<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[IPSEC filtering now present in recent snapshots]]></title><description><![CDATA[<p dir="auto">HEADS UP!</p>
<p dir="auto">IPSEC Filtering is now present in the 1.0.X branch first appearing in<br />
todays snapshot.</p>
<p dir="auto">By default on upgrade we will install a default PASS rule for the<br />
IPSEC interface to permit traffic.  So basically anyone upgrading will<br />
not see a difference.  However, you can edit the default rule and<br />
introduce fine grain control of the IPSEC tunnels if you wish.</p>
<p dir="auto">The feature will appear in todays snapshot which is currently building<br />
located at http://snapshots.pfsense.com/FreeBSD6/RELENG_1/updates/</p>
<p dir="auto">Have fun!</p>
]]></description><link>https://forum.netgate.com/topic/3408/ipsec-filtering-now-present-in-recent-snapshots</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 10:23:12 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/3408.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 09 Feb 2007 19:27:02 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to IPSEC filtering now present in recent snapshots on Wed, 21 Mar 2007 13:12:24 GMT]]></title><description><![CDATA[<p dir="auto">Yes, perfect.<br />
Thanks.</p>
]]></description><link>https://forum.netgate.com/post/151475</link><guid isPermaLink="true">https://forum.netgate.com/post/151475</guid><dc:creator><![CDATA[eskild]]></dc:creator><pubDate>Wed, 21 Mar 2007 13:12:24 GMT</pubDate></item><item><title><![CDATA[Reply to IPSEC filtering now present in recent snapshots on Sat, 17 Mar 2007 22:22:53 GMT]]></title><description><![CDATA[<p dir="auto">So it is working correctly now?</p>
]]></description><link>https://forum.netgate.com/post/151290</link><guid isPermaLink="true">https://forum.netgate.com/post/151290</guid><dc:creator><![CDATA[hoba]]></dc:creator><pubDate>Sat, 17 Mar 2007 22:22:53 GMT</pubDate></item><item><title><![CDATA[Reply to IPSEC filtering now present in recent snapshots on Sat, 17 Mar 2007 22:20:57 GMT]]></title><description><![CDATA[<p dir="auto">I just noticed that. Thanks, i'll keep that in mind.</p>
<p dir="auto">Cheers,<br />
//Eskild</p>
]]></description><link>https://forum.netgate.com/post/151289</link><guid isPermaLink="true">https://forum.netgate.com/post/151289</guid><dc:creator><![CDATA[eskild]]></dc:creator><pubDate>Sat, 17 Mar 2007 22:20:57 GMT</pubDate></item><item><title><![CDATA[Reply to IPSEC filtering now present in recent snapshots on Sat, 17 Mar 2007 22:13:51 GMT]]></title><description><![CDATA[<p dir="auto">This is for incoming traffic. Traffic that is sent from the remote end to you through the tunnel. If you have a pass any rule at lan it alows traffic to go into the tunnel fo course. You have to test this coming from the m0n0 end pinging through the tunnel.</p>
]]></description><link>https://forum.netgate.com/post/151288</link><guid isPermaLink="true">https://forum.netgate.com/post/151288</guid><dc:creator><![CDATA[hoba]]></dc:creator><pubDate>Sat, 17 Mar 2007 22:13:51 GMT</pubDate></item><item><title><![CDATA[Reply to IPSEC filtering now present in recent snapshots on Sat, 17 Mar 2007 21:57:52 GMT]]></title><description><![CDATA[<p dir="auto">I did reset the states, delete both IPSEC SA, but i can still ping a host at the remote site.</p>
<p dir="auto">//Eskild</p>
<p dir="auto"><img src="/public/_imported_attachments_/1/ipsec_rules.png" alt="ipsec_rules.png" class=" img-fluid img-markdown" /><br />
<img src="/public/_imported_attachments_/1/ipsec_rules.png_thumb" alt="ipsec_rules.png_thumb" class=" img-fluid img-markdown" /><br />
<img src="/public/_imported_attachments_/1/tunnels.png" alt="tunnels.png" class=" img-fluid img-markdown" /><br />
<img src="/public/_imported_attachments_/1/tunnels.png_thumb" alt="tunnels.png_thumb" class=" img-fluid img-markdown" /></p>
]]></description><link>https://forum.netgate.com/post/151286</link><guid isPermaLink="true">https://forum.netgate.com/post/151286</guid><dc:creator><![CDATA[eskild]]></dc:creator><pubDate>Sat, 17 Mar 2007 21:57:52 GMT</pubDate></item><item><title><![CDATA[Reply to IPSEC filtering now present in recent snapshots on Sat, 17 Mar 2007 19:55:36 GMT]]></title><description><![CDATA[<p dir="auto">A new ruleset is only applied for new connections. If there are old states they will still be allowed until they are closed or time out. Make sure you don't test with old states (maybe do a diagnostisc&gt;states, reset states).</p>
]]></description><link>https://forum.netgate.com/post/151282</link><guid isPermaLink="true">https://forum.netgate.com/post/151282</guid><dc:creator><![CDATA[hoba]]></dc:creator><pubDate>Sat, 17 Mar 2007 19:55:36 GMT</pubDate></item><item><title><![CDATA[Reply to IPSEC filtering now present in recent snapshots on Sat, 17 Mar 2007 19:36:04 GMT]]></title><description><![CDATA[<p dir="auto">HI Scott, the filtering is most welcome.<br />
I have tested the filtering through IPSEC tunnels on 1.0.1-SNAPSHOT-03-15-2007, and after rejecting any -any in IPSEC rules, i can still send traffic through the tunnels.</p>
<p dir="auto">Are the filtering just for Mobile clients or should the tunnels be filtered too?</p>
<p dir="auto">Thanks,<br />
Eskild</p>
]]></description><link>https://forum.netgate.com/post/151281</link><guid isPermaLink="true">https://forum.netgate.com/post/151281</guid><dc:creator><![CDATA[eskild]]></dc:creator><pubDate>Sat, 17 Mar 2007 19:36:04 GMT</pubDate></item></channel></rss>