem to work in IPSec.: uld try it again but use a unique value corresponding to e 172.31.1.60 and 10.10.10.1 ip for lan interfaces 172.31.1.91<Nat>10.255.68.201
  • One static, 1 dynamic address ...

    2
    0 Votes
    2 Posts
    332 Views
    O
    OK. For anyones interest this does work. 1 - Turn off automatic firewall creation on the pfsense. 2 - Set the wan address in phase 1 to 0.0.0.0 3 - In phase 1 advanced select responder only. 4 - Create any/any firewall rule in IPSEC rules. 5 - Create UDP/500, UDP4500 and ESP all rules. And we have sucess, thanks in no small part to some very patient support staff.
  • ipsec rsa auth issue

    Moved
    5
    0 Votes
    5 Posts
    499 Views
    jimpJ
    No, It's me stating that it works fine for myself and others, and requesting more information (which you still did not provide). If you give us enough information to help, we can help, but so far you have not given us anything to go on. We need details, such as logs and specifics about your configuration (like screenshots).
  • DNS IPSEC

    1
    0 Votes
    1 Posts
    277 Views
    No one has replied
  • OPENVPN and IPSEC on same pfsense SG3100 ?

    3
    0 Votes
    3 Posts
    253 Views
    O
    @Rico thanks, that will mean my problems are elsewhere !
  • DNS not working for Ipsec clients

    2
    0 Votes
    2 Posts
    198 Views
    C
    @cre8toruk Duh.. added UDP any any on the ipsec interface and voila ! Schoolboy error there ! :-)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.