• pfSense AWS VPN Dropout Every Month

    Moved
    3
    0 Votes
    3 Posts
    416 Views
    galda01G

    Excellent questions. I will check when it happens again. I appreciate you replying so quickly.

    -Andrew G

  • Routed IPSec Tunnel VTI Interface is down

    1
    0 Votes
    1 Posts
    209 Views
    No one has replied
  • IPSEC site to site Tunnel - cannot ping beyond Pfsene

    4
    0 Votes
    4 Posts
    429 Views
    A

    Removed all config and re did all config on both pfsense and Cisco and it now works.

    Dont know why it works as I din't change any settings....

  • IPsec Mobile Client send all traffic to internet

    1
    0 Votes
    1 Posts
    217 Views
    No one has replied
  • IPSEC Tunnel doesn't disable when disabled.

    1
    0 Votes
    1 Posts
    201 Views
    No one has replied
  • IPSec phase 2 not running initiating behind a NATed router

    1
    0 Votes
    1 Posts
    227 Views
    No one has replied
  • failing to connect with strongSwan

    1
    0 Votes
    1 Posts
    541 Views
    No one has replied
  • Dual WAN IPSec with load balance gateway group

    2
    0 Votes
    2 Posts
    378 Views
    M

    I assume some things here which may be wrong:

    one pfSense cluster = HA group Azure connection = your IPSEC goes to your Azure server/cluster

    We use a setup something like this one currently, just not connected to Azure but another third party. This has been used for a few years now with no issues. We only have one pfSense though, not an HA group on our side.

    For the interface, we use a two-tiered gateway failover group, and on the other side, there are two profiles set, one for each of our VPN IPs. I imagine a load balance group would work the same for IPSEC, just not prefer one over the other?

    By the time we replace our aging firewall with an HA failover group, we could use the CARP IPs in the failover group I guess? In reality, we'll likely go for BGP as well by then, but our IPSEC solution currently works fine without BGP.

    If I have misunderstood something, then please elaborate.

  • Slow IPSEC Performance

    11
    0 Votes
    11 Posts
    2k Views
    L

    Yes I tried disabling TCP offloading, and it reduced my throughput by 80%. I re-enabled it.

    I am getting the full 150Mbps over SMB on the PFSense tunnel, that is not the issue. I am sorry, it can be difficult to explain these issues using only text and I may not be explaining this correctly.

    Throughput is good!
    Random filesystem access is bad.

    Example:

    I search the SMB shared for all jpg files. Using the 50Mbps Cisco tunnel, it takes 5 minutes. Using the 150Mbps PFsense tunnel, it takes 15 minutes.

    It is an odd issue to have, and one I have not seen before.

  • Cannot route 2 local subnets to 1 remote subnet

    2
    0 Votes
    2 Posts
    295 Views
    M

    don't know why, but suddenly it's working.
    I just deleted phase 2 and recreated it...

  • IPsec Mobile Client Can't Access Network

    2
    0 Votes
    2 Posts
    398 Views
    M

    Is there a NAT rule to let mobile users to go out?
    Or they only use internal resources, thus not needing NAT?

    If there is a NAT rule to let this mobile users go out, can you confirm if the NAT is set to static, or dynamic ?

  • IPSec tunnels need to be restarted after config

    1
    0 Votes
    1 Posts
    247 Views
    No one has replied
  • P2 NAT/BINAT not translating

    7
    0 Votes
    7 Posts
    696 Views
    D

    Thank you that resolved it. I didn't realize the IPSec NAT and the firewall NAT were the same. Thanks again.

  • Second phase 2 entry not working on mobile IPSec tunnel

    1
    0 Votes
    1 Posts
    228 Views
    No one has replied
  • IPSEC Cisco ASA Issues

    4
    0 Votes
    4 Posts
    1k Views
    M

    Thought I'd put a final update into this as the working solution.

    After getting a couple of Cisco ASA 5506 units on site and creating exact copies of the IPSEC VPNs that I was having issues with, and running these test VPNs over other IP addresses on our twin internet links back to the firewall, I couldn't get the damn things to fail like the original links. They worked for a good couple of weeks without a dropped packet, even although I'd put the phase 1&2 settings to rekey every hour and half hour respectively in the hopes of generating enough debug traffic on both sides to see where the issue lay.

    Went back to the outside agency in question, presented them with my findings, to be told point blank again, that the fault was on our side. After a pretty gritted teeth conversation with their network admin, he let slip that their configuration had a data transfer limit on both VPNs, where it would rekey every 4Gb of traffic. This was the first I'd heard about it, the agreed VPN documentation didn't have this noted, and PfSense IPSEC configs didn't have this in there (I don't think the StrongSWAN version currently in use on PfSense has this as an option anyway). After insisting that this be removed, both VPNs haven't failed since.

    Cheers,
    Monty

  • 0 Votes
    2 Posts
    228 Views
    D

    This appears to be an MSS issue. I chnaged the index.html file down to a couple of words and the curl works. Will see if I can resolve by changing the MSS settings.

  • Cannot ping through AWS pfSense Instance

    8
    0 Votes
    8 Posts
    1k Views
    R

    3 days of troubleshooting, you are a legend!! The issue was source/dest on the interface level (thought it was only on instance level).

    Thanks heaps - much appreciated!

  • USG - pfSense IPSec problems

    1
    0 Votes
    1 Posts
    174 Views
    No one has replied
  • [SOLVED] IPSec site-to-site establishes but only initiated from remote

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    DerelictD

    @saqibshakeel035 said in [SOLVED] IPSec site-to-site establishes but only initiated from remote:

    Any surggestions ?

    Yes. You probably want to start a new thread. This one is years-old. Locking.

  • eap mschapv2 not available

    4
    0 Votes
    4 Posts
    725 Views
    GrimsonG

    https://docs.netgate.com/pfsense/en/latest/book/ipsec/index.html

    IPsec provides a standards-based VPN implementation that is compatible with a wide range of clients for mobile connectivity, and other firewalls and routers for site-to-site connectivity.

    pfSense is not designed to be used as a IPsec mobile client itself.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.