Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSec roadwarrior, no traffic through tunnel?

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    4 Posts 3 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      pakjebakmeel
      last edited by

      Hi all,

      Doing some testing on an IPSec VPN Roadwarrior setup with PfSense v2.0, we are planning to use this in production. I am able to get the tunnel up but I cannot get any data through it, I went through this again and again and I might be missing something very silly but it just refuses to pass data. When looking at the IPSec status page it shows the tunnel but the icon is yellow instead of green. Firewall rules allow everything to pass, all protocols all sources all destinations on all interfaces. No ICMP packets are being dropped.

      Testing with Mutual PSK + Xauth and Shrew Soft VPN Client. Setup as follows:

      LAN(192.168.0.0/24) –> PFSENSE2.0b <-- WAN(10.0.0.0/24)

      I have 1 client in LAN and 1 client in wan and I'm trying to connect the WAN client to VPN and make it ping the LAN client.

      Tunnels:

      Phase1:

      Phase2:

      Mobile clients:

      IPSec log after connecting to VPN, attempting a ping to the LAN side (which did not reply) and disconnecting:

      
      Jan 26 07:18:06 	racoon: [TEST]: INFO: @(#)ipsec-tools 0.8-alpha20090903 (http://ipsec-tools.sourceforge.net)
      Jan 26 07:18:06 	racoon: [TEST]: INFO: @(#)This product linked OpenSSL 0.9.8k 25 Mar 2009 (http://www.openssl.org/)
      Jan 26 07:18:06 	racoon: [TEST]: INFO: Reading configuration from "/var/etc/racoon.conf"
      Jan 26 07:18:06 	racoon: [TEST]: INFO: Resize address pool from 0 to 253
      Jan 26 07:18:06 	racoon: [TEST]: WARNING: setsockopt(UDP_ENCAP_ESPINUDP): UDP_ENCAP Protocol not available
      Jan 26 07:18:06 	racoon: [TEST]: INFO: 10.0.0.1[4500] used as isakmp port (fd=13)
      Jan 26 07:18:07 	racoon: [TEST]: WARNING: setsockopt(UDP_ENCAP_ESPINUDP_NON_IKE): UDP_ENCAP Protocol not available
      Jan 26 07:18:07 	racoon: [TEST]: INFO: 10.0.0.1[500] used as isakmp port (fd=14)
      Jan 26 07:18:07 	racoon: [TEST]: INFO: unsupported PF_KEY message REGISTER
      Jan 26 07:19:37 	racoon: [TEST]: INFO: respond new phase 1 negotiation: 10.0.0.1[500]<=>10.0.0.20[500]
      Jan 26 07:19:37 	racoon: [TEST]: INFO: begin Aggressive mode.
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-01
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received Vendor ID: RFC 3947
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received broken Microsoft ID: FRAGMENTATION
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received Vendor ID: DPD
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received Vendor ID: CISCO-UNITY
      Jan 26 07:19:37 	racoon: [TEST]: INFO: Adding xauth VID payload.
      Jan 26 07:19:37 	racoon: [TEST]: INFO: Sending Xauth request
      Jan 26 07:19:37 	racoon: [TEST]: INFO: ISAKMP-SA established 10.0.0.1[500]-10.0.0.20[500] spi:e1a84acb33a9bd29:da0d53c7064470ac
      Jan 26 07:19:37 	racoon: [TEST]: INFO: received INITIAL-CONTACT
      Jan 26 07:19:37 	racoon: [TEST]: INFO: Using port 0
      Jan 26 07:19:37 	racoon: [TEST]: INFO: login succeeded for user "pakjebakmeel"
      Jan 26 07:19:37 	racoon: [TEST]: WARNING: Ignored attribute INTERNAL_ADDRESS_EXPIRY
      Jan 26 07:19:45 	racoon: [TEST]: INFO: respond new phase 2 negotiation: 10.0.0.1[500]<=>10.0.0.20[500]
      Jan 26 07:19:45 	racoon: [TEST]: INFO: no policy found, try to generate the policy : 192.168.200.2/32[0] 192.168.1.0/24[0] proto=any dir=in
      Jan 26 07:19:45 	racoon: [TEST]: INFO: IPsec-SA established: ESP 10.0.0.1[500]->10.0.0.20[500] spi=52245415(0x31d33a7)
      Jan 26 07:19:45 	racoon: [TEST]: INFO: IPsec-SA established: ESP 10.0.0.1[500]->10.0.0.20[500] spi=705601606(0x2a0ea046)
      Jan 26 07:19:45 	racoon: [TEST]: ERROR: such policy does not already exist: "192.168.200.2/32[0] 192.168.1.0/24[0] proto=any dir=in"
      Jan 26 07:19:45 	racoon: [TEST]: ERROR: such policy does not already exist: "192.168.1.0/24[0] 192.168.200.2/32[0] proto=any dir=out"
      Jan 26 07:19:47 	racoon: [TEST]: INFO: initiate new phase 2 negotiation: 10.0.0.1[500]<=>10.0.0.20[500]
      Jan 26 07:19:47 	racoon: [TEST]: WARNING: attribute has been modified.
      Jan 26 07:19:47 	racoon: [TEST]: INFO: IPsec-SA established: ESP 10.0.0.1[500]->10.0.0.20[500] spi=190180669(0xb55ed3d)
      Jan 26 07:19:47 	racoon: [TEST]: INFO: IPsec-SA established: ESP 10.0.0.1[500]->10.0.0.20[500] spi=2280451856(0x87ecef10)
      Jan 26 07:19:56 	racoon: [TEST]: INFO: generated policy, deleting it.
      Jan 26 07:19:56 	racoon: [TEST]: INFO: purged IPsec-SA proto_id=ESP spi=705601606.
      Jan 26 07:19:56 	racoon: [TEST]: INFO: purged IPsec-SA proto_id=ESP spi=2280451856.
      Jan 26 07:19:56 	racoon: [TEST]: INFO: ISAKMP-SA expired 10.0.0.1[500]-10.0.0.20[500] spi:e1a84acb33a9bd29:da0d53c7064470ac
      Jan 26 07:19:57 	racoon: [TEST]: INFO: ISAKMP-SA deleted 10.0.0.1[500]-10.0.0.20[500] spi:e1a84acb33a9bd29:da0d53c7064470ac
      Jan 26 07:19:57 	racoon: [TEST]: INFO: Released port 0
      
      
      1 Reply Last reply Reply Quote 0
      • P
        pakjebakmeel
        last edited by

        hey,

        Anyone got IPSEC Roadwarrior running in 2.0B? Is it supposed to be working at all?
        I can't seem to get it running.

        Anyone who has got this working?

        1 Reply Last reply Reply Quote 0
        • H
          horsedragon
          last edited by

          sorry, the same question, I don't know how to solve.
          in 1.23 or m0n0wall, ipsec roadwarrior work fine!

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            pfSense 2.0 is still in beta. This is one area that still needs work. There are already some tickets open about it.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.