• Normal charon memory usage?

    18
    0 Votes
    18 Posts
    6k Views
    J

    @cmb:

    The most significant leaks are now fixed in 2.2.5.

    Well, we've patched around them, anyway.

  • Create a L2TP/IPSec server in pfSense?

    5
    0 Votes
    5 Posts
    1k Views
    jimpJ

    What exactly didn't work? And are you certain it was the firewall that didn't work? L2TP/IPsec client support is extremely inconsistent and in some cases broken.

    Move on to IKEv2… L2TP/IPsec isn't worth the trouble.

  • Questions migrating Linux Strongswan IKEv2 setup

    2
    0 Votes
    2 Posts
    792 Views
    jimpJ

    EAP-TLS is IKEv2 with per-user certificates.

  • IPSec from pfSense 2.2.4 to Fortigate (don't know the version) flakey

    3
    0 Votes
    3 Posts
    971 Views
    awebsterA

    Check your phase 1 and phase 2 lifetimes, sounds like there is a mismatch.

  • Glorious Error 789 or 13801 for IKEv2

    3
    0 Votes
    3 Posts
    2k Views
    F

    @David_W:

    As jimp has stated in the forums several times recently, IPsec using IKEv2 is probably a better option than L2TP/IPsec at this point.

    I have no problems using Windows 7 Professional clients with pfSense's IKEv2 support.

    Ok did that, and it worked ^^

  • PFSense 2.2.4 - ASA 5520 IPSEC

    1
    0 Votes
    1 Posts
    733 Views
    No one has replied
  • Draytek - setting up IPsec client

    6
    0 Votes
    6 Posts
    2k Views
    R

    i am doing it another way now, i am just using "mutual PSK" for authentication but i still cant get it to connect

    got screenshots incase it helps

    ipsec_site.zip

  • Site-to-Site IPSec VPN between PFSense 2.2.4 and Cisco ASA5505

    3
    0 Votes
    3 Posts
    1k Views
    D

    I believe it has to do with the nat rules in the asa you need to tell the asa that any traffic destined for the tunnel cannot go out the wan interface. I did it once don't remember the exact steps however.

  • Routing from A to B to C using IPsec tunnels

    2
    0 Votes
    2 Posts
    758 Views
    L

    Assuming that A, B, and C are all running pfSense it's relatively straightforward.

    Example LANs:
    Router A -> 10.10.0.0/24
    Router B -> 10.20.0.0/24
    Router C -> 10.30.0.0/24

    Router A
    –---------
    Phase 1 on A heading to B has two child Phase 2
    1. 10.10.0.0/24 -> 10.20.0.0/24
    2. 10.10.0.0/24 -> 10.30.0.0/24 Router B (B must know what to do with transiting traffic, this is probably what you're missing)

    Phase 1 on B heading to A has two child Phase 2
    1. 10.20.0.0/24 -> 10.10.0.0/24
    2. 10.30.0.0/24 -> 10.10.0.0/24 (C -> A Transit)

    Phase 1 on B heading to C has two child Phase 2
    1. 10.20.0.0/24 -> 10.30.0.0/24
    2. 10.10.0.0/24 -> 10.30.0.0/24 (A -> C Transit) Router C Phase 1 on C heading to B has two child Phase 2
    1. 10.30.0.0/24 -> 10.20.0.0/24
    2. 10.30.0.0/24 -> 10.10.0.0/24

    Also make sure that under Firewall -> Rules -> IPSEC that you pass IPSEC traffic for anything (all asterisks in all columns) on all routers. After getting the tunnels up you can make finer grained rules if you want.

  • Ipsec Tunnel

    1
    0 Votes
    1 Posts
    640 Views
    No one has replied
  • L2TP/IPsec - site to site tunnels

    2
    0 Votes
    2 Posts
    1k Views
    C

    That's probably not what you want for a site to site connection. There are a variety of potential routing complications. The Draytek should support a proper site to site IPsec connection without L2TP's inherent complications, use that instead.

  • IPsec invalid HASH_V1 payload length, decryption fail?

    8
    0 Votes
    8 Posts
    33k Views
    C

    @inexces:

    I have this problem after upgrading to 2.2.4

    charon: 07[ENC] <con1|2>invalid HASH_V1 payload length, decryption failed?
    charon: 07[ENC] <con1|2>could not decrypt payloads
    charon: 07[IKE] <con1|2>message parsing failed</con1|2></con1|2></con1|2>

    Upgrade to latest 2.2.5 snapshot (or release if it's out by the time you see this), that's probably the same root cause as this (which is confirmed fixed by several people in 2.2.5).

  • IPSec Issues after update to 2.2.4

    3
    0 Votes
    3 Posts
    2k Views
    C

    Upgrade to latest 2.2.5 snapshot, that's probably the same root cause as this (which is confirmed fixed by several people in 2.2.5).

    @dcandea:

    Based on strongswan
    https://wiki.strongswan.org/issues/460

    try with modeconfig=pull

    That has no relation in this case.

  • Charon memory leak

    18
    0 Votes
    18 Posts
    6k Views
    C

    @djamp42:

    It's being worked currently. https://redmine.pfsense.org/issues/5149

    There's an update on that ticket. Next snapshot run should resolve the serious leaks.

  • Multiple ipsec tunnels set up, one randomly stops working.

    3
    0 Votes
    3 Posts
    947 Views
    J

    Little progress?

    I deleted and re-created the problem tunnel Gave it a new key and set it at main mode instead of aggressive.

    Lasted just over 24 hours before dropping.

    Other tunnels still remain stable.

    Does anyone have any ideas?

  • PfSense 2.2.3 <–> CyberGuard SG300: Stuck to phase 1

    4
    0 Votes
    4 Posts
    2k Views
    C

    Thanks cmb,

    you were right.
    The Cyberguard is behind a Sitecom X4 N300 router.
    This home router has an "Ipsec pass through" option which sadly does not pass UDP 4500.
    Explictiy allowing it fixed the issue.

    Regards,
      Corrado

  • On new WAN IP (DHCP Client) it takes 10 minutes to IPsec reconnects

    1
    0 Votes
    1 Posts
    643 Views
    No one has replied
  • Mobile IPSEC Radius IP Assigment

    14
    0 Votes
    14 Posts
    3k Views
    D

    Hi

    I managed to make it also work with Mutual RSA and Xauth. Strongswan has support for xauth-radius

    replace line

    $rightsourceip = "\trightsourceip = {$a_client['pool_address']}/{$a_client['pool_netbits']}\n";

    with

    $rightsourceip = "\trightsourceip = %radius\n";

    and

    $authentication .= "\n\trightauth2 = xauth-generic";

    with

    $authentication .= "\n\trightauth2 = xauth-radius";
  • Radius attribute

    4
    0 Votes
    4 Posts
    1k Views
    D

    Read this and use the latest 2.2.5 snapshot. And stop necroposting to 2+ years old threads dealing with completely different pfSense versions.

  • IPSec VPN between ASA 5505 and pfSense 2.2.4

    3
    0 Votes
    3 Posts
    3k Views
    K

    It is working using IKE2.

    Thanks.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.