Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Multiple IPsec Mobile Clients

    Scheduled Pinned Locked Moved IPsec
    13 Posts 4 Posters 2.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I
      ironphil
      last edited by

      @viniciusmerlim I have multiple VLANs with different Active Directories behind one pfsense. Each user should be able to log in to the Ipsec VPN with their own AD Credentials and should only have a Phase 2 Entry for their corresponding VLAN net.

      Does anyone know if there s a chance to realize that with some direct configuration changes or is such a feature planned in the future? I have multiple WAN IPs, so i can easily assign one WAN IP for each VLAN Mobile config if needed.

      keyserK 1 Reply Last reply Reply Quote 0
      • keyserK
        keyser Rebel Alliance @ironphil
        last edited by keyser

        @ironphil Like I said, pfSense IPSec can only have one instance for mobile users, so you can’t create an individual IPSec setup pr. AD.

        On normal IPsec VPN boxes you could handle your situation by creating several IPSec instances, or you could radiusproxy your different Radius/AD’s from a local FreeRadius package, and have the different radiusservers return a group ID so you could apply different firewall rules to different users. But pfSense IPsec does not support that either, so I’m sorry to say it again, but if you want to use pfSense, you need to use OpenVPN to solve your needs. The built-in IPsec mobile features are very rudimentary - works great for a simple one type user/network setups, but it is useless for more advanced setups.

        The Mobile feature is a sort of “bolt on” to the Site-2-Site IPsec engine. It was originally a site-2-site design it was created for.

        Love the no fuss of using the official appliances :-)

        1 Reply Last reply Reply Quote 1
        • A
          Alberto 0
          last edited by

          @keyser said in Multiple IPsec Mobile Clients:

          It was originally a site-2-site design it was created fo

          Hi,
          I have a similar question here link text.
          I understanding correct that is not possible to implement something like what in the schema below?

          01cc2eb9-a6c5-4927-8797-64236f658899-image.png

          Best Regards
          Albe

          keyserK 1 Reply Last reply Reply Quote 0
          • keyserK
            keyser Rebel Alliance @Alberto 0
            last edited by

            @alberto-0

            Well that should indeed be possible without any trouble. All you really need to make sure is that you are not using Mobile VPN for the setup but instead create a unique P1+P2 for each connection, and make sure the identifiers are specific for each connection (so it can tell each remote apart).

            Since they are using Dynamic IP, I would make sure to have the remote sites register a DYNDNS name for their IP, and have the tunnel endpoint and identification use that name.

            Love the no fuss of using the official appliances :-)

            A 1 Reply Last reply Reply Quote 0
            • A
              Alberto 0 @keyser
              last edited by

              @keyser thanks' for the answer, is that mandatory to register DYNDNS? because configure 3 different P1+P2 only one VPN goes up (seems a difficult to distinguished link)

              Best Regards, and thanks' again.
              Alberto

              keyserK 1 Reply Last reply Reply Quote 0
              • keyserK
                keyser Rebel Alliance @Alberto 0
                last edited by

                @alberto-0
                No, DYNDNS is not mandatory - you can configure the remote endpoint in each P1 by IP adress instead. but if you do, then you need to reconfigure your tunnel every time the endpoints change IP. That’s why DYNDNS makes it easier.

                You need three different P1 +P2’s on your central box - how would it otherwise be able to distinguish the 3 endpoints from one another? Each of them also needs different IP subnets routed i P2 - otherwise the routing will fail and it cannot know which tunnel to use for which traffic.

                Love the no fuss of using the official appliances :-)

                1 Reply Last reply Reply Quote 0
                • V
                  viniciusmerlim
                  last edited by

                  @Alberto-0 you can also use a noip free account.

                  A 1 Reply Last reply Reply Quote 0
                  • A
                    Alberto 0 @viniciusmerlim
                    last edited by

                    @viniciusmerlim ok, thanks' a lot for answers. I used no-ip to configure all af three VPNSs!

                    keyserK 1 Reply Last reply Reply Quote 1
                    • keyserK
                      keyser Rebel Alliance @Alberto 0
                      last edited by

                      @alberto-0 Then it won’t work because you are in effect using the mobile IPsec framework.
                      With Mobile IPSec only the client can initiate the connection, and you are not using remote site routing where the central hub can initiate the tunnel.

                      So like I said, you need to create three distinct P1+P2’s centrally that connects to the remote device IP in P1, and have a distinc IP subnet for each site in P2

                      Love the no fuss of using the official appliances :-)

                      1 Reply Last reply Reply Quote 0
                      • V
                        viniciusmerlim
                        last edited by

                        I have multiple IPsec in place. But only 1 mobile. For each site-to-site you need to create P1 and P2 like @keyser said.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.