@jimp:
That still suggests that phase 2 is not matching in some way. Hard to say how, it usually logs something about why, but it may even be a mismatch in the subnet definitions on either end for the internal networks.
Can you post a listing of the ASA config and screenshots of the pfSense side?
You is almost spot on…
I did som debugging on the ASA and discovered a very interesting thing:
The access-list for matching interesting traffic was made by the WEB-GUI and was like this:
access-list OFFICE_nat0_outbound extended permit interface OFFICE-LAN 192.168.2.0 255.255.255.0
Changed this to the ip-address instead, and it worked - just like this:
access-list OFFICE_nat0_outbound extended permit ip 192.168.6.0 255.255.255.0 192.168.2.0 255.255.255.0
According to log address-mask was not matching when using interface-name in access-lists, but mask was the same all over on interfaces (ie. /24)...!
Log from ASA was showing (when I did ICMP ping from pfSense toward ASA):
Static Crypto Map check, map = outside_map, seq = 20, ACL does not match proxy IDs src:192.168.1.0 dst:192.168.6.0
This is RIGHT...! But the ASA dont like it at all... ;D So I changed the interface name to the actual address and mask - and then it worked like a charm...!
Thanx for help everyone...
Regards
Knudsen