• 3 location routing through IPSEC - help

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    R

    Looks like you may be trying to do like a couple other of us are at: http://forum.pfsense.org/index.php/topic,48952.0.html

  • Issues seeing computers on LAN

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    S

    I just realized I dont get any internet connection. It connects to pfsense and stops there. I tried dns servers and what not. nothing.

    Im home atm and getting internet, so that means traffic from the vpn isnt passing through. i dont know where to even begin looking to fix this.

  • IPIP tunnel as VPN server's gateway

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Step me though L2TP/IPSec either PSK or CRT?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    D

    L2TP/IPsec isn't available (yet), check http://redmine.pfsense.org/issues/475

  • Peplink pfsense ipsec vpn

    Locked
    5
    0 Votes
    5 Posts
    14k Views
    C

    @opti2k4:

    In case someone gets into trouble like me…

    problematic was secret  that contained speical characters !"

    :( >:( >:( >:( >:( >:( >:( >:( >:( >:( >:(

    Ah not the first time we've heard that with other products. That's a bug in Peplink, not on our side, we support every character, symbol, etc. in shared keys. One of my production VPNs runs with every letter, number and symbol in the key just to prove that always works, as people tend to not believe the problem is actually in the commercial box they paid big bucks for and not on our side.

  • Without connection (ipsec)

    Locked
    8
    0 Votes
    8 Posts
    2k Views
    C

    Looks fine at a glance. If the logs in this thread are all you're getting with that config, then you're not sending any traffic from 10.0.1.0/24 to 172.16.0.0/21 (at least that's getting to the firewall), as it would attempt to negotiate if you were.

  • IPsec tunnel not being initiated from remote network

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    C

    Not uncommon with Cisco, it's relatively easy to configure them in such a way that they use a different policy when initiating than what they accept as a responder. Setting the phase 1 proposal checking to "obey" on the pfSense side generally will work around it, or alternatively fix the Cisco.

  • Amazon Virtual Private Cloud (VPC) VPN

    Locked
    10
    0 Votes
    10 Posts
    23k Views
    S

    @abonstu:

    wow… thats awesome - thanks for taking the time to document those screens!

    i've actually got two pfsense routers in different locations:

    the first has a /29 frame route resulting in a config practically identical to your example - this connection is working perfectly

    the second router only has a single public IP address and this is where i am tearing my hair out - i cant seem to get the VPN up - the Amazon tunnel status just says PHASE_2_SUCCESS

    im sure its a routing issue but i cant see where im going wrong.

    the ipsec config is just using my WAN interface

    i shouldnt need a gateway or static route as my WAN is the only gateway i have, the tunnel subnet (169.*) should just go straight out the default gateway (right? :-/)

    any ideas on what im missing here? naturally ive tried all sorts of things, including manually configuring a static route anyway but i cant seem to get connected.

    That make two of us, I think this is the same Binding issue. I gave up now and recommended to terminated on Cisco Router.

  • Unable to establish tunnel from remote side…

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    S

    Just a quick update with the solution and thanks to cmb and jimp for the assistance (through commercial support).

    Apparently, the configuration of the Cisco device did not enforce it to use the Phase1 protocols defined and since proposal checking on the pfSense device was set to "strict" the negotiation failed.
    Changing proposal checking to "obey" did the trick.

    Also, it is recommended to keep SA lifetime on phase1 to 86400 as the Cisco devices are not to happy about changing this unless it is done 110% correctly.

  • How to view connected VPN clients??

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    C

    There is currently no such capability. There's a feature request ticket open on it. http://redmine.pfsense.org/issues/1986

  • IPSec Fallback

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    jimpJ

    There isn't a way to set it up, even manually, yet. Hence the open ticket.

  • PfSense 2.0 IPSec LAN to LAN with Cisco PIX running 6.3

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    C

    Did you add the rules in the firewall tab on the IPSEC interface ?

  • 0 Votes
    1 Posts
    2k Views
    No one has replied
  • IPSec tunnel endpoint with dynamic IP kills connection

    Locked
    3
    0 Votes
    3 Posts
    4k Views
    H

    You were right, I feel kinda dumb now.
    I plugged one of the WAN uplinks into my RV042 to test this and yes of course the Gateway monitoring is down.

    Thanks!

  • PfSense 2.0.1 IPSec - Site-To-Site Problem (pfSense to pfSense)

    Locked
    10
    0 Votes
    10 Posts
    5k Views
    E

    That is problem SOLVED.
    Thanks cmb.

    Now IPSec working STABIL after the change PPTP PUBLIC IP to PRIVATE IP.

  • Odd Tunnel Behaviour

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    C

    What that sounds like is large packets not getting through the VPN, which 2.0 is actually much better with because it MSS clamps VPN traffic, eliminating that issue. Probably not the case based on that description though. It's basically impossible to say from a description, having a packet capture to analyze is the only way to know what's happening.

  • PFSense <–> PFsense: IPSEC Tunnels Losing Connectivity

    Locked
    15
    0 Votes
    15 Posts
    39k Views
    D

    It seems that several people are reporting IPsec VPN issues with pfsense 2.x (note: which includes the recent ipsec-tools 0.8.0). While some problems may be due to misconfiguration (e.g. the racoon / mpd conflict), the pfsense<->pfsense VPN scenario should be trouble-free.

    As most of the problems posted here seem to be related to rekeying,  I've been searching the ipsec-tools-devel mailing lists for clues. Check the following discussions:

    http://old.nabble.com/why-is-SA-lifetime-kilobyte-limit-disabled-in-racoon–td31648198.html

    Even if Node-A think IPsec-SA is expired at this time, Node-B doen't
    think so. i.e. the states of IPsec-SA is mismatched.

    Understand – similar things already happen with time-based
    lifetimes if there is a clock skew between the two boxes.
    (This is particulary bad if the oldest available SA is used
    by the kernel.)

    Racoon's strategy of rekeying is "Initiator do it." If Node-B
      is responder, Node-A doesn't start rekeying even if IPsec-SA is
      expired.
    That sounds like a bug in racoon.  It seems that if either end is
    unsatisfied with the SA, that end should trigger a new one.

    I'd also call this a shortcoming at least. The standards are
    weak, and one doesn't know how other implementations behave.
    It would be safer if both sides did care about renegotiations.

    But the key
    question is what the other implementions do, and what the standard says.

    I've just tried OpenBSD's isakmpd (the oldish version in pkgsrc).
    It initiates a Phase 2 exchange if the soft timeout on its
    side expires, even if it was responder initially. (It randomizes
    the soft timeouts to minimize the chance that both sides start
    the exchange simultanously.)
    PFC2409 says that both sides can initiate rekeying. "Can" --
    this is not much of a guideline for implementors.

    I can see the argument that especially with a 24h or less
    lifetime, AES doesn't need volume-based rekeying.

    OK, I was more concerned about interoperability. What if
    the other side insists in some volume limit?

    I've just tried OpenBSD's isakmpd (the oldish version in pkgsrc).
    It initiates a Phase 2 exchange if the soft timeout on its
    side expires, even if it was responder initially. (It randomizes
    the soft timeouts to minimize the chance that both sides start
    the exchange simultanously.)
    PFC2409 says that both sides can initiate rekeying. "Can" --
    this is not much of a guideline for implementors.

    True, but it seems the original responder initiating a renegotiation is
    the only reasonable behavior.

    At the very least, it would appear to suggest that if the original
    initiator rejects an attempt on the part of the original responder to
    rekey, that's a bug.

    True, but it seems the original responder initiating a renegotiation is
    the only reasonable behavior.

    If both side start rekeying at same time, there is/was a problem of
    SA selection.

    The two rekeying session makes two pair of IPsec-SAs. racoon can
    do this, and IPsec implementations (kernel side) do one of following:

    a. Use oldest IPsec-SA to send and keep all IPsec-SAs to receive(KAME)
    b. Use newest IPsec-SA to send and keep all IPsec-SAs to receive(Fast IPsec)
    c. Use newest IPsec-SA to send/receive and purge older IPsec-SAs

    Of cause, c. is bad behavior, but small implementations(kernel side)
    may handle only one sessions and one key pair at a time.
    Standards don't prohibit this. This problem is exist between IKE
    standards and IPsec standards. It seems IKEv2 makes this more clean.

    Today, most implementations select b. or have configuration for it.
    And racoon isn't used on other than KAME, Fast IPsec, or Linux(a. or b.)
    I think your logic actually works fine. But racoon is old product,
    so it doesn't catch recent trends up.

    http://marc.info/?l=ipsec-tools-devel&m=129905181832157&w=2
    http://marc.info/?l=ipsec-tools-devel&m=129916127621017&w=2

    let me revive the discussion on an active negotiation,
    as opposed to a passive daemon. Until recently my use
    of IPsec was tied to isakmpd, ipsecctl, and OpenBSD
    and my views are conditioned by this fact. There the
    IPsec daemon is normally active in initiating its
    negotiations at startup, unless told to configure
    a passive listener for a particular tunnel/transport.
    At the other extreme there is even a so called
    active-only setting.

    The implicit and default setting in racoon-0.7.3 is
    "passive off", but this still waits for a demand to be
    detected. Thus the mode is better described as "passive
    until harshly bugged to get going"! The need to ping
    and wait for a ridiculously long delay should not be
    acceptable in most circumstances. Forgive me for the
    critisism, but to me this is a design flaw. It is a
    question of dependability and of trust to erect the
    desired IPsec tunnels already at booting time.

    Funny: when we tried to switch from racoon to isakmpd at work, a long
    long time ago, this is one of the things we noticed on our TODO list:
    patch isakmpd to negociate SAs only when traffic comes to the tunnel :-)

    And this is how things should (can ?) be done according to RFC 2367
    which provide SADB_ACQUIRE PFkey message….

    Now, doing comparative browsing in the sources 0.7.3
    and 0.8, the actual use of the variable PASSIVE in
    "struct remoteconf" has indeed expanded somewhat.
    Is the code progressing or maturing into a state
    that allows an actively negotiating daemon? I.e.,
    without waiting for traffic demand before commencing?

    Not afaik.
    Feel free to provide a patch for that, this would not be so
    complicated to parse all config and start negociation for needed
    tunnels, but there are also setups where we want to have tunnels
    negociated only when needed (so when traffic comes to the tunnel), so
    a patch will need to provide this feature as optional.
    The best would be to have a peer-based (or sainfo based ?) token for
    that.

    Please also note that this is quite easy to also generate dummy
    traffic for the needed tunnels when you activate the configuration if
    you want.
    And of course generate dummy traffic from time to time to ensure the
    tunnel will always be up.

  • IPsec & GLXSB - pfSense 2.0.1 i386

    Locked
    7
    0 Votes
    7 Posts
    4k Views
    dotdashD

    I was trying to use AES128 with glxsb. It works fine with both pfsense peers, my trouble was trying to connect from pfsense to a Sonicwall peer. It connected but wasn't passing traffic. I switched to 3DES and the tunnel came up. I didn't try disabling glxsb. I can't test anything at this point as the customer would not be amused at another outage.

  • Issue as described in bug #1351

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Tutorial Mobile client Mutual RSA + Xauth

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.