• IPSEC Mobile VPN routing all traffic down another IPSEC tunnel.

    2
    0 Votes
    2 Posts
    343 Views
    jimpJ
    Is the site-to-site tunnel using IKEv2? If so, check the "split connections" box in the P1 settings.
  • VPN IPSec iOS 13 VPN on Demand from App

    3
    5
    0 Votes
    3 Posts
    409 Views
    ?
    Tutorial: https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/configuring-an-ipsec-remote-access-mobile-vpn-using-ikev1-xauth.html but i had to change some options: [image: 1583178397196-ios13.jpg] [image: 1583178401665-ios132.jpg]
  • NAT/BINAT

    8
    0 Votes
    8 Posts
    2k Views
    M
    I think I found the solution ! In the outbound NAT. I'll check.
  • Multi Site Multi WAN Multi VPN - Help Please

    1
    0 Votes
    1 Posts
    238 Views
    No one has replied
  • Draytek on dynamic IP to pfSense on static IP VPN?

    1
    1 Votes
    1 Posts
    184 Views
    No one has replied
  • 0 Votes
    1 Posts
    279 Views
    No one has replied
  • No connection to IPSec

    2
    0 Votes
    2 Posts
    221 Views
    F
    Sigh, ignore this post...it looks like the router I'm using doesn't support IPSec.
  • IPSec tunnels work for several hours to days but then stop routing traffic

    10
    0 Votes
    10 Posts
    3k Views
    D
    @nbegley I'm not sure why you disable PFS Disable Rekey Disable Reauth or set Responder Only. The more change you make to pfSense's default settings the less chance you'll keep tunnels connected. According to my test (10 years ago), Draytek is compatible to pfSense, but I suggest you do your own interoperability test. -- Set margin time = 30s. -- Set short lifetime, like 30m Phase 1 and 15m Phase 2. -- Do not set Responder Only. Don't Disable Reauth, Disable Rekey or turn off PFS. -- (Just for the purpose of testing) Use different ciphersuit for Phase 1 and Phase 2 (say, DH group 15 and 14 respectively). If the tunnel can't be established or stops working after 1h, problem is yours. If it stops after 2 days, go after your ISP.
  • RRAS to pfSense on Azure VM. no virtual IP found for %any

    1
    0 Votes
    1 Posts
    467 Views
    No one has replied
  • 0 Votes
    1 Posts
    237 Views
    No one has replied
  • Ikev2 eap-mschapv2 on multiple interfaces? Possible?

    2
    0 Votes
    2 Posts
    713 Views
    F
    Hello, Thread necromancer here with the same question. I have successfully followed this guide: https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/configuring-an-ipsec-remote-access-mobile-vpn-using-ikev2-with-eap-mschapv2.html#Create_Client_Pre-Shared_Keys, and have had an IKEv2 P1 setup for years. I have a segmented network and allowing LAN access to loop back to the WAN interface was creating odd exceptions that allow a LAN user to have access to services that would be blocked by normal WAN rules, so I explicitly block LAN to WAN_address from a floating rule. I now want to allow IKEv2 from LAN into secure segments but I can only bind my P1 to one interface. No worries. I got to setup a second P1 on accessible interface and run into the same thing as the OP. I presented with a 'remote gateway address' option and no EAP options. It's as if pfSense is presuming any additional P1 are always going to be a client as a oppose to the already created server. I may be thinking about this wrong, any help appreciated.
  • Masquerade two different local nets into IPSEC tunnel [solved]

    4
    1
    0 Votes
    4 Posts
    735 Views
    iorxI
    Hi, almost cross posting here . Because this need some visibility so other don't have to waste hours finding out that Cisco may needs this option with multiple phase 2 for a stable connection. Ref: https://forum.netgate.com/topic/132546/ipsec-phase2-problem-pfsense-checkpoint a slight hijack of this thread from me. Split Connection was the solution to my problems too. IKE2, multiple phase 2 and Cisco ASA don't play well together (single phase 2 had no problems). This particular connection has now bean stable, 14h and counting. Brgs,
  • IPSec phase2 problem - pfSense - Checkpoint

    10
    1
    0 Votes
    10 Posts
    2k Views
    iorxI
    Hi ladies and germs. Split Connection was the solution to my problems. IKE2, multiple phase 2 and Cisco ASA don't play well together (single phase 2 had no problems). Split Connection is what got my connection stable, 14h and counting now. A link from the pfsense UI to the docs or a hint in the description on the option that Cisco probably needs this when running multiple phase 2 had been very helpful and saved me a couple of hours. Brgs,
  • Active Phase 2s do not match traffic flowing across tunnel

    1
    0 Votes
    1 Posts
    227 Views
    No one has replied
  • duplicate tunnels

    10
    0 Votes
    10 Posts
    596 Views
    B
    I'm going to have to google some of the things you talked about. I set reauth = no and rekey = no. Its been about 2 days and do far so good no reboots needed and no duplicate tunnels creeping up.
  • pfSense to Sonicwall with failover on Sonicwall

    3
    0 Votes
    3 Posts
    461 Views
    U
    @Perforado thanks for the reply! The dual gateway is on the Sonicwall, not the pfSense. What I am wondering is how to best leverage Sonicwall failover to a site pfSense IP.
  • ipsec1000 down

    2
    0 Votes
    2 Posts
    216 Views
    D
    Solved.
  • How to setup multiple concurrent L2TP users?

    l2tp vpn ipsec
    2
    0 Votes
    2 Posts
    472 Views
    M
    I could not find my previous post, I thought it was not posted properly, now I found it but can not remove this one... please Admin, remove it and pardon my mistake
  • 0 Votes
    1 Posts
    551 Views
    No one has replied
  • IKEv2 Certificate + EAP (Username/Password) and freeradius

    4
    1
    0 Votes
    4 Posts
    980 Views
    jimpJ
    Correct. You can choose from either EAP-TLS which has certificates in both directions (client and server) or EAP-MSCHAPv2/EAP-RADIUS which has user auth + clients validate server certificate. There isn't a way for both to work currently. (And even if strongSwan supported it, I'm not sure any clients do)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.