Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Tunnel ipsec between pfsense and cisco router

    Scheduled Pinned Locked Moved IPsec
    6 Posts 3 Posters 12.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      capitangiaco
      last edited by

      Hi all

      I've setup a couple of ipsec tunnel between pfsense and cisco routers.
      I noticed that the tunnel goes up only If I make traffic from the lan behind pfsense, the cisco side is unable to make start the vpn.

      When I try to make traffic from the cisco side I can see this:

      (pfsense ipsec vpn logs)

      Dec 20 11:22:19 racoon: INFO: respond new phase 2 negotiation: ...162[500]<=>...106[500]
      Dec 20 11:22:19 racoon: ERROR: failed to get sainfo.
      Dec 20 11:22:19 racoon: ERROR: failed to get sainfo.
      Dec 20 11:22:19 racoon: ERROR: failed to pre-process packet.
      Dec 20 11:22:29 racoon: INFO: purging ISAKMP-SA spi=0d6050832cb03cc0:261016ad12094e2f.
      Dec 20 11:22:29 racoon: INFO: purged ISAKMP-SA spi=0d6050832cb03cc0:261016ad12094e2f.
      Dec 20 11:22:30 racoon: INFO: ISAKMP-SA deleted ...162[500]-...106[500] spi:0d6050832cb03cc0:261016ad12094e2f
      Dec 20 11:23:48 racoon: ERROR: not acceptable Identity Protection mode

      while from the cisco debug I can see:

      *Mar  8 17:47:02.921: ISAKMP: local port 500, remote port 500
      *Mar  8 17:47:02.921: ISAKMP: set new node 0 to QM_IDLE
      *Mar  8 17:47:02.925: insert sa successfully sa = 82262E64
      *Mar  8 17:47:02.925: ISAKMP:(0:0:N/A:0):Can not start Aggressive mode, trying Main mode.
      Mar  8 17:47:02.925: ISAKMP: Looking for a matching key for ...162 in default : success
      Mar  8 17:47:02.925: ISAKMP:(0:0:N/A:0):found peer pre-shared key matching ...162
      *Mar  8 17:47:02.925: ISAKMP:(0:0:N/A:0): constructed NAT-T vendor-07 ID
      *Mar  8 17:47:02.929: ISAKMP:(0:0:N/A:0): constructed NAT-T vendor-03 ID
      *Mar  8 17:47:02.929: ISAKMP:(0:0:N/A:0): constructed NAT-T vendor-02 ID
      *Mar  8 17:47:02.929: ISAKMP:(0:0:N/A:0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
      *Mar  8 17:47:02.929: ISAKMP:(0:0:N/A:0):Old State = IKE_READY  New State = IKE_I_MM1
      *Mar  8 17:47:02.929: ISAKMP:(0:0:N/A:0): beginning Main Mode exchange
      Mar  8 17:47:02.929: ISAKMP:(0:0:N/A:0): sending packet to ...162 my_port 500 peer_port 500 (I) MM_NO_STATE
      *Mar  8 17:47:12.933: ISAKMP:(0:0:N/A:0): retransmitting phase 1 MM_NO_STATE…

      I've tried to change aggressive/main mode and md5/sha values but the same output in the logs.
      The keep alive function in pfsense doesn't work because the pfsense box was unable to ping the private ip of the cisco router (while it can ping the public ip).
      At the moment I solved with a cron job in a server in the pfsense lan (I ping an host behind the cisco router every 10 seconds, I've tried to use 600secs but the tunnel goes down).

      Any idea ?

      thanks

      Giacomo

      1 Reply Last reply Reply Quote 0
      • H
        hoba
        last edited by

        You can use the Ping feature of pfSense to keep the tunnel alive or bring it up. It's at the bottom when you edit the tunnel. Just specify an IP of the remote subnet there.

        What kind of identifier are you using for both ends? From the cisco logs it looks like it is trying several things to bring up the connection (agressive, main, nat-t,…). I'm not a cisco expert though but I think there are some settings wrong or not defined at all. Have a look at http://doc.m0n0.ch/handbook/examplevpn.html#id2606293 .

        1 Reply Last reply Reply Quote 0
        • S
          sindum
          last edited by

          Hi

          Just a quick question. Is there any nat involved ? I.e. the cisco router beeing behind a nat device or doing nat it self

          1 Reply Last reply Reply Quote 0
          • C
            capitangiaco
            last edited by

            no nat. pfsense and cisco router have a public ip.
            I cannot use the keep alive function cause the pfsense box cannot ping the private ip of the router (it can only ping the public ip).

            Giacomo

            1 Reply Last reply Reply Quote 0
            • H
              hoba
              last edited by

              Of course you can use the keepalive for this. it will use the lan ip of the pfsense as source. this way it will go through the tunnel. You can test this from the webgui if you go to diagnostics>ping and choose interface lan and ping an ip at the remote end.

              1 Reply Last reply Reply Quote 0
              • C
                capitangiaco
                last edited by

                I put seconds instead the IP…
                Now works !
                thanks very much.

                Giacomo

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.