Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Alternate address NAT for IPSEC VTI

    Scheduled Pinned Locked Moved IPsec
    14 Posts 5 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      enialos @jonathan.v
      last edited by

      @jonathan-v hello Jonathan,

      I ended up with policy-based VPN too. The problem is that there some security administrators that avoid policy-based VPNs and demand for the route-based. I hope in the future Netgate can provide a solution for this limitation.

      1 Reply Last reply Reply Quote 0
      • E
        eXo @enialos
        last edited by

        @enialos

        I'm confused about the wording of that slide. But it would seem that:

        • Local Net 10.1.1.0/24 > routed througgh VTI to the VTI GW 10.2.2.1/24 and NATed to that same address should work.

        In my case, packets reach the end machine and come back but they stay on the IPSec interface, they do not reach the LAN

        Anyone has succeded?? Is it really a limitation/bug??

        1 Reply Last reply Reply Quote 0
        • E
          eXo
          last edited by

          did you manage to make it work? perhaps a workaround?
          We are currently trying to get another device to do the NAT

          Thank you

          E 1 Reply Last reply Reply Quote 0
          • M
            Morlock
            last edited by

            I don't see the limitation. Is it about NATing to an address of the tunnel network? Why would you try that?

            E 1 Reply Last reply Reply Quote 0
            • E
              enialos @eXo
              last edited by

              @eXo Hello eXo,

              If you go with policy-based VPN there is an option in phase 2 where you decide to use NAT or not and, with this configuration, everything work as it should do.

              But if you decide to go with route-based(VTI option) there is not this NAT option. So if you would like to NAT your network you would go to NAT options, select the VTI interface and configure the NAT. But this just do not work and this the limitation we are discussing in this topic.

              The workaround I am using is policy-based VPN(Tunnel IPV4 option).

              1 Reply Last reply Reply Quote 0
              • E
                enialos @Morlock
                last edited by

                @Abbys For example if your network is 192.168.10.0/24 and the other side uses this same network too. In this case you must NAT your network, for example with 192.168.20.0/24. The issue we are discussing is this topic is that when you use route-vti option(route-based VPN) the NAT do not work properlly.

                M 1 Reply Last reply Reply Quote 0
                • M
                  Morlock @enialos
                  last edited by

                  @enialos Ok, but that is a flawed network design.
                  If you have to do it, is the translation network properly routed?

                  E 2 Replies Last reply Reply Quote 0
                  • L
                    linkos
                    last edited by

                    Hello, i also face the problem. We have some customers who want routed vti ipsec tunnels and we need to nat over the ipsec like for a traditionnal one where we can define the NAT in the phase 2. Is netgate going to fix it ? Thanks

                    1 Reply Last reply Reply Quote 0
                    • E
                      enialos @Morlock
                      last edited by

                      @Morlock You are right but it happens sometimes in the real world especially when you have to configure VPNs with different customers.

                      1 Reply Last reply Reply Quote 0
                      • E
                        enialos @Morlock
                        last edited by

                        @Morlock It should do nat yes, but as far as I know it's not working. Others firewalls like vyatta and Fortigate do. Take a look at this https://pt.slideshare.net/NetgateUSA/routed-ipsec-on-pfsense-244-pfsense-hangout-june-2018 (page 7).

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.