• 0 Votes
    9 Posts
    2k Views
    E
    Here is my solution; The vpn connection is used to call webservices (soap) of the remote site. To check every connection I created a derived class of SoapHttpClientProtocol from which webservice references are derived and edited all service references and drived them from new class NWSoapHttpClientProtocol. C# code public class NWSoapHttpClientProtocol : SoapHttpClientProtocol { protected new object[] Invoke(string methodName, object[] parameters) { try { return base.Invoke(methodName, parameters); } catch { RenewLocalIP(); return base.Invoke(methodName, parameters); } } private void RenewLocalIP() { try { ProcessStartInfo processStartInfo = new ProcessStartInfo(); processStartInfo.FileName = "ipconfig"; processStartInfo.Arguments = "/release "; processStartInfo.WindowStyle = ProcessWindowStyle.Hidden; Process process = Process.Start(processStartInfo); process.WaitForExit(); processStartInfo = new ProcessStartInfo(); processStartInfo.FileName = "ipconfig"; processStartInfo.Arguments = "/renew"; processStartInfo.WindowStyle = ProcessWindowStyle.Hidden; process = Process.Start(processStartInfo); process.WaitForExit(); EventLogger.Log(LogType.Information, MethodBase.GetCurrentMethod(), "Renewed Local IP"); } catch (Exception ex) { while (ex.InnerException != null) { ex = ex.InnerException; } EventLogger.Log(LogType.Error, MethodBase.GetCurrentMethod(), ex.Message); } } } InvokeAsync methods of SoapHttpClientProtocol can also be implemented.
  • IPSEC VTI and traffic shaper

    ipsec vti qos
    2
    0 Votes
    2 Posts
    832 Views
    jimpJ
    No, you cannot use it with ALTQ. You could use limiters, however.
  • IPSec issues

    16
    2
    0 Votes
    16 Posts
    4k Views
    DerelictD
    No idea what the Mikrotik will do but, yes, both sides need to support it. Set a maintenance window, try it, and see.
  • [SOLVED] IPSec status vs GUI

    3
    1
    0 Votes
    3 Posts
    578 Views
    A
    Thank you by your insight @jimp. I just change the keyword on my script (to monitor VPN tunnels on zabbix) to know if the tunnel is up for "rekeying" insted of "ESTABLISHED". If you wanna take a look: https://github.com/alanwds/zabbix_ipsec_pfsense Thank you so much.
  • [Solves] No IPSEC connection after 2.4.4 upgrade to some hosts

    5
    0 Votes
    5 Posts
    853 Views
    jimpJ
    There isn't an IPsec traceroute exactly, but you can use hping to get a similar effect. For example, to see how far ESP (tunneled traffic) makes it, run this command: $ hping -0 1.2.3.4 -H 50 -d 10 -t 1 Replace 1.2.3.4 with the far side, and increase the -t value until you do not get a response. That's where it gets dropped. I see -T in the hping settings now and it might be helpful as well. If the tunnel won't connect at all, however, that would be a simple UDP test for port 500 and 4500. For that you can probably use a traditional traceroute command with -P UDP -p 500 and again for -p 4500.
  • IPSec VPN Routing Issue

    ipsec routing
    3
    5
    0 Votes
    3 Posts
    816 Views
    johnpozJ
    2.3.2... I just don't get this.. Why would you not be on at least 2.3.5p2? 2.3.2 is no longer supported.. And to be honest the 2.3.x line is EOL here soon.. Like tmrw ;) https://www.netgate.com/blog/pfsense-release-2-3-x-eol-reminder.html
  • How to configure IKev2+radius authentication

    17
    0 Votes
    17 Posts
    1k Views
    O
    Thank you for the good information. I'm sure I'll succeed.
  • pfSense IPSec VPN to non-pfSense with dual peer

    2
    0 Votes
    2 Posts
    488 Views
    jimpJ
    Not easily. You can make a VPN to a hostname, and if the remote peer can update the hostname when a failover happens, that can trigger a failover. There isn't a way to use both peers at once at the moment though, not with tunneled IPsec. With routed IPsec (VTI) you could nail up a tunnel to both peer addresses and use a routing protocol like OSPF or BGP to decide when to fail over.
  • 2.4.4 Multiple tunnels to same endpoint

    3
    0 Votes
    3 Posts
    580 Views
    A
    @jimp said in 2.4.4 Multiple tunnels to same endpoint: When you make a P1 to a remote peer, it adds a static route to that peer out the chosen interface. Ah ha, that explains the behaviour! Forgive my naivety, but why is the static route required? Is there another mechanism we could use to make sure the connection exits via the right interface? I am imagining something similar to PBR but for host traffic...
  • 0 Votes
    4 Posts
    878 Views
    V
    Thank you very much for your suggestion. I've reconfigured the tunnel to use VTI and since some days it stays quite stable. The routing seems to work fine for all subnets.
  • ipsec port 1024 problem

    2
    2
    0 Votes
    2 Posts
    496 Views
    jimpJ
    That is probably what the far side used to contact you. pfSense will reply back to whatever port the far side used, since it was probably run through NAT or had some other similar translation done along the way. There may not be anything you can do about that on your side, the far side probably needs to fix whatever is changing that port.
  • IPSec mobile clients with static IP

    2
    0 Votes
    2 Posts
    419 Views
    NogBadTheBadN
    Radius, I think the AD server can provide radius, you'll also need to set up framed ip addresses. I use the inbuilt radius server, my user configs look something like this:- "andy" Cleartext-Password := "xxxxxxxxxx", Simultaneous-Use := "1", Expiration := "Apr 11 2027" Framed-IP-Address = 172.16.8.2, Framed-IP-Netmask = 255.255.255.0, Framed-Route = "0.0.0.0/0 172.16.8.1 1" "Fred" Cleartext-Password := "xxxxxxxxxx", Simultaneous-Use := "1", Expiration := "Apr 11 2027" Framed-IP-Address = 172.16.8.3, Framed-IP-Netmask = 255.255.255.0, Framed-Route = "0.0.0.0/0 172.16.8.1 1"
  • Routed IPsec - Remote Site Policy Based IPsec

    2
    0 Votes
    2 Posts
    424 Views
    jimpJ
    Unfortunately, NAT won't work with routed IPsec so you might be a bit of a bind there. It's an issue in FreeBSD with how if_ipsec and pf interact. For the larger issue there, you don't setup P2 entries with routed IPsec like that. You just setup static routes, and send the traffic through the tunnel. The far side should still accept the connection as long as the networks passing through match what it expects. Normally you'd want to do routed on both ends, however, not just one.
  • IPSec VPN not passing traffic

    3
    2
    0 Votes
    3 Posts
    677 Views
    I
    Thanks for the info. I just checked on both systems and this option was already disabled. Should I maybe enable it? Interestingly though: pfSense A is having trouble with pfSense B's site to site tunnel pfSense B is however able to establish 4 other siste to site tunnels successfully and communicate. THis 5th tunnel to pfSense A just refuses to work.
  • 2.4.4 IPsec Logs

    1
    2
    0 Votes
    1 Posts
    337 Views
    No one has replied
  • TCP not routing through IPsec tunnel - MSS issue?

    11
    0 Votes
    11 Posts
    2k Views
    B
    @chrismacmahon said in TCP not routing through IPsec tunnel - MSS issue?: Can you try disabling the setting of Asynchronous Cryptography? This is located in VPN - IPSEC - Advanced setting bottom of the page. @chrismacmahon - this setting was already disabled in my config - I don't have the box Asynchronous Cryptography checked.
  • ipsec tunnel stops forwarding trafic once phase 1 lifetime is reached

    2
    0 Votes
    2 Posts
    413 Views
    S
    correcting the above information, lifetimes above 3600 seconds still produce the same error after one hour. i'm thinking an upstream network equipment might time out. i'm currently checking with a smaller phase1 timer, hoping for better results
  • VPN no longer working after installing v2.4.4

    7
    0 Votes
    7 Posts
    2k Views
    jimpJ
    Oct 18 07:11:30 charon 06[CFG] <con-mobile|25> received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_MD5_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_MD5_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_MD5_96/NO_EXT_SEQ Oct 18 07:11:30 charon 06[CFG] <con-mobile|25> configured proposals: ESP:AES_CBC_256/HMAC_MD5_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_384_192/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_512_256/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/AES_XCBC_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_MD5_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_384_192/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_512_256/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/AES_XCBC_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_MD5_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_384_192/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_512_256/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/AES_XCBC_96/MODP_2048/NO_EX Oct 18 07:11:30 charon 06[IKE] <con-mobile|25> no matching proposal found, sending NO_PROPOSAL_CHOSEN That looks more like P2 mismatch there, again, there was no match between what the client wants and what your firewall is configured to send. Looks like the client doesn't want PFS.
  • IPSec Logging - change/lower verbosity

    1
    1 Votes
    1 Posts
    172 Views
    No one has replied
  • Mobile Ipsec cannot connect from guest wifi when behind same pfsense box

    6
    0 Votes
    6 Posts
    868 Views
    Y
    @NogBadTheBad Thank you for your message. I agree with your idea implementing Radius server, it makes sense in some way. The IP that they connect to the VPN is a virtual IP assigned to an interface. I better understand now. But on another pfsense box (version 2.3.4) we don't have this issue and we can connect to the vpn from a lan interface.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.