Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    "Disable Auto-added VPN rules" not working & ASN 1 DN

    Scheduled Pinned Locked Moved General pfSense Questions
    5 Posts 2 Posters 557 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      Woodsomeister
      last edited by

      Hello,

      Unfortunately the setting to deactivate the automatically generated VPN rules does not work for me.

      I have 2 pfSense firewalls in use and on both this setting is active, but they still establish a connection. How can that be?

      Shouldn't the firewall block all attempts to initiate a connection?

      Furthermore, I have activated the ASN 1 Distinguished name identifier for mutual authentication. This is equivalent with the common name of the respective client certificates, isn't it?

      Thanks

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        IPSec is using UDP and, usually, ESP. If both firewalls are configured to establish a tunnel then both with open outbound states to the other IP. Those states will match the incomging traffic from the other side passing it.
        If you set one side to responder only I would expect it to fail.

        ASN.1 is the identifier type which is sent along with the identifier value. It must match what the other side is set to. If both sides are pfSense that's obviously not a problem.
        For example we corrected that for KeyID in 2.4.5: https://redmine.pfsense.org/issues/9243

        Steve

        W 1 Reply Last reply Reply Quote 0
        • W
          Woodsomeister @stephenw10
          last edited by

          @stephenw10

          Thank you very much for your answer!

          I do not quite understand the ASN.1.
          I have now entered different values for ASN.1, also so that they were different on the 2 pfsense firewalls. Nevertheless, a connection was made between the two. Does the ASN.1 value play a role?

          For authentication i use Mutual RSA.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Hmm, I would not expect them to connect with mismatched identifiers. Did you stop-start the ipsec service between changes? It's possible it was still running with the previous value.

            Steve

            W 1 Reply Last reply Reply Quote 0
            • W
              Woodsomeister @stephenw10
              last edited by

              @stephenw10 Yes i did this, but only for one side.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.