IPSec Tunnel using Proxy ARP Virtual IP
- 
 Hi everyone, 
 I'm a new user.I have a problem with an IPSec tunnel between 2 PFsense. The scenario is as follows: Office A 
 PFSense behind router with a single Public IP NATted 1:1 to PFSense WAN IP
 (eg. 95.95.95.1 -> 192.168.x.5)Office B 
 PFsense behind router with 4 Public static IPs NATted 1:1 to 4 private IPs and a dynamic public IP (which here I define as "97.97.y.y) NATted 1:1 to the physical WAN IP address:
 (eg. 97.97.97.1 -> 10.10.x.1,
 97.97.97.2 -> 10.10.x.2,
 97.97.97.3 -> 10.10.x.3,
 97.97.97.4 -> 10.10.x.4
 97.97.y.y-> 10.10.x.5)PFS B has only 1 physical NIC used as WAN which was configured with 10.10.x.5. These 4 private IP addresses were configured on PFS B as Proxy ARP Virtual IP, so there are 4 public IP addresses pointing to a single PFS. I want to configure IPSec tunnel between 95.95.95.1 (A) and 97.97.97.4 (B), but once I finish configuring it, tunnel doesn't work, no connection established. 
 If I open "IPSec Status" page, I see "10.10.x.5" in "Local IP" column, and this is the problem because it should be "10.10.x.4" instead.How can I configure PFSense so that the Local IP address is the Proxy ARP IP 10.10.x.4? Thanks in advance. 
- 
 Any idea? :( :( :-[ 
- 
 No services on pfSense can use Proxy ARPs. You will need to convert it to a IP Alias. Once it has been converted to an IP Alias, on the IPSEC configuration Phase 1 switch the interface from WAN to the new IP Alias. 
- 
 Is it the same for OpenVPN? Now I'm trying to configure an OpenVPN Site-to-Site tunnel with the same Proxy ARP Virtual IP, but it doesn't work. Some time ago I configured an OpenVPN SSL/TLS tunnel using the same VIP and it works (I had to create a NAT rule that would translate VIP:1194 to 127.0.0.1:1194). 
- 
 You cannot bind any services running on the firewall to a proxy arp vip. https://doc.pfsense.org/index.php/What_are_Virtual_IP_Addresses You can probably tell OpenVPN to listen on localhost and port forward to it like you described. Not sure about IPsec. 
