• IPsec with Ikev2 received proposals inacceptable?

    4
    0 Votes
    4 Posts
    5k Views
    C
    "AES" is AES-CBC.
  • IPSEC moblie clients - iphone

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • IPSEC Tunnel help

    1
    0 Votes
    1 Posts
    840 Views
    No one has replied
  • IPSec Tunnel Stopped Working…

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • IPSec Throughput Issues

    1
    0 Votes
    1 Posts
    923 Views
    No one has replied
  • Routing to additional subnet over IPsec VPN

    3
    0 Votes
    3 Posts
    1k Views
    C
    You don't route across IPsec. Just need to make sure the additional P2 matches, if IKEv1. For IKEv2, ASAs don't support multiple selectors in the same TS payload yet, so that won't work. We'll implement a workaround likely in 2.3 to accommodate that, as Cisco doesn't seem to be implementing that any time soon. https://redmine.pfsense.org/issues/4704
  • 0 Votes
    3 Posts
    1k Views
    C
    It was technically wrong to begin with, but racoon didn't care. It's noted in the upgrade guide. https://doc.pfsense.org/index.php/UpgradeGuide#Mobile_client_users.2C_verify_Local_Network
  • Setup IPSEC on 2.2.5 for Mac OSX and Shrew VPN Client on Windows [SOLVED]

    5
    0 Votes
    5 Posts
    2k Views
    F
    No one know why i can connect only one VPN at the same time ? Best regards
  • IPSec with Commercial Certificates

    9
    0 Votes
    9 Posts
    3k Views
    C
    EV wouldn't be any different in that regard.
  • IPSec becomes unstable after some days

    2
    0 Votes
    2 Posts
    948 Views
    awebsterA
    As you said, not much to go on… Check the IPSEC Phase 2 lifetime.  They must match on both ends. Beware that not all vendors describe the lifetime in the same units (seconds, minutes or hours), so be sure that you are comparing apples to apples. The phase2 lifetime can also be specified in amount of data transferred.  Again, they must match, but don't use time and amount lifetimes at the same time, that gets confusing.
  • Cant browse using Always-On VPN on iOS device

    4
    0 Votes
    4 Posts
    1k Views
    E
    @cmb: Where local subnet is "LAN", it only allows to the LAN subnet. Set that to 0.0.0.0/0 instead to send all traffic across the VPN. Thank you very much, that resolved the problem. It totally makes sense too, can't believe I didn't notice that.
  • L2TP/IPsec VPN not responding to client?

    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    Did you read the warning at https://doc.pfsense.org/index.php/L2TP/IPsec ? Drop L2TP/IPsec and go for IKEv2 https://doc.pfsense.org/index.php/IKEv2_with_EAP-MSCHAPv2
  • Login issue with IPsec IKEv2 using Active Directory Authentication

    2
    0 Votes
    2 Posts
    1k Views
    L
    You cannot do what you're trying to do: https://forum.pfsense.org/index.php?topic=90753.msg504731#msg504731 Install and setup NPS/IAS on your AD server. Add it as a RADIUS server to pfSense. Then use EAP-Radius for authentication.
  • 1:1 NAT within Hub and Spoke IPsec VPN setup

    1
    0 Votes
    1 Posts
    727 Views
    No one has replied
  • IPsec to Fortinet stops working after some time

    8
    0 Votes
    8 Posts
    4k Views
    W
    @cmb: Does the a.a.a.a/24 and b.b.b.b/24 match what you would expect? It should only generate that response if those subnets don't match the config. It matches perfectly, also in the log fragment it actually fails. I just can't understand why it works fine for hours with multiple phase2 rekeyings gone well and then all of a sudden it should not match anymore? Can both sites initiatie a phase2 rekey? From what I have seen now it's alway strongswan rejecting the Fortinet TS after a while, but initial the connection works fine initiatited from both sites. For one connection I ended up with a phase1 lifetime of 28800 and a phase2 lifetime of 86400. In that case a rekey of phase2 should never happen. So far it seems stable, but only one day had passed so far.
  • IPSec Logs not Friendly in 2.2.5

    3
    0 Votes
    3 Posts
    997 Views
    C
    The connections are identified by the conXX entry in the log line. Can match that up via 'ipsec statusall' output or checking /var/etc/ipsec/ipsec.conf if you aren't sure what's what. The bulk of the logs are the same things expressed somewhat differently given it's a different keying daemon, but nothing difficult to grasp if you understand IPsec (which was a requirement for racoon's logs in 2.1x and earlier anyway). We'll probably bring back the connection description in the GUI log display at some point, but it's not a major usability hindrance.
  • L2TP/IPsec with Windows Embedded Handheld 6.5 Pro

    1
    0 Votes
    1 Posts
    985 Views
    No one has replied
  • StrongSwan IKEv2 EAP-TLS VPN to Android

    1
    0 Votes
    1 Posts
    4k Views
    No one has replied
  • Pfsense 2.1.5, when phase 1 drops, phase 2 does NOT

    1
    0 Votes
    1 Posts
    666 Views
    No one has replied
  • IPSec between version 2.1.2 and version 2.2.5

    6
    0 Votes
    6 Posts
    2k Views
    W
    FIXED: Thanks for the replies. I can confirm that the reason was due to the fact that our key had a space character at the end. This page is very helpful: https://doc.pfsense.org/index.php/IPsec_Troubleshooting
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.