Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense and Route-Based IPSec VPN

    Scheduled Pinned Locked Moved IPsec
    9 Posts 5 Posters 4.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      hphan082
      last edited by

      Hi everyone,
      I just deployed pfsense for in our environment. I'm searching around and it doesn't look like pfsense is supporting Route-based VPN tunnel. Is that true? Do you know if it will be available anytime soon?

      Thanks everyone!

      1 Reply Last reply Reply Quote 0
      • C
        cmb
        last edited by

        That's true. It's not on the immediate roadmap. Either standard tunnel mode, or transport mode + GRE or gif, will suffice for any possible need there (outside of interoperating with a third party route-based IPsec VPN).

        1 Reply Last reply Reply Quote 0
        • P
          PayableOnDeath
          last edited by

          +1 for Route-Based IPSec VPN.

          Sadly transport mode + GRE isn't supported on all devices (Juniper SRX for example)

          Found out about the lack of support for transport mode in the SRX when I tried to setup a VPN between 3 sites ( 2 of them used pfSense) and wanted dynamic routing between them so that if a tunnel dropped between 2 of them it would then reroute via the 3rd one.

          1 Reply Last reply Reply Quote 0
          • H
            Hugh
            last edited by

            Hi PayableOnDeath,

            the SRX was the reason I asked if it was possible to run a script or add a route when an IPSec tunnel came.

            That was my idea for a workaround for the dynamic networking issue.  Run BIRD on the pfSense box and use it to advertise the routes when the tunnel came up.

            1 Reply Last reply Reply Quote 0
            • H
              Hugh
              last edited by

              Is it possible to have a route based VPN configured at one end and a policy based VPN configured at the other?

              I have attempted to do this on a Juniper SRX and it appears to be working.  I am wondering whether I am just deceiving myself.

              1 Reply Last reply Reply Quote 0
              • E
                eri--
                last edited by

                Route based VPN is basically GRE + IPsec so it will work with no problem.
                Its more flexible on products that promote its support in which you control what gets sent to the tunnel by just routes instead of phase2.

                1 Reply Last reply Reply Quote 0
                • H
                  Hugh
                  last edited by

                  Is there any way that pfSense can have an IP address that can reply to the address on the tunnel interface? I would like to be able to run OSPF through the VPN tunnel.

                  1 Reply Last reply Reply Quote 0
                  • C
                    cmb
                    last edited by

                    @ermal:

                    Route based VPN is basically GRE + IPsec so it will work with no problem.

                    Route-based in the context of what OP is discussing isn't GRE+IPsec, there isn't a tunnel outside the usual IPsec tunnel mode's tunnel.

                    @Hugh:

                    Is there any way that pfSense can have an IP address that can reply to the address on the tunnel interface? I would like to be able to run OSPF through the VPN tunnel.

                    If you have an actual tunnel interface, like GRE or gif within the IPsec, yes, on the GRE or gif. Otherwise no, and it wouldn't accomplish what you're after with OSPF anyway since the routing table has no influence on tunnel-mode IPsec.

                    1 Reply Last reply Reply Quote 0
                    • H
                      hphan082
                      last edited by

                      thanks everyone!
                      We use VPN tunnels to a lot of 3rd party devices, including ASA, Fortigate, Sonicwall, Palo Alto, etc. I can confirm that you don't need Route-based or Policy-based on both end, it's only matter locally.
                      well, for now, we can go with Policy-based, once there is a need, I'll look into these options again.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.