Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Ipsec Configuration not Working!

    Scheduled Pinned Locked Moved IPsec
    66 Posts 6 Posters 13.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      gabacho4 Rebel Alliance @ibnkamala
      last edited by

      @ibnkamala attach them as a file then.

      1 Reply Last reply Reply Quote 1
      • G
        gabacho4 Rebel Alliance @ibnkamala
        last edited by

        @ibnkamala said in Ipsec Configuration not Working!:

        @gabacho4 I can't post my logs because
        97a5f1c2-c6b6-45b0-9f04-e1ee5b0d7042-image.png

        I am in France, once side is orange bank pro firber /SiteB and the other end is freebox revolution fibre/SiteA

        OK then note what I said about being able to port forward or set up a DMZ. Your device should have documentation that shows how to do this.

        I 1 Reply Last reply Reply Quote 0
        • I
          ibnkamala
          last edited by ibnkamala

          @gabacho4 please find attached logs in PDF and Word document with 500 log records.

          1306-Logo-4-gabacho4.zip

          Saying thank you is not enough for your great help, however I have to say it

          1 Reply Last reply Reply Quote 0
          • I
            ibnkamala @gabacho4
            last edited by

            @gabacho4 I have already port forward in place, https works fine I am even able to access publicly the pfsense gui, and since I have not change the pfsense ipsec default ports which I think it uses 500 and 4500 so I have crteated below reules.

            9b79554c-c983-4300-a2b0-2e983613cd3b-image.png

            G 1 Reply Last reply Reply Quote 0
            • I
              ibnkamala
              last edited by ibnkamala

              @gabacho4 in my real configuration I will be using https://shop.netgate.com/products/6100-max-pfsense instead of SiteA but still will be behind NAT and won't be here in France it will be in Barcelona

              Concerning the SiteB / there won't be any changes. which will happen in 3 days. on Th 16th of June. but for behind a proper firewall and router.

              But I wanted to do the manipulation to see how it works, but sadly I am not there yet :)

              1 Reply Last reply Reply Quote 0
              • G
                gabacho4 Rebel Alliance @ibnkamala
                last edited by

                @ibnkamala I don't see that the port forwarding allows the esp protocol through. This is why most internet devices support IPsec passthrough. Can you put the Pfsense box on a DMZ and then try. Looking at your logs, it looks like SiteB tries to connect to SiteA but never gets a response. Would seem to indicate to me that things are not getting through.

                I 1 Reply Last reply Reply Quote 1
                • I
                  ibnkamala @gabacho4
                  last edited by

                  @gabacho4 will do that.

                  luckman212L 1 Reply Last reply Reply Quote 0
                  • luckman212L
                    luckman212 LAYER 8 @ibnkamala
                    last edited by luckman212

                    Now that both boxes are on 2.6, may I suggest switching to WireGuard since it is more NAT friendly, and requires just a single UDP port to be forwarded. You can try this without disturbing the IPsec config you have done so far (just disable the P1 to test)

                    https://docs.netgate.com/pfsense/en/latest/recipes/wireguard-s2s.html

                    I 1 Reply Last reply Reply Quote 0
                    • I
                      ibnkamala @luckman212
                      last edited by

                      @luckman212 what do you mean exactly I have to disable phase1 in both sites, then how can we test ? I will forward simple to the Pfsense.

                      luckman212L 1 Reply Last reply Reply Quote 0
                      • luckman212L
                        luckman212 LAYER 8 @ibnkamala
                        last edited by

                        @ibnkamala I am saying: forwarding the ports and protocols needed to make IPSEC work in a double-NAT scenario (such as you have) is not an easy task. It seems you might be a little over your head with it.

                        So, I suggested changing strategy and trying Wireguard, which is a completely different protocol, to establish the site-to-site tunnel. I posted a link to the guide so you could try to set it up.

                        If you do give that a try, just stick to the default port (udp/51820) and forward that port from "Simple Internet Box" to your inside SiteA pfSense, and also forward from SiteB Sonicwall to pfSense. It's just another possible solution.

                        1 Reply Last reply Reply Quote 0
                        • G
                          gary.lopez @gabacho4
                          last edited by

                          @gabacho4 tenia este problema y exactamente esta era la solucion, mis 2 firewalls estan detras del NAT, me funciono perfectamente para la conexion IPSEC. Solo me sucedio de Pfsense a Pfsense.
                          aclaro, uso la version 2.6, tal vez el compañero deba actualizar la su version.

                          G 1 Reply Last reply Reply Quote 0
                          • G
                            gabacho4 Rebel Alliance @gary.lopez
                            last edited by

                            @gary-lopez quieres decir que usando el KeyID era la clave para tu éxito? Lo siento pero después de cuatro meses y muchos mensajes entre mi y el amigo, no estoy seguro cual te ayudo. De todas maneras te felicito.

                            G 1 Reply Last reply Reply Quote 1
                            • G
                              gary.lopez @gabacho4
                              last edited by

                              @gabacho4 Asi es, ya estoy un poco familiarizado, no soy experto pero ese problema lo tenia desde hace meses pero no le dedique mucho tiempo ya que en produccion tengo de Pfsense a un Fortigate y me dejo levantar la VPN sin la necesidad de poner la KEY ID, use como identificador My IP Address que es la que te da por Default. Otra ventaja que tengo es que mi ISP o modem lo tengo en DMZ y el servico de Dynamic DNS en el pfsense.

                              G 1 Reply Last reply Reply Quote 0
                              • G
                                gabacho4 Rebel Alliance @gary.lopez
                                last edited by gabacho4

                                @gary-lopez es posible que haya otra solución pero no he experimentado hasta ahora. Una de mis instancias de pfsense esta detras de NAT y la otra no. Ya que pude hacer la conexión de esta manera no quise gastar mas tiempo y energía. Si te dan las ganas un día de estos, deberías investigar VTI IPSec ya que ese tipo te da una interfaz y gateway que puedes usar para PBR etc.

                                G 1 Reply Last reply Reply Quote 0
                                • G
                                  gary.lopez @gabacho4
                                  last edited by

                                  @gabacho4 Tomare en cuenta tus comentarios, muchas gracias por comentar mi estimado, espero apoyar algun dia, y a seguir investigando. Saludos desde Mexico

                                  G 1 Reply Last reply Reply Quote 0
                                  • G
                                    gabacho4 Rebel Alliance @gary.lopez
                                    last edited by

                                    @gary-lopez viva la raza carnal!

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.