• 23.01 Keep Alive - Where is it

    37
    0 Votes
    37 Posts
    8k Views
    T
    @dalicollins Sad but true! There is nothing quite like a tongue lashing from one of the Gurus. Ted Quade
  • IPSec Issue After 23.01 Upgrade

    Moved
    11
    0 Votes
    11 Posts
    3k Views
    jimpJ
    @renegade said in IPSec Issue After 23.01 Upgrade: I have an ios device with ipsec to my 4100. After activation the tunnel works fine. When the iphone gets in standby (no user interaction) the 4100 reboots without any error message or crash dump :-( That wouldn't be related to this thread, so you should start a new one just for that. And there would have to be either an error message or a crash dump somewhere, even if it's only printed to the serial console. You should attach a serial console client and log all the output while you try to make the crash happen again.
  • Disable IPsec Tunnel by cli

    1
    0 Votes
    1 Posts
    539 Views
    No one has replied
  • Help with NAT through IPSec VTI Mode

    1
    0 Votes
    1 Posts
    488 Views
    No one has replied
  • NAT Not Working with IPsec Tunnel

    2
    0 Votes
    2 Posts
    1k Views
    J
    I was finally able to solve this by: Setting my Local Network as my actual local network rather than the Virtual IP in the Ph2 config. Then, I set the NAT/BINAT translation option to what the required source IP must be for the IPsec tunnel. Didn't even need Virtual IP or NAT rules for any of it 🥴
  • IPsec VPN - P2 does not come up

    7
    0 Votes
    7 Posts
    1k Views
    A
    @viragomann thank's again! I will try it asap and come back with the results!
  • MacOS Ventura and IPSec Mobile Clients

    15
    0 Votes
    15 Posts
    2k Views
    M
    Turns out my issue was within phase 2 on the tunnel. I mistakenly unchecked "SHA384". Smh...... Just wanted to share.
  • IPsec Mobile > IPsec Tunnel with Specific Source IP

    1
    0 Votes
    1 Posts
    491 Views
    No one has replied
  • 0 Votes
    5 Posts
    1k Views
    U
    hi @efriedman ,thank you for your advice. I will try to switch to WireGuard.
  • pfSense IPsec failover issue

    pfsense
    1
    0 Votes
    1 Posts
    744 Views
    No one has replied
  • IPSEC tunnels after 23.01 - advice

    1
    0 Votes
    1 Posts
    655 Views
    No one has replied
  • ipsec connection got unstable (dropping after 20s) after upgrade to 2.6.0

    1
    0 Votes
    1 Posts
    603 Views
    No one has replied
  • Windows Dropping Mobile IKEv2 on Idle After Upgrading From 2.6 to 22.05

    1
    0 Votes
    1 Posts
    698 Views
    No one has replied
  • Slow IPSEC - Strange behavior

    7
    0 Votes
    7 Posts
    2k Views
    S
    @itou-0 glad to hear it but that doesn’t make much sense. The drive isn’t involved in routing unless the firewall rule is logging every packet. (Shrug). Maybe the drive was dying?
  • IPSEC cant connect auto 1 time week

    2
    0 Votes
    2 Posts
    1k Views
    A
    The log the problem is in con4 pfsense_erro_ipsec.txt Someone can help?
  • IPSec multiple logins

    2
    0 Votes
    2 Posts
    801 Views
    L
    Hi Jeff In the Advanced Settings tab of the IPSec tunnel under Advanced IPSec Settings change "Configure Unique Ids as " from Yes to Never. This should ensure that for each new connection it doesnt kill the previous connection for same user. Kind Regards Description of Setting "Whether a particular participant ID should be kept unique, with any new IKE_SA using an ID deemed to replace all old ones using that ID. Participant IDs normally are unique, so a new IKE_SA using the same ID is almost invariably intended to replace an old one. The difference between no and never is that the old IKE_SAs will be replaced when receiving an INITIAL_CONTACT notify if the option is no but will ignore these notifies if never is configured. The daemon also accepts the value keep to reject new IKE_SA setups and keep the duplicate established earlier. Defaults to Yes."
  • Routing Internet Traffic Through a Site-to-Site IPsec Tunnel

    4
    0 Votes
    4 Posts
    1k Views
    V
    @geyser So the remote site says that it doesn't accept the additional phase 2. So I'd suspect that it's not configured there or has different parameters.
  • Switch from Tunnel to VTI mode

    2
    0 Votes
    2 Posts
    1k Views
    C
    Changing the MTU to 1460 & MSS to 1432 solved the problem
  • VTI with BGP (FRR package 1.1.1_7) on pfSense 2.6.0

    3
    0 Votes
    3 Posts
    1k Views
    C
    I had similar problems and changing the MTU to 1472 allowed traffic to pass
  • IPsec VTI - no traffic received

    19
    0 Votes
    19 Posts
    3k Views
    C
    @dehaas I had similar problems and changing the MTU to 1472 allowed traffic to pass
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.