• Problems with IPSec from China to United States

    1
    0 Votes
    1 Posts
    275 Views
    No one has replied
  • IPSec to Cisco ASR 1013

    4
    0 Votes
    4 Posts
    940 Views
    T
    @Konstanti Ya, I can't tell you how many times I verified the IPSec settings Magically, the connection was established last night as I left it on while doing some other work. When I returned to have another look, the connection was made. I tried this current configuration multiple times to no avail, so I am baffled as to what the resolution was I'm booking a meeting with a guy at the other side to start pulling parts and pieces apart to determine the issue One thing I noticed is that the initial attempts to connect were using port 4500 and the established tunnel is on 500 (I have no firewall logs blocking this and I have rules on WAN in place explicitly allowing UDP 500/4500 and ESP. Perhaps their end isn't liking the 4500 (they told me they are good with the UDP 4500 mind you) Sort of feels like Cisco just not wanting to play nice in the sandbox with the other kids. I'll update with any resolution(s) or comments here
  • Problems with traffic in VPN tunnel

    4
    0 Votes
    4 Posts
    671 Views
    K
    @Juan-Carlos-Gtz Hey You're only allowed TCP on the interface IPSEC Mex 2. Other protocols are prohibited. In order to use ping you need to enable ICMP.
  • Mobile Clients not sending all traffic via VPN

    ipsec vpn
    1
    0 Votes
    1 Posts
    302 Views
    No one has replied
  • My first routed ipsec environment, tunnels keep failing

    1
    0 Votes
    1 Posts
    207 Views
    No one has replied
  • Failback IPsec Tunnel

    1
    0 Votes
    1 Posts
    339 Views
    No one has replied
  • IPSEC's VPN can't PING the host network and vice versa

    ipsec vpn client ping ssh
    1
    0 Votes
    1 Posts
    524 Views
    No one has replied
  • Routing between VPN Client and VPN tunnel

    7
    0 Votes
    7 Posts
    917 Views
    I
    [image: 1553357748255-pfs2.jpg] [image: 1553357756563-azurepfs.png]
  • FW Rules for VTI interfaces

    9
    0 Votes
    9 Posts
    1k Views
    DerelictD
    Then post what you have because it most certainly does work.
  • Advertise specific routes (( not 0.0.0.0/0 )) via bgpd

    2
    0 Votes
    2 Posts
    248 Views
    NogBadTheBadN
    Might be better to use FRR in place of OpenBGP.
  • pfSense AWS VPN Dropout Every Month

    Moved
    3
    0 Votes
    3 Posts
    438 Views
    galda01G
    Excellent questions. I will check when it happens again. I appreciate you replying so quickly. -Andrew G
  • Routed IPSec Tunnel VTI Interface is down

    1
    0 Votes
    1 Posts
    218 Views
    No one has replied
  • IPSEC site to site Tunnel - cannot ping beyond Pfsene

    4
    0 Votes
    4 Posts
    450 Views
    A
    Removed all config and re did all config on both pfsense and Cisco and it now works. Dont know why it works as I din't change any settings....
  • IPsec Mobile Client send all traffic to internet

    1
    0 Votes
    1 Posts
    217 Views
    No one has replied
  • IPSEC Tunnel doesn't disable when disabled.

    1
    0 Votes
    1 Posts
    202 Views
    No one has replied
  • IPSec phase 2 not running initiating behind a NATed router

    1
    0 Votes
    1 Posts
    234 Views
    No one has replied
  • failing to connect with strongSwan

    1
    0 Votes
    1 Posts
    542 Views
    No one has replied
  • Dual WAN IPSec with load balance gateway group

    2
    0 Votes
    2 Posts
    393 Views
    M
    I assume some things here which may be wrong: one pfSense cluster = HA group Azure connection = your IPSEC goes to your Azure server/cluster We use a setup something like this one currently, just not connected to Azure but another third party. This has been used for a few years now with no issues. We only have one pfSense though, not an HA group on our side. For the interface, we use a two-tiered gateway failover group, and on the other side, there are two profiles set, one for each of our VPN IPs. I imagine a load balance group would work the same for IPSEC, just not prefer one over the other? By the time we replace our aging firewall with an HA failover group, we could use the CARP IPs in the failover group I guess? In reality, we'll likely go for BGP as well by then, but our IPSEC solution currently works fine without BGP. If I have misunderstood something, then please elaborate.
  • Slow IPSEC Performance

    11
    0 Votes
    11 Posts
    2k Views
    L
    Yes I tried disabling TCP offloading, and it reduced my throughput by 80%. I re-enabled it. I am getting the full 150Mbps over SMB on the PFSense tunnel, that is not the issue. I am sorry, it can be difficult to explain these issues using only text and I may not be explaining this correctly. Throughput is good! Random filesystem access is bad. Example: I search the SMB shared for all jpg files. Using the 50Mbps Cisco tunnel, it takes 5 minutes. Using the 150Mbps PFsense tunnel, it takes 15 minutes. It is an odd issue to have, and one I have not seen before.
  • Cannot route 2 local subnets to 1 remote subnet

    2
    0 Votes
    2 Posts
    307 Views
    M
    don't know why, but suddenly it's working. I just deleted phase 2 and recreated it...
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.