Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPsec Phase 2 entry for access to WAN interface?

    Scheduled Pinned Locked Moved IPsec
    4 Posts 2 Posters 454 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M Offline
      marama
      last edited by

      I've setup an IPsec tunnel between 2 locations, and everything is working fine. The "location B" is a pfSense behind a router (port forwarding for IPsec). PpfSense has a WAN address 192.168.0.6 . There are other devices in 192.168.0.0/24 network I need to be able to access from "location A", and I have no idea how to achieve that. There is also a 192.168.0.0/24 network in use on "location A", so I obviously need to do some translation voodoo on Phase 2 entry, but I don't know if it's even possible. Any ideas?

      1 Reply Last reply Reply Quote 0
      • viktor_gV Offline
        viktor_g Netgate
        last edited by

        Perhaps you need Phase 2 BINAT:
        https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/nat-with-ipsec-phase-2-networks.html

        M 1 Reply Last reply Reply Quote 0
        • M Offline
          marama @viktor_g
          last edited by

          @viktor_g said in IPsec Phase 2 entry for access to WAN interface?:

          Perhaps you need Phase 2 BINAT:
          https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/nat-with-ipsec-phase-2-networks.html

          Yes, that's what I meant with translation, but the trick is, the subnet I want to reach is on WAN interface on the "location B", so I guess it's not something I can define in Phase 2 entry.

          viktor_gV 1 Reply Last reply Reply Quote 0
          • viktor_gV Offline
            viktor_g Netgate @marama
            last edited by

            @marama So, you can try to use Policy NAT with some pseudo net which translates to 192.168.0.0/24 of WAN (10.0.0.0/24 in example):
            Port Forward with source field:
            Screenshot from 2019-09-02 12-04-07.png

            or 1:1 NAT with destination field

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.