Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPsec multi-wan failover

    Scheduled Pinned Locked Moved IPsec
    40 Posts 21 Posters 38.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      The patch is no longer needed. There is a checkbox to activate the behavior on 2.1 (System > Advanced, Misc tab, under IP Security)

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • B
        Briantist
        last edited by

        Ah, got it. So I guess there's no way to use mutiple gateways for the remote side except to use Dynamic DNS?

        1 Reply Last reply Reply Quote 0
        • A
          acriollo
          last edited by

          Flojose, what was the behavior after you appplied the patch code?

          Results as expected ?

          1 Reply Last reply Reply Quote 0
          • S
            sollostech
            last edited by

            Can this be done if one side of the VPN is not a pfSense? I am going to a Fortigate on Fiber in Atlanta with a pfSense in Michigan with Cable and DSL connections.

            Thanks!

            1 Reply Last reply Reply Quote 0
            • luckman212L
              luckman212 LAYER 8
              last edited by

              @sollostech:

              Can this be done if one side of the VPN is not a pfSense? I am going to a Fortigate on Fiber in Atlanta with a pfSense in Michigan with Cable and DSL connections.

              Did you ever get an answer on this? I have a similar scenario and before I bang my head against the wall just wanted to know if you got it working.

              1 Reply Last reply Reply Quote 0
              • S
                sollostech
                last edited by

                No unfortunately.

                1 Reply Last reply Reply Quote 0
                • N
                  neo_X
                  last edited by

                  Hello guys,

                  I have the pfSense firewall 2.1.3 and need configure ipsec failover with sonicwall. I know that sonicwall have the option for add the second peer in the configuration ipsec vpn, very easy.

                  Do you configure failover ipsec vpn?

                  1 Reply Last reply Reply Quote 0
                  • N
                    niccarp89
                    last edited by

                    Hi to all, anyone has test it again this with new versions of psense or have experience?

                    Also knows some dns service as dyndns but free?, i have one side of the ipsec tunel with three internet providers with CARP so having this feature will be amazing.

                    How i can create the group routing pointing to the group?, i have statics ips on both sides free to use.

                    Thanks

                    1 Reply Last reply Reply Quote 0
                    • N
                      neo_X
                      last edited by

                      @niccarp89:

                      Hi to all, anyone has test it again this with new versions of psense or have experience?

                      Also knows some dns service as dyndns but free?, i have one side of the ipsec tunel with three internet providers with CARP so having this feature will be amazing.

                      How i can create the group routing pointing to the group?, i have statics ips on both sides free to use.

                      Thanks

                      Hi,

                      I can help you with the tests, ok.    Do you have dyndns service like a noip.com ?

                      1 Reply Last reply Reply Quote 0
                      • M
                        mazur50
                        last edited by

                        I have a watchguard firewall on one end with Muiltiwan when going from watchgaurd to watchguard it works fine.

                        I now want to connect the Muilti wan watchgaurd over Ipsec VPN to a pfsence box with one wan connection.

                        What setup needs to be done on the both sides to get this to work so the pfsence knows what remote peer to connect to .

                        Right now it works when the connection it dropped but it will not drop the connection and failover to the preferred peer.

                        Thanks

                        1 Reply Last reply Reply Quote 0
                        • M
                          mill
                          last edited by

                          @jimp:

                          The patch is no longer needed. There is a checkbox to activate the behavior on 2.1 (System > Advanced, Misc tab, under IP Security)

                          I am sorry, I can not find the checkbox in 2.2.6-RELEASE (amd64), under (System > Advanced, Misc tab, under IP Security), there is:
                          "These settings have moved to VPN > IPsec on the Advanced Settings tab. "

                          And in (VPN > IPsec on the Advanced Settings tab.) none of the options seems to be related, there are just these sections:
                          IPsec Logging Levels
                          Unique IDs
                          IP Compression
                          Strict interface binding
                          Unencrypted payloads in IKEv1 Main Mode
                          Maximum MSS
                          Disable Cisco Extensions
                          Strict CRL Checking
                          Make before Break
                          Auto-exclude LAN address

                          However in documentation (https://doc.pfsense.org/index.php/Advanced_IPsec_Settings) is mentioned "Force IPsec Reload on Failover".

                          Or the checkbox disappeared because IPsec multi-wan failover is performed reliably and IPsec restart is not needed anymore?

                          Thank you

                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate
                            last edited by

                            pfSense 2.2 and later uses a different IPsec daemon that no longer requires that setting.

                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            1 Reply Last reply Reply Quote 0
                            • R
                              reinaldo.gomes
                              last edited by

                              @jimp:

                              Setup DynDNS, set to use a failover gateway group.
                              Setup IPsec to use the same failover gateway group.

                              I've done this and the DynDNS works fine, updating the IP as the interfaces go up and down. But the IPSEC config isn't getting updated unless I manually reload it. Did I miss anything?
                              ps: I'm using this group in a Mobile Ipsec, not site-to-site.

                              1 Reply Last reply Reply Quote 0
                              • R
                                reinaldo.gomes
                                last edited by

                                I figured out what was wrong.

                                I was testing this failover feature by "marking the gateway as down", right at the "System -> Routing -> Edit Gateway -> Force State".
                                This causes the DDNS service to imediatly update your DDNS record, but not the IP in the IPSEC conf file. Now I tested the failover by using the "ifconfig emx down" command, and this time both DDNS (though with some minor delay when compared to the previous option) and IPSEC updated the IP according to the active gateway's IP.

                                So, IPSEC doesn't update it's active gateway's IP when using the "mark this gateway as down" option. Is this working as intended?

                                1 Reply Last reply Reply Quote 0
                                • nzkiwi68N
                                  nzkiwi68
                                  last edited by

                                  And, we still have the bug that I posted:

                                  IPSEC bound to WAN gateway group and Dynamic DNS doesn't to fail back tunnel to WAN on DDNS update
                                  https://redmine.pfsense.org/issues/6370

                                  What can I do to get this issue looked at? It still an open bug, but, not confirmed nor assigned for fixing.

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    st_rupp
                                    last edited by

                                    Same here.
                                    Got a fast but unstable Vodafone cable Link (primary) and a slow but solid Telekom ADSL (backup).
                                    Last night, the cable link went down and up again several times. Due to the setting "enable default gateway switching" my servers were still reachable via a DynDns, but my site2site Ipsec tunnel (to DR Location) would use the wrong IP even after DynDns being updated.
                                    The tunnel was still shown as active in the morning, but no traffic was passing. Using the Restart button to restart IPSec did NOT solve the Problem, manually stopping and starting IPsec again DOES solve the problem…

                                    Had the same behaviour several times before...

                                    BTW: using latest 2.3.1_5

                                    @Steven Perreau: Did you also post a Bug report on Github?  Is this necessary / useful / recommended? I don't know which platform ist used by the Developers...

                                    1 Reply Last reply Reply Quote 0
                                    • luckman212L
                                      luckman212 LAYER 8
                                      last edited by

                                      @st_rupp:

                                      Using the Restart button to restart IPSec did NOT solve the Problem, manually stopping and starting IPsec again DOES solve the problem…

                                      I was working on a dual-WAN system yesterday where one of the links was flapping.  Had the exact same problem. Scratched my head for a while before trying what you did (completely stopping and then afterwards starting the Ipsec service)

                                      1 Reply Last reply Reply Quote 0
                                      • E
                                        enriluis
                                        last edited by

                                        @jimp:

                                        Not yet. That's really all there is to it though.

                                        Setup DynDNS, set to use a failover gateway group.
                                        Setup IPsec to use the same failover gateway group.
                                        Set the other end to use the dyndns host as the peer address.

                                        Sorry but i don't have DynDNS access to make the setup because both firewall are in my internal network(no internet access), so exist  another way to work ipsec  over multi-wan failover
                                        sorry about my English

                                        1 Reply Last reply Reply Quote 0
                                        • jimpJ
                                          jimp Rebel Alliance Developer Netgate
                                          last edited by

                                          No, Dynamic DNS is the only viable way at the moment.

                                          Use an internal dynamic DNS server then. Setup BIND somewhere with an RFC2136 dynamic zone and have the other firewall use it to resolve hosts for a private domain.

                                          That's all out of scope for this thread/board though.

                                          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                          Need help fast? Netgate Global Support!

                                          Do not Chat/PM for help!

                                          1 Reply Last reply Reply Quote 0
                                          • E
                                            enriluis
                                            last edited by

                                            another question… can i use gateway group in the local endpoint??? because it are show in  my interface list
                                            @jimp:

                                            No, Dynamic DNS is the only viable way at the moment.

                                            Use an internal dynamic DNS server then. Setup BIND somewhere with an RFC2136 dynamic zone and have the other firewall use it to resolve hosts for a private domain.

                                            That's all out of scope for this thread/board though.

                                            i was think make that but unknown  how to, i'm using windows server 2012 as internal DNS Server …  is possible make over it?? or another possible solution found here  http://arkanis.de/weblog/2015-11-27-build-your-own-dyndns  correct me please thank

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.