pfSense 2.5.0 IPSec Tunnel IKEv2 | The Quick and Easy Tutorial!

Поділитися
Вставка
  • Опубліковано 18 лис 2024

КОМЕНТАРІ • 28

  • @ayowatson
    @ayowatson 3 роки тому +1

    This video helped me set up our VPN from start to finish. I have been working on this during my free time for a while now, thank you so much for taking your time to record and explain this.
    10000000 thumbs up if I could!

  • @warlojesserbelandres2896
    @warlojesserbelandres2896 3 роки тому +2

    Great explanation, great audio, and great content!

  • @carlospassosbass
    @carlospassosbass 3 роки тому +1

    THANK YOU SO MUCH! THE ONLY TUTORIAL WICH WORKED FOR ME!

  • @TimothyHora
    @TimothyHora 2 роки тому +1

    Awesome OMG2Brain! Really good explanation, crystal clear voice, and content shortened to the needs.
    I watched so much pfsense Videos with different solutions to realize a Multi Site 2 Site Connection. I have 3 sponsored Azure Subscriptions where I connect all 3 Networks to my local LAN (also on a vSphere Cluster :p) with pfsense Community Edition (Installed in Hyper-V locally and uploaded it to Azure - so 1 VM with pfsense runs for around 6 US$ instead over 60 US $ per Month provisioning it from the Marketplace.
    This awesome Video provides a so called "Policy based IPSec routing" - am I right?
    For more "Real World Scenario" the "Route based IPSec routing" is recommended. I configured my site-2-site IPSec IKEv2 with vTI Routing Tunnel Mode. You have more control on your routes and it is better working with the Azure Environment. I've tried before FRR OSPF Routing, but after 3 Days I gave up and decide to do everything manually.
    My whole Authentication is centralized. The pfSense VPNs are doin' certificate based authentication with my own Certificates from Active Directory Certification Services, and User Authentication is handled by EAP RADIUS Authentication - so User needs to be only in UserGroup and he can connect to the mobile Client Tunnel.
    Maybe you find some time in future to show setting up such an Environment, because I'm totally unsure, if i did it right :p Currently I'm really struggling on the "HQ Site" where all Site-2-Site Tunnels running together (without routing internet traffic), and now implementing the mobile-Client IPSec for Windows 10, iPhone and for sure - Android let me freakin' out. Virtual Address Pool where Client got an IP assigned, but how to define the Gateway? Windows also ignores the Policy routes by pfSense so i wrote a Powershell Script to setup the connection - but srsly - really? Do I need to assign a Virtual Alias IP on the WAN Interface for those virtual IP Pool managed by the "Mobile Client" Tab in IPSec Settings?
    On all Interface I'll try to route vTI or Transport Tunnels instead Tunneling IPv4 - this should be the "route based IPSec" - am I correct?
    There are Settings to bypass LAN Traffic or additional Traffic on end of Page "Advanced IPSec Settings" to exclude traffic from an interface to it's Subnet IP based on Source/Destination of Package. Static Routes overrides this. So - I think i need this for the route based solution? It's not well documented in Community - sorry when it sounds stupid :p
    May you can help out on this. I totally understand, that this Questions are pretty complex in case of this setup. But it looks like you have a pretty similar Lab, so I give it a try ;)

  • @allandresner
    @allandresner 3 роки тому +1

    Thank you, very good tutorial. I can ping from remote to HQ, however internet traffic will not pass through the tunnel. I feel like this is just a step 1, do you have a step 2 that takes this work the final mile? Cheers

    • @OMGTheCloud
      @OMGTheCloud  3 роки тому

      Glad it helped! If you want to route Internet traffic through the tunnel, you would need to make some changes to your routing table on the "remote" site. By default, you will have effectively 0.0.0.0/0 route through the remote site's gateway, which will send its' next op to the Internet. You'd need to configure a default route that sends all that traffic through the IPSec tunnel, to exit your primary site.

    • @allandresner
      @allandresner 3 роки тому

      @@OMGTheCloud thank you for taking the time to respond. Once I figure it out; I’m sure what your saying will make sense. I followed an older article at Netgate, trying to adjust the work I did with your help, but it didn’t work. Sorry to ask, but can you be more specific? In phase 2, on the remote site, I tried adjusting the target network to 0.0.0.0/0 and reciprocal network on HQ to 0.0.0.0/0 but that only broke the communication

  • @zappatx
    @zappatx Рік тому

    Thanks for your video but I'm confused on one thing as you are using the DCHP router type of address on both sides which don't appear to be a remote static IP established by the internet hosting company. Where does the remote site static IP go? in the P2 address section or remote network setting? or in the P1 setting area where it says remote Gateway?? Ny old router (Zyxel) worded it differently.

  • @matthewsokolik5326
    @matthewsokolik5326 Рік тому

    can a pfsence firewall NAT traffic as a single source IP address over a tunnel? Example a vendor that has multiple clients and is avoiding IP address over lap?

  • @ERolando78
    @ERolando78 3 роки тому +1

    Great vídeo. Thank you for your time

  • @milosgajic23
    @milosgajic23 3 роки тому +1

    Great video for vpn. But can you make or explain situation when we are behind nat. Is it possible to have pfsense in cloud and then two sites connect to that pfsens in cloud and have two sites connected. Question is how to set that pfsens in cloud to work like that? Thanks

    • @OMGTheCloud
      @OMGTheCloud  3 роки тому

      Good question! What you describe would certainly be possible, and the config the same as my video describes, IF, your two cloud pfSense instances are using a public IP. Does not need to be a static public IP (Dynamic DNS services can take care of that problem). If so, then yes, you can deploy two or more cloud pfSense (for example in AWS, Azure, etc) and link them together with IPSec VPN tunnels

    • @milosgajic23
      @milosgajic23 3 роки тому

      @@OMGTheCloud Yes but problem is when two sites are behind nat and dont have public ip, and to connect them i want to bring one pfsens in cloud and then connect both sites in that pfsens? Is that scenario possible?

    • @OMGTheCloud
      @OMGTheCloud  3 роки тому

      I think this would not be possible. The two pfSense instances would need a public IP, otherwise they would not have the ability to reach one another

  • @ScottPlude
    @ScottPlude Рік тому

    I have followed numerous videos like this and the same result:
    A host on a subnet can only ping the internal interface on the remote subnet. Any pings to hosts beyond the other router will fail every time, all the time. Both directions show the same result. Ping the internal interface on the remote router just fine but not other hosts

  • @kmforde0785
    @kmforde0785 2 роки тому +1

    why did you choose ipsec over openvpn for truenas replication?

    • @OMGTheCloud
      @OMGTheCloud  2 роки тому

      Good question! It is more of a personal preference based on my professional background. IPSec supports modern encryption ciphers, has low overhead, and good inter-compatibility with other network gear, not just pfSense. For example, you can also set up an IPSec tunnel directly in to an AWS VPC, or Azure, and route traffic seamlessly. Perhaps similar goals could be achieved with OpenVPN. Would love to know what others have done as well

  • @MitchellTuckness
    @MitchellTuckness 2 роки тому

    Thanks for this. I have one question, I can ping and connect one way, but not the other, even with ANY/ANY rules in place on the IPSEC. Log indicates the PFSENSE on network1 is blocking traffic to network2, but network2 can get to network1, any ideas?
    Otherwise, thanks!

    • @OMGTheCloud
      @OMGTheCloud  2 роки тому

      I often get confused and wrapped around about firewall rules and what interface they should be on in pfSense: Remember that rules are for inbound traffic, and, remember that a successful ping requires rules in both directions for the round-trip communication. I'd check both sides and make sure you have complimentary rules going each direction. Also, remember that a ping is ICMP traffic, not TCP/UDP. an ANY rule will cover that. Good luck!

    • @MitchellTuckness
      @MitchellTuckness 2 роки тому +1

      @@OMGTheCloud Yup, that was it. I always forget ICMP is not something wrapped in TCP. I had to add an additional rule to allow ICMP traffic. What was confusing me at first, hence I never thought to think of ICMP as separate, was I could ping in one direction. Without a rule for ICMP. But after I removed the rules and created them again, I could no longer ping. That took me down a hole other rabbit hole, but I did finally get some help and figured it out. Thank you for the tutorial. It is the first one I found that actually guided me to successfully make a tunnel in my network. Now I am going to scourer your videos to see if there is one one setting up VLANS on Aruba (Since I have an Aruba and UNIFI switch) switches and how ACTL lists work! Thanks again and for the helpful reply. Now I know an any/any rule will not allow ICMP across.

  • @keithbuckner7459
    @keithbuckner7459 3 роки тому

    Nice series. Thanks for the help. In my vSphere Client, All of the "Distributed Switch options are grayed out. Is there any way around this step? I created everything else with no problems, BUT I can't connect. I'm trying to set up a Site to Site VPN tunnel to connect my local network to my Windows 2012 R2 Domain controller this is now in the cloud in a Remote data center.
    I'm using:
    vSphere Client version 6.7.0.46000 (Data Center)
    Draytek Vigor 3900: Firmware:1.5.1.3 (Local Router)

  • @n8lbv
    @n8lbv 2 роки тому

    Why do we want DH 15 instead of 14? and why is the default 14?

    • @n8lbv
      @n8lbv 2 роки тому

      I have done this whole thing a million times on PFS 2.4.5 and have never been successfully been able to bring up a tunnel in any version of PFS 2.5 including .1 and now .2
      It's incredibly frustrating.
      But I will eventually figure it out.
      We have many sites that have not been upgraded to 2.5 because of this.

    • @OMGTheCloud
      @OMGTheCloud  2 роки тому

      Have you tried the settings in my video? I am successfully running multiple sites on pfSense 2.5.2.
      AES 256 / SHA256 / DH15

    • @n8lbv
      @n8lbv 2 роки тому +1

      @@OMGTheCloud I will have to try this.
      I have so far only tried with the default settings (which really really should at least work). I also have not tried on two clean installed systems.. all of the systems I have tried had been upgraded to 2.5.2 from 2.4.5 *I think*.. I actually may have tried a fresh install on ONE end of the link but now I cannot remember. So I need to start all over again and document what I am trying.

  • @blackIceBass
    @blackIceBass 3 роки тому

    I forgot to create the firewall rules