Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Only route certain dst IP address via IPSec

    Scheduled Pinned Locked Moved IPsec
    10 Posts 3 Posters 4.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      greminn
      last edited by

      Hi There,

      Using 2.0.3 running in vmware and IPSec to a Fortigate unit in our Data Center. We used to have a local Fortigate unit here, but it was getting old and not holding up to the traffic demands.

      My question is: On the old fortigate we used to have the IPsec VPN, then route traffic only certain dst IP address via the VPN. For example: VPN is from our office lan (192.168.1.0) to our DC lan (203.xxx.xxx.x), only traffic to 203.xxx.xxx.10 would be routed via the VPN, all the rest would be via standard WAN link. We did this by adding static routes in the local Fortigate to the IPs we wanted via the VPN.

      Is this possible in pfsence?

      ![Screen Shot 2013-08-02 at 12.15.31 PM.png](/public/imported_attachments/1/Screen Shot 2013-08-02 at 12.15.31 PM.png)
      ![Screen Shot 2013-08-02 at 12.15.31 PM.png_thumb](/public/imported_attachments/1/Screen Shot 2013-08-02 at 12.15.31 PM.png_thumb)
      ![Screen Shot 2013-08-02 at 12.15.35 PM.png](/public/imported_attachments/1/Screen Shot 2013-08-02 at 12.15.35 PM.png)
      ![Screen Shot 2013-08-02 at 12.15.35 PM.png_thumb](/public/imported_attachments/1/Screen Shot 2013-08-02 at 12.15.35 PM.png_thumb)

      1 Reply Last reply Reply Quote 0
      • G
        greminn
        last edited by

        Hi there, no ideas here?  ;)

        1 Reply Last reply Reply Quote 0
        • M
          marvosa
          last edited by

          Is it possible?  Of course it is.  Once the tunnel is established, you can route whatever traffic you want over it.

          1 Reply Last reply Reply Quote 0
          • G
            greminn
            last edited by

            @marvosa:

            Is it possible?  Of course it is.  Once the tunnel is established, you can route whatever traffic you want over it.

            thanks for the reply, but it does not really answer my question. At the moment the whole dst range is routed over the VPN (by default?), what i need todo is to route only specific dst IPs (our of the range) over the VPN. I cannot see a way todo this in pfsence (unless im missing something?)

            1 Reply Last reply Reply Quote 0
            • M
              marvosa
              last edited by

              greminn,
              You'll have to forgive me, but I beg to differ.  The only question asked from your original post was:

              Is this possible in pfsence?

              Which I did answer :)

              So, for the 2nd question… how do you do it?  Unfortunately, I do not have specifics... maybe the devs or hero members can chime in... but it may involve assigning the tunnel to an interface, giving it a gateway, and configuring host/network routes from there.

              1 Reply Last reply Reply Quote 0
              • G
                greminn
                last edited by

                @marvosa:

                greminn,
                You'll have to forgive me, but I beg to differ.  The only question asked from your original post was:

                Is this possible in pfsence?

                Which I did answer :)

                I admit defeat on this!  ;D

                @marvosa:

                So, for the 2nd question… how do you do it?  Unfortunately, I do not have specifics... maybe the devs or hero members can can chime in... but it may involve assigning the tunnel to an interface, giving it a gateway, and configuring host/network routes from there.

                Thanks for this, can any one else confirm an approach here?

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  Well, IP you want to route only certain IPs through IPsec, then don't set Phase2 to the whole subnet, but set up multiple phase2 entries for single IPs you want routed through IPsec.

                  1 Reply Last reply Reply Quote 0
                  • G
                    greminn
                    last edited by

                    @doktornotor:

                    Well, IP you want to route only certain IPs through IPsec, then don't set Phase2 to the whole subnet, but set up multiple phase2 entries for single IPs you want routed through IPsec.

                    OK thanks for this! I see.. I gave this a go, but had issues - do i need to change anything at the Fortigate end? Is side one the local end or the remote end?

                    Aug 8 08:32:41  racoon: [New Media DC VPN]: [103.2.xxx.xxx] ERROR: failed to pre-process ph2 packet [Check Phase 2 settings, networks] (side: 1, status: 1).

                    Full log…

                    http://pastebin.com/D2ziMtXE

                    1 Reply Last reply Reply Quote 0
                    • D
                      doktornotor Banned
                      last edited by

                      @greminn:

                      OK thanks for this! I see.. I gave this a go, but had issues - do i need to change anything at the Fortigate end? Is side one the local end or the remote end?

                      Changes are requires to be done on both ends of the tunnel, of course.

                      1 Reply Last reply Reply Quote 0
                      • G
                        greminn
                        last edited by

                        @doktornotor:

                        @greminn:

                        OK thanks for this! I see.. I gave this a go, but had issues - do i need to change anything at the Fortigate end? Is side one the local end or the remote end?

                        Changes are requires to be done on both ends of the tunnel, of course.

                        OK so i changed both ends Phase 2's to only have a single IP address in the remote range… when trying to bring up the VPN i get these errors in the logs:

                        Aug 8 08:48:36 racoon: [New Media DC VPN]: INFO: IPsec-SA established: ESP 203.167.xxx.x[500]->103.2.xxx.xxx[500] spi=3405420369(0xcafa9751)
                        Aug 8 08:48:36 racoon: [New Media DC VPN]: INFO: IPsec-SA established: ESP 203.167.xxx.x[500]->103.2.xxx.xxx[500] spi=50113689(0x2fcac99)
                        Aug 8 08:48:36 racoon: [New Media DC VPN]: INFO: initiate new phase 2 negotiation: 203.167.xxx.x[500]<=>103.2.xxx.xxx[500]
                        Aug 8 08:48:24 racoon: INFO: unsupported PF_KEY message REGISTER
                        Aug 8 08:48:24 racoon: INFO: unsupported PF_KEY message REGISTER
                        Aug 8 08:48:24 racoon: INFO: unsupported PF_KEY message REGISTER
                        Aug 8 08:48:18 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:48:16 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:48:12 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:47:57 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:47:35 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:47:13 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:47:06 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:46:58 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:46:54 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:46:50 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:46:50 racoon: INFO: unsupported PF_KEY message REGISTER
                        Aug 8 08:46:50 racoon: ERROR: no iph2 found: ESP 103.2.xxx.xxx[500]->203.167.xxx.x[500] spi=225044466(0xd69e7f2)
                        Aug 8 08:46:50 racoon: INFO: unsupported PF_KEY message REGISTER
                        Aug 8 08:46:28 racoon: ERROR: failed to get sainfo.
                        Aug 8 08:46:28 racoon: INFO: unsupported PF_KEY message REGISTER
                        Aug 8 08:46:28 racoon: ERROR: such policy already exists. anyway replace it: 192.168.1.0/24[0] 182.236.xxx.xx/32[0] proto=any dir=out
                        Aug 8 08:46:28 racoon: ERROR: such policy already exists. anyway replace it: 192.168.1.0/24[0] 182.236.127.0/24[0] proto=any dir=out
                        Aug 8 08:46:28 racoon: ERROR: such policy already exists. anyway replace it: 182.236.xxx.xx/32[0] 192.168.1.0/24[0] proto=any dir=in
                        Aug 8 08:46:28 racoon: ERROR: such policy already exists. anyway replace it: 182.236.xxx.x/24[0] 192.168.1.0/24[0] proto=any dir=in
                        Aug 8 08:46:28 racoon: INFO: unsupported PF_KEY message REGISTER
                        Aug 8 08:46:27 racoon: ERROR: no iph2 found: ESP 103.2.xxx.xxx[500]->203.167.xxx.x[500] spi=139426204(0x84f799c)
                        Aug 8 08:46:27 racoon: INFO: unsupported PF_KEY message REGISTER
                        Aug 8 08:46:24 racoon: INFO: purged IPsec-SA proto_id=ESP spi=3405420368.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.