Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unifi best site-site alternative

    Scheduled Pinned Locked Moved OpenVPN
    11 Posts 6 Posters 2.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JKnottJ
      JKnott @bigbang
      last edited by

      @bigbang

      Any reason you can't use TLS? Seems to me that's all that's available now.

      PfSense running on Qotom mini PC
      i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
      UniFi AC-Lite access point

      I haven't lost my mind. It's around here...somewhere...

      B 1 Reply Last reply Reply Quote 0
      • planedropP
        planedrop
        last edited by

        IPSec? Any reason not to go with that, it's better for site to site in most cases than OpenVPN anyway.

        Or maybe I'm misunderstanding your question.

        M B 2 Replies Last reply Reply Quote 1
        • M
          michmoor LAYER 8 Rebel Alliance @planedrop
          last edited by

          @planedrop
          I came here to say IPsec

          Is Unifi not capable of doing site2site using Wireguard?

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          planedropP 1 Reply Last reply Reply Quote 0
          • planedropP
            planedrop @michmoor
            last edited by

            @michmoor That is correct, Site-to-Site is only for IPsec and OpenVPN right now. I imagine S2S WireGuard will come at some point since they just added the ability to be a "VPN client" to their Unifi devices and also their "site magic" stuff uses WG on the backend.

            I still prefer S2S over IPsec myself though, WireGuard isn't always the most fun to set up for that use case IMO. End up with too many gateways pretty easily.

            1 Reply Last reply Reply Quote 1
            • B
              bigbang @JKnott
              last edited by

              @JKnott I don't believe TLS is available in site-to-site in the latest release of Unifi.

              fa0dec47-42ce-4f30-aa3a-df5705849437-image.png

              3eaac5a1-d816-45a7-91fc-12e4f2c02c81-image.png

              1 Reply Last reply Reply Quote 0
              • B
                bigbang @planedrop
                last edited by bigbang

                @planedrop said in Unifi best site-site alternative:

                IPSec? Any reason not to go with that, it's better for site to site in most cases than OpenVPN anyway.

                Or maybe I'm misunderstanding your question.

                @planedrop said in Unifi best site-site alternative:

                @michmoor That is correct, Site-to-Site is only for IPsec and OpenVPN right now. I imagine S2S WireGuard will come at some point since they just added the ability to be a "VPN client" to their Unifi devices and also their "site magic" stuff uses WG on the backend.

                I still prefer S2S over IPsec myself though, WireGuard isn't always the most fun to set up for that use case IMO. End up with too many gateways pretty easily.

                Yeah I think I'm going to re-configure it as IPSEC.
                @planedrop yeah I saw that Wireguard is coming to Unifi for client setup in the crosstalk sol video for Unifi 8.0.7

                planedropP 1 Reply Last reply Reply Quote 0
                • planedropP
                  planedrop @bigbang
                  last edited by

                  @bigbang Yeah I would recommend just using IPsec for now, it's pretty straightforward once you read some documentation on how to use it, just make sure to use good DH groups for it (14 or 21) for example.

                  1 Reply Last reply Reply Quote 0
                  • B
                    brians
                    last edited by

                    Shared key mode still works for now, but who knows when it will actually be removed.

                    IPSec does not work if one site is behind NAT, or CGNAT. Unless there is a way that I am unware of... if anyone has a solution to this let me know.

                    I have a remote site that I use a UDMSE on with a Starlink, and want to connect to a main site that is on an SG6100 with static IP. I can do this currently no problem with OpenVPN shared key mode, but I do not wish to deploy it like this since it will one day fail. Not a huge deal since they can get away with using OpenVPN client on desktop PCs but i would like a solution to this in future.

                    Seems that if UDMSE supported WG S2S in future that this would solve the issue. Currently in 8.0.7 it still doesn't. Their site magic however is pretty nice, which requires all UDMs, and I think it uses WG as its protocol.

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      SteveITS Galactic Empire @brians
                      last edited by

                      @brians It work behind NAT, I’ve done it at both ends actually. Forward the port (at “server” end), and pfSense has a NAT Traversal checkbox in advanced options.

                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                      Upvote 👍 helpful posts!

                      B 1 Reply Last reply Reply Quote 1
                      • B
                        brians @SteveITS
                        last edited by

                        @SteveITS Since posting that I tried and got working and came back here and noticed your reply. I didn't forward a port since my pfsense is static but good to know that it can be done.

                        However it seems to go offline a couple times sometimes and needed "coaxing" to get it back connnected (but in all fairness I was messing around with it lots)... I found changing a setting like tunnel name on UniFi S2S VPN Page would make it work again (reset button in status column didn't do anything when in this state, nor did pausing/unpausing). Using hostname instead of IP does not appear to work even though it is a new feature, and unifi does not show any status that it is connected like OpenVPN, but that is support issues for UniFi, I suppose not here.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.