• IOS 8 Cisco IPSec -> pfSense 2.2 broken

    5
    0 Votes
    5 Posts
    7k Views
    D

    Same here, after i followed instructions in https://doc.pfsense.org/index.php/Upgrade_Guide#IPsec_Changes all is back to normal.

  • 2.2 versus 2.1.5

    2
    0 Votes
    2 Posts
    757 Views
    C

    Did you change the Sonicwall too or is its config still the same?

    Logs from both ends would be good to see.

  • Pfsense - Fortigate

    10
    0 Votes
    10 Posts
    3k Views
    valnarV

    And also add a firewall rule that allows traffic through that VPN interface.  So 3 things that need to be done on a Fortigate:

    VPN
    Routes
    FW rules

  • ERROR: none message must be encrypted

    3
    0 Votes
    3 Posts
    7k Views
    A

    Just want to add that this can also mean the shared secret does not match.  I just ran into this error recently.  The remote end (Checkpoint) revealed in the logs that it could be a shared secret mismatch.  Sure enough it was off on one character.  The pfsense side was initiating the connection.

  • IPsec routing workaround for pfsense own ip causes issues with SLES11.

    3
    0 Votes
    3 Posts
    1k Views
    C

    @cmb:

    Depends on what services you're using as to whether that route is required. For DNS, the DNS forwarder's domain overrides allow specifying a source IP, which negates the need for that route. Any service that lets you choose a source IP will work if you bind it to LAN.

    That really shouldn't break SLES, that should probably be reported there as a bug. Should be able to disable acceptance of ICMP redirects on the SLES host to work around it.

    Thanks for your reply.

    As I said, the services I absolutely need to work from pfsense through the tunnel are DNS resolution (not a forwarder, but pfsense itself needs to be able to resolve names, and the name server it needs to talk to is behind the tunnel), and NTP (the NTP server pfSense needs to use to sync it's won time is also behind the tunnel.

    As for reportign the SLES behaviour as a bug: No chance in hell this would ever be accepted as such. And I highly doubt it's a SLES specific issue at all. They don't touch the tcp/ip stack. Disabling redirect acceptance unforunately isn't possible here either, it's needed.

    Thanks again.

  • Windows internal VPN-Client to pfSENSE 2.2

    3
    0 Votes
    3 Posts
    1k Views
    A

    There is also a tutorial here
    https://doc.pfsense.org/index.php/L2TP/IPsec

    and on of the ongoing discussions is here

  • IPsec IKEv1 Configuration - with Mutual RSA + Xauth & Route all traffic

    5
    0 Votes
    5 Posts
    2k Views
    jimpJ

    The blog posts are the official announcements and included a note about that issue.

    It was not listed in the upgrade guide, so I corrected that:
    https://doc.pfsense.org/index.php/Upgrade_Guide#IPsec_Changes

  • Atom C2558 IPsec AES-CGM performance… using pfSense 2.2\. Yeah!

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • IPSec IKEv2 VPN - DLNA SSDP

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Strange IPsec work?

    Locked
    3
    0 Votes
    3 Posts
    1k Views
    N

    Thanks for answear. I thought that is a issue with NAT, but can't get exactly what. That's the point:
    @JamesJohnson:

    The most probable cause is that your forwarding all UDP 500 traffic to the pfsense box.
    Which means that the mobile client can never establish a tunnel because its not receiving the response.

    Solved!

  • DNS Default Domain…s?

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • IPv4/IPv6 mixed IPSEC configuration broken

    2
    0 Votes
    2 Posts
    988 Views
    R

    @MrMoo:

    As a quirk you can provide a hostname which resolves to IPv6 and configure for IPv4 tunneling without the complaints.

    Worse yet, I've had a v4 tunnel try (and fail, of course) to use a v6 address for a hostname that resolves for both.

  • [BUG] invalid config file '/var/etc/ipsec/ipsec.conf'

    2
    0 Votes
    2 Posts
    3k Views
    M

    I was able to fix this by enclosing the ASN.1 DN values with double quotes (").

    I have added Bug #4275

  • [SOLVED] Switching from aggressive to main mode does not work

    3
    0 Votes
    3 Posts
    2k Views
    M

    After reading up more on the subject, I discovered that apparently the combination of PSK and main mode is not possible with dynamic IP's.
    I have switched to certificate-based authentication now, and the tunnel did come up fine!
    (And I'm even more secure now :) )

    Thanks
    Michel

  • Hub & Multi-Spoke VPN - allow communication between spokes?

    5
  • Fortgate 110c and Pfsense

    3
    0 Votes
    3 Posts
    1k Views
    S

    I have two PfSense box connected to fortigate in IPSec without problem.
    (Different proposal used)

    Do you need help ?

    Regards,
    Secf'

  • Chaining VPNs using Phase2 NAT

    4
    0 Votes
    4 Posts
    895 Views
    J

    O o o…. Would this work ?

    Using just one site as an example
    If I extend the local subnet range of IPSEC5/Phase2NAT to include the NAT'd range of IPSEC2/Phase2NAT whilst making an additional tunnel for the remote site.

    Something like...

    RemoteOffice1 <=IPSEC1=> HQ <=IPSEC5/Phase2NAT=> ExternalService
    RemoteOffice1 <=IPSEC2/Phase2NAT=> HQ <=IPSEC5/Phase2NAT=> ExternalService

    Thanks

  • PfSense Netgear VPN

    1
    0 Votes
    1 Posts
    898 Views
    No one has replied
  • Multiple Mobile IPsec profiles

    4
    0 Votes
    4 Posts
    1k Views
    E

    It will be on the next versions for sure on 2.3

  • Chaining IPSEC VPN

    3
    0 Votes
    3 Posts
    1k Views
    H

    Thanks a lot,
    It works fine

    Hakim

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.