Quote from: mrzaz on Today at 03:12:56 PMAnd is using the exact IP/PSK and similar in my IPSec legacy working totally fine and is upFor testing the new connection you have to disable the legacy, however.
and could reach network on the other side of IPSec.
Quote from: mrzaz on Today at 03:12:56 PMI'm a little puzzled about the Local and Remote Authentication screens.The are the authentication settings.
Quote from: mrzaz on Today at 03:12:56 PMReqid = <blank> This one I am not sure if needs to be populated with anything if not using manual certificates ?Recent versions set a unique requid automatically, as I've read. This didn't work in the past, however. So I've stated a unique one (above of 10) for each tunnel.
Quote from: mrzaz on Today at 03:12:56 PMESP proposals = defaultYou should remove the check at default and select a proper for your needs here. The same is true for the phase 1.
Quote from: mrzaz on Today at 03:12:56 PMIn Legcay IPSec you are manually defining "My identifier" and "Peer identifier"You mean in the new connections?
where in my legacy setting I could not find that setting !?
Quote from: mrzaz on Today at 03:12:56 PMPs. I have using OpnSense for many years and pfSense (before they stagnated and I moved to much better OpnSense and never looked back. :-)Me too. :-)
Quote from: newsense on Today at 04:52:05 AMYou can start by posting a health check and the output of this commandls -ltrh /var/crash/
destination_net Inverting destinations is only allowed for single targets to avoid mis-interpretations bf920f1c-a9ab-4383-8dd7-9ca5e9b8c2f7;1;keep;;371;pass;1;0;lan;in;inet46;any;;;;;0;1;0;0;0;;;;;;;;;;;;;;;;;;;;;;;"Allow access to WAN";0;lan;;1;PrivateIPv4,PrivateIPv6;
destination_net Inverting destinations is only allowed for single targets to avoid mis-interpretations 2ace6415-7b35-4c42-9bb8-ee5415de71ec;1;keep;;451;pass;1;0;opt1;in;inet46;any;;;;;0;1;0;0;0;;;;;;;;;;;;;;;;;;;;;;;"Block access to other internal networks but allow access to the Internet";0;opt1;;1;PrivateIPv4,PrivateIPv6;
