• Pfsense 2.2 VPN L2TP/Ipsec * Problem

    2
    0 Votes
    2 Posts
    1k Views
    A

    please refer to the old thread https://208.123.73.68/index.php?topic=83321.0

  • [2.2] Problem with Dynamic IP on StrongWAN

    5
    0 Votes
    5 Posts
    5k Views
    E

    Probably DNS caches make this not work sometimes, probably the php cache in this instance.

    Anyhow the userid is a better choice in general.

  • Double Tunnels between two multiwan sites

    9
    0 Votes
    9 Posts
    2k Views
    G

    The first post you mentioned outlines the process. The patch mentioned is no longer required, there is a system option for that setting.

    If both ends are pfSense, it should be pretty straightforward. If the other end is some other vendor, you'll have to figure out a way to accomplish the same behavior (eg, on MikroTik RouterOS, I have configured some scripts which resolve the dynamic DNS hostnames and modify the config accordingly).

    Just do it, and post your results ;)

  • Site to Site Tunnel with Mutual RSA stopped working after 2.2 upgrade

    5
    0 Votes
    5 Posts
    2k Views
    E

    Yeah this bug has been fixed in the repository and will come with pfSense 2.2.1 update.

  • IPSec

    4
    0 Votes
    4 Posts
    1k Views
    R

    Thanks all.  I do have DNS set in phase 2.  It simply does not work.

    See https://forum.pfsense.org/index.php?topic=88226.0 for an identical example with more thorough logs.

    I suspect a possible migration or upgrade issue, but I would need to find the time to do a clean install.

  • IPsec Tunnels with Peplink

    3
    0 Votes
    3 Posts
    2k Views
    G

    So I'm an idiot.  There wasn't an IPsec allow rule on the firewall setup.  In my defense, it's more than 3 private networks actually, and I didn't set things up, and sitting there staring at the firewall rules it kinda all looks dandy even when you're having problems.  Man, props to the peplink guys though as they went above and beyond.  Ha, in my defense again though, I'm the guy that stared at the pfctl -sa output and finally had things dawn on me.  Anyhow, if anyone else encounters this issue?  Don't be an idiot?

  • [Solved] IPSec IKEv2 in pfSense only allow one mobile client to connect.

    16
    0 Votes
    16 Posts
    9k Views
    Z

    @maxxer:

    @zllovesuki:

    Therefore, every mobile client needs to have the self signed CA installed. For strongSwan client, the X.509 server certificate needs to be installed as well.

    So to use IPsec with IKEv2 you need to import a cert on the mobile client?

    I managed to get IPSec back to work with IKEv1, but now my Ubuntu client won't connect anymore. I was wondering if moving to IKEv2 could solve both issues, but cannot manage it to authenticate.
    i found here that android 4.4 should work with EAP-MSCHAPv2, which from what I understand is still a user/pass method, but it won't work here…

    Yes, you need to install/import the CA that issued the e IPSec certificate.

  • Is /usr/local/www/charon.core a core dump file

    2
    0 Votes
    2 Posts
    1k Views
    D

    Yeah, this one can safely be deleted unless you intend to debug why's it crashing.

  • IPsec - Intended mechanism of CRL check

    17
    0 Votes
    17 Posts
    5k Views
    P

    Yeah, thanks for grasping this former question. Currently, everything is working as expected with the help of a correspondingly configured DNS forwarder. But I consider adding to future certificates two CRL URLs: One with a public address and one with a LAN address. I have just spent some time to re-issue most of my certificates due to expiry range 1 year and I am glad not being forced to do it again although those certificates do just protect my ambitious home LAN  ;)

    Regards,
    Peter

  • Brand new way to be locked out :)

    3
    0 Votes
    3 Posts
    1k Views
    M

    @jimp:

    If the Phase 1 was between the WAN IP of the firewall and the IP address you were coming from

    Yes, good guess, I didn't think of it while trying to regain access.
    It might be a good idea to (at least) add a line somewhere about "changing ip address".
    It would too resolve "5 Locked Out by Too Many Failed Login Attempts"

  • Bug in 2.2: IPSec logging settings ignored on restart

    2
    0 Votes
    2 Posts
    630 Views
    L

    Hi,

    I can confirm I had the same symptoms with 2.2. But I had to go back with 2.1.5 because of IPsec multiple p2 problems.

    So you are not alone.

    Regards

  • 0 Votes
    2 Posts
    2k Views
    D

    If you apply this patch then

    /usr/local/sbin/pfSsh.php playback restartipsec

    should work.

  • Unable to ping dynamic leases through IPSec

    1
    0 Votes
    1 Posts
    671 Views
    No one has replied
  • Help me understand why Ipsec is faster

    1
    0 Votes
    1 Posts
    646 Views
    No one has replied
  • Frequent IPsec disconnects with 2.2

    12
    0 Votes
    12 Posts
    11k Views
    M

    Attached another set of logs after a disconnect.
    This time with compression ON

    I can also see this on the console:
    ipcomp_output_cb: compressions was useless 104 - 20 <= 86

    1.1.1.1.txt
    2.2.2.2.txt

  • [2.1.5 -> 2.2.0] Multiple P2 = pfsense reboot any time

    1
    0 Votes
    1 Posts
    718 Views
    No one has replied
  • PfSense 2.2 IPSEC to 2.1.5 failing

    10
    0 Votes
    10 Posts
    3k Views
    W

    new topic for same problem ? :o

    yes main mode on both.

    I redo a config vpn to test.

  • Routed LANs with IPSec as it in OpenVPN

    1
    0 Votes
    1 Posts
    589 Views
    No one has replied
  • IPsec pfSense 2.2 to 2.1.5 failing

    6
    0 Votes
    6 Posts
    1k Views
    C

    You don't actually have to use the public IP it's using, for that case behind NAT you could let it use its private WAN IP as the ID. Just make sure both ends are set to match accordingly for that private IP.

  • Control P2 local network proposal with nat before ipsec config

    1
    0 Votes
    1 Posts
    527 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.