• Frequent Disconnects With IPSec VPN Connection to Azure on 2.3.3

    18
    0 Votes
    18 Posts
    11k Views
    F

    It's been running stable for me since I made those changes referenced previously in this thread.

  • 0 Votes
    1 Posts
    399 Views
    No one has replied
  • IPsec site-to-site slow in one direction

    2
    0 Votes
    2 Posts
    755 Views
    S

    suggest we remove this from IPsec.
    I'll repost in hardware - turns out my entire inbound traffic stream is limited to 1.2mbs and it has nothing to do with the VPN.

  • Sending DNS search list to Mac OS broken?

    1
    0 Votes
    1 Posts
    295 Views
    No one has replied
  • Slow IPsec throughput

    1
    0 Votes
    1 Posts
    748 Views
    No one has replied
  • IPSec in 2.4.1 and 2.4.2

    1
    0 Votes
    1 Posts
    604 Views
    No one has replied
  • HELP! Possible pfsense bug parsing a CA certificate

    3
    0 Votes
    3 Posts
    661 Views
    M

    @jimp:

    Looks like this issue: https://redmine.pfsense.org/issues/7929

    Having the same component with multiple values is tripping up that section of code, apparently.

    I don't have time to look into that one today, but it doesn't look too hard to solve, I can check it out next week though.

    The workaround from the bug above did it. Now it works, thank you very much. Hope this bug gets patched on next release.

    Best regards.

  • Better GUI support for IPSec Phase 1 proposals

    3
    0 Votes
    3 Posts
    636 Views
    O

    I hit something similar today. I dont have an answer, but it got me wondering if the config.xml has a defined schema ? Maybe there are additional parameters that can be manually defined in the xml ?
    I have been unable to find a schema so far.

  • IPSEC Tunnels Initiated Phase 1 from any remote IP

    7
    0 Votes
    7 Posts
    1k Views
    O

    Yes you are correct. Stood up a test server and 0.0.0.0 works. If you inspect the ipsec.config file used by Strongswan the right value is 0.0.0.0 so pfSense does not parse it in any way. Yet there is no mention of 0.0.0.0 in the Strongswan docs (from what I could find)
    In my situation I also needed to be able to have multiple tunnels configured, all allowing the incoming connection from any source IP. However I discovered that multiple tunnels cant all have 0.0.0.0 or % any. First the Web Gui will complain that 0.0.0.0 is in use in another Phase 1 config, and the Web Gui wont allow %any.
    But even if I add the 0.0.0.0 or %any directly into the config.xml via the Diagnostics->Edit File method I get not luck. I see that the values actually make it all the way to the ipsec.config file after the VPN service is rebooted, but not all Tunnels will connect. Strongswan's lookup process during the Phase 1 incoming connection will match on the first Tunnel config in the list, then a Phase 2 will initiate but fail if the incoming connection is not actually for that first tunnel config.
    I was hoping that the lookup process uses more than the peer and local IP addresses, but I don't think it does.
    In my situation I've had to fall back to DDNS to make all this work.

  • Error messages because endpoint has chacnged ip

    1
    0 Votes
    1 Posts
    287 Views
    No one has replied
  • IPsec IKEv2 - ESP vs UDP

    1
    0 Votes
    1 Posts
    373 Views
    No one has replied
  • Multiple Phase 1 Proposals required for Mobile IKEv2 Clients

    2
    0 Votes
    2 Posts
    3k Views
    ?

    Just for additional info, Android 8 appears to proffer the following:

    IKE:AES_CBC_256/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024
    IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
    IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_1024
    IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
    IKE:AES_CBC_128/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_1024
    IKE:AES_CBC_128/HMAC_SHA2_384_192/PRF_HMAC_SHA2_384/MODP_1024
    IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
    IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    IKE:AES_CBC_128/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
    IKE:3DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
    IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    IKE:3DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024
    IKE:DES_CBC/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_1024
    IKE:DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    IKE:DES_CBC/HMAC_MD5_96/PRF_HMAC_MD5/MODP_1024

    Again, this leaves only 3DES/SHA1/MODP1024 as the common cypher which is less than ideal.

  • VPN site-to-site tunnel between VyOS and pfSense

    3
    0 Votes
    3 Posts
    3k Views
    M

    You are not showing the phase2 config you are using in the pfSense and that is what it is failing.

  • IPSec apple profile generates a broken config

    1
    0 Votes
    1 Posts
    448 Views
    No one has replied
  • Move IPsec to next Tier when previous Tier is unstable but still up

    5
    0 Votes
    5 Posts
    849 Views
    S

    @barnettd:

    Totally agree. We have been moving our small remote sites from ASA 5505s to the SG-2440s, but the ipsec issue has been a major pain point and I'm starting to regret our move…
    The ASAs are more expensive and are more limited, but ipsec failover worked really well.

    Yeah… I installed one at my house, one at my company's office and one for a client just a few weeks ago. That will be the last one and this great pfSense adventure is gonna be over.

    I chose to support it, but I regretted it. I'm probably gonna switch everything over to MikroTik and Ubiquiti. The first one provides real support without spending in the thousands and the second one always seems to just work (& is incredibly cheap).

    Good luck!

  • Transport Mode P2 Routing

    1
    0 Votes
    1 Posts
    536 Views
    No one has replied
  • Issues with IKEv2, MSchapv2, windows 10, and udp packet size

    3
    0 Votes
    3 Posts
    2k Views
    U

    Another update:
        Reinstalled the firewall from scratch, and everything works fine.
        For about 10 minutes. Then I observe the symptoms from https://forum.pfsense.org/index.php?topic=117827.15
        I see the state table for the IPSEC interface full of nonsensical entries as well.
        This seems to affect ONLY TCP replies to a ipsec mobile client. ICMP and UDP are unaffected, as is downlink TCP.
        Testing with iperf, I observe 200mb/s down, and one packet up.

    Edit:
      I've resolved this.

    My current configuration is using RADIUS and MSCHAPv2 credentials, so multiple devices for the same user, with identical credentials.
      These were getting mapped to the same SA, apparently causing forwarding wierdness?

    The fix was to set peer identifier to peer ip, and replace sa to never.
      Finally, to get windows 10 working, I needed to disable hardware checksum offloading. This is with a chelsio t520-so-cr, wan on a vlan, on a lacp lagg. So I may be poking an edge case. It reported bad udp checksums on the fragments, and pfsense didn't even see them when not in promiscuous mode.

    Is there a wiki or something where I can contribute troubleshooting steps and known working settings? The failure modes were not what I expected, which made this take much longer to troubleshoot.
    I expected that either only one client would work, or they all would, not all working for download, but breaking state tracking.

  • Settings for Windows, iPhone, and Mac

    7
    0 Votes
    7 Posts
    1k Views
    B

    Unfortunately, the functions that you need in powershell aren't available under windows 7 like they are in windows 10.  I've downloaded literally every version of powershell.  If you were to find a way, I'd be very interested in seeing how this is done.

    For now, I'm rolling with 3des which I cringe at the idea of.  The only Windows 7 PC that is holding me back is my work laptop.  Luckily, I'm due for an upgrade so I've asked our IT group to issue me a new PC with windows 10 so I'm pretty excited to get some new hardware which I'm confident will allow access to the functions needed to configure the specifics.

    Much appreciated for the guide and I'll be watching if you post anything on the Windows 7 front!

  • Routing internet traffic through a site-to-site IPsec tunnel

    7
    0 Votes
    7 Posts
    2k Views
    J

    yea, did you follow the guide?  ive made a few screenshots of all i i changed.

    ![pfsense route internet.png](/public/imported_attachments/1/pfsense route internet.png)
    ![pfsense route internet.png_thumb](/public/imported_attachments/1/pfsense route internet.png_thumb)

  • VPN IPSec don't work with Cisco router

    5
    0 Votes
    5 Posts
    878 Views
    M

    I have a good new, the VPN connection is actually connect.
    For feedback, my problem was that my peer router are in the same situation that me (another router is on front internet and the VPN router are next that).
    So, when I configure my VPN I have indicate the Public IP for identify the remote router but, with the private IP the VPN work correctly. [The remote router don't modify his identify IP].

    Thank for your assist.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.