pfSense to pfSense - IPsec - site to site Setup.
Setup an IPSec VPN between 2 instances of pfSense using both a static (work) and dynamic IP address (home office).
NOTE: A static IP is NOT a requirement.
You already have a working pfSense configuration at both locations.
Both locations must NOT have the same internal LAN address - meaning both can’t be running 192.168.1.x addresses, one can run 192.168.1.x while the other can run 192.168.2.x.
Final note - the VPN configuration on both firewalls will be exactly the same, save for parts that require IP addresses or hostnames.
Click on VPN → IPsec, and on the bottom right, click on the green + Add P1 button at the bottom of the screen.
Leave everything defaulted in this section, and click Save. When finished, it should look like this:
From the above screen, click on Show Phase 2 Entries (0) and expand out the menu, then click on the green + Add P2 button that appears.
After you hit Save, this is what your Phase 2 will look like:
After you hit Apply Changes on both firewalls, your IPsec VPN should connect right away.
You may find that you can’t ping anything across the VPN though - you’ll need to click on Firewall → Rules → Add to create a hole in the firewall to allow traffic to pass.
WARNING: This rule will allow ALL traffic to traverse the firewalls (remember you have to make the same rule for both sides).
This is NOT a secure setting! If your home network gets compromised, your home network can be a jumping off point for bots/hackers/viruses to invade the network on the other side of the VPN.
You have been warned.
And that’s it, unless you want to add a description.
End result looks like this: