<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://piracyforjesus.xyz/w/index.php?action=history&amp;feed=atom&amp;title=IPsec_VPN_with_pfSense</id>
	<title>IPsec VPN with pfSense - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://piracyforjesus.xyz/w/index.php?action=history&amp;feed=atom&amp;title=IPsec_VPN_with_pfSense"/>
	<link rel="alternate" type="text/html" href="http://piracyforjesus.xyz/w/index.php?title=IPsec_VPN_with_pfSense&amp;action=history"/>
	<updated>2026-04-20T05:47:03Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.33.0</generator>
	<entry>
		<id>http://piracyforjesus.xyz/w/index.php?title=IPsec_VPN_with_pfSense&amp;diff=7&amp;oldid=prev</id>
		<title>Fear: added categories</title>
		<link rel="alternate" type="text/html" href="http://piracyforjesus.xyz/w/index.php?title=IPsec_VPN_with_pfSense&amp;diff=7&amp;oldid=prev"/>
		<updated>2019-07-23T23:08:35Z</updated>

		<summary type="html">&lt;p&gt;added categories&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 23:08, 23 July 2019&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:Documentation]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:pfSense]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:Software]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== About ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== About ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;How to setup an ipsec vpn between 2 instances of pfsense using both a static (work) and dynamic ip address (home office). However, a static IP is NOT a requirement.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;How to setup an ipsec vpn between 2 instances of pfsense using both a static (work) and dynamic ip address (home office). However, a static IP is NOT a requirement.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key pfjesuswiki:diff::1.12:old-3:rev-7 --&gt;
&lt;/table&gt;</summary>
		<author><name>Fear</name></author>
		
	</entry>
	<entry>
		<id>http://piracyforjesus.xyz/w/index.php?title=IPsec_VPN_with_pfSense&amp;diff=3&amp;oldid=prev</id>
		<title>Fear: initial edit</title>
		<link rel="alternate" type="text/html" href="http://piracyforjesus.xyz/w/index.php?title=IPsec_VPN_with_pfSense&amp;diff=3&amp;oldid=prev"/>
		<updated>2019-07-23T22:47:22Z</updated>

		<summary type="html">&lt;p&gt;initial edit&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== About ==&lt;br /&gt;
How to setup an ipsec vpn between 2 instances of pfsense using both a static (work) and dynamic ip address (home office). However, a static IP is NOT a requirement.&lt;br /&gt;
&lt;br /&gt;
== Software used ==&lt;br /&gt;
* pfSense: https://www.pfsense.org&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
* Dynamic '''OR''' static IP address&lt;br /&gt;
* A [https://www.namecheap.com/ domain name] or a [https://www.maketecheasier.com/best-dynamic-dns-providers/ free dynamic DNS provider].&lt;br /&gt;
* CPU with [https://en.wikipedia.org/wiki/AES_instruction_set AES-NI] (if your uplink is 20Mbps or faster)&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
I'm going to assume that if you're at this point, you already have a working pfSense configuration at both locations.&lt;br /&gt;
&lt;br /&gt;
Both locations must NOT have the same internal LAN address - meaning both can't be running 192.168.1.x addresses, one can run 192.168.1.x while the other can run 192.168.2.x.&lt;br /&gt;
&lt;br /&gt;
Final note - the VPN configuration on both firewalls will be exactly the same, save for parts that require IP addresses or hostnames.&lt;br /&gt;
&lt;br /&gt;
Let's get started:&lt;br /&gt;
* Click on VPN -&amp;gt; IPsec, and on the bottom right, click on the green &amp;quot;'''+''' Add P1&amp;quot; button at the bottom of the screen.&lt;br /&gt;
=== Phase 1 ===&lt;br /&gt;
==== General Info ====&lt;br /&gt;
* Key exchange version: IKEv2&lt;br /&gt;
* Internet Protocol: IPv4 (IPv6/Dual stack will work if you're running IPv6 at both sites)&lt;br /&gt;
* Interface: WAN (or whatever you named the interface with the public IP address)&lt;br /&gt;
* Remote Gateway: this is where you need either your own domain, or a free Dynaimc DNS provider - or manually entering the IP addresses works, users with dynamic IP addresses the &amp;quot;work&amp;quot; location will have to update your IP address manually every time it changes.&lt;br /&gt;
** Remote Gateway (home): work.piracyforjesus.xyz&lt;br /&gt;
** Remote Gateway (work): home.piracyforjesus.xyz&lt;br /&gt;
* Description: put whatever you like or leave blank&lt;br /&gt;
==== Phase 1 Proposal (Authentication) ====&lt;br /&gt;
* Authentication Method: Mutual PSK&lt;br /&gt;
* My Identifier: Distinguished name:&lt;br /&gt;
** Home: home.piracyforjesus.xyz&lt;br /&gt;
** Work: work.piracyforjesus.xyz&lt;br /&gt;
* Peer identifier: Distinguished name&lt;br /&gt;
** Home: work.piracyforjesus.xyz&lt;br /&gt;
** Work: home.piracyforjesus.xyz&lt;br /&gt;
* Pre-Shared Key: On one firewall, click generate key, then copy &amp;amp; paste that key to the other firewall&lt;br /&gt;
&lt;br /&gt;
==== Phase 1 Proposal (Encryption Algorithm) ====&lt;br /&gt;
* Encryption Algorithm:&lt;br /&gt;
** Algorithm: AES128-GCM&lt;br /&gt;
** Key Length: 128 bits&lt;br /&gt;
** Hash: SHA256&lt;br /&gt;
** DH Group: 14 (2048)&lt;br /&gt;
* Lifetime (Seconds): 28800&lt;br /&gt;
==== Advanced Options ====&lt;br /&gt;
Leave everything defaulted in this section, and click Save. When finished, it should look like this:&lt;br /&gt;
&lt;br /&gt;
[[File:Phase1-complete.png]]&lt;br /&gt;
&lt;br /&gt;
=== Phase 2 ===&lt;br /&gt;
From the above screen, click on &amp;quot;Show Phase 2 Entries (0)&amp;quot; and expand out the menu, then click on the green &amp;quot;'''+''' Add P2&amp;quot; button that appears.&lt;br /&gt;
==== General Information ====&lt;br /&gt;
* Mode: Tunnel IPv4&lt;br /&gt;
* Local Network: LAN subnet&lt;br /&gt;
* NAT/BINAT translation: None&lt;br /&gt;
* Remote Network: Network&lt;br /&gt;
** Address (Work): 192.168.10.0/24&lt;br /&gt;
** Address (Home): 192.168.1.0/24&lt;br /&gt;
* Description:&lt;br /&gt;
** Home: Work LAN&lt;br /&gt;
** Work: Home LAN&lt;br /&gt;
==== Phase 2 Proposal (SA/Key Exchange) ====&lt;br /&gt;
* Protocol: ESP&lt;br /&gt;
* Encryption Algorithms: AES128-GCM @ 128 bits&lt;br /&gt;
* Hash Algorithms: AES-XCBC (or SHA256 if your CPU doesn't have AES-NI)&lt;br /&gt;
* PFS key group: 14 (2048)&lt;br /&gt;
* Lifetime: 3600&lt;br /&gt;
==== Advanced Configuration ====&lt;br /&gt;
* Automatically ping host: set this IP address to a server you run 24/7, this will keep the VPN up 24/7&lt;br /&gt;
&lt;br /&gt;
After you hit save, this is what your Phase 2 will look like:&lt;br /&gt;
&lt;br /&gt;
[[File:Phase2-complete.png]]&lt;br /&gt;
== Firewall Rules ==&lt;br /&gt;
After you hit &amp;quot;Apply Changes&amp;quot; on both firewalls, your IPsec VPN should connect right away. You may find that you can't ping anything across the VPN though - you'll need to click on Firewall -&amp;gt; Rules -&amp;gt; Add to create a hole in the firewall to allow traffic to pass.&lt;br /&gt;
=== Insecure allow all traffic rule ===&lt;br /&gt;
This rule will allow ALL traffic to traverse the firewalls (remember you have to make the same rule for both sides). This is NOT a secure setting! If your home network gets compromised, your home network can be a jumping off point for bots/hackers/viruses to invade the network on the other side of the VPN.&lt;br /&gt;
&lt;br /&gt;
''' You have been warned.'''&lt;br /&gt;
==== Edit Firewall Rule ====&lt;br /&gt;
* Protocol: Any&lt;br /&gt;
&lt;br /&gt;
And that's it, unless you want to add a description. End result looks like this:&lt;br /&gt;
&lt;br /&gt;
[[File:IPsec-any-rule.png]]&lt;/div&gt;</summary>
		<author><name>Fear</name></author>
		
	</entry>
</feed>