• IPSEC pfSense to Sonicwall using RSA certificates

    2
    0 Votes
    2 Posts
    457 Views
    johnpozJ
    Have not used sonicwall in many many years. But since I create pfx with openssl all the time and use these on other devices that are road warrior connections. IOS devices for example - it shouldn't be a problem. An openvpn client is an openvpn client in the big picture.
  • Restrict access for certain VPN users?

    15
    0 Votes
    15 Posts
    3k Views
    NogBadTheBadN
    Or you could just use FreeRadius like I suggested and not have to mess about with text files.
  • 0 Votes
    25 Posts
    3k Views
    DerelictD
    @lmhaydii said in IPSec connection established and trafic is outgoing, but no ongoing response: @derelict thank you. How can I determine with certitude that thier response or thier request are not arriving to my firewall ? There is any command to show up that ? Yes. A packet capture. You have done that. That would be enough for me. If you want more certainty, pcap on WAN for protocol ESP. You will see your pings (encrypted) go out but nothing come back from their side. If you are going across NAT (NAT-T) you will need to capture UDP 4500 instead of protocol ESP.
  • Question about throughput

    throughput site-to-site
    6
    0 Votes
    6 Posts
    2k Views
    DerelictD
    32ms across IPsec? If so it sounds like you're getting right about what you should for a single-stream TCP session with 32ms latency and a 128KB buffer. That is probably a little high since you have the 30Mbit upstream at one end and certainly not a 1460 MSS across IPsec. Bandwidth-delay Product and buffer size BDP (1000 Mbit/sec, 32.0 ms) = 4.00 MByte required tcp buffer to reach 1000 Mbps with RTT of 32.0 ms >= 3906.2 KByte maximum throughput with a TCP window of 128 KByte and RTT of 32.0 ms <= **32.77 Mbit/sec.** You could try giving a -P4 or -P8 to the iperf client to see if running multiple streams helps. Or switch to UDP and see how high you can take the -b parameter before you start experiencing loss.
  • IPsec VTI with Palo Alto

    18
    0 Votes
    18 Posts
    5k Views
    Y
    @mountainlion I'm using 1200 as MSS because it's required by my datacenter (DoS Protection)
  • Routing to a specific host via IPSec

    3
    0 Votes
    3 Posts
    494 Views
    4
    Thanks. Turn out running an outdated pfSense version wasn't helping my case. Now I just need to figure out how to set it up so it works with Azure.
  • IPsec dropping

    3
    0 Votes
    3 Posts
    1k Views
    DerelictD
    You mean like this? https://www.netgate.com/docs/pfsense/vpn/ipsec/ipsec-troubleshooting.html
  • IPSec VPN from pfSense to Cisco 1941 dropping connection (redacted)

    11
    0 Votes
    11 Posts
    2k Views
    DerelictD
    Jan 11 10:21:26 charon 05[NET] <con1000|17> received packet: from 173.220.x.x[500] to 50.196.x.x[500] (380 bytes) Jan 11 10:21:26 charon 05[ENC] <con1000|17> parsed QUICK_MODE request 3356035729 [ HASH SA No KE ID ID ] Jan 11 10:21:26 charon 05[ENC] <con1000|17> received HASH payload does not match Jan 11 10:21:26 charon 05[IKE] <con1000|17> integrity check failed Jan 11 10:21:26 charon 05[ENC] <con1000|17> generating INFORMATIONAL_V1 request 3233859265 [ HASH N(INVAL_HASH) ] Jan 11 10:21:26 charon 05[NET] <con1000|17> sending packet: from 50.196.x.x[500] to 173.220.x.x[500] (76 bytes) Jan 11 10:21:26 charon 05[IKE] <con1000|17> QUICK_MODE request with message ID 3356035729 processing failed Jan 11 10:21:26 charon 05[NET] <con1000|17> received packet: from 173.220.x.x[500] to 50.196.x.x[500] (92 bytes) Jan 11 10:21:26 charon 05[ENC] <con1000|17> parsed INFORMATIONAL_V1 request 2703109558 [ HASH D ] Jan 11 10:21:26 charon 05[IKE] <con1000|17> received DELETE for IKE_SA con1000[17] Jan 11 10:21:26 charon 05[IKE] <con1000|17> deleting IKE_SA con1000[17] between 50.196.x.x[50.196.x.x]...173.220.x.x[173.220.x.x] Jan 11 10:21:26 charon 05[IKE] <con1000|17> IKE_SA con1000[17] state change: ESTABLISHED => DELETING Jan 11 10:21:26 charon 05[IKE] <con1000|17> IKE_SA con1000[17] state change: DELETING => DELETING Jan 11 10:21:26 charon 05[IKE] <con1000|17> IKE_SA con1000[17] state change: DELETING => DESTROYING Your side does not like the traffic selector in the P2 being sent by the other side. Please send the output from each of these on each node - the one that's working and the one that isn't: swanctl --list-conns swanctl --list-sas cat /var/etc/ipsec/ipsec.conf Send them in chat or I can send you a nextcloud upload link.
  • IPSec VPN from pfSense to Cisco1941 dropping connection

    5
    0 Votes
    5 Posts
    512 Views
    T
    @konstanti The secondary Peer with the 96.65.x.x address is the office we setup to test the connection. The 96.65.x.x is the address for the SG-3100 that works, while the 50.196 address is the SG-3100 I'm having trouble with. The 173.220 address is the address for the Cisco router.
  • IPSEC tunnel config works on 2.4.3p1, not on 2.4.4p1

    4
    0 Votes
    4 Posts
    613 Views
    DerelictD
    @sgw said in IPSEC tunnel config works on 2.4.3p1, not on 2.4.4p1: seems like: we then tried swapping pfsenses again and additionally rebooted the Hitron "modem" in front of the pfsense. Tunnel came up immediately. So I assume there are some MAC-based filters built at bootup or something like that. Right. On the modem. You always have to reboot an upstream ISP device when you change the hardware behind it. Or at least it's a good idea especially if you have problems changing devices around. I usually: Disconnect the WAN patch cable between the modem and the WAN port Power cycle the upstream device and let it sync up and "go green" again Connect the modem to the new WAN port. This is primarily for normal US cable modems. Any ISP "Residential Gateway" might have other requirements.
  • IPsec with a transparent firewall

    3
    0 Votes
    3 Posts
    817 Views
    P
    Hello, I have the same problem. @jimp : i don't understand your solution. Can you explain me with more details please ? I made a schema : [image: 1547127771405-pfsense.png] thank you very much if you can help me because I'm stuck. Ludo.
  • Cisco AnyConnect - Disconnects and Reconnects every 20 minutes

    1
    0 Votes
    1 Posts
    490 Views
    No one has replied
  • Split DNS on iOS not working

    3
    0 Votes
    3 Posts
    2k Views
    L
    Have a look here: https://forum.netgate.com/topic/95361/solved-cross-platform-ikev2-vpn-no-dns-on-linux-mac-ios/7 Note that the basic problem of Split DNS with Split Tunnel in IKEv2 is work-in-progress regarding RFC standards. https://tools.ietf.org/html/draft-ietf-ipsecme-split-dns-16
  • 0 Votes
    5 Posts
    1k Views
    chrismacmahonC
    That is correct.
  • Proxy ARP and IPsec mobile

    1
    0 Votes
    1 Posts
    218 Views
    No one has replied
  • IPsec not connecting

    5
    0 Votes
    5 Posts
    761 Views
    DerelictD
    If you have the same subnet as the other side, both sides have to NAT to something else, else one side will think the other side is actually on its local subnet.
  • 0 Votes
    7 Posts
    2k Views
    K
    Hi, your machines uses s.o windows ? in that case turn off the firewall each and check pin to the other machine
  • PfSense IPsec Site to Site Issues

    7
    0 Votes
    7 Posts
    2k Views
    J
    @konstanti i have put the log in my topic
  • VPN issues from flapping secondary connection?

    7
    0 Votes
    7 Posts
    893 Views
    N
    Ommit my ovpn reference, still, what do the ipsec logs say? timeout? remote disc? How is failover implemented
  • How to make Windows servers use pfSense VPN?

    7
    0 Votes
    7 Posts
    1k Views
    F
    I know! ;-) Since this is a productive system I can't easily mess with network settings. I have changed pfSense LAN address to 192.168.0.1 and the IP of a test server to 192.168.0.22. The subnet in Azure now is 10.10.0.0. The connection can be established, but machines in the different subnets still do not see each other. WAN, LAN, and IPsec firewall rules have all been set to allow full IP4 traffic. Can ping local machine from pfSense LAN and vice versa. Azure VPN shows some traffic in both directions (just a few bytes).
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.