• IPSEC connectivity dropping (tunnel stays UP)

    5
    0 Votes
    5 Posts
    724 Views
    A

    @awebster Hello! Thanks for the input!

    I've checked the Phase 2 configuration and they are using a lifetime of 3600, as per AWS configuration file.

    ! #2: IPSec Configuration
    !
    ! The IPSec transform set defines the encryption, authentication, and IPSec
    ! mode parameters.
    ! Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
    ! Please note, you may use these additionally supported IPSec parameters for encryption like AES256 and other DH groups like 2, 5, 14-18, 22, 23, and 24.
    ! Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".

    Expand the VPN configuration clicking in "+" and then create a new Phase2 entry as follows:

    ***a. Disabled :uncheck
    b. Mode : Tunnel
    c. Local Network : Type: LAN subnet
    Address : ! Enter your local network CIDR in the Address tab
    d. Remote Network : Type : Network
    Address : ! Enter your remote network CIDR in the Address tab
    e. Description : Amazon-IPSec-vpnxxx

    Phase 2 proposal (SA/Key Exchange)
    a. Protocol : ESP
    b. Encryption algorithms :aes128
    c. Hash algorithms : hmac-sha1-96
    d. PFS key group : 2
    e. Lifetime : 3600 seconds
    ***

  • PfSense l2tp ipsec server and Mikrotik

    1
    0 Votes
    1 Posts
    990 Views
    No one has replied
  • Internet traffic through IPSEC - Fallback

    2
    0 Votes
    2 Posts
    605 Views
    P

    Hi

    I have the same question. Did you get any solution for this problem?

    Stefan

  • Phase 2 is not establishing

    7
    0 Votes
    7 Posts
    1k Views
    S

    @jimp

    You were exactly right, the issue was on remote end. Thank you very much for your help, it's good to have such experts like you here. Good luck you to you.
    SOLVED!

  • Phase 2 : "invalid HASH_V1 payload length" error

    19
    0 Votes
    19 Posts
    4k Views
    G

    @gchialli said in Phase 2 : "invalid HASH_V1 payload length" error:

    I apologize for replying to this old topic, but I'm having the same issue I think. I'm on 2.4.4-p1. I have already bumped the max_ikev1_exchanges
    value to 50, but the errors keep happening, and the tunnel restarts every 2 minutes.
    @cukal Have you been able to find a solution for this?
    Thank you

    Hello,
    Just wanted to update the forum that my issue got resolved. It was caused by one proxy-id configured with the wrong prefix-length on the other side.
    Thanks

  • ICMP traffic allowed over IPsec by default?

    6
    0 Votes
    6 Posts
    2k Views
    jimpJ

    What is in Diagnostics > States matching ICMP before you start a new ping attempt? Have you tried killing/resetting states between tests?

    There is nothing special about ICMP vs TCP or UDP in the rules. They are all treated equally when it comes to evaluating the ruleset.

    You may also need to look at the detailed output from pfctl -vvss for the ICMP states matching your ping and compare them with the related info in pfctl -vvsr to see which rule(s) allowed the state to be created.

  • IPSec site to site with access to other sites

    7
    0 Votes
    7 Posts
    796 Views
    DerelictD

    You don't use static routes for IPsec unless you're using VTI.

  • IPSec VTI is a dream...

    1
    1 Votes
    1 Posts
    215 Views
    No one has replied
  • IPSEC Routing from LAN not working

    1
    0 Votes
    1 Posts
    230 Views
    No one has replied
  • 0 Votes
    1 Posts
    179 Views
    No one has replied
  • Connecting from different mobile IPSec clients to the same pfSense

    2
    0 Votes
    2 Posts
    314 Views
    jimpJ

    There is no way to have more than one mobile configuration at this time. Though I have yet to see the strongSwan app fail to connect, since pfSense uses strongSwan for the server. Odds are that it's just a client misconfiguration.

    Share more details about the configuration and error messages / logs and it can likely be solved.

  • Have P1/P2 tunnel and vti run at the same time?

    1
    0 Votes
    1 Posts
    162 Views
    No one has replied
  • VPN Site-to-Site between Fortigate (AWS) and Netgate SG-1100 (PfSense)

    4
    0 Votes
    4 Posts
    1k Views
    stephenw10S

    No problem. 👍

  • Routing between Multiple IPSec Tunnels, AWS/Oracle

    2
    0 Votes
    2 Posts
    446 Views
    stephenw10S

    You label only one tunnel there as VTI but whether the routing is dynamic or static if you are routing it must be VTI.

    If the tunnel to Oracle is policy based then do you have the correct P2s to carry traffic sourced from the AWS VPC?

    It sounds like they may be missing.

    Steve

  • BUG: VLAN over LAGG: Adding a new interface breaks existing tunnels.

    Locked
    3
    0 Votes
    3 Posts
    943 Views
    stephenw10S

    Even if you are seeing the same thing here, and I don't think you are since I see no mention of IPSec, this is from 2014!
    There is almost no chance the cause is the same.

    Locking this.

    Steve

  • Which VPN protocol is best?

    8
    0 Votes
    8 Posts
    936 Views
    NogBadTheBadN

    @Velociraptor

    That PDF is dated 1999, things have moved on since then, i.e IKEv2 which was proposed in 2005 in RFC4306.

    https://tools.ietf.org/html/rfc4306

  • IPsec IKEv2 (K)ubuntu 18.04 client (strongswan with Network Manager)

    2
    0 Votes
    2 Posts
    3k Views
    V

    So I found my issue.
    Apparantly "Network Manager" did not safe the password properly or something happened there.

    So usually commandline the PSK/EAP secrete of the client is stored in /etc/ipsec.secrets where my password was correct but Network Manager also stores it in its own location under /etc/NetworkManager/system-connections/<CONNECTION_NAME> and in the second file a wrong password was given under the section [vpn-secrets] \n password=<PSK>.

    I dont know why and how because a definitly have change and give the correct password but thats how it is.

    So user error. -> Check your configs 🤦

  • 10 GbE performance of site-to-site IPSec

    2
    0 Votes
    2 Posts
    694 Views
    M

    UPDATE: It seems that the ixl driver has been ported to iflib and is available in FreeBSD 12. As pfSense is adopting FreeBSD 12 for its 2.5 release, I decided to try a development snapshot of pfSense 2.5 (pfSense-CE-memstick-2.5.0-DEVELOPMENT-amd64-20191031-1313.img).

    Below are the updated results for both pfSense 2.4.4-p3 and pfSense 2.5.0-dev:

    +------------------+---------------+---------------+ | MTU | streams | pfSense 2.4.4 | pfSense 2.5.0 | +------------------+---------------+---------------+ | | 1 | 1.30 Gbps | 1.66 Gbps | | 1500 |-----------+---------------+---------------+ | | 8 | 1.81 Gbps | 2.52 Gbps | +----------------- +---------------+---------------+ | | 1 | 6.13 Gbps | 2.92 Gbps*| | 9000 |-----------+---------------+---------------+ | | 8 | 8.76 Gbps | 9.77 Gbps | +------------------+---------------+---------------+

    *The result for pfSense 2.5.0 with 9000 MTU and 1 stream is suspect. Performance decreased dramatically with pfSense 2.5.0 for this test, while performance improved with pfSense 2.5.0 for all of the other tests. I did see some curious behavior during this specific tests as compared to the others. In all other tests the throughput was relatively constant on a second-by-second basis. During this test the throughput each second varied wildly from 1 to 6 Gbps.

    The interrupt processing definitely improved with the move to pfSense 2.5.0. Below is a snapshot of the output from "top" on the left pfSense server during the 1500 MTU test. The interrupt processing and CPU usage seems to be distributed nicely across all of the cores. In fact, most of the CPUs seem to be underutilized. So I am not sure now what the bottleneck might be that is limiting performance.

    [2.5.0-DEVELOPMENT][admin@left]/root: top -P last pid: 46970; load averages: 1.65, 1.10, 0.97 up 0+16:56:20 08:44:13 49 processes: 2 running, 47 sleeping CPU 0: 3.5% user, 0.0% nice, 15.7% system, 3.1% interrupt, 77.6% idle CPU 1: 2.4% user, 0.0% nice, 14.2% system, 2.0% interrupt, 81.5% idle CPU 2: 0.8% user, 0.0% nice, 23.1% system, 2.0% interrupt, 74.1% idle CPU 3: 2.7% user, 0.0% nice, 18.0% system, 5.5% interrupt, 73.7% idle CPU 4: 3.5% user, 0.0% nice, 20.4% system, 2.4% interrupt, 73.7% idle CPU 5: 1.6% user, 0.0% nice, 23.1% system, 4.3% interrupt, 71.0% idle CPU 6: 2.4% user, 0.0% nice, 16.9% system, 1.6% interrupt, 79.2% idle CPU 7: 7.5% user, 0.0% nice, 52.5% system, 0.8% interrupt, 39.2% idle CPU 8: 5.1% user, 0.0% nice, 24.7% system, 1.6% interrupt, 68.6% idle CPU 9: 2.7% user, 0.0% nice, 16.9% system, 2.4% interrupt, 78.0% idle CPU 10: 3.1% user, 0.0% nice, 16.1% system, 3.1% interrupt, 77.6% idle CPU 11: 2.7% user, 0.0% nice, 24.3% system, 2.4% interrupt, 70.6% idle CPU 12: 4.7% user, 0.0% nice, 21.2% system, 2.4% interrupt, 71.8% idle CPU 13: 2.4% user, 0.0% nice, 22.0% system, 2.0% interrupt, 73.7% idle CPU 14: 0.0% user, 0.0% nice, 100% system, 0.0% interrupt, 0.0% idle CPU 15: 0.0% user, 0.0% nice, 0.0% system, 0.0% interrupt, 100% idle Mem: 77M Active, 39M Inact, 522M Wired, 69M Buf, 15G Free Swap: 3979M Total, 3979M Free PID USERNAME THR PRI NICE SIZE RES STATE C TIME WCPU COMMAND 8645 root 17 52 0 70M 20M sigwai 7 8:08 111.07% charon 26414 root 2 92 0 18M 6380K CPU0 0 6:52 99.59% ntpd
  • Slow IPSec Connection

    2
    0 Votes
    2 Posts
    381 Views
    DerelictD

    What kind of transfer? What is the latency across the tunnel? How exactly are you measuring throughput?

    AESGCM will generally be faster overall than AES. Change the Phase 2 to AESGCM without a hash.

  • Pfsense 2nd Ipsec stopped routing from 13 to 14 subnets

    1
    0 Votes
    1 Posts
    156 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.