• PFSense IPSec VPN to AWS Issue

    1
    0 Votes
    1 Posts
    263 Views
    No one has replied
  • IPSEC tunnel between two sites not working as it should

    2
    0 Votes
    2 Posts
    419 Views
    D
    Issue resolved! Believe it or not it was a f****** reboot that solved it... Probably the firewall still had some old caches or something still in it's memory...
  • IPSec VPN to OpenWrt Strongswan Travel Router

    4
    5
    0 Votes
    4 Posts
    2k Views
    K
    @highc said in IPSec VPN to OpenWrt Strongswan Travel Router: Thanks for trying to help me. I tried to do what you said, i.e. setup a new site-to-site config in pfSense Look at the file on the PFSense side /var/etc/ipsec/ipsec.conf This is an example of what settings should be on the Openwrt router . These settings should mirror the settings on the PFSense (left/right) https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/configuring-a-site-to-site-ipsec-vpn.html https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/routing-internet-traffic-through-a-site-to-site-ipsec-vpn.html For example , my file ipsec.conf (CentOS server, site-to-site connection) conn es_ru_pfsense_rsa keyexchange=ikev2 authby=pubkey fragmentation = yes ikelifetime=28800s ike = aes256-sha256-modp2048,aes-sha256-modp2048! esp = aes256-sha256-modp2048,aes192-sha256-modp2048,aes128-sha256-modp2048,aes128gcm16-sha256-modp2048,aes128gcm64-sha256-modp2048! left=XX.XXX.XX.XX leftsubnet=0.0.0.0/0 leftcert=strongswan_rsa.pem leftca="C=ES, O=M, CN=e.m.org" leftid=@strongswan.m.org leftfirewall=yes lefthostaccess=no right=YY.YY.YY.YYY rightid=@pfsense.m.org rightsubnet=192.168.55.32/27 auto=add
  • 0 Votes
    1 Posts
    252 Views
    No one has replied
  • No EAP-MSChapv2 or other option but RSA and PSK even no Xauth

    11
    2
    0 Votes
    11 Posts
    1k Views
    jimpJ
    Again, there are numerous threads around the forum already covering this in detail.
  • [Solved] Mobile Ipsec to Windows has no gateway

    1
    0 Votes
    1 Posts
    322 Views
    No one has replied
  • IPSec (IKEv2) iPhone VPN fails to connect

    1
    0 Votes
    1 Posts
    287 Views
    No one has replied
  • iOS not connecting

    1
    0 Votes
    1 Posts
    491 Views
    No one has replied
  • iOS gets connected to the VPN, but nothing loads

    1
    0 Votes
    1 Posts
    216 Views
    No one has replied
  • Pre-shared Keys, IPSec and Windows

    1
    0 Votes
    1 Posts
    370 Views
    No one has replied
  • IPSec Mobile from AWS pfSense AMI to Windows 10

    3
    2
    0 Votes
    3 Posts
    758 Views
    W
    Solved (I think). Turns out that not only do you have to add IPSec ports to the pfSense firewall, I had to add UDP 4500 to the AWS Security Group (AWS version of a firewall). The person who set up the Security Group had added UDP 500, but not 4500.
  • IPSEC VTI low speed

    1
    0 Votes
    1 Posts
    421 Views
    No one has replied
  • My experience with IPSEC and SMB

    1
    0 Votes
    1 Posts
    397 Views
    No one has replied
  • IPSec client mobile

    8
    2
    0 Votes
    8 Posts
    996 Views
    DerelictD
    Yeah you almost certainly want tunnel mode there, not transport. It really depends on the mix of intended VPN clients but if I had to use IPsec instead of OpenVPN for some reason I would try to get IKEv2 working first.
  • IPSec Overlapping Subnets

    2
    0 Votes
    2 Posts
    704 Views
    M
    @schulzie00 BINAT is not so hard. The only thing that you have to take into account is that, from the point of view of the remote site the remote net you have to supply is the one you have used in the binat field and not the original one onf the LAN interface, so your phase II configuration must use this later one and rules must apply with this. Apart from this take into consideration that there will not be any matching rules between local IP addresses (those in the LAN Net space) and binat addresses so the remote site clients would not be able to contact servers in the binat side unless you configure a NAT static translation too. Hope this helps.
  • NAT Traversal Force not working

    1
    0 Votes
    1 Posts
    345 Views
    No one has replied
  • An invalid IP address was detected in the 'Reject leases from' field.

    9
    2
    0 Votes
    9 Posts
    2k Views
    F
    Thanks for the help.
  • Unable to established connection in IPsec PFSense

    3
    0 Votes
    3 Posts
    3k Views
    A
    What is the solution please i have the same problem :/ ipsec_starter[35497]: configuration 'con1000' unrouted
  • Phase 2 stops traffic after 45 minutes

    4
    0 Votes
    4 Posts
    896 Views
    emammadovE
    @Mathews What do system logs show on both sides when this happens? Everything is okay on the other side? I recommend keep the default lifetimes 28800 for phase 1 and 3600 for phase 2. Does it bring up the tunnel if you ping again the remote side after 45 minutes? https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/configuring-a-site-to-site-ipsec-vpn.html Phase 1 lifetime: "The lifetime defines how often the connection will be rekeyed, in seconds. 28800 seconds is a good balance of frequent rekeying without being too aggressive." Phase 2 lifetime: "The lifetime for which the negotiated keys will be valid. One hour (3600) is a good setting. Do not set this to too high (e.g. more than about a day: 86400) as doing so will give people more time to crack the key. Don’t be over paranoid either; there is no need to set this to 20 minutes either."
  • Provide different access through IPSEC

    2
    0 Votes
    2 Posts
    221 Views
    M
    @Daz22 Hi, you will need a RADIUS server and use the Framed-IP attribute and group the addresses by aliases. For a domain environment, see the answer in my thread. If you want just a simple setup, you can drop all the NPS/AD stuff there and install FreeRADIUS on the pfSense. If I remember correctly, the package allows to set IPs in the user properties.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.