• 21.02 Upgrade Broke IPSec site-2-site to Cisco ASA

    8
    0 Votes
    8 Posts
    1k Views
    I
    @sgw I can confirm disabling hw crypto on our SG-1100 running 21.02 fixed our tunnels to a Sonicwall. We had the same issues as the OP, tunnels connected but no traffic flowing inside.
  • IPSec P2 stability problems with 20.02

    8
    0 Votes
    8 Posts
    1k Views
    jimpJ
    Check the detail of the firewall states (pfctl -vvss) between the IPsec endpoints (so the WAN/public addresses) and see if there is any change in the states from when it works vs when it doesn't. ~5 minutes is suspiciously around a default state timeout for a state which only has traffic in one direction, which sounds sort of like asymmetric routing somehow. Also are these IPsec tunnels all on the WAN with the default gateway? Or are they on an alternate WAN?
  • IPsec IKE secrets not written properly

    3
    0 Votes
    3 Posts
    719 Views
    jimpJ
    @4920441-0 said in IPsec IKE secrets not written properly: I go 9 (!) IKE secrets despite the fact in the webinterface there is only one defined.... Secrets entries are also defined by user keys under user accounts and on the PSK tab, not just from tunnel. Sorry for the fuss but @netgate this is not good at all... Some key feature which is essential like IPSec should be tested more thouroughly.... We did test it thoroughly but there are only so many configuration variations we can test. We all use IPsec on 2.5.0/21.02 on our edges and have for many months during development. We use it for remote access IPsec. We use it in our labs. I personally have about 20 lab systems and most of them have interconnected IPsec tunnels with a variety of configurations. @4920441-0 said in IPsec IKE secrets not written properly: When I look in the secrets section on the pfsense site I see a different key in the resulting swanctl.conf file /var/etc/ipsec/swanctl.conf which is completely different like so... secret = 0sVGF.......................dg== (the '.' are a several dozend of random characters) Not all, but many start with '0sVGF' and end wih '==' I haven't seen other reports of anything like that. The secrets are base64 encoded and prefixed with 0s so in your case, the part starting with VGF all the way to the end (including the ==) is the encoded form of the string. If it didn't match, then the config didn't match in some way. Without seeing the whole keys it's hard to say what might have been the case there, but some top suspects would be extraneous characters in the field (extra whitespace, quotes, etc) which made them not match. That said, I tried running a few different strings through a base64 encoder and I didn't see any that started with VGF.
  • 2.5 with many tunnels - Apply Changes fails

    21
    0 Votes
    21 Posts
    2k Views
    jimpJ
    Is there any way you can try at least loading the IPsec portion of that configuration in a non-AWS system? It's difficult to tell if it's related to IPsec or if there is a general problem with AWS. The only other potentially-related report I've seen is a report of a kernel panic on AWS with someone that has even more IPsec tunnels than you, but as far as I'm aware they were not experiencing any slowness or boot delays.
  • 2.5 upgrade broke some, not all, IPSEC

    Locked
    16
    0 Votes
    16 Posts
    3k Views
    jimpJ
    This thread is getting out of hand like the previous one. We need to keep each thread for ONE issue only, not for multiple unrelated things that happen to be in IPsec. See my previous response at https://forum.netgate.com/post/964752 Before reporting any issues, please look at the list of recent IPsec issues and apply fixes/workarounds from there to eliminate known causes. You can install the System Patches package and then create entries for the following commit IDs to apply the fixes: ead6515637a34ce6e170e2d2b0802e4fa1e63a00 #11435 57beb9ad8ca11703778fc483c7cba0f6770657ac #11435 10eb04259fd139c62e08df8de877b71fdd0eedc8 #11442 ded7970ba57a99767e08243103e55d8a58edfc35 #11486 afffe759c4fd19fe6b8311196f4b6d5e288ea4fb #11487 2fe5cc52bd881ed26723a81e0eed848fd505fba6 #11488 Please refrain from replying to someone else's thread with a "me too" until there is confirmation that your issues are really the same and not just similar. I'll split some of these off into their own threads if they don't already have them, but for now, this one is locked.
  • Same issue with Azure Site-to-site (IPsec)

    1
    0 Votes
    1 Posts
    172 Views
    No one has replied
  • Possible bug in 21.02 ikev2 and rekey

    2
    1
    2 Votes
    2 Posts
    693 Views
    L
    @jgraham5481 This solved my issue where I was seeing something like: [ESP] ESP sequence number verification failed: in the Android Strongswan app, but now I can't recreate the error log in the app by removing the Reauth Time. I wanted to recreate the log so I can add it here for accuracy. That's what I get for not even taking screenshot. I added a value to "Reauth Time", then I removed it. Now Android Strongswan app doesn't show ESP errors in 21.02 after I changed P2 hash to SHA384. More on the hash issue here. Thanks again! -LamaZ
  • Mobile Client: Certificate AND Username/Password

    1
    0 Votes
    1 Posts
    301 Views
    No one has replied
  • Mobile IPsec to Site-to-Site VPN

    6
    0 Votes
    6 Posts
    943 Views
    ?
    @ldoodle SNATting everything could help, but administer the firewall rules with sourcenatting... I would not like to go down this rabbit hole... Sure, if the Network of the SA is also directly attached to an interface of the firewall, it should work. Cheers. 4920441
  • 0 Votes
    2 Posts
    588 Views
    B
    1. Floating IP Solution: add the floating IP as virtual IP and then it can be chosen in IPsec Phase 1 "Interface" dropdown.
  • Unable to use IPv4-mapped IPv6 address for mobile IPsec DNS

    5
    0 Votes
    5 Posts
    291 Views
    jimpJ
    I split this off into its own thread. Are you certain this worked on previous versions? It may have been silently rejected / not sent to clients. I can reproduce the config parsing problem here but I can't find any info in strongSwan about that being allowed. It may have been accepted by the old ipsec.conf config parser and now rejected by the swanctl parser. I also don't see it mentioned in the IKEv2 config payload RFC that it would be allowed. If nothing else we could add input validation to reject entering those values since they are now known not to work. I opened https://redmine.pfsense.org/issues/11446 to fix the validation.
  • pfSense 2.5.0 broke all IPSec VPNs

    Locked
    25
    0 Votes
    25 Posts
    9k Views
    jimpJ
    Seems there are several issues here all getting confused. Identifier issues with "Distinguished Name" (Which is a bug -- see https://redmine.pfsense.org/issues/11442 -- for a quick workaround, apply the patch there or just set your IDs to KeyID in the meantime) Identifier issues from incorrect use of Key ID in the past (which fell back to automatic guessing at the type, so may not now match a remote not set specifically to Key ID) -- To fix this, set the right ID type and value on both sides to match Configuration issues where the configuration is failing to load (with errors) Tunnels loading but not connecting Other things that haven't yet been identified Having one thread for all of this is a giant mess that's hard to follow. It's better for the moment if everyone makes their own thread here in the IPsec category and includes as much detail as possible. If someone else does have a thread for the exact same root issue then you can combine those threads, but this one is far too generic to be useful. For those of you who say re-creating the tunnel worked, be sure to grab the config.xml and compare before/after as well as /var/etc/ipsec/swanctl.conf -- something must be different if it suddenly started working, and if it's something done by the upgrade process then we can identify and fix it. For troubleshooting, first apply patches to fix known issues which have already been resolved: ead6515637a34ce6e170e2d2b0802e4fa1e63a00 #11435 57beb9ad8ca11703778fc483c7cba0f6770657ac #11435 10eb04259fd139c62e08df8de877b71fdd0eedc8 #11442 ded7970ba57a99767e08243103e55d8a58edfc35 #11486 afffe759c4fd19fe6b8311196f4b6d5e288ea4fb #11487 2fe5cc52bd881ed26723a81e0eed848fd505fba6 #11488 After that, edit/save/apply an IPsec tunnel, then stop and start (not restart) the IPsec daemon, or reboot instead. If problems persist, do the following: Edit/save a tunnel Apply changes Go to Status > Services and stop, then start the IPsec service (don't click restart) Go to Status > IPsec on one end and attempt to initiate the tunnel if it doesn't come up automatically. If it works, great. If not: Run swanctl --list-conns to see what the IPsec daemon loaded for the connections Run swanctl --load-all --file /var/etc/ipsec/swanctl.conf --debug 1 and see if it reports any problems Get the config from /var/etc/ipsec/swanctl.conf Get the most recent logs from both sides With that in hand, check for an existing thread which matches the symptoms exactly. If one exists, post there. If there isn't one, create one. Locking this so it doesn't keep growing and making things more confusing.
  • IPSEC Mobile split connection doubts?

    1
    0 Votes
    1 Posts
    313 Views
    No one has replied
  • Azure VPN up, but only one way

    2
    0 Votes
    2 Posts
    536 Views
    L
    Well, for anyone else that may run into this... the problem was that a Firewall Rule is needed. I was wrong to think that the VPN creation took care of that. Firewall Rules, IPsec is where it had to be created.
  • Not able to access Network Printer which is in PFSence

    2
    0 Votes
    2 Posts
    443 Views
    johnpozJ
    @velupazhani said in Not able to access Network Printer which is in PFSence: except Network Printer. And does this network printer have a gateway set.. I have seen it countless times on customer sites from very small.. To huge corps with hundreds of vlans - printers don't have gateway set. So no you can not talk to it from another vlan. Had 1 customer - hundreds of printers in the building. Not freaking 1 of them had a gateway.. Only reasons printers worked was of proxy arp set on their core switch.. Bet you beer - printer doesn't have gateway set ;)
  • how to set MTU on L2TP/IPsec server ?

    3
    0 Votes
    3 Posts
    643 Views
    Z
    @viktor_g i couldnt get anything from that link, could you please guide with more details/
  • vti dropped packets (mtu?)

    9
    0 Votes
    9 Posts
    717 Views
    M
    @clarknova we saw this in opnsense as after switching to VTI. SMB stopped working over ipsec. hard to track down. it worked like half a year, then problems started and it was kind of reproducible. pings works, SMB browsing too. SMB access timeout. reverting to classic ipsec solved the issue. i assume we did tunnel VTI back then, although the freebsd bug mentions transport mode. maybe it hurts both modes. why i wonder how pfsense is affected by this open freebsd bug as well. i would like to use VTI soon... https://github.com/opnsense/core/issues/3674
  • 0 Votes
    6 Posts
    1k Views
    F
    @viktor_g Hello, I've seen that too but it didn't help me. The solution was to reconfigure the vpn to IPsec IKEv2 and everyone is happy.
  • VTI tunnels behaving strange

    1
    0 Votes
    1 Posts
    363 Views
    No one has replied
  • IPSec S2S with Routed VTI, unable to access specific port

    2
    2
    0 Votes
    2 Posts
    295 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.