Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IKEv2 Road Warrior VPN with a Dynamic WAN IP?

    Scheduled Pinned Locked Moved IPsec
    14 Posts 3 Posters 4.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • luckman212L
      luckman212 LAYER 8
      last edited by

      dax- thank you- yes that was one of the first guides I tried to follow.

      Problem as I mentioned in my OP is that it requires entering the "WAN IP" which in this case is dynamic. See screenshot.  So are you saying that every time the IP changes (could be once a week e.g.) a new Cert would need to be generated, imported, trusted, etc.. ?

      Or am I still missing something??

      problem.png
      problem.png_thumb

      1 Reply Last reply Reply Quote 0
      • D
        daxpfacc
        last edited by

        just use your DDNS in common name and in alternative names selecting FQDN or hostname in our server cert

        1 Reply Last reply Reply Quote 0
        • luckman212L
          luckman212 LAYER 8
          last edited by

          Would you mind posting some screenshots of your config?  I have literally spent hours and cannot make that work.  Of course redact any sensitive info but it would be extremely helpful to see a sample working config – CA / server cert pages and then the IPSEC tunnel pages showing P1/P2 config..... thank you very much

          1 Reply Last reply Reply Quote 0
          • D
            daxpfacc
            last edited by

            To be more clear you need subscription to a dynamic dns service:

            https://doc.pfsense.org/index.php/Dynamic_DNS

            In the image you see user cert that should be server cert, sorry

            DDNS is somewhere.dyndns.com sorry again.

            server-cert.jpg
            server-cert.jpg_thumb

            1 Reply Last reply Reply Quote 0
            • luckman212L
              luckman212 LAYER 8
              last edited by

              Thanks - I do know what a DDNS service is and I already subscribe to that and have my DDNS working.  What I am saying is when I tried to use that in my cert, it resulted in a non-working config.  So I was hoping to see more of your screenshots from those sections and see where I might have made a wrong turn…

              It's interesting that you have an @ symbol in yours.. is that valid??

              1 Reply Last reply Reply Quote 0
              • D
                daxpfacc
                last edited by

                Screenshots

                phase1-1.png
                phase1-1.png_thumb
                phase1-2.png
                phase1-2.png_thumb
                phase2-1.png
                phase2-1.png_thumb
                phase2-2.png
                phase2-2.png_thumb

                1 Reply Last reply Reply Quote 0
                • luckman212L
                  luckman212 LAYER 8
                  last edited by

                  daxpfacc, just wanted to confirm (because I was re-reading this and noticed you linked to a post about installing certs in Windows)- have you gotten this config working on MacOS X and/or iOS9?

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    You need to create a server certificate using the DDNS FQDN as both the CN and a SAN as described in that guide.

                    Use that certificate as the server certificate.

                    Import and trust the CA in the device.

                    Instruct your clients to connect to the FQDN not the IP address.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • luckman212L
                      luckman212 LAYER 8
                      last edited by

                      Thank you - I had success last night and was able to get a working IKEv2 set up [pfSense 2.3.1_5 / OS 10.11.5 / iOS 9.3.2]. I was struggling at first because my connection would immediately fail when I hit connect if a DNS name was specified for "Server".  On a whim I tried putting an IP there instead and - it worked.  Then I tried a different DDNS name (pointed at the same IP) and that worked too.

                      So for now, the quirk I'm trying to overcome is that the "Server Address" and the "Remote ID" fields cannot be the same or the connection immediately fails.  Not sure if that's something I've configured wrong or if that's expected behavior…

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        Is the name you are trying to use actually out in global DNS?

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • luckman212L
                          luckman212 LAYER 8
                          last edited by

                          Yes it is in public DNS.  It's a really strange problem actually.  I don't know exactly where the problem lies but here's what the symptoms are:

                          Let's assume I have 2 public DNS domains "foo.com" and "baz.com" hosted on Namecheap

                          • I have set the wildcard A record '*.foo.com' as a Dynamic DNS entry pointing to the WAN IP of my pfSense router

                          • I have ext.baz.com also pointing to the WAN IP of my pfSense router (same IP as *.foo.com)

                          • Router name (System > General) is "r1.foo.com"

                          • IKEv2 Server Cert "CN" = "r1.foo.com"

                          • IPSEC IKEv2 Phase1 "My Identifier" (Distinguished Name) = "r1.foo.com"

                          Now, from a machine OUTSIDE of the LAN:

                          • dig r1.foo.com returns the correct public IP, let's say 11.22.33.44

                          • dig ext.baz.com returns the exact same IP 11.22.33.44

                          BUT, if I specify "r1.foo.com" in the Server Address from my VPN client (Mac) and try to connect, it immediately fails.  However, changing it to "ext.baz.com" works fine.  I don't even have to have ext.baz.com set as a SAN on the cert, it just works.

                          So what I have concluded for now is that somehow, having the identifier on the Phase1 the same as the system/router name may be causing the issue … could be some sort of interaction with DNS not resolving right from the router itself if strongSwan is maybe querying r1.foo.com during the negotiation phase. ??? Not sure

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            What's in the logs?

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.