<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[IPSEC Client -&gt; Site-to-Site VPN via PFsense]]></title><description><![CDATA[<p dir="auto">Dear volks,</p>
<p dir="auto">This is my first post so don't blame me :) I have the following situation:</p>
<ul>
<li>Windows Clients connects via Shrew Soft VPN Client to my PFsense (IPSEC / virtual IP Range therefore is 10.10.10.0/24)</li>
<li>A Fortigate connects via IPSEC site-to-site into my PFsense (and has the network 192.168.90.0/24)</li>
<li>my local network is 172.10.10.0/24  (where the PFsense sit in)</li>
</ul>
<p dir="auto">The goal is to be able to connect the Windows client to my PFsense and be able to access the 192.168.90.0/24 network</p>
<p dir="auto">Actual i'm able to open the IPSEC from the windows client and access my local network (172.10.10.0)</p>
<p dir="auto">I tried several things that should fix the issue, without success. Now i ask the pro's here … what would help is to know</p>
<ul>
<li>what firewall rules needs to be in place</li>
<li>actual i'm doing NAT on all tunnel - is this ok?</li>
</ul>
<p dir="auto">sidenote: if i try to get the accessable networks by the windows client (route print) i do not get the 192.168.90.0 network provided (the local network 172.10.10.0 is provided) . I added them manual in the Shrew Soft Client ....</p>
<p dir="auto">Thanks for everybody to support me on this!</p>
<p dir="auto">BR,<br />
Matthias</p>
]]></description><link>https://forum.netgate.com/topic/111646/ipsec-client-site-to-site-vpn-via-pfsense</link><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 05:41:26 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/111646.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 14 Feb 2017 17:54:29 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to IPSEC Client -&gt; Site-to-Site VPN via PFsense on Mon, 27 Feb 2017 23:01:42 GMT]]></title><description><![CDATA[<p dir="auto">Hi</p>
<p dir="auto">Figured out a workaround myself.</p>
<p dir="auto">On mobile P1 add a P2 to route everything 0.0.0.0/0. And I am using Android built in VPN client which can define what range of IPs to go through with VPN</p>
<p dir="auto">site to site P2s are needed as suggested</p>
<p dir="auto">Thanks</p>
]]></description><link>https://forum.netgate.com/post/683070</link><guid isPermaLink="true">https://forum.netgate.com/post/683070</guid><dc:creator><![CDATA[mrcola]]></dc:creator><pubDate>Mon, 27 Feb 2017 23:01:42 GMT</pubDate></item><item><title><![CDATA[Reply to IPSEC Client -&gt; Site-to-Site VPN via PFsense on Mon, 27 Feb 2017 16:56:44 GMT]]></title><description><![CDATA[<p dir="auto">Hey all,</p>
<p dir="auto">Exactly the same here, adding a second PH2 network isn't fixing my issue. Either the mobile client don't know how to reach the other IPSEC-Destination. On Fortigate you can define static routes and each ipsec-connection can be added as "source device". Unfortunately this is working not the same on pfsene. What i'm missing is a way to tell a pfsense static route to use a IPSEC connection as "gateway". If anybody can shed some light into this issue i would really appreciate.</p>
<p dir="auto">BR,<br />
Matthias</p>
]]></description><link>https://forum.netgate.com/post/682968</link><guid isPermaLink="true">https://forum.netgate.com/post/682968</guid><dc:creator><![CDATA[mdonner]]></dc:creator><pubDate>Mon, 27 Feb 2017 16:56:44 GMT</pubDate></item><item><title><![CDATA[Reply to IPSEC Client -&gt; Site-to-Site VPN via PFsense on Mon, 20 Feb 2017 08:32:57 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/jimp">@<bdi>jimp</bdi></a>:</p>
<blockquote>
<p dir="auto">You need to setup Phase 2 entries for the extra network, so:</p>
<p dir="auto">On Mobile P1, you need a P2 for 192.168.90.0/24 and 172.10.10.0/24<br />
On the Fortigate IPsec tunnel P1, you need a P2 to cover 10.10.10.0/24 &lt;-&gt; 192.168.90.0/24 (on both pfSense and the Fortigate!)</p>
<p dir="auto">And you also have to pass that traffic in IPsec tab firewall rules</p>
</blockquote>
<p dir="auto">Hi Admin</p>
<p dir="auto">I have got the similar setup</p>
<p dir="auto">site to site IPsec VPN both running PFsense 2.3.2_p1 (192.168.50.0/24 and 192.168.70.0/24) and a mobile ipsec endpoint (192.168.71.0/24), my goal is to allow mobile ipsec users to access both sites.</p>
<p dir="auto">Now I have got the following setup</p>
<p dir="auto">Mobile P2 192.168.70.0/24 and 192.168.50.0/24<br />
Site to Site P2 192.168.70.0/23 (cover both 0.70 and 0.71) &lt;-&gt;192.168.50.0/24</p>
<p dir="auto">So far the user which has 192.168.71.1 (Android native IPsec client) can access 192.168.70.0/24 but not the 192.168.50.0/24. The firewall rules in IPsec are set to allow all.</p>
<p dir="auto">Here is the tracert from a Win box in the 192.168.50.0/24 subnet (192.168.50.2 is the pfsense Lan IP)</p>
<p dir="auto">tracert 192.168.70.2</p>
<p dir="auto">Tracing route to 192.168.70.2 over a maximum of 30 hops</p>
<p dir="auto">1    &lt;1 ms    &lt;1 ms    &lt;1 ms  192.168.50.2<br />
  2    7 ms    7 ms    6 ms  192.168.70.2</p>
<p dir="auto">tracert 192.168.71.1</p>
<p dir="auto">Tracing route to 192.168.71.1 over a maximum of 30 hops</p>
<p dir="auto">1    &lt;1 ms    &lt;1 ms    &lt;1 ms  192.168.50.2<br />
  2    *        *        *    Request timed out.<br />
  3    *        *        *    Request timed out.<br />
  4  ^C</p>
<p dir="auto">In the firewall states I can see some traffics so I guess PFsense doesn't know where to send traffic back</p>
<p dir="auto">Please advise</p>
<p dir="auto">Thanks</p>
]]></description><link>https://forum.netgate.com/post/681075</link><guid isPermaLink="true">https://forum.netgate.com/post/681075</guid><dc:creator><![CDATA[mrcola]]></dc:creator><pubDate>Mon, 20 Feb 2017 08:32:57 GMT</pubDate></item><item><title><![CDATA[Reply to IPSEC Client -&gt; Site-to-Site VPN via PFsense on Fri, 17 Feb 2017 16:12:57 GMT]]></title><description><![CDATA[<p dir="auto">You need to setup Phase 2 entries for the extra network, so:</p>
<p dir="auto">On Mobile P1, you need a P2 for 192.168.90.0/24 and 172.10.10.0/24<br />
On the Fortigate IPsec tunnel P1, you need a P2 to cover 10.10.10.0/24 &lt;-&gt; 192.168.90.0/24 (on both pfSense and the Fortigate!)</p>
<p dir="auto">And you also have to pass that traffic in IPsec tab firewall rules</p>
]]></description><link>https://forum.netgate.com/post/680708</link><guid isPermaLink="true">https://forum.netgate.com/post/680708</guid><dc:creator><![CDATA[jimp]]></dc:creator><pubDate>Fri, 17 Feb 2017 16:12:57 GMT</pubDate></item></channel></rss>