• [SOLVED] inbound traffic with NAT/BINAT translation via IPsec

    3
    0 Votes
    3 Posts
    4k Views
    Q

    I tried it exactly as I guessed (and derelict too) and it worked.

    Thank you for your help!

  • How to push route onto a IPSEC L2TP

    2
    0 Votes
    2 Posts
    572 Views
    jimpJ

    With L2TP, it's completely up to the client to decide what traffic to send across. You need to configure the routes you want in the client itself.

  • Routed (VTI) IPsec Tunnel troubleshooting, no or slow traffic

    10
    0 Votes
    10 Posts
    1k Views
    P

    @konstanti

    So... I replaced the SG-3100 with an XG-7100 today, setting up that side (site2) from scratch, and it now works as expected. IPsec tunnel speed is decent and no more packet loss. I can't see that I did anything differently, but I don't really have the time to look into it right now, if ever.

    Anyhow, thanks, again, for your time and input.

  • Lan to LAN Keep alive?

    3
    0 Votes
    3 Posts
    501 Views
    O

    Many thanks

  • pfSense IPSEC VPN to Azure VPN

    1
    0 Votes
    1 Posts
    527 Views
    No one has replied
  • Site to Site VPN over multiple WAN with IPSec? How?

    5
    0 Votes
    5 Posts
    799 Views
    C

    I figured out why my setup wasn't working. I had created Firewall rules under IPSec that allowed specific networks to connect to other specific networks. Once I created wildcard rules (anyone can talk to anyone on this interface), the IPSec tunnels started talking to each other and I was able to get FRR configured. Quagga OSPF wasn't working for me so I tried FRR and it worked fine.

  • 0 Votes
    1 Posts
    613 Views
    No one has replied
  • VIP is not set in IPSec configuration

    2
    0 Votes
    2 Posts
    359 Views
    C

    OK, the solution is that in the failover security group, in the "Interface Address" field, I had to specify the VIP address. When I did this, then the right IP was showed in the config file.

  • Tunnel is ok but not ping

    8
    0 Votes
    8 Posts
    939 Views
    S

    Hi,
    the problem was solved by modifying, in phase 2, the protocol and Auth Methods as the one configured on pfsense were not compatible with those used on the fortigate.
    Thanks.

  • Setting up ipsec on wan routed subnet

    2
    0 Votes
    2 Posts
    354 Views
    DerelictD

    IPsec requires:

    UDP 500
    UDP 4500
    Protocol ESP

    You might or might not need protocol ESP based on NAT Traversal.

    Probably just want to post your NAT settings and WAN rules.

  • IPSec mobile VPN using IKEv2 with EAP-MSCHAPv2

    14
    0 Votes
    14 Posts
    6k Views
    P

    Hi guys,

    Thank you for the provided information. As I have had a very busy week with training and courses I was not able to do some in depth tests yet.

    I did some quick and dirty testing with the information in these last 2 posts provided by you. I've tried various settings and combinations but all seem to fail.

    I think the problem is somewhere in the Apple Configurator profile, as everything is working very well on my W10 machine. I have also tried on a Macbook but was also unable to connect. I will provide a more detailed log later when I have some more time at home.

    Only thing what seems to be different in my setup is that I'm not using a self-signed certificate from a pfSense CA. There I was thinking it was not necesarry to add this certificate into the Apple Configurator profile. I'm using a Let's Encrypt wildcard certificate on my setup -> ACME installation in pfSense with auto-renewal, etc.. So I was thinking, like on my W10 it should work out of the box. However I did some quick tests with the settings provided by you guys (Machine Authentication, Server Certificate Issues Common Name, Server Certificate Common Name, etc..) but all with the same result.

    Anyway I justed wanted to let you know I'm not inactive but currently have no time to perform further troubleshooting. I will update this topic further this weekend with more screenshots and error logs.

    Thanks!

  • 0 Votes
    1 Posts
    170 Views
    No one has replied
  • IPsec manual routing

    5
    0 Votes
    5 Posts
    772 Views
    DerelictD

    If both sides support VTI I would suggest that over GRE.

    https://www.youtube.com/watch?v=AKMZ9rNQx7Y

  • IPSEC Phase 2 Duplicate Causes VPN Tunnel to get stuck

    18
    0 Votes
    18 Posts
    6k Views
    telservT

    @harow Thanks for your suggestions on this. The problem hasn't occurred in the past two weeks, after I changed the P1 configuration from Initiator or Responder to Respnder Only.

  • IPSect Site to Site (Slow Upload) - (Fast Download) issue

    24
    0 Votes
    24 Posts
    3k Views
    P

    As far as I know MSS Clamping is a workaround to avoid MTU discovery problems. I assumed that you have some filtering in the source-destination path (ICMP was my first thought) that prevent MTU discovery.

    Since throughtput was assymetric, I expected it to be fairly easy to find what was different and causing the issue at one end.

  • IPSec site-to-site between PFSense and USG rekey issue

    6
    0 Votes
    6 Posts
    5k Views
    T

    thanks for the update and great looking script! :)

    I had disabled PFS on both sides and had the VPN running ok but it appeared to stop passing traffic when the P2 timeout expired after 3600 seconds.

    By adding the rekey @ 540 seconds before expiry I 'think' its now stable.

    I run approx 25 VPN tunnels from two sites to remote sites and Ive replaced a remote pfsense box with a USG device at one remote site.

    From one main site ive had 100% uptime 19 hours to the USG
    Strangely the other main has had drops during the same period - 5,56,45 minutes breaks

    same IPSEC configuration
    (all other IPSECs from that site were ok)

    Both main sites pfsense 2.4.3

  • 0 Votes
    5 Posts
    936 Views
    J

    @derelict from the firewall fortigate in the capture I see the traffic coming out, but this does not reach the pfsense making the capture by ipsec

    Origin -> fortigate
    192.168.0.0/24
    destination -> pfsense
    172.16.100.0/27

    Something additional currently from that fortigate I have another vpn with another pfsense and it is established without problems these two vpn have the same configuration parameters.

    0_1550595464289_f8e30d6a-fb99-42f3-a31e-466357195f26-image.png

  • IPsec over IPv6

    3
    0 Votes
    3 Posts
    483 Views
    jimpJ

    As long as it's IKEv2 it should be able to carry mixed traffic in the phase 2 / child SA.

  • 3 sites - routed ipsec - automatic redundant failover routing

    2
    0 Votes
    2 Posts
    348 Views
    M

    I think the way to go is :

    Created routed IPSec with VTI Implemented some kind of dynamic routing, with BGP or OSPF, assigning different metrics to your path.

    Videos on theses subjects
    https://www.youtube.com/watch?v=AKMZ9rNQx7Y
    https://www.youtube.com/watch?v=4IlKcB17rWk

  • VTI Ipsec Dynamic Rules (solved)

    8
    0 Votes
    8 Posts
    890 Views
    M

    So for people who are facing the same issues.

    You need both a route on the pfsense (you must be able to see it with netstat -rn)
    And then, according to your firewall policy rules :

    if you use the default gateway (*) in your rules : OK if you use a specific gateway or a gateway group : assign a new rule throught the ipsec gateway

    I think the documentation should mentionned it. I'm not a native english speaker and after reading the doc, I thought, either static routes OR policy rules should work. But it's not an OR, it's an AND :)

    Regards

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.