Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site-to-Site IPSec w/one side behind NAT?

    Scheduled Pinned Locked Moved IPsec
    4 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      TheWaterbug
      last edited by

      I already have several sites up and running like Remote Worker 1, where I have a pfsense box at the edge of the remote network establishing an IPSec tunnel back to the main office:

      alt text

      Can I put a pfsense box (SG-1100) inside Remote Worker 2's house, behind his generic ISP router, and establish a tunnel for that one PC?

      • Do I connect the WAN port on the SG-1100 to the remote LAN?

      • Do I use the ISP router's address as the default Gateway?

      • Do I need to port-forward anything in the ISP router if the SG-1100 can initiate the tunnel?

      • Is it a problem if the default LAN in Remote2 is either 192.168.0.0 or 192.168.1.0, e.g. conflicting with any of the other connected LANs?

      Setting up a software IKEv2 client in Windows 10 at Remote 2 has not been successful, and I've wasted enough hours to want to try something else, and I have the unused SG-1100 lying around anyway.

      I do not understand WireGuard or OpenVPN well enough to want to learn something new right now, but I have set up several IPSec tunnels successfully, so I have a preference to try this if it will work.

      Thanks!

      maverickwsM 1 Reply Last reply Reply Quote 0
      • maverickwsM
        maverickws @TheWaterbug
        last edited by

        @thewaterbug I have IPSec Site-to-Site where ONE of the sides is behind NAT. No problem at all.
        Just initiate the connection from the side behind NAT. Nothing extraordinary to configure.

        T 1 Reply Last reply Reply Quote 1
        • T
          TheWaterbug @maverickws
          last edited by

          @maverickws said in Site-to-Site IPSec w/one side behind NAT?:

          @thewaterbug I have IPSec Site-to-Site where ONE of the sides is behind NAT. No problem at all.
          Just initiate the connection from the side behind NAT. Nothing extraordinary to configure.

          Once the tunnel has been initiated by the pfsense inside Remote2 and the tunnel established, could a host inside Main Office be routed out to the internet through Remote2, e.g. so the Geo IP location would identify as being from Remote2?

          V 1 Reply Last reply Reply Quote 0
          • V
            viragomann @TheWaterbug
            last edited by

            @TheWaterbug
            If it's a policy-based IPSec there is no possibility to route certain hosts over it, you would only be able to route all upstream traffic over the VPN.
            If it's a VTI you can do this.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.