I few days ago i had installed/uninstalled squid/lightsquid.
Lightsquid had not uninstalled properly and had the monitor hanging.
So none of the rules i was adding was getting written.
Installed uninstalled squid/lightsquid again.
Lef the same rules again.
There are at least 15 different systems running IPsec to IOS on 2.0 release that I've setup personally, probably hundreds or thousands total, so it's not really that easy. I first suspected some kind of issue with the crypto card, but completely changing out hardware, unless you moved over the crypto card (did you?), would probably rule that out. That linked thread has no relation at all to what you're seeing, the patch that caused that is long gone.
My question is if someone think this is possible to me to keep loadbalancing and have all this traffic on a VPN using IPSEC?
It's been a while since I've looked at a Sonicwall firewall. If it has the ability for a failover (alternate) VPN IP address, then you could set a gateway group in pfSense set the second WAN interface to Tier 2.
That should work because both firewalls would monitor an IP for each failover. I'm just not sure with Sonicwall, it's been a few years for me.
Unless someone has seen this before, you will probably need to post more information. Such as, what version of pfSense you are using, what did you do when this occurred, etc.
do I also need to add a rule allowing UDP port 4500 traffic?
That depends on if you are using NAT-T.
Look in your tunnel configuration to see if you have NAT Traversal enabled in pfSense. It is in the advanced options at the bottom of the phase 1 policy.
If both firewalls have NAT-T on, then you will need to allow access over UDP 4500, or disable it on both.
IPsec connections don't stay up unless you're sending traffic across them. Though that generally doesn't matter, as soon as something tries to send something across they'll come up within 1-2 seconds. As long as the local subnet includes one of the IPs assigned to the firewall, the ping host will keep it up.
If you can still SSH, you can hit the web interface via a SSH tunnel and fix it. Item #6 here.
http://doc.pfsense.org/index.php/I_locked_myself_out_of_the_WebGUI,_help!
You can also manually edit the XML via SSH but that's error prone if you're not familiar with it, could really break things.
ok, the only place I saw that could have possibly overridden the chosen pfs_group setting would have been in there. I don't see any other way that what you choose isn't ending up in the racoon.conf
System > Advanced > Misc. > Enable MSS clamping on VPN traffic
The problem was already large RPC packets becoming too large as a result of IPsec encapsulation. After reducing the WAN mtu and messing up all my connections, a colleague suggested I try this setting. It works great with the default value of 1400.
That error is not your problem. That error is harmless. Mobile tunnels have no remote gateway, so that error isn't really saying anything significant. The system log is not where you should be looking, check the IPsec tab.
I will have to recreate everything to get a log dump. I guess what I mean when I said they do not contain anything decipherable to me is that through all my changes, I muddied the waters so much. I will post back when I have recreated the issue.
Is 192.168.190.x the LAN subnet of the PFsense or an additional network behind the PFsense? You might need a rule on your LAN interface permitting ALL LAN subnets to any. Also, if it is an additional network, you need a route on your PFsense to point 192.168.190.x out the local LAN interface.
Same questions would apply for the other side of the tunnel as well…
It is normal for it to try, yes, but if it's bound to the CARP interface the traffic won't normally ever make it out of the box, so it does nothing but fill the logs on the secondary with attempted connections.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.