• Packets destined for IPSEC tunnell go through NAT instead…

    Locked
    3
    0 Votes
    3 Posts
    3k Views
    R
    We've got an 'allow anything' on the LAN interface (VLAN 10) and an 'allow anything' rule on the IPSEC interface on pfSense. If I do a tcpdump on enc0 and ping a host on the LAN subnet from the other end of the ipsec tunnell (10.1.1.0/24), I see the incoming ping request, and the outgoing ping response, but the remote network never receives the packet. I've also checked the filters on the remote linksys router, and I'm not having much luck. We've even tried dropping the filters on the remote end entirely, and still no response. In my initial look at the state table I wasn't quick enough. An initial attempt to go directly to the host w/o involving NAT happens, and then after some time, NAT gets involved. I also have the system logging all blocked packets, and I don't see any blocks of my ICMP packets being logged. If I see the incoming request, and the pinged host's response on enc0, that seems to indicate that the filters on pfSense aren't in play, unless the outbound ping response is getting filtered out somewhere and I'm just not finding it. I've got the exact same setup working on v1.0.1, so I'm really not sure why this isn't working on the new version. Has the handling of packets destined to IPSEC tunnels changed in 1.2 beyond the IPSEC interface filters? I'm really baffled by this one…. Thanks again for any insight you can offer on this one.
  • Can't re-create ipsec tunnel automatically if peer side poweroff

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    GruensFroeschliG
    http://forum.m0n0.ch/ ?
  • VPN Client - suggestion

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    GruensFroeschliG
    search the forum there is a solution around
  • IPSEC TUNNEL FROM LINKSYS WRV54G TO PFSENSE

    Locked
    6
    0 Votes
    6 Posts
    4k Views
    F
    my client has a static address on his end and i have one two on my side.  I have no issues.  It was a pain to get just right but I am finding everyvendor has slightly different terms for the same thing and it will drive you nuts. In my case it was a typo.  I had the wrong IP set up.  changed it and up it came.  it's been working fine. RC
  • Sasyncd… What was the problem ?

    Locked
    6
    0 Votes
    6 Posts
    4k Views
    S
    Great work!  Can you submit this to freebsd-net@freebsd.org as well for comments / directions from the community on how we can get this commited to the official FreeBSD tree? Thanks for all the work on this!
  • 0 Votes
    8 Posts
    4k Views
    H
    OK, sorry, yes, mobile clients are working  not in main mode…..
  • IPSec broken still?

    Locked
    7
    0 Votes
    7 Posts
    4k Views
    P
    I've been trying to get a tunnel up between pfsense and ipcop and am also getting the same message in my ipsec logs. Any ideas? IPSEC Log Dec 7 16:32:44 racoon: INFO: unsupported PF_KEY message REGISTER Dec 7 16:32:44 racoon: INFO: fe80::200:e8ff:fe12:ba22%dc0[500] used as isakmp port (fd=19) Dec 7 16:32:44 racoon: [Self]: INFO: 85.189.247.234[500] used as isakmp port (fd=18) Dec 7 16:32:44 racoon: [Self]: INFO: 172.31.15.8[500] used as isakmp port (fd=17) Dec 7 16:32:44 racoon: INFO: fe80::202:a5ff:fecc:7d08%fxp0[500] used as isakmp port (fd=16) Dec 7 16:32:44 racoon: [Self]: INFO: 127.0.0.1[500] used as isakmp port (fd=15) Dec 7 16:32:44 racoon: INFO: ::1[500] used as isakmp port (fd=14) Dec 7 16:32:44 racoon: INFO: fe80::1%lo0[500] used as isakmp port (fd=13) Dec 7 16:32:44 racoon: INFO: @(#)This product linked OpenSSL 0.9.7e-p1 25 Oct 2004 (http://www.openssl.org/) Dec 7 16:32:44 racoon: INFO: @(#)ipsec-tools 0.6.7 (http://ipsec-tools.sourceforge.net) /var/etc/racoon.conf: path pre_shared_key "/var/etc/psk.txt"; path certificate  "/var/etc"; remote 80.177.152.212 {         exchange_mode main;         my_identifier address "85.189.247.234"; peers_identifier address 80.177.152.212;         initial_contact on;         support_proxy on;         proposal_check obey; proposal {                 encryption_algorithm 3des;                 hash_algorithm sha1;                 authentication_method pre_shared_key;                 dh_group 2;                 lifetime time 3600 secs;         }         lifetime time 3600 secs; } sainfo address 172.31.15.0/24 any address 10.101.0.0/16 any {         encryption_algorithm 3des,blowfish,cast128,rijndael,rijndael 256;         authentication_algorithm hmac_sha1,hmac_md5;         compression_algorithm deflate;         lifetime time 28800 secs; }
  • Cisco asa to pfsense

    Locked
    2
    0 Votes
    2 Posts
    2k Views
    C
    I think I posted on another one of your posts, I will get some additional help for you tomorrow with my working configurations posted on here.
  • PfSense to Cisco ASA

    Locked
    2
    0 Votes
    2 Posts
    4k Views
    C
    Let's try to narrow down a few things.  What ASA Model and OS version are you running?  I would suggest limiting the protocol/encryption/hash to ESP-3DES-MD5 and disable or disallow all the others.  When phase 1 completes on the Cisco side and you try to ping through from the Cisco LAN to the pfSense LAN, does anything change (TTL?, RTT?)? I will lab this up with one of my work ASA's to my home pfSense to offer some additional assistance.
  • Erratic IPSEC traffic cut

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Branchoffice site -> site vpn

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Multiple connections from same IP

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Could not do active ftp through ipsec vpn (SOLVED)

    Locked
    5
    0 Votes
    5 Posts
    4k Views
    C
    Oh, well yeah that'd help.  :)  I was assuming you had the proper rules in place and thinking it possibly was a FTP proxy related issue (though VPN subnets are supposed to bypass that, obviously that's working correctly).
  • 1.2 RC3, IPSEC, Packet Size

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Help setting up a site to site ipsec vpn tunnels

    Locked
    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Ipsec theory

    Locked
    5
    0 Votes
    5 Posts
    5k Views
    A
    Hi, Unfortunately I have given up on pfsense, and done an install using voyage linux to my machine and done this using traditional iptables/racoon, etc which works no problem. Thanks again for your feedback.
  • Ipsec to host group

    Locked
    3
    0 Votes
    3 Posts
    2k Views
    J
    OK at the other end it is a cisco ASA, they only want to see 3 host on our LAN. they try to implement this: Extended IP access list ACL-XXX 10 permit ip 150.2.0.0 0.0.255.255 host 172.16.3.14 20 permit ip 150.2.0.0 0.0.255.255 host 172.16.3.16 30 permit ip 150.2.0.0 0.0.255.255 host 172.16.3.15 any idea ?
  • IPSEC - RC1 and RC2

    Locked
    15
    0 Votes
    15 Posts
    6k Views
    H
    Problem still exist in RC3. I really like the new IPsec connection status symbols and the IPsec highlighting in the log files. It would be great if the mobile clients could be shown also. [image: IPsec.png] [image: IPsec.png_thumb]
  • Connect from behind pfsense to linksys rv042

    Locked
    2
    0 Votes
    2 Posts
    3k Views
    F
    I recently did this.  It was really a challenge.  I was using a netgear 380 vpn router.  It was a realy pain to get configured.  It took me about 14 hours to get it running.  The vpn's tunnels between pfsense and the netgear about killed me.  RC
  • IPsec not working in lastest snapshot…

    Locked
    6
    0 Votes
    6 Posts
    3k Views
    F
    I am using the following build without any issues. 1.2-RC3 built on Thu Oct 18 15:19:54 EDT 2007 RC
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.