• BUG: VLAN over LAGG: Adding a new interface breaks existing tunnels.

    Locked
    3
    0 Votes
    3 Posts
    963 Views
    stephenw10S
    Even if you are seeing the same thing here, and I don't think you are since I see no mention of IPSec, this is from 2014! There is almost no chance the cause is the same. Locking this. Steve
  • Which VPN protocol is best?

    8
    0 Votes
    8 Posts
    961 Views
    NogBadTheBadN
    @Velociraptor That PDF is dated 1999, things have moved on since then, i.e IKEv2 which was proposed in 2005 in RFC4306. https://tools.ietf.org/html/rfc4306
  • IPsec IKEv2 (K)ubuntu 18.04 client (strongswan with Network Manager)

    2
    0 Votes
    2 Posts
    3k Views
    V
    So I found my issue. Apparantly "Network Manager" did not safe the password properly or something happened there. So usually commandline the PSK/EAP secrete of the client is stored in /etc/ipsec.secrets where my password was correct but Network Manager also stores it in its own location under /etc/NetworkManager/system-connections/<CONNECTION_NAME> and in the second file a wrong password was given under the section [vpn-secrets] \n password=<PSK>. I dont know why and how because a definitly have change and give the correct password but thats how it is. So user error. -> Check your configs
  • 10 GbE performance of site-to-site IPSec

    2
    0 Votes
    2 Posts
    696 Views
    M
    UPDATE: It seems that the ixl driver has been ported to iflib and is available in FreeBSD 12. As pfSense is adopting FreeBSD 12 for its 2.5 release, I decided to try a development snapshot of pfSense 2.5 (pfSense-CE-memstick-2.5.0-DEVELOPMENT-amd64-20191031-1313.img). Below are the updated results for both pfSense 2.4.4-p3 and pfSense 2.5.0-dev: +------------------+---------------+---------------+ | MTU | streams | pfSense 2.4.4 | pfSense 2.5.0 | +------------------+---------------+---------------+ | | 1 | 1.30 Gbps | 1.66 Gbps | | 1500 |-----------+---------------+---------------+ | | 8 | 1.81 Gbps | 2.52 Gbps | +----------------- +---------------+---------------+ | | 1 | 6.13 Gbps | 2.92 Gbps*| | 9000 |-----------+---------------+---------------+ | | 8 | 8.76 Gbps | 9.77 Gbps | +------------------+---------------+---------------+ *The result for pfSense 2.5.0 with 9000 MTU and 1 stream is suspect. Performance decreased dramatically with pfSense 2.5.0 for this test, while performance improved with pfSense 2.5.0 for all of the other tests. I did see some curious behavior during this specific tests as compared to the others. In all other tests the throughput was relatively constant on a second-by-second basis. During this test the throughput each second varied wildly from 1 to 6 Gbps. The interrupt processing definitely improved with the move to pfSense 2.5.0. Below is a snapshot of the output from "top" on the left pfSense server during the 1500 MTU test. The interrupt processing and CPU usage seems to be distributed nicely across all of the cores. In fact, most of the CPUs seem to be underutilized. So I am not sure now what the bottleneck might be that is limiting performance. [2.5.0-DEVELOPMENT][admin@left]/root: top -P last pid: 46970; load averages: 1.65, 1.10, 0.97 up 0+16:56:20 08:44:13 49 processes: 2 running, 47 sleeping CPU 0: 3.5% user, 0.0% nice, 15.7% system, 3.1% interrupt, 77.6% idle CPU 1: 2.4% user, 0.0% nice, 14.2% system, 2.0% interrupt, 81.5% idle CPU 2: 0.8% user, 0.0% nice, 23.1% system, 2.0% interrupt, 74.1% idle CPU 3: 2.7% user, 0.0% nice, 18.0% system, 5.5% interrupt, 73.7% idle CPU 4: 3.5% user, 0.0% nice, 20.4% system, 2.4% interrupt, 73.7% idle CPU 5: 1.6% user, 0.0% nice, 23.1% system, 4.3% interrupt, 71.0% idle CPU 6: 2.4% user, 0.0% nice, 16.9% system, 1.6% interrupt, 79.2% idle CPU 7: 7.5% user, 0.0% nice, 52.5% system, 0.8% interrupt, 39.2% idle CPU 8: 5.1% user, 0.0% nice, 24.7% system, 1.6% interrupt, 68.6% idle CPU 9: 2.7% user, 0.0% nice, 16.9% system, 2.4% interrupt, 78.0% idle CPU 10: 3.1% user, 0.0% nice, 16.1% system, 3.1% interrupt, 77.6% idle CPU 11: 2.7% user, 0.0% nice, 24.3% system, 2.4% interrupt, 70.6% idle CPU 12: 4.7% user, 0.0% nice, 21.2% system, 2.4% interrupt, 71.8% idle CPU 13: 2.4% user, 0.0% nice, 22.0% system, 2.0% interrupt, 73.7% idle CPU 14: 0.0% user, 0.0% nice, 100% system, 0.0% interrupt, 0.0% idle CPU 15: 0.0% user, 0.0% nice, 0.0% system, 0.0% interrupt, 100% idle Mem: 77M Active, 39M Inact, 522M Wired, 69M Buf, 15G Free Swap: 3979M Total, 3979M Free PID USERNAME THR PRI NICE SIZE RES STATE C TIME WCPU COMMAND 8645 root 17 52 0 70M 20M sigwai 7 8:08 111.07% charon 26414 root 2 92 0 18M 6380K CPU0 0 6:52 99.59% ntpd
  • Slow IPSec Connection

    2
    0 Votes
    2 Posts
    392 Views
    DerelictD
    What kind of transfer? What is the latency across the tunnel? How exactly are you measuring throughput? AESGCM will generally be faster overall than AES. Change the Phase 2 to AESGCM without a hash.
  • Pfsense 2nd Ipsec stopped routing from 13 to 14 subnets

    1
    0 Votes
    1 Posts
    158 Views
    No one has replied
  • (Solved) pfsense IPSEC behind another pfsense WAN

    3
    0 Votes
    3 Posts
    458 Views
    N
    So, I've installed OPNsense and it seems to work properly there with a basic NAT port forward rule. I'm gonna do a couple more tests with different hardware on pfsense, but I suspect there're some issues with port forwarding rules on pfsense regardin IPSEC. Edit: I've reset pfsenseA to factory defaults and set it up again. It was basically the same as the previous install but something went different this time. Now it seems to work properly.
  • IPSec S2S up but no outbound Traffic

    2
    0 Votes
    2 Posts
    452 Views
    K
    @enthu19 Hello Show phase 2 settings and rules on Lan and IPSEC interfaces There is no need to configure NAT OUTBOUND for IPSec tunnel (/Firewall/NAT/Outbound) There is no need to configure NAT Reflection for IPSec tunnel.
  • Encryption algorithm question

    3
    0 Votes
    3 Posts
    498 Views
    ?
    @Konstanti Thanks mate. Much appreciate it.
  • SG-3100 - routing all internet access over IPSEC tunnel

    Moved
    33
    0 Votes
    33 Posts
    3k Views
    DerelictD
    @ngoehring123 Yeah. Can't help you with the latency. Glad it helped.
  • Can I route internet traffic from site B through site A via Ipsec VTI?

    34
    0 Votes
    34 Posts
    4k Views
    stephenw10S
    Ok, all that blocked traffic you're seeing is TCP flagged traffic that is out of state. It's either blocked because the states have already closed, probably the case on that :PA traffic, ot because the states were never opened, usually due to rouet asymmetry. https://docs.netgate.com/pfsense/en/latest/firewall/troubleshooting-blocked-log-entries-for-legitimate-connection-packets.html You should be trying to find out why that is happening not just trying to pass the traffic anyway. Remove any floating rules you added there. You should not be seeing asymmetric traffic if this is setup correctly. I assume pings work fine from the policy routed clients? If you run a packet capture do you see both requests and replies at all points in the path? Steve
  • Site to Site IPSec with NAT peer

    3
    0 Votes
    3 Posts
    297 Views
    jwsiJ
    So I managed to fix it in the end, seemed the issue was the IKEv2 P1 connection on the XG1541's side. I added the public IP as an attribute in the RSA cert and it seemed to then hookup fine - weird how there was no report of this failure though... James.
  • pfSense crashes when 3+ site-to-site VPN's have DDNS / FQDNhostname

    5
    0 Votes
    5 Posts
    553 Views
    jimpJ
    That isn't a bug, it's a configuration problem. It definitely does do fallback in the right scenarios but it depends on how you have the DNS Settings/Resolver settings configured. You should not rely on servers that hand out different data. All of your configured forwarders should provide the same data. That's a topic for a different thread, however.
  • Some doubts about IPsec VPN / tunel configuration.

    1
    0 Votes
    1 Posts
    261 Views
    No one has replied
  • Alternate address NAT for IPSEC VTI

    14
    0 Votes
    14 Posts
    2k Views
    E
    @Morlock It should do nat yes, but as far as I know it's not working. Others firewalls like vyatta and Fortigate do. Take a look at this https://pt.slideshare.net/NetgateUSA/routed-ipsec-on-pfsense-244-pfsense-hangout-june-2018 (page 7).
  • IPsec ERROR: Could not find phase 1

    7
    0 Votes
    7 Posts
    646 Views
    C
    @Derelict Okay, I have tested it. The result with my IP address is VALID IPv6 address. Can it be that behind the IP address is a hidden blank? In the Dashboard Interfaces behind my address is also a hidden blank! [image: 1572340623119-screenshot_20191029_101321.png] In the Status / Interfaces there is no hidden blank behind it. [image: 1572340856947-screenshot_20191029_101757.png]
  • IPsec Down notifications

    notifications ipsec monitor ip
    7
    0 Votes
    7 Posts
    1k Views
    W
    @dragoangel Maybe https://forum.netgate.com/category/30/bounties If you really need it and are willing to pay for it. Else the best you can do is hope that it will come some time...
  • IPsec nat issues

    2
    0 Votes
    2 Posts
    431 Views
    dragoangelD
    @prx first of all your second phase2 is absolutely incorrect - you cross 2 different network. You can try 2 different cases (first one more good): Change OpenVPN subnet to be next subnet after your LAN like 192.168.1.0/24, and after it create only one Phase2 with 192.168.0.0/23 Use BNAT to 1 /32 IP on LAN subnet and reserve this IP in DHCP for not existing static IP so nobody will use it really NEVER in your LAN. I doesn't sure if even this will fix because even this is network collision And another question: why you configured 3DES and use 1024 bit key group - this is too low? It totally deprecated... This is due old gw on other side of ipsec?
  • DMZ-Network via IPSec (question for the gurus/developers)?

    1
    0 Votes
    1 Posts
    204 Views
    No one has replied
  • IPSEC Packet Loss

    1
    0 Votes
    1 Posts
    226 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.