• VPN Default Route

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    Usually so long as the IPsec Phase 2 matches (0.0.0.0/0 as local on your side of the P2), the firewall rules on the IPsec tab match, and your outbound NAT is set to manual and has a rule for the remote P2 network, then it would work.
  • Phase 2 Failure on Android

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    How exactly do you have the Android device configured? Last I tried it, http://doc.pfsense.org/index.php/Mobile_IPsec_on_2.0#Device_Setup_.28Android.29 worked for me on all of my Android devices. Though I've long since ditched IPsec in favor of OpenVPN for mobile access
  • Mobile ipsec problem since upgrade from pfsense 2.0.1 to 2.0.2

    Locked
    5
    0 Votes
    5 Posts
    3k Views
    jimpJ
    If you have a chance, take a backup and try a pfSense 2.1 snapshot, it's using a newer version of IPsec tools (racoon). There were a few changes to IPsec from 2.0.1 to 2.0.2 but not that I'm aware of that would cause problems with mobile client SAs. Do make sure that you have "Prefer old IPsec SA" unchecked under System > Advanced on the Misc tab.
  • IPSec pfSense to ASA 5505: Overlapping Subnets

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    J
    For the sake of your sanity (speaking from bitter experience) change the remote subnets. I spent years using NAT to workaround just this issue, and with sites daisy-chained together over private circuits I'd got NAT(NAT(NAT))) going on in some cases!  It took me about a day to completely renumber each LAN (about 65-70 PCs each + servers, switches, printers, router(s), etc) - I wish I'd done it years ago!
  • IPSec is not connecting automatically and does not reconnect by itself

    Locked
    4
    0 Votes
    4 Posts
    5k Views
    J
    To clarify the 'bringing the tunnel up' point: All the 'connect' button does is to ping a node in the P2 subnet so the daemon will see this and bring the tunnel up for it.  It's no different than you pinging a remote node from a connected PC and the tunnel should come up if you do that.  If not then you have some troubleshooting to do. Next, in my experience the ASAs are a bit picky about who gets to initiate the tunnel.  Usually, setting 'Obey' in the P1 proposal checking will sort them out.  Basically you're saying that when the ASA responds, agree to do things their way from then on.
  • 0 Votes
    2 Posts
    3k Views
    M
    Did you ever find a solution to your problem?  I have a similar problem.  My Mobile Device IPSec settings work great for OSx and iOS.  My Android device succeeds on the Phase 1 connection, but as soon as I try to connect to anything Phase 2 fails and the tunnel drops.  I have multiple Phase 2s.  My current hypothesis is that Android can't handle more than one Phase 2.  I'm trying to get my hands on a test pfSense to test this hypothesis.  Would love to hear if anyone has a solution.
  • OpenVPN vs IPSec

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    M
    Here is one answer to my question, to reset all your states go to Diagnostics->States->reset. This is a broad tools though. I would like to reset states that correspond to a specific rule established.
  • Ipsec tunnel causing problems with http traffic

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    M
    Hi, Thanks for the reply, seems to have solved most of the problems will tune it over the next few days to iron out any hold outs. Thanks again for your time.
  • ERROR: none message must be encrypted

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Pfsense to Cisco VPN

    Locked
    6
    0 Votes
    6 Posts
    4k Views
    valnarV
    Cisco makes a hardware VPN client, the 3002 just for this purpose.  I think it is discontinued, but still works well for connecting a group of people as a classic Cisco IPSEC client.
  • IPSEC and Haproxy on the FW – servers on the other side of the tunnel

    Locked
    5
    0 Votes
    5 Posts
    5k Views
    jimpJ
    It probably has more to do with how the HAproxy instance is sourcing the traffic that is trying to reach the servers. If the proxy process using the "wrong" IP to send the traffic to the server, it would never enter the tunnel because it wouldn't match the Phase 2 entry on the tunnel. Try redirecting temporarily to a local server, see how the traffic is sourced, and account for that in the IPsec Phase 2 configuration.
  • IpSec VPN. There is no connection.

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    E
    Well if both devices can't ping each other, then that will need to be resolved. You also seem to be missing rules for ISKMP (500 UDP), AH, ESP and Nat-T (4500 UDP). I'm still learning my way around pfsense myself, but once I opened up the required ports on the WAN side filtering of both devices, the tunnel came up.
  • Mobile IPSec not able to access PF box

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Ipsec ipad certificate

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Ipsec Performance on Soekris 6501-50

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Slave not reachable through ipsec tunnel

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C
    Works like a charm! Thanks a lot  ;D
  • Racoon status

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    Status > IPsec. Green icon means a phase 2 is established. You can look at the SAD and SPD tabs to see the interpreted output of "setkey -D" and "setkey -DP", if needed.
  • IPSec, iPhone, IP Address Question

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    S
    I've never done it but check out below post…seems to be exactly what you are attempting. http://forum.pfsense.org/index.php?topic=27444.0;prev_next=prev
  • Multi-site Multi-WAN vpn to MSP's CiscoASA

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Cron Ipsec auto restart on fail , and email notify

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    P
    thank you for taking the time to follow up, DPD is disabled for the IPsec, as I found that same conclusion, but my "GRE" tunnels are what's failing.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.