Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Not able to reach P2 Tunnel IPSec VPN From another FW

    Scheduled Pinned Locked Moved IPsec
    6 Posts 2 Posters 532 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      Redbob
      last edited by Redbob

      Hi! We have the following topology:
      bd88d132-77dc-452f-879b-d4ea18367761-image.png

      • Each firewall is Pfsense release 2.4.4;
      • 172.24.28.0/24 is root VLAN110 and 172.24.38.0/24 is leaf VLAN110;
      • They are normally communicating each other;
      • VPN IPSec P1 Phase is Tagged VLAN110;
      • VPN IPsec is fully functional between P1 and P2 phases;
      • 10.254.124.0 is external network from Telecom Provider;
      • Telecom could reach 172.24.38.0/26 network due to Firewall IPSec Rules;

      My question is:

      • How does 174.24.38.0/26 reach to 10.254.124.0? They stuck in 172.24.38.1

      dd099dc4-4a34-42f3-a5c9-6b548cf4f40c-image.png

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @Redbob
        last edited by

        @Redbob
        Has routing ever worked prior to you posting here?

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        R 1 Reply Last reply Reply Quote 0
        • R
          Redbob @michmoor
          last edited by Redbob

          @michmoor Routing from 172.24.38.0/26 to 172.24.28.0/24 works fine (IP cliente here is 172.24.38.12):
          40459b70-32b9-4a5f-953d-1faa03e9fb40-image.png

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @Redbob
            last edited by

            @Redbob
            To clarify, has it routing through the IPsec tunnel ever worked? Reading the post it feels like it did so im trying to make sure if it was working before so we can figure out what changed.

            If it never worked, then my question is how will traffic get to the other LAN? Static or Dynamic routing?

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            R 1 Reply Last reply Reply Quote 0
            • R
              Redbob @michmoor
              last edited by Redbob

              @michmoor The IPSec Tunnel works fine. Look this device:
              b0b9f724-fe08-469a-b8a8-97c47ac2f3e2-image.png

              It's on the 172.24.28.0/24 side. The challenge is: how to establish a route between 172.24.38.0/26 and 172.24.28.0/24 till 10.254.124.0/24?
              172.24.38.0/26 is not merely a subnet from 172.24.28.0/24 due to tag, because Telecom must not access the entire network (172.24.0.0/16)

              This is VPN IPsec:9c5dfcbb-5414-40d4-b9cc-2d16cd1e36a6-image.png

              And these are rules:4af34ce6-2dd8-417b-9f43-3aa64d6c311f-image.png

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @Redbob
                last edited by

                @Redbob

                172.24.38.1 doesnt have a route to 10.254.124.0/24.
                Your options are either to

                1. create static routes on each hop.
                2. use dynamic routing protocols such as OSPF or BGP.

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.