• Problems with DNS resolution across VPN

    1
    0 Votes
    1 Posts
    982 Views
    No one has replied
  • Weird act of ikev2 on pFsense 2.2.2 and 2.2.3

    8
    0 Votes
    8 Posts
    1k Views
    W
    And yes, afterwards - its Cisco bug related issue… https://redmine.pfsense.org/issues/4704
  • StrongSwan: strict CRL policy

    2
    0 Votes
    2 Posts
    1k Views
    S
    Sorry, question is irrelevant now. After some careful thinking, i realized that this will be impossible. At first, i thought i will need to make CRLs from endpoint service CA, which i installed specifically for IPSec certificates publishing, available from WAN for checking, which i can do. But i realized, that in case of strict check, StrongSwan will require all CRLs available - from root and intermediate CAs too. Those i don`t want to publish to WAN.
  • IPsec kernel panic when enabling MSS clamping

    10
    0 Votes
    10 Posts
    2k Views
    E
    I can reproduce it by clean installing pfSense, enabling IPsec and activate mss clamping. No more webgui, no more ssh as soon as I submit. I tried searching the logs via an attached display and keyboard but could not find anything suspicious.
  • Aes-ctr for fast crypto

    1
    0 Votes
    1 Posts
    606 Views
    No one has replied
  • IPsec tunnel - Large BDP Link, Congestion Algo. & Window Sizes?

    2
    0 Votes
    2 Posts
    744 Views
    E
    Yeah the hosts need the tunning since they generate the traffic IPsec cannot do much here.
  • Large Subnet Routing Issue

    4
    0 Votes
    4 Posts
    1k Views
    V
    I found the issue, was a typo on my site with the subnet masks in one of my aliases I used in a firewall rule.
  • IPSEC traffic going over WAN vs Tunnel

    18
    0 Votes
    18 Posts
    3k Views
    V
    Hi, I just saw it myself :) I have a typo in my aliases I put in a /16 instead of /12 in my private network alias for 172.16.0.0 Thanks for your help ermal
  • IPsec mobile clients

    2
    0 Votes
    2 Posts
    813 Views
    E
    AS it is today there is not yet the binding of a specific user to an ip for mobile clients. That would allow you to perform that. It is possible in the underlying software but is not exposed to the GUI.
  • L2TP/IPSEC setup

    3
    0 Votes
    3 Posts
    2k Views
    T
    You mean aaa.aaa.aaa.aaa and so on? These are only for anonymizing, the log contains correct ip's.
  • L2TP/IPSec didn't work well

    3
    0 Votes
    3 Posts
    785 Views
    Z
    I enable mobile clients on ipsec tab,is it possible that I have set something wrong in the rules->IPSec tab?
  • IPsec between pfSense at home and Ubuntu in data center

    7
    0 Votes
    7 Posts
    5k Views
    M
    Dump the contents of the generated StrongSwan configuration on pfSense, it looks like you have it configured for esp = aes128gcm128-sha1-modp1024! which is different to the other side.
  • Upgrade from 2.1.5 - 2.2.2 IPSEC rekey issue

    6
    0 Votes
    6 Posts
    2k Views
    C
    @jmesser: I have had no trouble in Ipsec with my 2.2.1 production boxes. 2.2.2 upgrade broke Ipsec for me with 2 P2 entries. when i rolled back to 2.2.1 Ipsec again works without trouble. just FYI. That's almost certainly fixed by the reqid change here: https://github.com/pfsense/pfsense/commit/afd0c1f2c9c46eaa8e496e98bea8a8e0887d504f 2.2.1 and earlier have strongswan 5.2.x, where specifying the reqid works around a rekeying problem. 2.2.2 and 2.2.3 snapshots have strongswan 5.3.0, where the problem that required specifying the reqid is gone, and with multiple P2s doing so can cause you to hit a race condition in strongswan where it duplicates reqids, which breaks multi-P2 where you hit it.
  • Struggling to get IPsec working for windows clients

    10
    0 Votes
    10 Posts
    7k Views
    S
    The last problem item on the IKE2 setup seems to be DNS.  My network config looks something like this: LAN: 10.10.42.0/24 VPN: 10.10.69.0/24 We had a dedicated DNS box prior to the pfSense that I'd like to phase out since the pfSense is easier to configure.  From the VPN network I can't get the pfSense DNS resolver to work, but the dedicated DNS box does. 10.10.42.1 = pfSense 10.10.42.6 = DNS server from my lan i can successfully do the following: nslookup myserver.mydomain 10.10.42.1 nslookup myserver.mydomain 10.10.42.6 from my VPN I can't nslookup via 10.10.42.1, only the .6 box works.  I've tried telnetting to 10.10.42.1:53 and I'm able to establish a connection, so something about the response is getting lost.
  • Internal lan not accessible via IPSEC tunnel

    5
    0 Votes
    5 Posts
    5k Views
    T
    @doktornotor: the ipsec tab has an "allow all" rule. See screenshots for all rules. @shreek: If i set the virtual address pool in the mobile clients tab to 192.168.23.144/28 and if I manually add the route on the client after connecting the vpn, I get access to the internal lan. To set the route on Win7 use "route add 192.168.22.0 MASK 255.255.255.0 192.168.23.145" where 192.168.23.145 is the IP of the VPN interface on the client. The connection was succesfull after following these instructions: https://forum.pfsense.org/index.php?topic=93541.0 and http://serverfault.com/questions/536092/strongswan-ikev2-windows-7-agile-vpn-what-is-causing-error-13801 [image: fw1.png] [image: fw1.png_thumb] [image: fw2.png] [image: fw2.png_thumb] [image: fw3.png] [image: fw3.png_thumb] [image: fw4.png] [image: fw4.png_thumb]
  • 2.2.2 L2TP/IPsec stopped working

    3
    0 Votes
    3 Posts
    2k Views
    B
    Sorry. I'm using this exact(!) config: https://doc.pfsense.org/index.php/L2TP/IPsec Edit: I did revert to my 2.2.1 snapshot, that one still works, but the "conflicts with IKE traffic" is also there, but the log after is different: May 12 12:39:23 charon: 05[KNL] can't install route for 79.138.*.*/32|/0[udp/57280] === 83.250.*.*/32|/0[udp/l2f] in, conflicts with IKE traffic May 12 12:39:23 charon: 05[IKE] CHILD_SA con2{2} established with SPIs ce630aa3_i 03d2ee78_o and TS 83.250.*.*/32|/0[udp/l2f] === 79.138.*.*/32|/0[udp/57280] May 12 12:39:23 charon: 05[IKE] CHILD_SA con2{2} established with SPIs ce630aa3_i 03d2ee78_o and TS 83.250.*.*/32|/0[udp/l2f] === 79.138.*.*/32|/0[udp/57280] May 12 12:39:26 charon: 05[KNL] interface l2tp0 activated May 12 12:39:26 charon: 09[KNL] 192.168.42.142 appeared on l2tp0 May 12 12:39:44 charon: 09[IKE] sending DPD request May 12 12:39:44 charon: 09[ENC] generating INFORMATIONAL_V1 request 286907280 [ HASH N(DPD) ] May 12 12:39:44 charon: 09[NET] sending packet: from 83.250.*.*[4500] to 79.138.*.*[55263] (92 bytes) May 12 12:39:45 charon: 09[NET] received packet: from 79.138.*.*[55263] to 83.250.*.*[4500] (92 bytes) May 12 12:39:45 charon: 09[ENC] parsed INFORMATIONAL_V1 request 2737098688 [ HASH N(DPD_ACK) ] Edit 2: Ok so I reproduced the error: Im on 2.2.1 - vpn ok Use built in ugprader to 2.2.2 + Reboot VPN does not work anymore https://doc.pfsense.org/index.php/2.2.2_New_Features_and_Changes I see 6 points of IPSec fixes in the patch notes, one is strongSwan upgrade. Strange I'm the first one with this problem… I did revert to 2.2.1 for the time beeing.
  • 2.2.2 L2TP/IPsec not working (OS X and iOS clients)

    2
    0 Votes
    2 Posts
    2k Views
    K
    Ok, I think I've got it somewhat sorted. I had a mismatch on proposals. May 10 17:57:44  charon: 15[CFG] <7> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024 May 10 17:57:44  charon: 15[CFG] <7> configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048 I was able to switch my DH key group from 4 (2048 bit) to 2 (1024 bit) and now I'm getting a successful connection. It looks like DNS isn't working right, but I think I can get that sorted. Hopefully this helps someone else! EDIT: DNS is working just fine (verified via nslookup on OS X client), and I can ping hosts on the network, but I can't access those hosts via a web browser, nor can I access the internet once I'm connected via VPN. I don't think it's outbound NAT, as I have that set to automatic generation and I can see the VPN subnet in the rules. What else could it be?
  • Ipsec Status page not available

    1
    0 Votes
    1 Posts
    586 Views
    No one has replied
  • Ipsec for specific traffic

    4
    0 Votes
    4 Posts
    889 Views
    E
    It depends on order you create the tunnels. If you create the tunnel with specific ip first it will be used instead of next one.
  • Still IPSec Problems with 2.2.2

    23
    0 Votes
    23 Posts
    5k Views
    J
    @mkaishar: I can reproduce problem very quickly P2 lifetime dropped to 300 seconds and when it expires, traffic stops Oh well back to 2.1.5 because 2.2.x is not production ready from my experiences so far I have been using 2.2.1 with no problems regarding Ipsec. when i upgraded to 2.2.2 i started having this issue with multiple P2 entries. I fell back to 2.2.1 and I am back up and running with no problems. just thought I would toss that out there.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.