• IPSEC Tunnel using Public IP's

    2
    0 Votes
    2 Posts
    2k Views
    C
    Did you ever get this worked out?  I am having a similar issue…
  • IPSec policy-based VPN (vs route-based VPN)

    9
    0 Votes
    9 Posts
    13k Views
    C
    We resolved our issue by checking that no intermediary device was blocking ESP protocol traffic. Even though SA "exchange/handshake" was completed and DPD transferring over UDP 500… ESP transfer was our root cause!
  • VPN pfSense to Juniper SSG140 - Phase 2 negotiates, no data transfer

    7
    0 Votes
    7 Posts
    6k Views
    C
    Thanks for your advice. We believe that it is working now with some minor changes to the pfSense end. We have gone back to basics on IPSec. Since the Security Associations (SA) were being established between the two sites, but traffic was flowing OUTOF the pfSense (to somewhere) but not flowing INTO the pfSense from the second site (from y.y.y.y);  and no traffic was being received at the second site. We assumed that there must be some device in the way that was blocking the data traffic. Since the data traffic is handled on ESP Protocol, something must be blocking that. Changing the router configuration, so instead of using open ports (UDP 500) for NAT, we tested by using a DMZ/address map. As soon as this was changed, data started to flow and SSH connections could be made. We also made it more robust by adding a gateway definition for the LAN interface and Firewall rules to pfSense to run LAN 172.20.0.0/16 via the LAN GW. Belt and braces really (plus enables better fault finding). During this process we ruled out red herrings such as: IPV6 redirection issues Routing table issues on the SSG140's Firewall policies on the SSG140's Scrub This experience leads me to favour pfSense over packaged Juniper products (e.g. SSG140): Better overall fault diagnosis than Juniper Better tracing of traffic Better tuning of configuration parameters Better log information
  • Cisco PIX IPSec and PfSense 2.0.3

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Visibility between tunnels

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    http://doc.pfsense.org/index.php/IPsec_with_Multiple_Subnets#pfSense_2.0.2B
  • Ipsec between pfsense and cyberoam

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Failover back to Primary issue with ipsec

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Mobile IPsec problem with iOS client

    13
    0 Votes
    13 Posts
    8k Views
    M
    @gamejia: For those interested in a very ugly workaround, I created a script that runs every 5 minutes (using cron) and cleans up the IPSec SAD and SPD entries if there are no users using IPSec. <snip>Please keep in mind that this is still a WIP and I plan on cleaning it up more in the future if no fix is available. I plan on comparing the entries returned by "setkey -Da" and "setkey -DPa" to the values returned by racoonctl and only remove the SPD entries that are causing problems.</snip> Thank you for posting the script. It has been really helpful, and has made the VPN usage in our small network more predictable. Ideally this should be handled at the pfsense end without using this workaround, considering if there are more number of users, then things can get complicated. I was not able to find any bug-report for this; is anyone aware of any bug report filed - else I'll go ahead and do it.
  • Connect Then Disconnects PfSense to Cisco ASA

    2
    0 Votes
    2 Posts
    2k Views
    F
    Do you have VM's running?
  • Sasyncd (ipsec failover)

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • 0 Votes
    2 Posts
    1k Views
    A
    I unfortunately can not answer your question and I know this won't help your specific issue but I am curious if you know that you can use a single carp IP and then put an IP Alias attached to that carp IP.  This reduces the amount of CARP network traffic on an interface.  During a firewall failover and the main CARP IP gets brought down the IP Aliases attached to that CARP IP will also be brought down and up along with the CARP IP on the primary and secondary firewall.  It is also done much faster that way from what I read.  I just recently discovered this so I just wanted to spread the info for those that haven't searched on it.  I don't know if you are already doing that or not.
  • IPSEC (ZyXEL ZyWALL - pfSense)

    Locked
    10
    0 Votes
    10 Posts
    16k Views
    J
    On the second router all set up in the same way. There are no rules prohibiting IPsec. NAT config - Automatic outbound NAT rule generation           (IPsec passthrough included) I'll try to set up the IPSec tunnel on Cisco-Linksys device today and will report.
  • Tunnel between Pfsense and Cisco

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Default Deny blocks printer :9100 packets

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    C
    Check your ipsec firewall rules? Are they set to any and any?
  • Site-to-site split tunnel

    Locked
    5
    0 Votes
    5 Posts
    2k Views
    C
    In the firewall rules. What rules are in the Ipec tab? They should also be any and any??
  • WatchGuard BOVPN and pfSense IPSec?

    Locked
    16
    0 Votes
    16 Posts
    20k Views
    L
    @wisowebs: Lonney are you still using the mentioned configuration?  I am attempting to establish an IPSEC connection from PFsense to one of 2 Watchguard x10's and for the life of me cannot get it to work.  The logs yield nothing.  I can add the gateway with success.  When I add and apply my phase two settings I can get them to take only if the check box "add this tunnel to the BOVPN-Allow Policies" is unchecked No dynamic DNS, static IP in each location for the WAN.  Any help anyone could toss my way I would greatly appreciate.  I have scrapped this forum and google with not much help outside of this post. I didn't notice you had posted twice, I only saw the second one. I'm really not too sure, before I got my config working I had no previous experience with IPSec in general. Most of the information I gleaned from the WatchGuard documentation which is not written in such a way as to help you configure it for non WatchGuard devices, and few bits and pieces from searching forums etc. If you're having problems getting the WatchGuard configured you could try contacting WG for support. I had dealt with them a few times for other things, and they were very helpful.
  • Android JB (3G) to Dynamic IP IPsec Tunnel Issue

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    W
    Nobody have any tips/ideas?
  • Speed of IPsec tunnel negotiation

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C
    Thank you cmb!  Disabling 'Prefer older IPsec SAs' (i.e., clearing the checkbox) definitely shortened my IPsec negotiation time with the remote SonicWALL PRO 3060 to near-instantaneous.  Wow. Under the hood, was this setting causing a lot of 'negotiation chatter' between the two peers, or does this setting simply cause pfSense to spin its own wheels and cause the negotiation delay?  I ask because the SonicWALL 'Gen3' model series do not seem to have a corresponding setting.
  • Ipsec behind nat configuration help.

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    C
    Well that was simple… Guess this is why I shoudn't configure networks at 1 in the morning. I just forgot to add a route on the openwrt router. How can I close this topic?
  • IPsec GRE with BGP

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.