• Unable to establish tunnel from remote side…

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    ?
    Just a quick update with the solution and thanks to cmb and jimp for the assistance (through commercial support). Apparently, the configuration of the Cisco device did not enforce it to use the Phase1 protocols defined and since proposal checking on the pfSense device was set to "strict" the negotiation failed. Changing proposal checking to "obey" did the trick. Also, it is recommended to keep SA lifetime on phase1 to 86400 as the Cisco devices are not to happy about changing this unless it is done 110% correctly.
  • How to view connected VPN clients??

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    C
    There is currently no such capability. There's a feature request ticket open on it. http://redmine.pfsense.org/issues/1986
  • IPSec Fallback

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    There isn't a way to set it up, even manually, yet. Hence the open ticket.
  • PfSense 2.0 IPSec LAN to LAN with Cisco PIX running 6.3

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    C
    Did you add the rules in the firewall tab on the IPSEC interface ?
  • 0 Votes
    1 Posts
    2k Views
    No one has replied
  • IPSec tunnel endpoint with dynamic IP kills connection

    Locked
    3
    0 Votes
    3 Posts
    4k Views
    H
    You were right, I feel kinda dumb now. I plugged one of the WAN uplinks into my RV042 to test this and yes of course the Gateway monitoring is down. Thanks!
  • PfSense 2.0.1 IPSec - Site-To-Site Problem (pfSense to pfSense)

    Locked
    10
    0 Votes
    10 Posts
    6k Views
    E
    That is problem SOLVED. Thanks cmb. Now IPSec working STABIL after the change PPTP PUBLIC IP to PRIVATE IP.
  • Odd Tunnel Behaviour

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    C
    What that sounds like is large packets not getting through the VPN, which 2.0 is actually much better with because it MSS clamps VPN traffic, eliminating that issue. Probably not the case based on that description though. It's basically impossible to say from a description, having a packet capture to analyze is the only way to know what's happening.
  • PFSense <–> PFsense: IPSEC Tunnels Losing Connectivity

    Locked
    15
    0 Votes
    15 Posts
    39k Views
    D
    It seems that several people are reporting IPsec VPN issues with pfsense 2.x (note: which includes the recent ipsec-tools 0.8.0). While some problems may be due to misconfiguration (e.g. the racoon / mpd conflict), the pfsense<->pfsense VPN scenario should be trouble-free. As most of the problems posted here seem to be related to rekeying,  I've been searching the ipsec-tools-devel mailing lists for clues. Check the following discussions: http://old.nabble.com/why-is-SA-lifetime-kilobyte-limit-disabled-in-racoon–td31648198.html Even if Node-A think IPsec-SA is expired at this time, Node-B doen't think so. i.e. the states of IPsec-SA is mismatched. Understand – similar things already happen with time-based lifetimes if there is a clock skew between the two boxes. (This is particulary bad if the oldest available SA is used by the kernel.) Racoon's strategy of rekeying is "Initiator do it." If Node-B   is responder, Node-A doesn't start rekeying even if IPsec-SA is   expired. That sounds like a bug in racoon.  It seems that if either end is unsatisfied with the SA, that end should trigger a new one. I'd also call this a shortcoming at least. The standards are weak, and one doesn't know how other implementations behave. It would be safer if both sides did care about renegotiations. But the key question is what the other implementions do, and what the standard says. I've just tried OpenBSD's isakmpd (the oldish version in pkgsrc). It initiates a Phase 2 exchange if the soft timeout on its side expires, even if it was responder initially. (It randomizes the soft timeouts to minimize the chance that both sides start the exchange simultanously.) PFC2409 says that both sides can initiate rekeying. "Can" -- this is not much of a guideline for implementors. I can see the argument that especially with a 24h or less lifetime, AES doesn't need volume-based rekeying. OK, I was more concerned about interoperability. What if the other side insists in some volume limit? I've just tried OpenBSD's isakmpd (the oldish version in pkgsrc). It initiates a Phase 2 exchange if the soft timeout on its side expires, even if it was responder initially. (It randomizes the soft timeouts to minimize the chance that both sides start the exchange simultanously.) PFC2409 says that both sides can initiate rekeying. "Can" -- this is not much of a guideline for implementors. True, but it seems the original responder initiating a renegotiation is the only reasonable behavior. At the very least, it would appear to suggest that if the original initiator rejects an attempt on the part of the original responder to rekey, that's a bug. True, but it seems the original responder initiating a renegotiation is the only reasonable behavior. If both side start rekeying at same time, there is/was a problem of SA selection. The two rekeying session makes two pair of IPsec-SAs. racoon can do this, and IPsec implementations (kernel side) do one of following: a. Use oldest IPsec-SA to send and keep all IPsec-SAs to receive(KAME) b. Use newest IPsec-SA to send and keep all IPsec-SAs to receive(Fast IPsec) c. Use newest IPsec-SA to send/receive and purge older IPsec-SAs Of cause, c. is bad behavior, but small implementations(kernel side) may handle only one sessions and one key pair at a time. Standards don't prohibit this. This problem is exist between IKE standards and IPsec standards. It seems IKEv2 makes this more clean. Today, most implementations select b. or have configuration for it. And racoon isn't used on other than KAME, Fast IPsec, or Linux(a. or b.) I think your logic actually works fine. But racoon is old product, so it doesn't catch recent trends up. http://marc.info/?l=ipsec-tools-devel&m=129905181832157&w=2 http://marc.info/?l=ipsec-tools-devel&m=129916127621017&w=2 let me revive the discussion on an active negotiation, as opposed to a passive daemon. Until recently my use of IPsec was tied to isakmpd, ipsecctl, and OpenBSD and my views are conditioned by this fact. There the IPsec daemon is normally active in initiating its negotiations at startup, unless told to configure a passive listener for a particular tunnel/transport. At the other extreme there is even a so called active-only setting. The implicit and default setting in racoon-0.7.3 is "passive off", but this still waits for a demand to be detected. Thus the mode is better described as "passive until harshly bugged to get going"! The need to ping and wait for a ridiculously long delay should not be acceptable in most circumstances. Forgive me for the critisism, but to me this is a design flaw. It is a question of dependability and of trust to erect the desired IPsec tunnels already at booting time. Funny: when we tried to switch from racoon to isakmpd at work, a long long time ago, this is one of the things we noticed on our TODO list: patch isakmpd to negociate SAs only when traffic comes to the tunnel :-) And this is how things should (can ?) be done according to RFC 2367 which provide SADB_ACQUIRE PFkey message…. Now, doing comparative browsing in the sources 0.7.3 and 0.8, the actual use of the variable PASSIVE in "struct remoteconf" has indeed expanded somewhat. Is the code progressing or maturing into a state that allows an actively negotiating daemon? I.e., without waiting for traffic demand before commencing? Not afaik. Feel free to provide a patch for that, this would not be so complicated to parse all config and start negociation for needed tunnels, but there are also setups where we want to have tunnels negociated only when needed (so when traffic comes to the tunnel), so a patch will need to provide this feature as optional. The best would be to have a peer-based (or sainfo based ?) token for that. Please also note that this is quite easy to also generate dummy traffic for the needed tunnels when you activate the configuration if you want. And of course generate dummy traffic from time to time to ensure the tunnel will always be up.
  • IPsec & GLXSB - pfSense 2.0.1 i386

    Locked
    7
    0 Votes
    7 Posts
    4k Views
    dotdashD
    I was trying to use AES128 with glxsb. It works fine with both pfsense peers, my trouble was trying to connect from pfsense to a Sonicwall peer. It connected but wasn't passing traffic. I switched to 3DES and the tunnel came up. I didn't try disabling glxsb. I can't test anything at this point as the customer would not be amused at another outage.
  • Issue as described in bug #1351

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Tutorial Mobile client Mutual RSA + Xauth

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • IPsec Clients Unable Access Windows Shared Folder

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ
    That's generally up to the server itself, your firewall rules on the IPsec tab, and how your client access the server. If the server allows the connection from the VPN subnet, it should work, provided the traffic passes in your IPsec firewall rules, and the clients are accessing it by \x.x.x.x where x.x.x.x is the IP of the server. Browsing/accessing by name probably isn't going to work in most cases. If it works by IP and not by name, check the client's DNS settings and such in Shrew. OpenVPN works much better, especially for road warrior/mobile clients.
  • Mobile IPsec Server Unresponsive…

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Clientless VPN with SSL

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    C
    No. There is no such thing as a clientless VPN. The browser-based VPNs do nasty things, I wouldn't want to use one along the lines of what some commercial vendors offer. Better off with a real VPN client that's not some ugly browser hack.
  • IPsec low throughput

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    C
    400 KB/sec is rough 3 Mbps. i.e. you're hitting the max of the upload. Or you mean 400 Kb?
  • PfSense IPsec <-> Shrew: no configuration for …

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    U
    I have exact the same problem. I've tried almost any setting… it connects, I get an IP from pfsense, but no traffic. Also the errors in pfsense are sometimes different (without any change in settings on both sites) Most of the times I get this error: racoon: ERROR: failed to begin ipsec sa negotication also this one: racoon: ERROR: no configuration found for x.x.x.x But sometimes a phase 2 error (but I allready got the IP from the pfsense box) this doesn't happen often. I got this error aswell: racoon: ERROR: libipsec failed pfkey check (Invalid address family) I have NAT-T enabled and opened port 4500 (UDP) in my firewall. What could be wrong? Is there a bug in IPSEC? BtwI have also some site-2-site tunnels running on the same box, those work fine. Only the mobile client is not working.
  • PfSense 2.0.1 <-> Fritz!Box Fon WLAN 7270, IPsec

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Using the cisco vpn client

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Shrew client could not browse by hostname

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    dotdashD
    That should work. Verify you are providing the correct dns domain name and try to ping the full dns name- e.g. server.company.local.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.