Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VPN point to point

    Scheduled Pinned Locked Moved General pfSense Questions
    40 Posts 2 Posters 3.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rmainero @stephenw10
      last edited by

      @stephenw10

      I have a pfsence 2.7 with 2 vpn tunnel at the end of the tunnel there is a cisco 881, the tunnel is ipsec.

      But one of the tunnels stops working and only resumes if I disable both tunnels and activate them again

      I'm going to pass you the log tomorrow so you see it

      thank you

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        If there are no logs showing it trying to come back up and failing then perhaps there is no traffic to initiate it.

        R 1 Reply Last reply Reply Quote 0
        • R
          rmainero @stephenw10
          last edited by

          @stephenw10

          Hello, I pass the log

          Sep 22 07:18:03 charon 57999 16[NET] <con1|1108> received packet: from 190.106.82.252[500] to 190.13.88.176[500] (304 bytes)
          Sep 22 07:18:03 charon 57999 16[IKE] <con1|1108> received retransmit of response with ID 0, but next request already sent
          Sep 22 07:18:06 charon 57999 16[IKE] <con1|1108> sending retransmit 3 of request message ID 0, seq 3
          Sep 22 07:18:06 charon 57999 16[NET] <con1|1108> sending packet: from 190.13.88.176[4500] to 190.106.82.252[4500] (76 bytes)
          Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> sending DPD request
          Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> queueing ISAKMP_DPD task
          Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> activating new tasks
          Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> activating ISAKMP_DPD task
          Sep 22 07:18:07 charon 57999 16[ENC] <con2|689> generating INFORMATIONAL_V1 request 1418999662 [ HASH N(DPD) ]
          Sep 22 07:18:07 charon 57999 16[NET] <con2|689> sending packet: from 190.13.88.176[500] to 200.0.211.137[500] (92 bytes)
          Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> activating new tasks
          Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> nothing to initiate
          Sep 22 07:18:07 charon 57999 16[NET] <con2|689> received packet: from 200.0.211.137[500] to 190.13.88.176[500] (92 bytes)
          Sep 22 07:18:07 charon 57999 16[ENC] <con2|689> parsed INFORMATIONAL_V1 request 2879668186 [ HASH N(DPD_ACK) ]
          Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> activating new tasks
          Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> nothing to initiate
          Sep 22 07:18:08 charon 57999 12[CFG] vici client 516 connected
          Sep 22 07:18:08 charon 57999 06[CFG] vici client 516 registered for: list-sa
          Sep 22 07:18:08 charon 57999 06[CFG] vici client 516 requests: list-sas
          Sep 22 07:18:08 charon 57999 06[CFG] vici client 516 disconnected

          stephenw10S 1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator @rmainero
            last edited by

            @rmainero said in VPN point to point:

            Sep 22 07:18:03 charon 57999 16[NET] <con1|1108> received packet: from 190.106.82.252[500] to 190.13.88.176[500] (304 bytes)
            Sep 22 07:18:03 charon 57999 16[IKE] <con1|1108> received retransmit of response with ID 0, but next request already sent

            This message implies the other side is either not receiving the replies or is rejecting them. What do the logs at the remote side of that tunnel show?

            R 1 Reply Last reply Reply Quote 0
            • R
              rmainero @stephenw10
              last edited by

              @stephenw10 Captura de pantalla 2023-09-26 071455.png Captura de pantalla 2023-09-26 071354.png

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                That looks like the same side of the tunnel. Do you have any logs from the other side?

                R 1 Reply Last reply Reply Quote 0
                • R
                  rmainero @stephenw10
                  last edited by

                  @stephenw10

                  Do you want any record on the side of the cisco?

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Any errors shown. From the pfSense logs it looks like the other side is either not seeing packets we are sending or is rejecting them.

                    R 1 Reply Last reply Reply Quote 0
                    • R
                      rmainero @stephenw10
                      last edited by

                      @stephenw10 said in VPN point to point:

                      Any errors shown. From the pfSense logs it looks like the other side is either not seeing packets we are sending or is rejecting them.

                      Ok, I'll send them to you tomorrow, because now it's up and working.

                      R 1 Reply Last reply Reply Quote 0
                      • R
                        rmainero @rmainero
                        last edited by

                        @rmainero

                        you can pass me an email where you reverse a full video of the error

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          You can upload files for me here: https://nc.netgate.com/nextcloud/index.php/s/ai7Km5LsYWZRQMf

                          R 1 Reply Last reply Reply Quote 0
                          • R
                            rmainero @stephenw10
                            last edited by

                            @stephenw10
                            I already uploaded the file

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Hmm, nothing instantly jumps out but something that can cause a connection to succeed once then fail is an encryption mismatch at phase2. If it matches phase1 it will initially use that for phase2 in an IKEv2 connection but then fail at rekey. Check that.

                              It could also be something con figured with more allowed at one end. So pfSense will allow connections that configured with one of the enabled algorithms but the other end might only have one.

                              If you can copy/paste the complete logs from when it's failing it's much easier to review than a video.

                              R 1 Reply Last reply Reply Quote 0
                              • R
                                rmainero @stephenw10
                                last edited by

                                @stephenw10 said in VPN point to point:

                                If you can copy/paste the complete logs from when it's failing it's much easier to review than a video.
                                Captura de pantalla 2023-09-27 070335.png

                                debug cisco 881.txt

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  When does it fail, after how long? When it first rekeys?

                                  R 1 Reply Last reply Reply Quote 0
                                  • R
                                    rmainero @stephenw10
                                    last edited by

                                    @stephenw10 said in VPN point to point:

                                    When does it fail, after how long? When it first rekeys?

                                    I pick it up at 7 am and at 14 pm it falls off and I pick it up again manually. If you think I can give you access to see the team as a whole, my English is not very good

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      Mmm, it looks like the re-auth time is ~7h so that lines up; it fails at re-auth.

                                      Really I would want to see the full log from both sides covering the time where it tries to re-auth and fails.

                                      I would also compare the VPN config from both sides carefully. It looks like one side allows connections the other side would refuse.

                                      The error shown is a key mismatch:
                                      https://docs.netgate.com/pfsense/en/latest/troubleshooting/ipsec-logs.html#phase-1-pre-shared-key-mismatch
                                      But since it can connect when pfSense establishes the tunnel that appears to be correct. Unless somehow Cisco has multiple keys.

                                      Steve

                                      R 1 Reply Last reply Reply Quote 0
                                      • R
                                        rmainero @stephenw10
                                        last edited by

                                        @stephenw10 said in VPN point to point:

                                        But since it can connect when pfSense establishes the tunnel that appears to be correct. Unless somehow Cisco has multiple keys.

                                        This started after the update of pfsense to 2.7 before the configurations were in des and md5, what generates noise is that the other point works correctly the problem is only this point

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Ah OK. So you had to update the ciphers at both ends and then this started?

                                          R 1 Reply Last reply Reply Quote 0
                                          • R
                                            rmainero @stephenw10
                                            last edited by

                                            @stephenw10 said in VPN point to point:

                                            Ah OK. So you had to update the ciphers at both ends and then this started?

                                            That's right, modify both points, and only one has this behavior the other works perfect

                                            R 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.