• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

IPSsec between PFSense <-> Cisco

Scheduled Pinned Locked Moved IPsec
11 Posts 6 Posters 13.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    Blobot
    last edited by Nov 9, 2007, 10:21 AM Nov 9, 2007, 10:17 AM

    Hello,

    I need to create an IPSec tunnel between my PFSense and a remote Cisco device. The configuration is done on both side and it works !
    BUT !…
    ... The problem is it only works when, on the Cisco, the ID = IP Address. When the Cisco is configured to send its FQDN as Identifier, the tunnel doesn not come UP. There are some depedencies that oblige us to keep the FQDN as ID on the cisco.

    My question is :

    How can I tell to PFSense to accept FQDN as Identifier instead of the Public IP addresse ?

    Thank you in advance

    Note : I'm using PFSense 1.2 RC3

    Note 2 : I got those errors when the Cisco send the FQDN :
    racoon: ERROR: invalid ID payload.
    racoon: ERROR: Expecting IP address type in main mode, but FQDN.

    Note 3 : When I try to use agressive mode I get this error :
    racoon: ERROR: not acceptable Identity Protection mode

    1 Reply Last reply Reply Quote 0
    • S
      scourtney2000
      last edited by Nov 9, 2007, 1:28 PM

      there is an option in pfsense call 'My Identifier'

      you will see when creating your tunnel under Phase 1 proposal.

      can you post your cisco config. i can't seem to get a site to set working between my cisco asa and my pfsense.

      thanks

      1 Reply Last reply Reply Quote 0
      • B
        Blobot
        last edited by Nov 9, 2007, 1:36 PM

        Thank you for your answer, I don't have the cisco conf under my hand yet but about the "My Identifier" in pfsense what should I put ? I setted "IP Address" and put the FW ip address in the box. But you think it can be the problem ? Because as I said, when the Identity is set to IP (instead of FQDN) in the Cisco, it works.

        But what I don't understand is when I read the RFC 2409 section 5.4 I can see :

        When using pre-shared key authentication with Main Mode the key can
          only be identified by the IP address of the peers since HASH_I must
          be computed before the initiator has processed IDir. Aggressive Mode
          allows for a wider range of identifiers of the pre-shared secret to
          be used. In addition, Aggressive Mode allows two parties to maintain
          multiple, different pre-shared keys and identify the correct one for
          a particular exchange.

        It means that there is no possibility to tell PFSense to use FQDN for the VPN Tunnel ? If that's it, why does cisco use the FQDN ??

        Thank you

        1 Reply Last reply Reply Quote 0
        • S
          scourtney2000
          last edited by Nov 9, 2007, 2:47 PM

          Interesting…from what I understand of Cisco (I am not a Cisco expert) you do have the ability to change the identifier.

          In your Cisco config look for this:

          At the cisco configuration terminal type:
          crypto isakmp identity ?

          You will see:

          address  Use the IP address of the interface for the identity
            auto      Identity automatically determined by the connection type: IP
                      address for preshared key and Cert DN for Cert based connections
            hostname  Use the hostname of the router for the identity
            key-id    Use the specified key-id for the identity

          1 Reply Last reply Reply Quote 0
          • B
            Blobot
            last edited by Nov 9, 2007, 3:22 PM

            That's exact ! But the problem is this option is global ! And can affect other configurations, that's why we will keep it to "hostname".

            Now the question is : how to tell Pfsense to accept Hostname as identifier for a pre-shared key IPSec tunnel ??

            Thank you in advance

            1 Reply Last reply Reply Quote 0
            • B
              Blobot
              last edited by Nov 13, 2007, 10:02 AM

              UP ! :)

              1 Reply Last reply Reply Quote 0
              • S
                scourtney2000
                last edited by Nov 13, 2007, 1:07 PM

                can you post your cisco config. i have never been able to get my site to site going between pfsense and my cisco asa.

                thanks,
                sean

                1 Reply Last reply Reply Quote 0
                • C
                  clamasters
                  last edited by Nov 25, 2007, 11:17 PM

                  What Cisco device are you using, router?, pix?, asa?.  Additionally, what OS version is running on the Cisco.  Tomorrow I will upload my working pfSense 1.2RC3 - Cisco PIX 506 6.3.5. config's.

                  http://www.curtis-lamasters.com
                  http://www.builtnetworks.com

                  1 Reply Last reply Reply Quote 0
                  • R
                    rulle_mus
                    last edited by Jan 23, 2008, 9:23 AM

                    Hello,

                    I am struggling to get ipsec working getween pfsense 1.2rc4 and Cisco 1721 with crypto ios.
                    Is it possible to post your IOS config?

                    Regards,

                    Mus

                    1 Reply Last reply Reply Quote 0
                    • F
                      Fritz79
                      last edited by Jan 24, 2008, 2:20 PM

                      Hi everyone,

                      I got tunnel standing to router 1800 series with  12.4(6)T8
                      The problem is, that i can initiate tunnel only from pfSense side (when traffic is sent to destination private network, eg. ping tunel is set up). when tunnel is standing everythin works fine.

                      I have firewall WAN ESP, ipsec and LAN rules set.

                      Does anyone have idea ?

                      1 Reply Last reply Reply Quote 0
                      • K
                        kirikiri
                        last edited by Jan 30, 2008, 9:56 AM

                        @Blobot:

                        UP ! :)

                        Could you please send me a short description of how you mananged to get it up and running?
                        Thanks!

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received