• How to reset Racoon service from command line

    Locked
    9
    0 Votes
    9 Posts
    17k Views
    V
    Like a charm, thank you!
  • PfSense as VPN Server w/NAT

    Locked
    6
    0 Votes
    6 Posts
    8k Views
    jimpJ
    The way IPsec "grabs" the traffic in the kernel, NAT can't be done on it in any traditional way. It's not in 2.0 now. At one point there was a bounty for it, but it was withdrawn before it was completed. Check the expired bounties forum if you want to read all the details.
  • Lan to Lan VPN

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    R
    Can you please post a picture or diagram of what you are trying to do?  Screenshots of what you have configured in pfSense would be very helpful.
  • Ipsec

    Locked
    12
    0 Votes
    12 Posts
    6k Views
    R
    Sorry, my mistake.  Your screen grabs looked just like the site-to-site tunnel config screen. What kind of logs does your client get during tunnel negotiation?  What kind of client are you using?
  • Lan -> ipsec Local subnet Type Single host -> internet <- subnets

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • How to configure 3 tunnels on 3 different sites with 3 pfsense

    Locked
    15
    0 Votes
    15 Posts
    8k Views
    jimpJ
    Correct. With a PKI setup you need that option ticked so the B can reach C via A.
  • Ipsec through more links

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • PfSense IPSec to Cisco ASA5500

    Locked
    7
    0 Votes
    7 Posts
    10k Views
    K
    @jimp: That still suggests that phase 2 is not matching in some way. Hard to say how, it usually logs something about why, but it may even be a mismatch in the subnet definitions on either end for the internal networks. Can you post a listing of the ASA config and screenshots of the pfSense side? You is almost spot on… I did som debugging on the ASA and discovered a very interesting thing: The access-list for matching interesting traffic was made by the WEB-GUI and was like this: access-list OFFICE_nat0_outbound extended permit interface OFFICE-LAN 192.168.2.0 255.255.255.0 Changed this to the ip-address instead, and it worked - just like this: access-list OFFICE_nat0_outbound extended permit ip 192.168.6.0 255.255.255.0 192.168.2.0 255.255.255.0 According to log address-mask was not matching when using interface-name in access-lists, but mask was the same all over on interfaces (ie. /24)...! Log from ASA was showing (when I did ICMP ping from pfSense toward ASA): Static Crypto Map check, map = outside_map, seq = 20, ACL does not match proxy IDs src:192.168.1.0 dst:192.168.6.0 This is RIGHT...! But the ASA dont like it at all...  ;D  So I changed the interface name to the actual address and mask - and then it worked like a charm...! Thanx for help everyone... Regards Knudsen
  • 0 Votes
    1 Posts
    2k Views
    No one has replied
  • IPSEC with certs up, but had to set asn1dn in racoon.conf manually

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Using PfSense VPN with ldap backend authentication

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    T
    Hey guys,   Sorry for the minimalist post.  I'm running version 2.0.  I've read this blog post. http://blog.pfsense.org/?p=174 I can't seem to find the doc on how to do this anywhere, did this get cut in order to get the 2.0 release out earlier? Thanks
  • Mobile IPSEC connects but not passing traffic!

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    B
    I've already have this probleme. i've fixed it by set 3DES encryption algo in phase 2, in pfsense and in shrewsoft. Benoit
  • Issue with racoon in 1.2.3 embedded 2g

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    D
    I found the problem to be that pfSense requires the WAN (and possibly all interfaces) to have an IP before the racoon service will start. I find that to be slightly odd practice, as the lab I'm trying to create has nothing to do with that interface. Maybe I'm crazy, but spend a few hours trying to troubleshoot an issue that shouldn't exist in the first place.
  • IPsec and optional interface support

    Locked
    4
    0 Votes
    4 Posts
    3k Views
    jimpJ
    @rtrinkle: Thanks for the comment. I read on the pfsense tutorials the limitations of IPsec and overlapping IP address space. It never really dawned on me that the /8 was too broad. I do have resources that would be helpful to be reached on the full /8 segment, however, once I changed the address space to something that didn't overlap all was well. Thanks for your help! You're welcome :) @rtrinkle: In addition, I was under the impression that because the local routes are in the pfsense routing table it would take precedence over VPN traffic. Case in point, all traffic was being shot out of the VPN because of the broad address range. Now I know how the internals of pfsense works, which in turn has helped me understand how it performs traffic routing. The way IPsec works, it just grabs the data in-kernel before the routing table is even consulted. That's just a side effect of how it works under FreeBSD (and probably other OS implementations). If you were using OpenVPN instead, you can selectively route things a lot cleaner, and the routing table is respected (though you still can't overlap subnets).
  • Route reset after restarting ipsec

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    C
    the only trick seems to be: route delete 192.168.250.1 every 5 min by the cron. Giacomo
  • IPSec tunnel failures after upgrade to 1.2.3

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    K
    @jimp: On pfSense, try to enable "Prefer old IPsec SAs" under the advanced options. I have to enable this when talking to some other routers (Linksys, Watchguard, etc) Thanks,  I will try that and see what happens. -kg
  • IPSec VPN from pfSense to WatchGuard

    Locked
    12
    0 Votes
    12 Posts
    17k Views
    J
    After going back to 1.2.3 it is working fine as well. I did not check the 'prefer old sa' box. DPD: 60 Sec Phase 1 Mode: Main My Identifier: Domain (user@domain) Encryption: 3DES Hash: SHA1 DH Group: 5 Lifetime: 28800 Auth: PSK Phase 2 Protocol: ESP Encryption: AES128 (others unchecked) Hash: SHA1 (MD5 unchecked) PFS: on/DH5 Lifetime: 28800 Perhaps someone else could use this info… Also I disabled NAT-T on the WG, but this is also handled out so I guess it was not the problem.
  • Cannot ping DHCP clients

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Outgoing IPSec connection failing?

    Locked
    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • Multiple different networks on VPN IPSec ?

    Locked
    8
    0 Votes
    8 Posts
    15k Views
    P
    OK - got it working now! In fact, we only need connectivity between networks A and C. Setting up: On A: src A, dst C On B: src C, dst A Seemed counterintuitive because the tunnel was terminating in B, which never gets referenced.  But it worked (after some unrelated but confounding firewall issues were resolved). Thanks for your patience - I understand IPSEC a little better now.  :)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.