• IPSec pfsense <-> Fritzbox broken in 2.2

    20
    0 Votes
    20 Posts
    11k Views
    ?
    The initial connection comes up fine. Just after the 24h disconnect the tunnel will not be reestablished and I get the same log entries. It seems the ISP cut the line all 24h once, like here in Germany and the IPSec connection is not coming up proper again. Confusing but maybe helpful: If I use another IPSec connection from my Smartphone (with VPNCilla, inside LAN) to the Fritz!Box then the pfsense tunnel comes up simultaneously  :o If there will be then a packet flow through the tunnel it will be perhaps revive the older IPSec VPN tunnel also again and its up then. Did you try out to get from your PC a link or data flow through the tunnel by opening the briwser and start connecting some devices on the other side of the VOPN tunnel, or perhaps another program running on a device in the LAN?
  • AWS VPC Wizard connection - received DELETE for ESP CHILD_SA

    3
    0 Votes
    3 Posts
    3k Views
    H
    @jimp: How many Phase 2 entries do you have? IIRC AWS will only allow so many P2 entries (3, I think) and if you establish another one after that, they will disconnect one of the previous entries in exactly that fashion. Hi, I had since found the issue and that was in fact the problem. These symptoms are buried in this Amazon tech note https://aws.amazon.com/premiumsupport/knowledge-center/vpn-connection-instability/. Really difficult to track down because you don't have access to any logs on the AWS side… Cheerio, Harry.
  • Ping Anomaly

    4
    0 Votes
    4 Posts
    1k Views
    C
    Basic network config on the hosts in question the next most likely. Missing or wrong default gateway, wrong subnet mask.
  • VPN Tunnel issues

    1
    0 Votes
    1 Posts
    819 Views
    No one has replied
  • Ipsec service stopped

    2
    0 Votes
    2 Posts
    2k Views
    C
    You're at least a version or two behind. Upgrade, then if you're still having an issue, post your IPsec logs again and what you're trying to configure.
  • [2.2] Strong Swan DNS Problems with mobile users

    14
    0 Votes
    14 Posts
    7k Views
    C
    @Garrett: Just found a workaround by appending another bogus domain name in my split-dns list from: "mydomain.com" to "mydomain.com bogus.com". That seemed to do the trick. That'll work around it. The root issue, which was a client-side problem, was fixed in OS X El Capitan for sure, and I believe a newer iOS version than this thread originally referenced as well.
  • EAP-MSCHapv2 with internal users?

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    For local clients and EAP-MSCHAPv2, they go on the PSK tab, with entries set for EAP, as described in the documentation: https://doc.pfsense.org/index.php/IKEv2_with_EAP-MSCHAPv2#Create_Client_Pre-Shared_Keys
  • 0 Votes
    8 Posts
    4k Views
    S
    Hi, Alternative you Need two ip addresses at colocation, setup transport IPSec connections and gre Tunnels over it. Sorry for spellings Tablet with wrong keyboard Best regards Thomas
  • IPSEC initiation from one side only

    8
    0 Votes
    8 Posts
    2k Views
    C
    Config can differ as initiator vs. responder. UDP 500 traffic could be blocked in that direction but not the opposite. Regardless you need to look at the Juniper side and see why it's not replying.
  • P2 problems pfSense <-> Juniper

    2
    0 Votes
    2 Posts
    1k Views
    C
    The Juniper is first not replying, and second, sending a delete. No way to tell anything useful from that side's logs in that case, check the logs on the Juniper side.
  • IPSEC address to address

    1
    0 Votes
    1 Posts
    813 Views
    No one has replied
  • Phase 1 problem after phase 1 lifetime ends

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Insight into ipsec traffic

    1
    0 Votes
    1 Posts
    578 Views
    No one has replied
  • Client VPN and then Site to Site VPN traversal (possible?)

    3
    0 Votes
    3 Posts
    1k Views
    K
    I am trying to do the same but confused as to your explanation.  Any screenshots would be great!
  • IPSEC widget error

    14
    0 Votes
    14 Posts
    4k Views
    M
    2.3 is not affected :)
  • L2TP, Privat Network -> Public Network

    2
    0 Votes
    2 Posts
    822 Views
    J
    Seems like pfSense auto adds a NAT rule (default "Automatic outbound" is selected in Outbound "Firewall: NAT: Outbound"). I changed Outbound to "Hybrid outbound", and added an exception "Do not NAT" with the subnet used for L2TP; see attachment. Image is manipulated to mask my real IP/mask, instead using 8.8.8.0/29 as the example in my previous post. [image: outbound.png_thumb] [image: outbound.png]
  • Bounty offered: IKEv2 for iOS and OSX mobile client

    Locked
    9
    0 Votes
    9 Posts
    3k Views
    M
    Ok, my solution is posted to a new post, to keep things clean. https://forum.pfsense.org/index.php?topic=106433.0 Imagine how pleased I was to find that the forum does not support markdown and I had to reformat the whole thing!!! It would be great if that post could be 'stickied' if this forum supports that, at least for as long as the instructions are valid!
  • No traffic over ipsec

    4
    0 Votes
    4 Posts
    1k Views
    2
    IPsec tunnels need NSA/GCHQ approval before coming functional, I had that several times in the past. openVPN the apparently crack on-the-fly, so they "work" out of the box… ;-)
  • IPSEC Tunnels / Routing in between

    8
    0 Votes
    8 Posts
    2k Views
    G
    Sorry, my bad. I did this several times but the "branches" were in fact OpenVPN tunnels, and they were connected through an IPsec tunnel between the main sites. On the basis of how all this work, I don't think you can do what I mentioned earlier (although I never tried) Probably your best bet is to use some dynamic DNS so you can establish a direct Ph1 between the branches, since you'll be able to ditch the 0.0.0.0/0 requirement
  • Site-to-Site + Synology Diskstation = Problems

    2
    0 Votes
    2 Posts
    2k Views
    S
    The plot thickens a bit more and I get more and more out of my depth of field. I have toggled the following value: net.inet.ip.redirect = 0 (default 1) and communication between the Diskstation and Azure has been restored. Have I set myself up for more problems by altering the above flag? Thanks in advance!
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.