Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Interface Groups - No IPsec tunnels listed

    General pfSense Questions
    2
    10
    741
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by

      Im looking to set up a security-zone esqe set up for my firewall rules so i wanted to group a few of my IPsec tunnels together as they will share a similar rule set.
      When i go to click add to add my group members, all my interfaces are listed there but not my ipsecX interfaces.
      Maybe i thought this was just a limitation in that you cant select VPN interfaces but then i noticed i see my wireguard 'tun_wgX' interfaces listed.

      My ipsecX interfaces are assigned on the firewall. So not sure why its not showing up.

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @michmoor
        last edited by

        @stephenw10 Any idea on this?
        Im hesistent to open up a redmine because im not entirely sure its a "bug".
        I have IPsec, Wireguard,OpenVPN technologies and only IPsecX tunnels are the ones i cant set up for interface groups. They are set up as VTI interfaces so maybe thats a problem?

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          It's probably because the IPSec group already covers all IPSec tunnels unless you have switched the filtering mode.

          https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/firewall-rules.html#tunneled-ipsec-traffic-from-remote-to-local

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @stephenw10
            last edited by

            @stephenw10
            hmm. So i can have VTIs and per-interface filtering but cannot do VTI and grouping?

            My goal was to have IPsec1 and IPsec2 to be in the same group or "zone" and to have similar policies. Im also running dynamic routing hence the VTI need.

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              It's probably possible now but not implemented yet. VTI interfaces were deliberately excluded from groups because when they were introduced rules added to them had no effect.

              Now we have a way to move filtering onto the VTI interfaces they could likely be added back but it would require some logic there to allow it.

              See: https://redmine.pfsense.org/issues/11134

              You could comment out he code to allow it
              https://github.com/pfsense/pfsense/blob/master/src/usr/local/www/interfaces_groups_edit.php#L54

              Steve

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @stephenw10
                last edited by

                @stephenw10
                Oh man...this is nice.
                Ok let me try this out and let you know. Do i restart the webconfigurator once i commented out line 55-59 ?

                Also if putting in the ability to see it in the GUI is just a comment, why cant it done with an update (23.09)?

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  It needs some logic there to allow it only if filtering has been moved. But then would it also need code to remove it if the filtering is switched back? It needs more than just enabling again but doing that to test it is the first step.

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance @stephenw10
                    last edited by

                    @stephenw10

                    Works without issues once i commented out the section you told me.
                    So for next steps, should i open up a redmine to get this looked at or will you post a note internally to get the code rectified as you mentioned?

                    Nice quick fix Steve, seriously. I love it.

                    1db64ab6-5b61-4f75-a0da-447214882ef5-image.png

                    b0fc2d92-cffa-4e6b-b9f7-f015c6247851-image.png

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Yes, open it as a feature request and we can look into what else this might affect and how to implement it safely.

                      M 1 Reply Last reply Reply Quote 1
                      • M
                        michmoor LAYER 8 Rebel Alliance @stephenw10
                        last edited by

                        @stephenw10
                        Done.
                        Appreciate your quick assist on this.

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.