Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Are the Autocreated ISAKMP rules needed?

    NAT
    4
    10
    7.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      powerextreme
      last edited by

      Are the Autocreated ISAKMP NAT rules needed if I am not using IPSEC?Screen Shot 2020-07-25 at 5.38.16 PM.png

      The above is for the loopback. But are they needed for the LAN network ?

      THanks!

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        Less and less these days. Most modern IPsec clients you'd have on your network will happily use NAT-T and won't need that static source port rule for udp/500.

        The primary exception is if you have a device on your local network which needs its own site-to-site IPsec tunnel to a remote endpoint, but even those are more forgiving. Unless the remote end has some seriously outdated VPN setup.

        It's still in the config because it's relatively harmless to keep. Unlikely to cause problems and still benefits some (admittedly rare, now) cases.

        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • Raffi_R
          Raffi_
          last edited by

          The static port section under NAT in the docs explains that default rule.
          https://docs.netgate.com/pfsense/en/latest/book/nat/outbound-nat.html#static-port.

          Found this as well, which kind of says its a requirement.
          41273cda-0ed9-424c-9ba9-ccbae3c44dc1-image.png

          jimpJ 1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate @Raffi_
            last edited by

            @Raffi_ said in Are the Autocreated ISAKMP rules needed?:

            Found this as well, which kind of says its a requirement.

            That is only for IPsec endpoints (like if pfSense was terminating the connection itself) -- that doesn't apply to routers/firewalls/NAT in between endpoints.

            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            Raffi_R 1 Reply Last reply Reply Quote 0
            • Raffi_R
              Raffi_ @jimp
              last edited by

              @jimp said in Are the Autocreated ISAKMP rules needed?:

              @Raffi_ said in Are the Autocreated ISAKMP rules needed?:

              Found this as well, which kind of says its a requirement.

              That is only for IPsec endpoints (like if pfSense was terminating the connection itself) -- that doesn't apply to routers/firewalls/NAT in between endpoints.

              Meaning if an IPsec tunnel is setup in pfSense? So would it make sense to auto add this rule only if someone adds a IPsec tunnel?

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                That NAT rule is not relevant to IPsec on pfSense -- only connections passing through pfSense. strongSwan wouldn't initiate from localhost or LAN and go out and have NAT applied. It binds directly to the WAN interface(s).

                Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 1
                • demD
                  dem
                  last edited by

                  In the past I believe these rules caused me problems when multiple IKEv2 clients tried to initiate connections too close together (i.e., before the states from the previous attempt expired). I created my own patch to disable generation of these rules while still letting me use "Automatic Outbound NAT". My clients are now using WireGuard so I'm no longer applying the patch.

                  It would be convenient if you could disable generation of these rules with, for example, a checkbox in "System / Advanced / Firewall & NAT".

                  1 Reply Last reply Reply Quote 0
                  • P
                    powerextreme
                    last edited by

                    Thanks for the answers folks. Follow-up:

                    So I can delete these rules and have no issues?

                    @jimp How did you get WireGuard running on the pfSense?

                    1 Reply Last reply Reply Quote 0
                    • P
                      powerextreme
                      last edited by

                      Also, why is the loopback address using ISAKMP?

                      jimpJ 1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate @powerextreme
                        last edited by

                        @powerextreme said in Are the Autocreated ISAKMP rules needed?:

                        Also, why is the loopback address using ISAKMP?

                        It normally isn't, but it's included in the networks for automatic outbound NAT rules, and each entry in that list gets the udp/500 static port rule.

                        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.