Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSec VPN from pfSense to WatchGuard

    Scheduled Pinned Locked Moved IPsec
    12 Posts 2 Posters 16.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jlepthien
      last edited by

      Doesn't seem to work for me….

      The last logs are:

      Dec 22 15:19:22 racoon: [XXXX]: INFO: ISAKMP-SA deleted 82.82.X.X[500]-213.178.X.X[500] spi❌x
      Dec 22 15:19:21 racoon: INFO: DPD: remote (ISAKMP-SA spi=x:x) seems to be dead.

      Should I deactivate DPD?

      | apple fanboy | music lover | network and security specialist | in love with cisco systems |

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        Have you tried checking "Prefer old IPsec SAs" under Advanced options?

        I just replaced a whole set of fireboxes for a customer and they dropped in pfSense boxes into their VPN mesh and it worked fine, I just had to set that option to make the VPN tunnels stable.

        If that doesn't help I can look at what the other tunnel options were and tell you what worked for us.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • J
          jlepthien
          last edited by

          Hi there,

          I will try that. Hmmm. But curious. The tunnel was stable before I upgraded to 1.2.3-release. Was using 1.2.3-RC3…

          | apple fanboy | music lover | network and security specialist | in love with cisco systems |

          1 Reply Last reply Reply Quote 0
          • J
            jlepthien
            last edited by

            From what I can see it works better now. I will reply to you tomorrow again, to see if it still works. But why on earth that option? What is so special about these boxes that you need this?

            | apple fanboy | music lover | network and security specialist | in love with cisco systems |

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              Not sure why, but they seem to generate new SAs all the time unnecessarily when the old ones work fine.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • J
                jlepthien
                last edited by

                Same problem today. But the weird thing is, that if I ping from behind the pfSense Box, the traffic starts to flow immediatelly. From behind the WatchGuard it takes some time…
                What other settings did you use? Thanks jimp...

                | apple fanboy | music lover | network and security specialist | in love with cisco systems |

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  Here is what I had. Most of the settings were just tailored to match what the previous vendor had used on the fireboxes at the time.

                  DPD: 60 Sec

                  Phase 1
                  Mode: Main
                  My Identifier: IP Address
                  Encryption: 3DES
                  Hash: SHA1
                  DH Group: 1
                  Lifetime: 86400
                  Auth: PSK

                  Phase 2
                  Protocol: ESP
                  Encryption: 3DES (others unchecked)
                  Hash: SHA1 (MD5 unchecked)
                  PFS: off
                  Lifetime: 86400

                  Automatically ping host: LAN IP of remote firewall

                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • J
                    jlepthien
                    last edited by

                    Hi jimp,

                    I have the tunnel up and running now with the beta1 of 2.0. Even with my settings the tunnel seems to be really stable now.
                    Has the ipsec changed so much in 2.0?

                    My settings are:

                    Phase 1:

                    ESP-AES128-SHA1
                    Lifetime 28800
                    PSK
                    DH5

                    Phase 2:
                    ESP-AES128-SHA1
                    Lifetime 2600
                    PFS
                    DH5

                    DPD 10s / 5 retries

                    | apple fanboy | music lover | network and security specialist | in love with cisco systems |

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      Yes, it changed quite a bit.

                      The 2.0 beta has a completely different version of ipsec-tools (0.8 instead of 0.7.x) and also has NAT-T support. The GUI was also rewritten.

                      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      1 Reply Last reply Reply Quote 0
                      • J
                        jlepthien
                        last edited by

                        After going back to 1.2.3 it is working fine as well. I did not check the 'prefer old sa' box.

                        DPD: 60 Sec

                        Phase 1
                        Mode: Main
                        My Identifier: Domain (user@domain)
                        Encryption: 3DES
                        Hash: SHA1
                        DH Group: 5
                        Lifetime: 28800
                        Auth: PSK

                        Phase 2
                        Protocol: ESP
                        Encryption: AES128 (others unchecked)
                        Hash: SHA1 (MD5 unchecked)
                        PFS: on/DH5
                        Lifetime: 28800

                        Perhaps someone else could use this info…

                        Also I disabled NAT-T on the WG, but this is also handled out so I guess it was not the problem.

                        | apple fanboy | music lover | network and security specialist | in love with cisco systems |

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.