• Scaling IPsec (and VPNs in general)

    Pinned
    2
    15 Votes
    2 Posts
    6k Views
    ?

    Thank you!

  • Mobile Clients loosing connectivity akter 60 minutes

    5
    0 Votes
    5 Posts
    135 Views
    A

    I have run into the same issue a while ago.
    As others have mentioned, it is due to Windows using DH group 2 (1024 bit) at re-key time, even if it the P1 and P2 are configured with a stronger DH group.

    Changing the re-key interval to something like 9 hours is the easiest way to minimize disruption.

    Other options are to create the client connections using PowerShell to specify a higher DH group, or use DH group 2 on the server.

    https://learn.microsoft.com/en-us/powershell/module/vpnclient/set-vpnconnectionipsecconfiguration?view=windowsserver2025-ps

  • IPsec tunnels show as down, but they are working

    1
    0 Votes
    1 Posts
    36 Views
    No one has replied
  • P2s flip-flopping and going stale

    2
    0 Votes
    2 Posts
    92 Views
    YayPeacePeaceY

    @TitaniumCoder477 Send a print of Status / IPsec / SADs and SPDs while the GEN_VLAN gateway is unreachable.

  • IPSec narrowing down

    1
    0 Votes
    1 Posts
    48 Views
    No one has replied
  • IPsec Site-to-Site VTI Only One Way Traffic

    3
    0 Votes
    3 Posts
    85 Views
    LaxarusL

    Okay, after a long troubleshooting session. Problem is solved. For reference, I needed to recreate the firewall rules on both sites for ipsec, reload filters and reset states. I suspect it was a weird gimmick messing up the filters.

  • IPSec problem with one-way traffic flow

    8
    0 Votes
    8 Posts
    206 Views
    C

    @viragomann @tinfoilmatt
    Based on your feedback I read up on asymmetric routing and ended up skipping pfSense for this setup altogether 🙄
    I always try to standardize on products but here it just lead to a level of network knowledge I do not fully understand.

    I configured a basic IKEv1 tunnel in the edge gateway, added necessary firewall rules and everything worked as intended.
    A sidenote is that IKEv2 did not work well in VMware NSX-V with the P2's being disconnected after 3600 seconds and not being able to reconnect without tearing down the P1 manually as well.

    ef365c84-1553-4c71-8c60-fbb1827af9a7-image.png

    Thanks everyone for your input!

  • Routing Specific Traffic over VTI

    9
    0 Votes
    9 Posts
    224 Views
    S

    @viragomann thank you!

    You were right I was being an idiot! All working now as it should be.

    Thank you very much for your time and patience

    /Stan

  • Routing ipv6 across tunnel

    1
    0 Votes
    1 Posts
    65 Views
    No one has replied
  • IKEv2 Policy Match Error on Windows 10 Client

    7
    0 Votes
    7 Posts
    4k Views
    S

    I know this is an old topic but I got here from searching the error message. In our case the person adding the VPN didn't use the .ps1 file from pfSense to do it, and Windows 11 24H2 still apparently uses weak algos by default.

  • IPsec site to site dropping every 49-55 minutes

    44
    0 Votes
    44 Posts
    1k Views
    T

    @michmoor I would love to give your reply a thumbs up, but apparently you have to have 5 something, and no clue on how to get that.

    Anyway, I'm going to look at wireguard; however, i upped my p1 timeout, rekey, and expiry times to 7 days then 10 under for rekey and 2 under for expiry and i've gone ahead and upped the p2 to 1 day and rekey at 5 minutes under.

    That was at 13:44 and we are now at 16:17 and we haven't had a drop yet.

  • IPSec to USG behind NAT

    2
    0 Votes
    2 Posts
    69 Views
    M

    @tompark said in IPSec to USG behind NAT:

    It looks to be as if the connection between the USG and the PFSense I am connecting too, timesout. Is there a way that I can easierly check the traffic is being forwarded by the PFSense firewall?

    You can check pftop to see the state table. Doc is here

  • Ipsec clients x openvpn clients communication

    2
    0 Votes
    2 Posts
    70 Views
    V

    @diegoavelinogomes
    You need to add an IPSec phase 2 for the OpenVPN tunnel network:
    A:
    local: A clients subnet
    remote: OpenVPN tunnel subnet
    B:
    local: OpenVPN tunnel subnet
    remote: A clients subnet

    In the OpenVPN access server settings you have to add the "A clients subnet" to the "Local networks".

    However, OpenVPN clients might block access from the remote site by their own firewalls by default. You will have to configure their firewalls accordingly.
    Possibly masquerading the source IP with the OpenVPN interface IP can circumvent firewall restrictions.

  • 0 Votes
    3 Posts
    273 Views
    I

    @viragomann firstly thanks for the reply, forgive me for the dense paragraph. I did setup a P2 per subnet. In any case I have in the mean time found a solution (which happens to coincide with what you suggested):

    Firstly I switched from BiNAT to simple NAT for each target subnet and then I NATted on a single address per each subnet like this:

    Local Subnet Remote Subnet NATed IP
    172.20.48.x/24 10.10.x.x/16 10.10.12.201/24
    172.20.48.x/24 10.11.x.x/16 10.10.12.202/24
    172.20.2.x/24 10.10.x.x/16 10.10.12.203/24
    172.20.2.x/24 10.11.x.x/16 10.10.12.204/24

    This way the packets from both subnets are routed and NATed through the IPSec tunnel correctly. However, even though I also added a local static route as per https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/access-firewall-over-ipsec.html to be able to be pinged by the other end for monitoring, the remote pings do not return. This may be a limitation of the above NAT setup in the IPSec. At the moment this isn't a major issue but I should find a solution for the remote monitoring setup.

    Notes:
    The BiNAT solution works only for a primary Network (the first P2 Network encountered in the list), any subsequent different specified P2 network subnet is ignored - packets reach the firewall LAN interface but are not routed to the IPSec interface.

    I have not attempted a routed VTI IPSec approach which I suppose will work fine also, but requires a more elaborate configuration to setup the relative IPSec enabled interfaces, firewall rules and NAT/routing. I may take a shot at this in the future as with the above setup it's hard if not impossible to have a fallback/secondary IPSec gateway configured if the main one dies - this would require the VTI routed approach if I'm not mistaken.

    Some additional references to IPSec / NAT issues and workarounds which seem to be relevant:
    https://forum.netgate.com/topic/155132/problems-with-routed-ipsec-vti/6
    https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474

    Cheers

  • No routing between vti tunnels

    2
    0 Votes
    2 Posts
    73 Views
    A

    Update 2: Fixed it. It is not so clear that vti interfaces ip addresses have to be routed also. To make it simple: use single /24 subnet for all vti tunnels and add this subnet to "Static routes" at every site

  • Slow IPSec Site-to-Site Speeds

    8
    0 Votes
    8 Posts
    337 Views
    keyserK

    @TheStormsOfFury Okay - that means we should totally disregard the IPsec numbers and tests for now. Since we can’t reach Gbit in the public/public test, then we won’t be able to through IPsec either.

    When doing 4 streams?

    Are the numbers more or less the same in both directions when the client is in site 1 and server in site 2 (test from client with and without -R) Are the numbers more less the same if you run the server on site 1 and test both directions with the client on site 2? Is the packetloss still showing up in the “ramp up” intial phase of all 4 session tests above? (this causes TCP to not scale further) What it the PING latency between the sites?

    Anyways - like I said, these things are sometimes impossible to diagnose properly because there is so many factors in play.
    I’m guessing you probably have to do a packetcapture of the first 2 secs of an iPerf run to see if it’s just packetloss that causes TCP not to scale further, or if it is out-of-order delivery. I have started seeing the latter become a more and more prevalent issue on the Internet. I don’t know if ISPs are starting to use some new multipath loadbalancing mechanisms that are really suceptible to in-path latency causing a lot of out-of-order issues end-to-end.

    The point here is - your speedtests to internet does not pass the routers and paths that the test between your sites does. So it’s likely something in that path that is causing the problem - be it latency, out-of-order or packetdrops. Generally ISP’s focus and calibrate bandwidth and latency on vertical traffic (that is down/upload to the wider internet). Horisontal traffic between end user sites is of very little to no priority at all depending on the subscriptions used in both ends.

  • Fragments over IPsec

    11
    0 Votes
    11 Posts
    241 Views
    V

    @mcury

    Copy. Will either write it up on the plane today or when I get to my destination.

  • Gateway Group, Routed VTI IPSEC tunnels and failover

    2
    0 Votes
    2 Posts
    84 Views
    L

    @lc63
    The answer seems to be no. I have switched to Policy-based mode for tunnels, which allows failover automatically.

  • vti IPsec, gateway not adding static routes on 24.11

    6
    0 Votes
    6 Posts
    226 Views
    O

    @lmassera

    Hey, I'm the person who made the original thread that you referenced. I can confirm that setting the interface address manually via console is a working solution for 24.11. However, under "system -> routing" the gateway address changed from 0.0.0.0 to "dynamic", which is not correct. This still makes me think it's a bug.

    I would like to stress again that routing via interface has been working flawlessly since at least CE 2.6.0 (from 2022), even though I understand it's not quite supported explicitly in strongswan. Setting a static address for an interface that is then ignored seems... unnecessary.

  • IPSec reconnections

    1
    0 Votes
    1 Posts
    52 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.