Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Virtual Address Pool in Pre-Shared Keys is not used for ipsec

    IPsec
    8
    12
    2.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      nohimx
      last edited by

      Hello. I was configured VPN according THIS, and i managed to connect.
      But when i specified additional IP pool for specific preshared key, it not work. Client still received IP from default pool.
      I need to find was to provide specific IP addresses to different VPN clients, and i dont want to use radius. Reading forums it say that this feature should work, but not really. Version of my pfsense is 2.4.4-Release-p3 . Can somebody help?

      H 1 Reply Last reply Reply Quote 0
      • J
        jsiverskog
        last edited by

        +1 on this

        1 Reply Last reply Reply Quote 0
        • E
          Erik Svensson
          last edited by

          I have the same thing in windows 10. If I use a strongswan client in my cell phone it works, Right now I am trying a mac to see if i got the same result. I have tested with windows 10 1809 1903 and 1909 with the same bad result.

          1 Reply Last reply Reply Quote 0
          • H
            heltech @nohimx
            last edited by

            @nohimx I have the same problem. I use macOS Catalina 10.15.1 as VPN client. The ip-adress I get is from the global pool even though I configured one on the pre-shared key for the user.

            H 1 Reply Last reply Reply Quote 0
            • H
              heltech @heltech
              last edited by

              I just solved it on Mac. On the client, in the VPN configuration, for "Local ID" I entered the same email address that I used in the pfsense pre shared key as identifier. Now I get an IP-adress from the pool that I assigned to the pre shared key.

              1 Reply Last reply Reply Quote 0
              • M
                mlevy823
                last edited by

                I am currently also having this issue on windows server 2016. The vpn connection will not connect if you turn off Virtual Address Pool under Mobile Clients and set one for a user under Pre-Shared Keys it will not connect. When you do enable the Virtual Address Pool under Mobile Clients then the vpn will connect but will ignore the virtual address put under the connecting Pre-Shared Key user.

                E 1 Reply Last reply Reply Quote 0
                • E
                  Erik Svensson @mlevy823
                  last edited by

                  @mlevy823 Windows Rasman use ip address instead of IKE local ID. There is no ´solution today for this problem. I use Strongswan client as a work around.

                  1 Reply Last reply Reply Quote 2
                  • E
                    es9465
                    last edited by

                    There are any solutions about this problem?
                    Or what client for IKEv2 ipsec connection may I use under Windows?

                    jimpJ 1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate @es9465
                      last edited by

                      @es9465 said in Virtual Address Pool in Pre-Shared Keys is not used for ipsec:

                      There are any solutions about this problem?
                      Or what client for IKEv2 ipsec connection may I use under Windows?

                      It is primarily a client problem. The client is not using a identifier in Phase 1 that the IPsec daemon on pfSense can associate with a given client. For example it may be using its own IP address instead of the EAP username.

                      See https://redmine.pfsense.org/issues/12549 for some more info as well.

                      I've tried working around it a few different ways but haven't hit anything reliable so far.

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      keyserK 1 Reply Last reply Reply Quote 0
                      • keyserK
                        keyser Rebel Alliance @jimp
                        last edited by

                        @jimp Hi Jimp

                        This is really turning into major issue for me and my pfSense customers. The fact that you cannot assign Windows VPN clients different IP pools based on a radius return - or even the preshared-key assigned pool - is essentially making pfSense Mobile Ipsec worthless as all clients are treated equal.

                        yes i know, return a framed-IP with radius, but that does not scale at all.

                        This is the single most problematic issue I have with pfSense - its such a sweet idea to use the built-in VPN client in operating systems. But not with pfSense if you need different access rights for users :-(

                        Any chance that any of the feature requests for this ever gets bumped into production? It’s been 10 years now….

                        Love the no fuss of using the official appliances :-)

                        1 Reply Last reply Reply Quote 0
                        • jimpJ
                          jimp Rebel Alliance Developer Netgate
                          last edited by

                          It works right now if the client sends the correct identifier in P1, but the problem is that Windows doesn't. Other clients like those on Linux or the strongSwan app send the correct ID and can use per-user addresses right now.

                          There is a patch in the Redmine issue linked above that has shown promise with Windows clients but isn't a complete solution.

                          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          keyserK 1 Reply Last reply Reply Quote 0
                          • keyserK
                            keyser Rebel Alliance @jimp
                            last edited by

                            @jimp said in Virtual Address Pool in Pre-Shared Keys is not used for ipsec:

                            It works right now if the client sends the correct identifier in P1, but the problem is that Windows doesn't. Other clients like those on Linux or the strongSwan app send the correct ID and can use per-user addresses right now.

                            There is a patch in the Redmine issue linked above that has shown promise with Windows clients but isn't a complete solution.

                            Jimp, if you could get that patch to work - and thereby enable windows native clients to use PSK defined pool addresses - would be REALLY nice!!

                            Any chance you could spend a little time to get the IPSec Daemon to accept a virtual address pool returned from Radius in a EAP-Radius setup? That would be the ultimate solution to get pfSense IPSec VPN go Enterprise. Right now its useless because it doesn’t scale and you cant separate user rights with firewall rules.

                            Love the no fuss of using the official appliances :-)

                            1 Reply Last reply Reply Quote 0
                            • lifeboyL lifeboy referenced this topic on
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.