• [IPSEC site-to-site] Subnets Connectivity

    32
    0 Votes
    32 Posts
    3k Views
    awebsterA

    @nomatter Thanks for the followup.
    I've not experimented with VTI source NAT before, and I'm surprised to see that it doesn't in fact work.

  • IPv6 IKEv1 tunnel not established if FQDN is used as Remote Gateway

    4
    0 Votes
    4 Posts
    568 Views
    D

    @jimp Thanks. I'm glad hearing that it is known and somebody is working on it. Can't wait for pfSense v2.5.

  • IPSec established but not work properly

    2
    0 Votes
    2 Posts
    342 Views
    R

    Update:

    The remote network is 10.90.0.0/16.

    When this problem appears sometines i can do ping host in one VLan and not another host in another vlan. For example:

    When i do ping to host on vlan 6: 10.90.6.22/24 . The ping not work and when I do ping to VLan 19: 10.90.19.63 , the ping work. The problem with Vlans is random.

    I tried to disable DPD but the result is the same.

  • No internet access through VPN connection to pfsense

    4
    0 Votes
    4 Posts
    5k Views
    R

    You are absolutely awesome! Thank you so much. I wasn't thinking of that. I disabled "pull routes", and it worked right away :-).

  • Site-to-Site Authentication Fails

    4
    0 Votes
    4 Posts
    2k Views
    jimpJ

    NAT will make that trickier but usually you can get around that by setting appropriate identifiers. I wouldn't use hostnames in those fields for identifiers, though. It isn't handled there like it is in the remote gateway field. Try setting the identifiers explicitly to a value on both sides and see what happens.

  • ipsec tunnel established but i see same isp ip address

    1
    0 Votes
    1 Posts
    162 Views
    No one has replied
  • CLI Options to Re-establish Collapsed Tunnel

    3
    0 Votes
    3 Posts
    411 Views
    L

    @jimp Thanks! Will start digging into this.

  • IPsec (VTI) memory leak.

    3
    0 Votes
    3 Posts
    528 Views
    0daymaster0

    @jimp So I don't have definitive proof but both my core router and branch router started swapping out. My branch router filled up its swap then crashed. My core router would have crashed also but it has 32 GB of RAM while my branch router only has 16 GB of RAM. The memory usage tracks exactly with the backup job.

    Core router memory overview including swap usage:

    86018311-ff80-4f6e-b75d-d9e87f6688d2-image.png

    Branch router memory overview including swap usage:

    8f08546d-07dd-419b-a5a2-c71ed244eb9a-image.png

    For the time being I am moving all my tunnels that I can over to OpenVPN. This is unfortunate as OpenVPN does not get good performance and I have some remote sites with Fortigate firewalls. Fortigate does not support OpenVPN.

  • IPSec/ Road Warrior not working on pfsense2.4.4

    1
    0 Votes
    1 Posts
    218 Views
    No one has replied
  • max number of ipsec tunnels for c3758 processor

    7
    0 Votes
    7 Posts
    714 Views
    L

    IOW the limitation is likely not the number of IPsec tunnels, but the total amount of traffic they carry, which will run into bandwidth limits or CPU encryption/decryption capacity limits, whichever comes first. You can realistically expect 400-900 Mbps of total encrypted traffic on that box, depending on traffic complexity. Hope this helps.

  • Problem with NAT on IPSEC for Networks not in Phase2

    1
    0 Votes
    1 Posts
    227 Views
    No one has replied
  • 0 Votes
    2 Posts
    423 Views
    JeGrJ

    @Sal said in Is it necessary to add the 4500(IPsec Nat-T) and 500 (ISAKmp) on the WAN?? pfsense 2.4.4:

    I thought that the important part is to add the rules on the IPsec interface, not the WAN. Is this correct ??

    Rules for 4500/500 on your IPSEC interface? Makes no sense. Those ports have to be working on your WAN so incoming IPSEC connections are passed through. On your tunnel/IPSEC interface those rules for those ports make no sense.

    But IMHO IPSec Ports are accepted automatically on WAN if IPSEC connections are configured.

    but I noticed that the tunnel is connected.

    IPSEC can be initiated bi-directional. So every side can be initiator or receiver. The tunnel coming up doesn't mean you already have working rules as it could have been initiated from the second site to the first your created the rules yourself. But as stated above, if I remember correctly IPSEC is created automatically (and that automation can be switched off in adv. settings)

  • Port-forward IPSec-Traffic

    1
    0 Votes
    1 Posts
    262 Views
    No one has replied
  • IPsec rules to only allow specific pc's

    1
    0 Votes
    1 Posts
    208 Views
    No one has replied
  • IKEv2 to Windows10

    11
    0 Votes
    11 Posts
    1k Views
    K

    Hello,

    sorry for the delay!
    It works now perfect for me and I think it was a problem wit my mobile-connection.
    It works with the Android StrongSwan-App, with the default configuration on Windows 10 (IKEv2) and with the PowerShell generated connection mentioned by @lfoerster.

    Thank you
    Robert

  • One side pfsense behind NAT 1:1 and another as peer

    8
    0 Votes
    8 Posts
    832 Views
    J

    Someone? =/

  • IPsec Tunnel goes down with end of SA Lifetime - SOLVED!!!

    5
    0 Votes
    5 Posts
    4k Views
    P

    SOLVED!!!!

    Searching for answers I strumbled on another post that was having the same problem. And it pointed me to a problem in my setup… I had PFS enabled on the pfSense and disabled on the USG.

    Thanks to those that stopped to help, hopefully this post will help someone in the future.

    Scot

  • What is proper way to add P2 routes for additional networks?

    3
    0 Votes
    3 Posts
    413 Views
    R

    @jimp Thank you. Perfect explanation and I think you may have solved my issue. I was not doing the P2 segments at the hub correctly. I didn't have any P2 entries with links between remote offices. I kept trying to create them with the hub as the distribution point.

  • IPsec slow even on direct local Gbps link

    5
    0 Votes
    5 Posts
    860 Views
    R

    @lguy2000 I didn't try those particular settings yet. I'm testing on 1gb WAN to WAN. Both sides on ATT fiber and only getting about 60Mbps tops.

    Phase 1 is AES128-GCM, 128 bit with AES-XCBC hash on DH14
    Phase 2 is AES128-GCM, 128 with no hash, DH14

  • How to measure IPSec tunnel throughput using Iperf3 and UDP protocol

    1
    0 Votes
    1 Posts
    177 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.