• Release 2.3.2-P1 compatibility

    2
    0 Votes
    2 Posts
    627 Views
    J
    I have updated all sites now with the latest version. Unfortunately some ipsec tunnels are operational others are not. The strange thing is that after re-starting the ipSec service a few times I lost some connections that were active and can not get them back without any changes in the configuration. Very strange.
  • Exposing ipsec routes

    Locked
    3
    0 Votes
    3 Posts
    825 Views
    M
    IPsec does not route. The kernel looks for traffic matching SPD entries and places it into IPsec when a match is found. To view the SPD contents, look at Status > IPsec, SPDs tab. Thank you, that clarifies why it doesn't show up as a route.
  • Ikev2 Mobile Clients

    2
    0 Votes
    2 Posts
    789 Views
    jimpJ
    That's all up to the client. They will either send all or send none. You can setup custom routing with powershell commands on the client side to nudge additional networks over, the server can't influence that.
  • So can I do this?

    3
    0 Votes
    3 Posts
    715 Views
    N
    Well the reason I ask is because on another thread I discovered I couldn't nat the gre tunnel to one of my spare up addresses behind my ASA. So I thought I had better double check here.
  • SSH connections over IPSec hang: how to configure MTU for IPSec properly?

    5
    0 Votes
    5 Posts
    7k Views
    V
    At the end we worked this around and changed the MTU of the target machines (SSH servers) as we can afford the MTU change there (differently than on pfsense).
  • SG-1000 IPsec Road Warrior Issues

    3
    0 Votes
    3 Posts
    988 Views
    jimpJ
    https://redmine.pfsense.org/issues/6937
  • 0 Votes
    2 Posts
    2k Views
    ?
    FYI the powershell for windows 10 adds it to the pkb (phone book) file for the vpn not to the computer itself so once you add it you can deploy the pbk out with group policy if you wish.
  • Multiple/rogue SADs

    5
    0 Votes
    5 Posts
    1k Views
    K
    Problem solved. In the remote branch there was another device (Sophos XG105) connected to the internet with a buggy 4G connection… This device was setup with the same parameter (IPsec initiator) than the pfSense box and was, sometimes (no idea when/why), connecting the main XG appliance. The message in the log (main XG appliance) is: "System received a P2 connexion request whose Localsubnet-Remotesubnet configuration conflicts with that of an already established connexion "XXXX-1". System is terminate connection "XXXX-1" to honor the incoming request." That message leaded me to thing there was an issue on the pfSense box, trying to start several tunnels. It was (obviously) not the case, it was another device... Once that other device is shutdown, problem is solved.
  • IPSec One Way Communication… Sorta

    8
    0 Votes
    8 Posts
    2k Views
    B
    Thanks again, your explanation makes a lot of sense and matches up against my symptoms and config. I've been working a lot with MikroTiks which require manually setting block rules. When I didn't see the block rules in the pfSense GUI, I was just filling them in. That's my excuse and I'm sticking with it! Thanks again.
  • 2.3.2-RELEASE-p1 (amd64) PSK issues

    2
    0 Votes
    2 Posts
    873 Views
    A
    Any ideas? Prior to the update, raccoon didn't lead with the %any in the PSK file.
  • Transport mode comes up and GRE goes down.

    10
    0 Votes
    10 Posts
    4k Views
    J
    But you are not able to route OSPF over the IPSEC P2 Tunnel are you?
  • Mobile IPSEC IKEv2 NAT to Site to Site IPSEC?

    1
    0 Votes
    1 Posts
    608 Views
    No one has replied
  • Mobile Client + Site to Site Tunnel

    1
    0 Votes
    1 Posts
    517 Views
    No one has replied
  • L2TP over IPsec - traffic from LAN -> L2TP being dropped

    8
    0 Votes
    8 Posts
    7k Views
    DerelictD
    Looks like when you corrected it and saved again (and reloaded the rule set) it started working. Logging has no bearing on what traffic is or is not passed.
  • GRE Tunnel between branch and Datacenter

    2
    0 Votes
    2 Posts
    645 Views
    N
    Can I bump this topic to the top and check that I am in the correct forum?
  • IPSec VPN with Multiple Remote IPs

    3
    0 Votes
    3 Posts
    958 Views
    S
    i have done something similar before, except i created the phase1 and phase2 as if they were completely normal using the full /24 lan subnet, but then on the IPSec firewall rules tab, i did not create an any:any rule.  i just created a rule for the specific IP address(s) that were allowed to access the tunnel.
  • pfSense 2.2.5 - Redundancy with IPSEC

    2
    0 Votes
    2 Posts
    1k Views
    J
    I don't know if this helps you but we are doing ipsec redundancy with a CARP Cluster on each side and we bind the IPSEC Tunnel to the CARP VIP so if one system goes down the other system automatically kicks in and rebuilds the Tunnel. This obviously works only if you own continous IP Subnets on WAN Interfaces (we are using a dual LWL WAN Connection from Provider A which also provides the Copper SDSL Backup Connection to our datacenter over Provider B) so they move ove the IP Network from their side to the Backup connection). Not shure if this is possible on your side. Hope thhis helps anyways.
  • Static routing to IPsec tunnel

    6
    0 Votes
    6 Posts
    9k Views
    J
    Actually it is working in the constellation that i have a direct connection to another pfSense Appliance and a GRE Tunnel over WAN to the same Appliance both connections are configured within a Gateway Group, i got them up running and failing over as long as i do not activate the IPSec Transport Tunnel. If i activate the IPSec Tunnel traffic gets blocked somewhere but i do not see where. If i tear the tunnel down everything is working as expected. Thought about some kind of a triangle route but the Tranport IPSec Tunnel is similar to a L2 Connection so i do not get why it should interfere with my routing… I am really banging my head about this... Thought about using pfSense as a large Scale Hub and Spoke WAN to connect serveral branch offices together but this would be a PITA if this simple GRE / IPSEC connection is so difficult to get up and running.
  • IKEv2 pfSense - Cisco ASA goes down after about 24 hours

    3
    0 Votes
    3 Posts
    3k Views
    L
    @ljorgensen: Is it a rekeying issue (the lifetime of both P1 and P2s are 86400 seconds)? Dug around in the logs and found some tidbits. This is where it starts to go wrong: Dec  2 16:00:50 10.12.4.21 charon: 11[IKE] <con2000|3>initiator did not reauthenticate as requested Dec  2 16:00:50 10.12.4.21 charon: 11[IKE] <con2000|3>reauthenticating IKE_SA con2000[3] actively</con2000|3></con2000|3> After that the ASA end seems to try to reestablish P2s: Dec  2 16:00:50 10.12.4.21 charon: 11[NET] <con2000|4>received packet: from 130.225.247.66[500] to 130.226.230.200[500] (438 bytes Dec  2 16:00:50 10.12.4.21 charon: 11[ENC] <con2000|4>parsed IKE_SA_INIT response 0 [ SA KE No V V N(NATD_S_IP) N(NATD_D_IP) V ] Dec  2 16:00:50 10.12.4.21 charon: 11[IKE] <con2000|4>received Cisco Delete Reason vendor ID Dec  2 16:00:50 10.12.4.21 charon: 11[IKE] <con2000|4>received Cisco Copyright (c) 2009 vendor ID Dec  2 16:00:50 10.12.4.21 charon: 11[IKE] <con2000|4>received FRAGMENTATION vendor ID</con2000|4></con2000|4></con2000|4></con2000|4></con2000|4> These keep coming forever, incrementing the number after the pipe, e.g. "<con2000|3657>" until everything stops working and I restart the IPsec services. Looks like this: Dec  5 09:29:49 10.12.4.21 charon: 03[NET] <con2000|4906>received packet: from 130.225.247.66[500] to 130.226.230.200[500] (438 by Dec  5 09:29:49 10.12.4.21 charon: 03[ENC] <con2000|4906>parsed IKE_SA_INIT response 0 [ SA KE No V V N(NATD_S_IP) N(NATD_D_IP) V Dec  5 09:29:49 10.12.4.21 charon: 03[IKE] <con2000|4906>received Cisco Delete Reason vendor ID Dec  5 09:29:49 10.12.4.21 charon: 03[IKE] <con2000|4906>received Cisco Copyright (c) 2009 vendor ID Dec  5 09:29:49 10.12.4.21 charon: 03[IKE] <con2000|4906>received FRAGMENTATION vendor ID</con2000|4906></con2000|4906></con2000|4906></con2000|4906></con2000|4906> At that point I also get a lot of these: Dec  5 08:50:01 10.12.4.21 charon: 12[KNL] <con2000|4843>unable to query SAD entry with SPI 9c8aeb8c: No such file or directory (2) Dec  5 08:50:01 10.12.4.21 charon: 12[KNL] <con2000|4843>unable to query SAD entry with SPI 6b3a845f: No such file or directory (2)</con2000|4843></con2000|4843> ```</con2000|3657>
  • IPsec site to site to checkpoint UTM drops every few minutes

    2
    0 Votes
    2 Posts
    970 Views
    J
    Anyone? Ideas maybe?
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.