• 2.1 - IPsec overview page slow to load

    2
    0 Votes
    2 Posts
    1k Views
    C
    The issue has stopped happening, arbitrarily but I'd like to get some input if other people have experienced this, in case it comes back again.
  • AES-NI

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    As of 2.1 IPsec can't see it/use it. That should be corrected in 2.2 (FreeBSD 10)
  • Pfsense 2.1 and cisco asa5520 one way traffic (SOLVED)

    2
    0 Votes
    2 Posts
    2k Views
    D
    The solution was to move the nat command higher up the nat table using this command on the ASA5520: First remove it: no nat (inside,outside) source static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 destination static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 no-proxy-arp route-lookup The add it again: nat (inside,outside) 2 source static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8 destination static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 no-proxy-arp route-lookup
  • ERROR: in ipsec between RV042 and PFbox 2.1

    5
    0 Votes
    5 Posts
    2k Views
    A
    i kinda figured out what the issue was and it may be something to do with the 2.1 release, maybe a feature or gui issue which was causing this problem. i did get it working. i will post screenshots for both sites in the morning. EDIT: Sorry, will post SS next week as I need to travel to another city and only have access to cellphone. anyway the issue was very simple. In Pfsense Phase1 of my identifier and peer identifier I selected my IP and peer IP tabs as I assumed it would be the default public IPs, but that was not the case. I had to select "IP address" in both tabs and manually give my and peer public IP. it started working. there is a lot of search for RV042 - pfsense setting screenshots, so I will make sure to put them up soon. rgds
  • Can pfSense do Easy VPN to a Cisco ASA?

    3
    0 Votes
    3 Posts
    2k Views
    K
    Its would simultaneously be cool and uncool if pfsense had a openvpn package GUI that could be presented to the world that would allow a user based on their credentials to login and download a config file for their account. Some people really want to allow this, even though its not the most secure way to roll.  Brings the security of the VPN down to a password.
  • Weird problem IPSEC

    17
    0 Votes
    17 Posts
    5k Views
    K
    If you messed up the settings on the manual outbound NAT for port 500, that would do it. You need to have a setting at the very top to pass port 500 as static port.  I had many subnets, so I put a rule in to pass a /16 as static on that port to take care of all the /24s.  That rule should have been autogenerated, but it would be very easy to mess it up or to put in a rule before it that breaks it.
  • Dynamic IPSec peers: host routes not cleaned up when peer IPs change

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Randomly IPSec Tunnel Dropping - Reboot Brings it Back up

    3
    0 Votes
    3 Posts
    2k Views
    W
    Thanks for your reply, was away from my machine. Settings are IDENTICAL, like I said it only happens for 1 particular watchguard.  Funny thing is I had to change the NICS out due to some interface errors 6 weeks or so ago, prior to that swap the tunnel never dropped ( I think because the tunnel had restricted traffic ).  Once I changed that NIC, the errors cleared and the tunnel had more traffic on it, now bringing that firewall down randomly. Firewall is not identical, I started updating them one by one a day or so ago. ISPs, nothing has changed. Tunnel shows up in PFSENSE, but no pings are successful.  I can get into the Watchguard however, from another location.  IE, no ping from the PFSENSE box to the down watchguard, but if I am in another watchguard I can ping the "down" firewall just fine.  Very odd and frustrating. Going to clear the states tonight. Once again thanks for your response, not sure what else I can check ***Went down this AM. Sep 5 05:56:12 racoon: [site1 to site2]: [66.185.28.115] INFO: DPD: remote (ISAKMP-SA spi=d8bd5fa5f02159cb:2d3df88062dc7094) seems to be dead. Sep 5 05:55:37 racoon: [site1 to site2]: INFO: ISAKMP-SA established 78.185.55.234[500]-66.185.28.115[500] spi:8c610366f1e444b6:e167895836b7b267 Sep 5 05:55:37 racoon: INFO: NAT not detected Sep 5 05:55:37 racoon: INFO: NAT-D payload #1 verified Sep 5 05:55:37 racoon: [site1 to site2]: [66.185.28.115] INFO: Hashing 66.185.28.115[500] with algo #2 Sep 5 05:55:37 racoon: INFO: NAT-D payload #0 verified Sep 5 05:55:37 racoon: [Self]: [78.15.55.234] INFO: Hashing 78.15.55.234[500] with algo #2 Sep 5 05:55:37 racoon: INFO: Adding remote and local NAT-D payloads. Sep 5 05:55:37 racoon: [Self]: [78.15.55.234] INFO: Hashing 78.15.55.234[500] with algo #2 Sep 5 05:55:37 racoon: [site1 to site2]: [66.185.28.115] INFO: Hashing 66.185.28.115[500] with algo #2 Sep 5 05:55:37 racoon: [site1 to site2]: [66.185.28.115] INFO: Selected NAT-T version: draft-ietf-ipsec-nat-t-ike-02
  • Slave unable to reach out via IPSEC tunnel

    1
    0 Votes
    1 Posts
    959 Views
    No one has replied
  • IPSEC DOWN - Unknow Gateway

    2
    0 Votes
    2 Posts
    3k Views
    B
    bumping this thread, hoping we can get resolution I'm seeing the same error, I've got multiple tunnels up but I'm having disconnect issues with them.  The SAD entires still appear with setkey -D but the counters show no traffic coming from the remote site.  The other site is not a racoon/pfsense device. Sep  4 08:34:44 vpn racoon: [184.71.132.154] ERROR: delete payload with invalid doi:0. Sep  4 08:48:45 vpn racoon: [aaa.aaa.aaa.aaa] ERROR: unknown Informational exchange received. Sep  4 11:10:39 vpn racoon: ERROR: phase1 negotiation failed due to time up. 4da0a464cfd021e5:d86e8547b43ac0af Sep  4 12:56:54 vpn racoon: [aaa.aaa.aaa.aaa] ERROR: unknown Informational exchange received. Sep  4 13:48:59 vpn racoon: ERROR: pfkey DELETE received: ESP me.me.me/me[500]->aaa.aaa.aaa.aa[500] spi=246925167(0xeb7c76f) Sep  4 13:48:59 vpn racoon: ERROR: no iph2 found: ESP aaa.aaa.aaa.aaa[500]->me.me.me.me[500] spi=199400304(0xbe29b70) Sep  4 13:49:10 vpn racoon: ERROR: no iph2 found: ESP me.me.me.me[500]->aaa.aaa.aaa.aaa[500] spi=166831041(0x9f1a3c1) Sep  4 13:51:16 vpn racoon: ERROR: no iph2 found: ESP me.me.me.me[500]->bbb.bbb.bbb.bbb[500] spi=1807220792(0x6bb80038) Sep  4 13:51:16 vpn racoon: ERROR: no iph2 found: ESP bbb.bbb.bbb.bbb[500]->me.me.me.me[500] spi=36532152(0x22d6fb8) Sep  4 13:55:02 vpn racoon: ERROR: pfkey DELETE received: ESP me.me.me.me[500]->ccc.ccc.ccc.ccc[500] spi=187913932(0xb3356cc) Sep  4 13:55:02 vpn racoon: ERROR: no iph2 found: ESP ccc.ccc.ccc.ccc[500]->me.me/me/me[500] spi=213876149(0xcbf7db5) Here's one of my racoon.conf entires for Site A remote aaa.aaa.aaa.aaa {         exchange_mode main;         lifetime time 28800 seconds;         proposal {                 encryption_algorithm 3des;                 hash_algorithm sha1;                 authentication_method pre_shared_key;                 dh_group 2;         }         generate_policy off; } sainfo address 172.29.0.0/28 any address 192.168.0.0/23 any {         pfs_group 2;         lifetime time 28800 seconds;         encryption_algorithm 3des;         authentication_algorithm hmac_sha1;         compression_algorithm deflate; }
  • IPSec error Unknown Gateway/Dynamic v2.0.3

    2
    0 Votes
    2 Posts
    3k Views
    jimpJ
    Have you checked here? http://doc.pfsense.org/index.php/IPsec_Troubleshooting
  • IPsev multi-WAN failover

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    That only works on 2.1, and on 2.1, a gateway group will show up as an interface choice for the tunnel.
  • Slow transfer speed from Windows Server over IPSEC?

    2
    0 Votes
    2 Posts
    4k Views
    J
    Well I sorted it out myself, not perfect but better. I enabled MSS clamping on the IPSEC tunnel under Advanced and set it to 1300. That has made transfers from Windows servers work well and it keeps a steady 95Mbit/s transfer, but it also affected the Qnap NAS that now has a bursting traffic graph. I guess it´s fine as the Qnap still averages about 80Mbit/s. The MSS clamping was enabled previously with the default 1400 value and that worked a lot better for the Qnap. Anybody that could give me a hint on how to get them both to work properly over the tunnel? I´m also not sure I understand how this works. I could ping both the Win Server and Qnap over the IPSEC tunnel with ping -f -l 1472 x.x.x.x without getting fragmentation both ways. Why would I need to clamp the MSS all the way down to 1300 for the Windows server and not for the Qnap? What other overhead is there to subtract from 1472? I Still can ping with a 1472 lenght max before fragmentation  even now when the clamping is set to 1300, is that how it should be? I´m open for someone to educate me on how this works and how to properly calculate this. Thanks, Jesper
  • MOVED: Nat and Ipsec Issiue

    Locked
    1
    0 Votes
    1 Posts
    824 Views
    No one has replied
  • PF 2.0.3 routing over IPSEC tunnel

    4
    0 Votes
    4 Posts
    2k Views
    D
    Whoooooo worked. OK so for posterity's (and googles) sake, the solution was evident in PFsense 2.1 (RC0+), in the PH2 properties of the IPsec tunnel under local network you can provide the LAN subnet, and the 'nat/binat' address being the external WANip. My only conclusion is that since the ipsec routes are kernel routes they don't get applied with outbound nat rules (which is what I was trying).
  • Racoon: INFO: received broken Microsoft ID: FRAGMENTATION

    2
    0 Votes
    2 Posts
    2k Views
    D
    I have this occasionally too.. seems not to affect anything.
  • IPsec VPN to Windows Azure

    2
    0 Votes
    2 Posts
    3k Views
    D
    There is a whole bunch of documentation available here. Absolutely not apparent what your setup is, and frankly, this whole thing should be taken to Windows Azure Forums way before you start debugging pfSense stuff (basically until MS has determined this to be a BSD-specific issue at least.)
  • NAT before IPsec VPN

    3
    0 Votes
    3 Posts
    2k Views
    A
    Great job! Once again thanks. (I think i found the patches applied https://github.com/pfsense/pfsense-tools/blob/master/pfPorts/ipsec-tools-0.8.1/files/ipsec-nat.diff)
  • Shrew soft, IPSec Mobile issues, connects but cannot PING! Please Help!

    12
    0 Votes
    12 Posts
    34k Views
    L
    @cakewipe: I have added my documentation to google docs so anyone can see it. Here is the link for pfSense Router settings https://docs.google.com/file/d/0B2zOOBoh3isOSmtYakVEc3ZNWDA/edit?usp=sharing Here is the link for Shrewsoft, Android, iOS Clients. https://docs.google.com/document/d/1Pl21sk7ckU6dSqgxtXu6iNIv8-60bv7AFFVUQwdJ_WE/edit?usp=sharing Please leave comments if this is helpful so I will know not to remove the documents from my share. Hello Cakewipe,     Thanx for your work here.  I am having a similar problem you had.  When the client connects, there is no route handed to the client according to ipconfig on the windows box. I see not route to that network on the pfsense box. So looking over your doc above it looks like you are still using the static route, is that true? Did you have to use PSK-Xauth?  It wouldn't work with just PSK? I looked over your doc
  • IPSEC Issue (Connexion up, Trrafic IN => OK, Traffic OUT => NON)

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.