
You can be lazy and just any/any/any it, or make more specific ones. You’ll need to configure appropriate firewall rules for traffic traversing the IPsec link in the “ipsec” firewall rules section. Sometimes it’ll make the right firewall rules, but double check your WAN interface actually has a rule that lets ESP traffic from 9.9.9.9 on UDP/500 and ESP. Make sure you tick “Enable IPsec” on the tunnel config screen and ensure you hit apply, otherwise it won’t start the tunnels… From the Tunnel settings page, next to the newly created phase 1 configuration, there should be a button to add a phase 2 entry. This is the actual “traffic encryption” stage. Dead peer detection: Enabled (10 seconds delay, 5 retries, restart the tunnel).Interface: WAN (your external interface).Internet Protocol: v4 (depending on what connectivity you have).This is the authentication stage for working out how to talk to each other. | Local Network +-+ House 1 +-+ Internet | | House 2 | | Local Network | A /16 at each house, connected over the internet.

This time it was from Mikrotik at one end to OPNsense at the other.

I needed a VPN from one house to another for running the Ubiquiti Unifi AP’s I’m setting up at RMB’s house… I used to have mikrotik’s at each end so that was a fairly simple setup.
