• IPsec failing with 21.02-p1

    5
    0 Votes
    5 Posts
    821 Views
    dennypageD

    @jimp Thanks Jim

  • IPSECKEY Plugin is disabled

    1
    0 Votes
    1 Posts
    451 Views
    No one has replied
  • IPsec Tunnel to Azure Not Working Since 21.02

    4
    0 Votes
    4 Posts
    634 Views
  • PFsense 2.5 Multiple Phase 1 not working

    2
    0 Votes
    2 Posts
    448 Views
    jimpJ

    Both can coexist OK on 2.5.0/21.02, but something in your settings may be causing that. You need to provide a lot more information about your configuration, plus connection logs when it does/doesn't work to compare what happens.

    Typically that kind of thing happens when there is some overlap in the remote addresses on the tunnel or if the identifiers can't be matched.

    There are also a few known issues in 2.5.0 which could affect this, look at the other threads here in the IPsec category for a list of patches to try.

  • After upgrade to 2.5.0-RELEASE IPSec Tunnel Dashboard not working

    Locked Moved
    3
    0 Votes
    3 Posts
    530 Views
    jimpJ

    There are several threads for this issue already here in the IPsec category.
    https://forum.netgate.com/category/17/ipsec

  • 21.02-RELEASE IPsec Mobile DNS Issues

    Moved
    20
    0 Votes
    20 Posts
    3k Views
    C

    @viktor_g Thanks for the super fast response. Unfortunately no improvement, DNS servers still not pushed. If uncheck the "Provide a virtual IP address to clients" like the above workaround, the mobile pool is not loaded despite the patch.

  • Windows 10 IKEv2 TLS Dialin

    3
    0 Votes
    3 Posts
    574 Views
    L

    Just as an update, this is working well now.

    However, when RDPing to computers we get a warning that the Revocation check for our cert couldn't be completed. So I created a CRL in pfSense, exported it and imported it to computers and the warning has gone away.

    However on the CRL page it shows an X for the 'In Use' column for the CRL. Do I need to force this on the IPsec Mobile Client VPN? OR does X indicate it is in-use?!!!

    Thanks again :)

  • IKEv2 IPsec VPN with pfSense and Apple devices

    12
    0 Votes
    12 Posts
    6k Views
    W

    I know it's an old topic, but specifically because it's old I am asking that you actually update the official Docs with these conclusions and replace the "Set Peer Identifier to User Distinguished name, enter an e-mail address style identifier (e.g. user@example.com) – This isn’t used, but is currently required by the GUI" with "Set to Any".

    I would do this myself, but you don't seem to be hosting the Docs on GitHub anymore.

    I spent some 2 hours today at my wits end trying to figure this out before I set the Local ID on my mac to "user@example.com" and got it working.

  • IPSec Dashboard Widget not displaying proper status

    Locked
    19
    0 Votes
    19 Posts
    2k Views
    jimpJ

    The status problem is already known and fixed. To ensure you have all of the current known and fixed IPsec issues corrected, You can install the System Patches package and then create entries for the following commit IDs to apply the fixes:

    ead6515637a34ce6e170e2d2b0802e4fa1e63a00 #11435 57beb9ad8ca11703778fc483c7cba0f6770657ac #11435 10eb04259fd139c62e08df8de877b71fdd0eedc8 #11442 ded7970ba57a99767e08243103e55d8a58edfc35 #11486 afffe759c4fd19fe6b8311196f4b6d5e288ea4fb #11487 2fe5cc52bd881ed26723a81e0eed848fd505fba6 #11488
  • 21.02 Upgrade Broke IPSec site-2-site to Cisco ASA

    8
    0 Votes
    8 Posts
    1k Views
    I

    @sgw I can confirm disabling hw crypto on our SG-1100 running 21.02 fixed our tunnels to a Sonicwall. We had the same issues as the OP, tunnels connected but no traffic flowing inside.

  • IPSec P2 stability problems with 20.02

    8
    0 Votes
    8 Posts
    879 Views
    jimpJ

    Check the detail of the firewall states (pfctl -vvss) between the IPsec endpoints (so the WAN/public addresses) and see if there is any change in the states from when it works vs when it doesn't.

    ~5 minutes is suspiciously around a default state timeout for a state which only has traffic in one direction, which sounds sort of like asymmetric routing somehow.

    Also are these IPsec tunnels all on the WAN with the default gateway? Or are they on an alternate WAN?

  • IPsec IKE secrets not written properly

    3
    0 Votes
    3 Posts
    588 Views
    jimpJ

    @4920441-0 said in IPsec IKE secrets not written properly:

    I go 9 (!) IKE secrets despite the fact in the webinterface there is only one defined....

    Secrets entries are also defined by user keys under user accounts and on the PSK tab, not just from tunnel.

    Sorry for the fuss but @netgate this is not good at all...
    Some key feature which is essential like IPSec should be tested more thouroughly....

    We did test it thoroughly but there are only so many configuration variations we can test. We all use IPsec on 2.5.0/21.02 on our edges and have for many months during development. We use it for remote access IPsec. We use it in our labs. I personally have about 20 lab systems and most of them have interconnected IPsec tunnels with a variety of configurations.

    @4920441-0 said in IPsec IKE secrets not written properly:

    When I look in the secrets section on the pfsense site I see a different key in the resulting swanctl.conf file /var/etc/ipsec/swanctl.conf which is completely different like so...
    secret = 0sVGF.......................dg==

    (the '.' are a several dozend of random characters)
    Not all, but many start with '0sVGF' and end wih '=='

    I haven't seen other reports of anything like that. The secrets are base64 encoded and prefixed with 0s so in your case, the part starting with VGF all the way to the end (including the ==) is the encoded form of the string. If it didn't match, then the config didn't match in some way. Without seeing the whole keys it's hard to say what might have been the case there, but some top suspects would be extraneous characters in the field (extra whitespace, quotes, etc) which made them not match.

    That said, I tried running a few different strings through a base64 encoder and I didn't see any that started with VGF.

  • 2.5 with many tunnels - Apply Changes fails

    21
    0 Votes
    21 Posts
    2k Views
    jimpJ

    Is there any way you can try at least loading the IPsec portion of that configuration in a non-AWS system?

    It's difficult to tell if it's related to IPsec or if there is a general problem with AWS.

    The only other potentially-related report I've seen is a report of a kernel panic on AWS with someone that has even more IPsec tunnels than you, but as far as I'm aware they were not experiencing any slowness or boot delays.

  • 2.5 upgrade broke some, not all, IPSEC

    Locked
    16
    0 Votes
    16 Posts
    3k Views
    jimpJ

    This thread is getting out of hand like the previous one. We need to keep each thread for ONE issue only, not for multiple unrelated things that happen to be in IPsec.

    See my previous response at https://forum.netgate.com/post/964752

    Before reporting any issues, please look at the list of recent IPsec issues and apply fixes/workarounds from there to eliminate known causes.

    You can install the System Patches package and then create entries for the following commit IDs to apply the fixes:

    ead6515637a34ce6e170e2d2b0802e4fa1e63a00 #11435 57beb9ad8ca11703778fc483c7cba0f6770657ac #11435 10eb04259fd139c62e08df8de877b71fdd0eedc8 #11442 ded7970ba57a99767e08243103e55d8a58edfc35 #11486 afffe759c4fd19fe6b8311196f4b6d5e288ea4fb #11487 2fe5cc52bd881ed26723a81e0eed848fd505fba6 #11488

    Please refrain from replying to someone else's thread with a "me too" until there is confirmation that your issues are really the same and not just similar.

    I'll split some of these off into their own threads if they don't already have them, but for now, this one is locked.

  • Same issue with Azure Site-to-site (IPsec)

    1
    0 Votes
    1 Posts
    166 Views
    No one has replied
  • Possible bug in 21.02 ikev2 and rekey

    2
    2 Votes
    2 Posts
    618 Views
    L

    @jgraham5481 This solved my issue where I was seeing something like:

    [ESP] ESP sequence number verification failed:

    in the Android Strongswan app, but now I can't recreate the error log in the app by removing the Reauth Time. I wanted to recreate the log so I can add it here for accuracy. That's what I get for not even taking screenshot.

    I added a value to "Reauth Time", then I removed it. Now Android Strongswan app doesn't show ESP errors in 21.02 after I changed P2 hash to SHA384. More on the hash issue here.

    Thanks again!

    -LamaZ

  • Mobile Client: Certificate AND Username/Password

    1
    0 Votes
    1 Posts
    257 Views
    No one has replied
  • Mobile IPsec to Site-to-Site VPN

    6
    0 Votes
    6 Posts
    814 Views
    4

    @ldoodle

    SNATting everything could help, but administer the firewall rules with sourcenatting... I would not like to go down this rabbit hole...
    Sure, if the Network of the SA is also directly attached to an interface of the firewall, it should work.

    Cheers.

    4920441

  • 0 Votes
    2 Posts
    487 Views
    B

    1. Floating IP

    Solution: add the floating IP as virtual IP and then it can be chosen in IPsec Phase 1 "Interface" dropdown.

  • Unable to use IPv4-mapped IPv6 address for mobile IPsec DNS

    5
    0 Votes
    5 Posts
    259 Views
    jimpJ

    I split this off into its own thread.

    Are you certain this worked on previous versions? It may have been silently rejected / not sent to clients.

    I can reproduce the config parsing problem here but I can't find any info in strongSwan about that being allowed. It may have been accepted by the old ipsec.conf config parser and now rejected by the swanctl parser.

    I also don't see it mentioned in the IKEv2 config payload RFC that it would be allowed.

    If nothing else we could add input validation to reject entering those values since they are now known not to work.

    I opened https://redmine.pfsense.org/issues/11446 to fix the validation.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.