Status of IKE charon daemon (weakSwan 5.6.3, FreeBSD 11.1-RELEASE-p10, amd64): uptime: 45 minutes, since Jun 28 13:44:15 2018 worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 3 loaded plugins: charon aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf curve25519 xcbc cmac hmac gcm attr kernel-pfkey kernel-pfroute resolve socket-default stroke vici updown eap-identity eap-md5 eap-mschapv2 eap-radius eap-tls eap-ttls eap-peap xauth-generic whitelist addrblock countersListening IP addresses: <public IP FW R> <NET R IP FW R>Connections: con1: <public IP FW R>...<public IP FW L> IKEv2, dpddelay=30s con1: local: [<public IP FW R>] uses pre-shared key authentication con1: remote: [<public IP FW L>] uses pre-shared key authentication con1: child: <NET R> === <NET L> TUNNEL, dpdaction=clearSecurity Associations (1 up, 0 connecting): con1[1]: ESTABLISHED 45 minutes ago, <public IP FW R>[<public IP FW R>]...<public IP FW L>[<public IP FW L>] con1[1]: IKEv2 SPIs: af539d1d52e4b970_i db82b64dfdb13183_r*, pre-shared key reauthentication in 6 hours con1[1]: IKE proposal: AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048 con1{3}: INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: c9b931a6_i ccc8da4d_o con1{3}: AES_CBC_256/HMAC_SHA2_512_256/MODP_2048, 65187 bytes_i (900 pkts, 0s ago), 152716 bytes_o (929 pkts, 0s ago), rekeying in 39 minutes con1{3}: <NET R> === <NET L>
Status of IKE charon daemon (strongSwan 5.6.3, FreeBSD 11.1-RELEASE-p10, amd64): uptime: 47 minutes, since Jun 28 13:44:19 2018 worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 10 loaded plugins: charon aes des blowfish rc2 sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp dnskey sshkey pem openssl fips-prf curve25519 xcbc cmac hmac gcm attr kernel-pfkey kernel-pfroute resolve socket-default stroke vici updown eap-identity eap-md5 eap-mschapv2 eap-radius eap-tls eap-ttls eap-peap xauth-generic whitelist addrblock countersListening IP addresses: <NET DMZ IP FW L> <NET DMZ CARP IP FW L> <HA SYNC IP> <NET L IP FW L> <CARP IP NET L FW L>Connections: con1: <NET DMZ IP FW L>...<public IP FW R> IKEv2, dpddelay=300s con1: local: [<public IP FW L>] uses pre-shared key authentication con1: remote: [<public IP FW R>] uses pre-shared key authentication con1: child: <NET L> === <NET R> TUNNEL, dpdaction=clearSecurity Associations (1 up, 0 connecting): con1[1]: ESTABLISHED 47 minutes ago, <NET DMZ IP FW L>[<public IP FW L>]...<public IP FW R>[<public IP FW R>] con1[1]: IKEv2 SPIs: af539d1d52e4b970_i* db82b64dfdb13183_r, pre-shared key reauthentication in 6 hours con1[1]: IKE proposal: AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048 con1{5}: INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: ccc8da4d_i c9b931a6_o con1{5}: AES_CBC_256/HMAC_SHA2_512_256/MODP_2048, 1509939 bytes_i (2455 pkts, 1s ago), 301572 bytes_o (1971 pkts, 1s ago), rekeying in 37 minutes con1{5}: <NET L> === <NET R>
Routed Connections: con1{2}: ROUTED, TUNNEL, reqid 2 con1{2}: <NET X> === <NET Y>
Did you check this already? https://docs.opnsense.org/manual/how-tos/ipsec-s2s-binat.htmlCheers,Franco