Hate to parachute into a 6 year old post but I do want to make a quick point, here. One place where the pfSense IS more flexible is that you can use any WAN IP to terminate IPsec where on the Sophos UTM you must always use the public WAN (not any of the "alternate" WAN IPs - at least that has been my experience). Where this can become an issue is if you want to have multiple VPNs from a single location back to a single location. For example, I used to be able to support two VPN IPsec tunnels from two separate AWS VPCs back to our office until I replaced the pfSense with a Sophos UTM-9. I then had to choose the one that was more important and build an OpenVPN server for access to the other. I still prefer the Sophos over pfSense, though.
I'm curious, Kipland - What problem were you having when trying to use two IPsec tunnels? Were you blocked from creating some definition? Did the second tunnel get established but passed no traffic? Or???
Cheers - Bob
Amazon did not allow me to make an IPsec connection back to the same WAN IP where I already had one established. May have been a limitation on their side at the time and it was actually my son who reported that he had to drop one of the connections after the move to the Sophos. Before, on the pfSense, we used two "alternate" WAN IPs to set that up so AWS saw us as two separate entities whereas when we tried to connect both to a single "public" WAN, Amazon complained. I never pursued that any further since the people accessing that VPC we had to shut down where remote to our office, anyway, so OpenVPN was really a better solution for them. It was just a convenience for me while at the office.
Amazon did not allow me to make an IPsec connection back to the same WAN IP where I already had one established. May have been a limitation on their side at the time and it was actually my son who reported that he had to drop one of the connections after the move to the Sophos. Before, on the pfSense, we used two "alternate" WAN IPs to set that up so AWS saw us as two separate entities whereas when we tried to connect both to a single "public" WAN, Amazon complained. I never pursued that any further since the people accessing that VPC we had to shut down where remote to our office, anyway, so OpenVPN was really a better solution for them. It was just a convenience for me while at the office.