Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Multiple Roadwarriors Phase 1

    Scheduled Pinned Locked Moved IPsec
    8 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      megapearl
      last edited by

      Is it possible?

      I need for example 2 inbound vpn connections, one for Apple Devices which use IKEv2 EAP-TLS and one for Windows devices which are using IKEv1 Mutual RSA (via Shrewsoft VPN)
      But I can only create one Phase 1 mobile client Connection, when I create a second Phase 1 I Must fill in a Remote Gateway but there isn't one with roadwarrior.

      How can I accomplish it?

      Best Regards,
      Donald.

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        I've yet to figure out why people insist on working themselves to death when openvpn will do it crazy easy?

        1 Reply Last reply Reply Quote 0
        • M
          megapearl
          last edited by

          OpenVPN isn't a standard, I don't want or can't install additional VPN Software on the devices, and it isn't always possible to install it due to company policies or restrictions.
          I want to use the default modern vpn clients which are already built in a lot of operating systems.

          1 Reply Last reply Reply Quote 0
          • K
            kejianshi
            last edited by

            I understand, but you are on the opposite of whatever a bleeding edge is. Also, openvpn traverses all kinds of NAT where IPsec just fails.

            These are actual roadwarriors?  I'd only use ipsec between 2 very simple networks with perfect conditions.

            But if your hands are tied, I guess there is nothing you can do.

            1 Reply Last reply Reply Quote 0
            • M
              megapearl
              last edited by

              Yes, they are roadwarriors, laptops in the field connected to 4G LTE Networks, and mobile devices like android and iphones.
              I had it several years ago working without pfsense, and created manually a ipsec.conf file with lot of different configurations using Strongswan.
              So it is possible, why isn't it implemented in pfSense?

              My config that time was:

              
              root@fileserver:/usr/local/etc # cat ipsec.conf
              config setup
                  cachecrls=yes
                  strictcrlpolicy=no
                  uniqueids=never
              
              conn %default
                  left=donald.flissinger.com
                  leftfirewall=no
                  leftdns=127.0.0.1
                  rightdns=10.0.0.1
              
              # compatible with iOS 8.0.1/8.1.0
              conn ikev1_cert
                  keyexchange=ikev1
                  fragmentation=yes
                  leftid=donald.flissinger.com
                  leftauth=pubkey
                  leftsubnet=0.0.0.0/0
                  leftcert=donaldflissinger.pem
                  right=%any
                  rightauth=pubkey
                  rightauth2=xauth
                  rightsourceip=10.0.1.2/27
                  rightcert=clientdonald.crt
                  auto=add
              
              # also supports iOS PSK and Shrew on Windows
              conn xauth_psk
                  keyexchange=ikev1
                  leftauth=psk
                  leftsubnet=0.0.0.0/0
                  right=%any
                  rightauth=psk
                  rightauth2=xauth
                  rightsourceip=10.0.1.2/27
                  auto=add
              
              # compatible with "strongSwan VPN Client" for Android 4.0+
              # and Windows 7/8 cert mode.
              conn ikev2_cert
                  keyexchange=ikev2
                  leftauth=pubkey
                  leftsubnet=0.0.0.0/0
                  leftcert=donaldflissinger.pem
                  right=%any
                  rightauth=pubkey
                  rightsourceip=10.0.1.2/27
                  rightcert=clientdonald.pem
                  auto=add
              
              conn windows8
                  keyexchange=ikev2
                  ike=aes256-sha1-modp1024!
                  esp=aes256-sha1!
                  dpdaction=clear
                  dpddelay=300s
                  rekey=no
                  left=%any
                  leftcert=vpn-Cert.pem
                  leftsubnet=0.0.0.0/0
                  right=%any
                  rightcert=win8client-Cert.pem
                  rightsourceip=10.0.1.2/27
                  auto=add
              
              conn ikev2_mschapv2
                  keyexchange=ikev2
                  ike=aes256-sha1-modp1024!
                  rekey=no
                  leftauth=pubkey
                  leftsubnet=0.0.0.0/0
                  leftcert=donaldflissinger.pem
                  right=%any
                  rightauth=eap-mschapv2
                  rightsourceip=10.0.1.2/27
                  rightsendcert=never
                  eap_identity=%any
                  auto=add
              
              conn mainserver
                  aggressive=yes
                  authby=secret
                  leftid=@donald.flissinger.com
                  leftsubnet=10.0.0.0/24
                  right=proxy.flissinger.com
                  rightid=@proxy.flissinger.com
                  rightsubnet=10.0.1.0/24
                  auto=start
              root@fileserver:/usr/local/etc #
              
              
              1 Reply Last reply Reply Quote 0
              • K
                kejianshi
                last edited by

                IPsec works for pfsense.  But for all listed devices, openvpn is easier.  I dropped ipsec for myself because its just too easily broken depending on the network.

                However, there are many IPsec gurus on the forum.  I'm sure 1 will help you.

                1 Reply Last reply Reply Quote 0
                • S
                  SisterOfMercy
                  last edited by

                  I've found IPSec with pfSense works a lot better since IKE v2 got implemented/strongswan got used.

                  However, multiple roadwarrior phase 1s are not supported yet.  :(

                  Things like this showup as requests:
                  https://redmine.pfsense.org/issues/8036

                  Hi, I'm Lance Boyle, and people often wonder if I'm real.

                  1 Reply Last reply Reply Quote 0
                  • M
                    megapearl
                    last edited by

                    I ended up manually editing /cf/conf/config.xml to achieve what I want, just copied the relative code and changed the ikeid in phase 1 and 2 and uniqid in phase 2 , after that I was able to use the  pfsense GUI again.
                    I now can connect from android, windows, and apple devices using different authentication methods.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.