• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Interface Groups - No IPsec tunnels listed

General pfSense Questions
2
10
739
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    michmoor LAYER 8 Rebel Alliance
    last edited by Nov 3, 2023, 2:39 PM

    Im looking to set up a security-zone esqe set up for my firewall rules so i wanted to group a few of my IPsec tunnels together as they will share a similar rule set.
    When i go to click add to add my group members, all my interfaces are listed there but not my ipsecX interfaces.
    Maybe i thought this was just a limitation in that you cant select VPN interfaces but then i noticed i see my wireguard 'tun_wgX' interfaces listed.

    My ipsecX interfaces are assigned on the firewall. So not sure why its not showing up.

    Firewall: NetGate,Palo Alto-VM,Juniper SRX
    Routing: Juniper, Arista, Cisco
    Switching: Juniper, Arista, Cisco
    Wireless: Unifi, Aruba IAP
    JNCIP,CCNP Enterprise

    M 1 Reply Last reply Nov 5, 2023, 10:43 PM Reply Quote 0
    • M
      michmoor LAYER 8 Rebel Alliance @michmoor
      last edited by Nov 5, 2023, 10:43 PM

      @stephenw10 Any idea on this?
      Im hesistent to open up a redmine because im not entirely sure its a "bug".
      I have IPsec, Wireguard,OpenVPN technologies and only IPsecX tunnels are the ones i cant set up for interface groups. They are set up as VTI interfaces so maybe thats a problem?

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      1 Reply Last reply Reply Quote 0
      • S
        stephenw10 Netgate Administrator
        last edited by Nov 5, 2023, 10:44 PM

        It's probably because the IPSec group already covers all IPSec tunnels unless you have switched the filtering mode.

        https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/firewall-rules.html#tunneled-ipsec-traffic-from-remote-to-local

        M 1 Reply Last reply Nov 5, 2023, 10:53 PM Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @stephenw10
          last edited by Nov 5, 2023, 10:53 PM

          @stephenw10
          hmm. So i can have VTIs and per-interface filtering but cannot do VTI and grouping?

          My goal was to have IPsec1 and IPsec2 to be in the same group or "zone" and to have similar policies. Im also running dynamic routing hence the VTI need.

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          1 Reply Last reply Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by Nov 6, 2023, 12:16 PM

            It's probably possible now but not implemented yet. VTI interfaces were deliberately excluded from groups because when they were introduced rules added to them had no effect.

            Now we have a way to move filtering onto the VTI interfaces they could likely be added back but it would require some logic there to allow it.

            See: https://redmine.pfsense.org/issues/11134

            You could comment out he code to allow it
            https://github.com/pfsense/pfsense/blob/master/src/usr/local/www/interfaces_groups_edit.php#L54

            Steve

            M 1 Reply Last reply Nov 6, 2023, 1:58 PM Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @stephenw10
              last edited by Nov 6, 2023, 1:58 PM

              @stephenw10
              Oh man...this is nice.
              Ok let me try this out and let you know. Do i restart the webconfigurator once i commented out line 55-59 ?

              Also if putting in the ability to see it in the GUI is just a comment, why cant it done with an update (23.09)?

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 0
              • S
                stephenw10 Netgate Administrator
                last edited by Nov 6, 2023, 2:31 PM

                It needs some logic there to allow it only if filtering has been moved. But then would it also need code to remove it if the filtering is switched back? It needs more than just enabling again but doing that to test it is the first step.

                M 1 Reply Last reply Nov 6, 2023, 4:31 PM Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @stephenw10
                  last edited by Nov 6, 2023, 4:31 PM

                  @stephenw10

                  Works without issues once i commented out the section you told me.
                  So for next steps, should i open up a redmine to get this looked at or will you post a note internally to get the code rectified as you mentioned?

                  Nice quick fix Steve, seriously. I love it.

                  login-to-view

                  login-to-view

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  1 Reply Last reply Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Nov 6, 2023, 4:33 PM

                    Yes, open it as a feature request and we can look into what else this might affect and how to implement it safely.

                    M 1 Reply Last reply Nov 6, 2023, 4:55 PM Reply Quote 1
                    • M
                      michmoor LAYER 8 Rebel Alliance @stephenw10
                      last edited by Nov 6, 2023, 4:55 PM

                      @stephenw10
                      Done.
                      Appreciate your quick assist on this.

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      1 Reply Last reply Reply Quote 1
                      8 out of 10
                      • First post
                        8/10
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.