• VPN access to DMZ

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    Cry HavokC

    That should just be a matter of pushing the correct routes and having the right firewall rules.  Certainly I have done that using OpenVPN without problems.

  • IPSEC Road Warrior randomly works…

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    M

    I got it working, most clients can connect some can't due to their firewalls. I've verified IPSEC passthrough is enabled but that doesn't matter. I've tried to enable NAT-T but then nothing works. It breaks IPSEC completely on the pfsense box.

    Also, the ones that do work require me to set static dns, if I enter the dns servers on the DNS tab of the shrew client it doesn't work at all. Any thoughts? When will there be a solid road warrior implementation of IPSEC? Will there be or is OpenVPN expected to replace it?

  • Ipsec failover pfsense 1.2.3-RC1

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    dotdashD

    Currently, you have to manually fail over. I have disabled tunnels setup on the second WAN. When the main WAN fails, I disable the primary tunnel and enable the backup. I set this up awhile ago and remember having to set static routes to get it working, I'm not sure if this is still needed. Search a bit on ipsec failover or somesuch.

  • Site-To-Site Tunnel Drops Connection

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    B

    @brianmac64:

    I have the same (or similar) issue.  pfSense1.2.2–-> Fortigate FG-500A cluster.  Tunnels come up fine, but when the P2 key lifetime ends, the tunnels go down.  I checked both configs and they are equal.  Any ideas?

    Forgot to mention that I am running MR6 P3 on the FGs and that disabling and re-enabling IPSEC on the pfSense solves the issue.  Should I maybe schedule a CRON job that does that in conjunction with the P2 expire?

  • IPSEC connection dropping

    Locked
    17
    0 Votes
    17 Posts
    11k Views
    jimpJ

    Well then I really have no idea on that one. Unfortunately, ipsec-tools does have more than its fair share of bugs.

    They are nearing the release of a new version, but it won't be out in time for 1.2.3. Hopefully it will work out for 2.0, though.

  • Drop tunnel problems

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Can I Route all traffic through an IPSec VPN?

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    J

    I'm not sure w/ ipsec, but it is definitely possible via openvpn (ssl).
    see: http://openvpn.net/index.php/open-source/documentation/howto.html#redirect

    hope this helps.

  • NAT on enc0?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ

    There was a bounty for this at some point, but I believe it was withdrawn.

    It's not currently possible, but there were some ideas in the bounty thread. Check the expired bounties board and it should be there.

  • IPSEC from PFSense 1.2.3 to PFSense 1.2.3

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    jimpJ

    Though your error is one I had not seen before, it looks harmless.

    You may want to try a new 1.2.3-RC3 image from snapshots.

    NAT-T has been removed, it caused too many other regressions.

  • Ipsec tunnel pfsense 1.2.3.RC1 <-> ipcop 1.4.21 problems

    Locked
    5
    0 Votes
    5 Posts
    7k Views
    J

    Hi Gordon,

    Unfortunately this settings doesn't work. I have a green ok indication on both sides but after a minute the comunication is down. I can't understand why.  I already done another ipcops and pfsense  ipsec tunnel with no problems but with the pfsense 1.2.2 vers. I found in my ipsec logs (pfsense side) :

    Sep 9 11:09:45 racoon: [vpn a cordoba]: ERROR: pfkey DELETE received: ESP wan pfsense[500]->IPCOP RED IP[500] spi=3607332516(0xd70386a4)
    Sep 9 11:09:45 racoon: [vpn a cordoba]: INFO: IPsec-SA established: ESP wan pfsense[500]->IPCOP RED IP[500] spi=3865395393(0xe66540c1)
    Sep 9 11:09:45 racoon: [vpn a cordoba]: INFO: IPsec-SA established: ESP IPCOP RED IP[0]->wan pfsense[0] spi=184063618(0xaf89682)
    Sep 9 11:09:45 racoon: [vpn a cordoba]: INFO: respond new phase 2 negotiation: wan pfsense[500]<=>IPCOP RED IP[500]
    Sep 9 11:09:45 racoon: [vpn a cordoba]: INFO: ISAKMP-SA established wan pfsense[500]-IPCOP RED IP[500] spi:dd3240523b1a178a:5edb221090fa00e5
    Sep 9 11:09:45 racoon: INFO: received Vendor ID: DPD
    Sep 9 11:09:45 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
    Sep 9 11:09:45 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
    Sep 9 11:09:45 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
    Sep 9 11:09:45 racoon: INFO: received Vendor ID: RFC 3947
    Sep 9 11:09:45 racoon: INFO: begin Identity Protection mode.
    Sep 9 11:09:45 racoon: [vpn a cordoba]: INFO: respond new phase 1 negotiation: wan pfsense[500]<=>IPCOP RED IP[500]
    Sep 9 11:09:44 racoon: [vpn a cordoba]: INFO: ISAKMP-SA deleted wan pfsense[500]-IPCOP RED IP[500] spi:022ba8fc052bf43f:8d9b0dfde61e13d8
    Sep 9 11:09:43 racoon: [vpn a cordoba]: INFO: ISAKMP-SA expired wan pfsense[500]-IPCOP RED IP[500] spi:022ba8fc052bf43f:8d9b0dfde61e13d8
    Sep 9 11:09:12 racoon: [vpn a cordoba]: ERROR: pfkey DELETE received: ESP wan pfsense[500]->IPCOP RED IP[500] spi=253583350(0xf1d5ff6)
    Sep 9 11:09:12 racoon: [vpn a cordoba]: INFO: IPsec-SA established: ESP wan pfsense[500]->IPCOP RED IP[500] spi=3607332516(0xd70386a4)
    Sep 9 11:09:12 racoon: [vpn a cordoba]: INFO: IPsec-SA established: ESP IPCOP RED IP[0]->wan pfsense[0] spi=55126245(0x34928e5)
    Sep 9 11:09:12 racoon: [vpn a cordoba]: INFO: respond new phase 2 negotiation: wan pfsense[500]<=>IPCOP RED IP[500]
    Sep 9 11:09:12 racoon: [vpn a cordoba]: INFO: ISAKMP-SA established wan pfsense[500]-IPCOP RED IP[500] spi:022ba8fc052bf43f:8d9b0dfde61e13d8
    Sep 9 11:09:11 racoon: INFO: received Vendor ID: DPD
    Sep 9 11:09:11 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
    Sep 9 11:09:11 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
    Sep 9 11:09:11 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
    Sep 9 11:09:11 racoon: INFO: received Vendor ID: RFC 3947
    Sep 9 11:09:11 racoon: INFO: begin Identity Protection mode.
    Sep 9 11:09:11 racoon: [vpn a cordoba]: INFO: respond new phase 1 negotiation: wan pfsense[500]<=>IPCOP RED IP[500]
    Sep 9 11:09:10 racoon: [vpn a cordoba]: INFO: ISAKMP-SA deleted wan pfsense[500]-IPCOP RED IP[500] spi:854e2e340ea487c6:f5eda415ea8305a6
    Sep 9 11:09:09 racoon: [vpn a cordoba]: INFO: ISAKMP-SA expired wan pfsense[500]-IPCOP RED IP[500] spi:854e2e340ea487c6:f5eda415ea8305a6

    Any clues?

    Marcos

  • Windows 7 64 IPSEC Client

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    S

    I am using the 2.1.5 BETA RC2 (not even latest one; haven't tried latest one yet released a few days ago) on RTM release of Windows 7 and I can connect to all of my pfSense FW at 4 different companies (2 T1's and 2 DSL) - just works.

  • 0 Votes
    1 Posts
    2k Views
    No one has replied
  • Multiple matching SAs - IPsec 'failover'?

    Locked
    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • PfSense 1.2.3PRE <–--> pfSense 1.2.2 | IPSec Tunnel Simply Won't Work

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • 0 Votes
    1 Posts
    5k Views
    No one has replied
  • IP Sec not starting on connection

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • IPsec mobile client tunnel active, but no traffic to lan possible

    Locked
    4
    0 Votes
    4 Posts
    2k Views
    L

    OK, solved.
    I had a mismatch in the phase 2 setup….the PFS keygroup was not exactly the same on both ends.

    Now I believe routing is ok, next thing is setting up dhcp relay.

    Thanks for the support!

    Leon

  • Help on issue

    Locked
    2
    0 Votes
    2 Posts
    1k Views
    L

    ran into the same issue with one of the Aug 4th builds, reinstall with a build from mid july seems to fix the issue for me.

    dont have access to my pfsense box now, but from what i remember if you have a harddrive install the config files should be in /var/etc/ .

    -loki

  • VPN worked with m0n0wall, what do I do wrong with pfsense?

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    A

    It turns out the problem with the Cisco VPN client wasn't a problem, wifey didn't remember her passcode right…

    Anyway, the Watchguard Mobile VPN is still not working.

    I have setup a few rules in the firewall: allow all communication on ports 500 and 4500 from any to any, and allow ESP and AH protocols from any to any. All those four rules are under "WAN" tab in the Firewall rule table page in the webGUI - do I need anything under the "LAN" tab?

  • Vpn tunnel dies on ip update

    Locked
    8
    0 Votes
    8 Posts
    3k Views
    D

    No worries then, that specific issue is fixed in RC2 snapshots.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.