Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Looking for help on installation. Will make a guide afterwards.

    Scheduled Pinned Locked Moved IPsec
    15 Posts 2 Posters 4.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I
      Ilikethisdevice
      last edited by

      Not really. It only helps to a point. It is generalized.

      This is a scenario here which is much more useful.

      1 Reply Last reply Reply Quote 0
      • X
        XIII
        last edited by

        Well all of the IPSec setups I have done, Req. 2 worked by default, though I had the auto config of VPN rules option enabled.

        What do the logs say? Under Status>System Logs>IPSec VPN

        -Chris Stutzman
        Sys0:2.0.1: AMD Sempron 140 @2.7 1024M RAM 100GHD
        Sys1:2.0.1: Intel P4 @2.66 1024M RAM 40GHD
        freedns.afraid.org - Free DNS dynamic DNS subdomain and domain hosting.
        Check out the pfSense Wiki

        1 Reply Last reply Reply Quote 0
        • I
          Ilikethisdevice
          last edited by

          I am not there yet. I need help on the static routes for this scenario first.

          But so far the Colo device says:

          Nov 21 03:56:22 racoon: [Self]: INFO: <device wan="" address="">[500] used as isakmp port (fd=15)
          Nov 21 03:56:22 racoon: [Self]: INFO: 1<device lan="" address="">[500] used as isakmp port (fd=14)
          Nov 21 03:56:22 racoon: [Self]: INFO: 127.0.0.1[500] used as isakmp port (fd=13)
          Nov 21 03:56:22 racoon: [Self]: INFO: 192.168.5.1 (not sure where this is coming from)[500] used as isakmp port (fd=12)
          Nov 21 03:56:22 racoon: INFO: unsupported PF_KEY message REGISTER

          And here are the Main Site logs:

          Nov 20 08:49:14 racoon: [Self]: INFO: <device wan="" address="">[500] used as isakmp port (fd=15)
          Nov 20 08:49:14 racoon: [Self]: INFO: 1<device lan="" address="">[500] used as isakmp port (fd=14)
          Nov 20 08:49:14 racoon: [Self]: INFO: 127.0.0.1[500] used as isakmp port (fd=13)
          Nov 20 08:49:14 racoon: INFO: unsupported PF_KEY message REGISTER</device></device></device></device>

          1 Reply Last reply Reply Quote 0
          • X
            XIII
            last edited by

            Why do you want static routes? Just cause? It should route automatically via IP address (unless you access them via DNS), otherwise you go to System>Static Routes
            For the entry it would be the devices DNS name and the IP of the device

            -Chris Stutzman
            Sys0:2.0.1: AMD Sempron 140 @2.7 1024M RAM 100GHD
            Sys1:2.0.1: Intel P4 @2.66 1024M RAM 40GHD
            freedns.afraid.org - Free DNS dynamic DNS subdomain and domain hosting.
            Check out the pfSense Wiki

            1 Reply Last reply Reply Quote 0
            • I
              Ilikethisdevice
              last edited by

              Even when the PFsense devices are not the default gateway? It was my understanding that there had to be static routes in place when they are not.

              1 Reply Last reply Reply Quote 0
              • X
                XIII
                last edited by

                Yes that is true.

                You add it under System>Static Routes

                -Chris Stutzman
                Sys0:2.0.1: AMD Sempron 140 @2.7 1024M RAM 100GHD
                Sys1:2.0.1: Intel P4 @2.66 1024M RAM 40GHD
                freedns.afraid.org - Free DNS dynamic DNS subdomain and domain hosting.
                Check out the pfSense Wiki

                1 Reply Last reply Reply Quote 0
                • I
                  Ilikethisdevice
                  last edited by

                  What would those entries be in this scenario?

                  1 Reply Last reply Reply Quote 0
                  • X
                    XIII
                    last edited by

                    So at each location its:
                    1: WAN->Router(this is the WAN Network)->pfSenseWAN->pfSenseLAN

                    You need to add a static route at the main router that points the network at the main site for the colo to the pfSense box.

                    COLO
                    Destination Network:192.168.1.0  /24 
                    Gateway: 172.32.128.236
                    Main Site
                    Destination Network: 192.168.2.0  /24
                    Gateway: 100.192.224.248

                    -Chris Stutzman
                    Sys0:2.0.1: AMD Sempron 140 @2.7 1024M RAM 100GHD
                    Sys1:2.0.1: Intel P4 @2.66 1024M RAM 40GHD
                    freedns.afraid.org - Free DNS dynamic DNS subdomain and domain hosting.
                    Check out the pfSense Wiki

                    1 Reply Last reply Reply Quote 0
                    • X
                      XIII
                      last edited by

                      This is covered in more depth in the book

                      -Chris Stutzman
                      Sys0:2.0.1: AMD Sempron 140 @2.7 1024M RAM 100GHD
                      Sys1:2.0.1: Intel P4 @2.66 1024M RAM 40GHD
                      freedns.afraid.org - Free DNS dynamic DNS subdomain and domain hosting.
                      Check out the pfSense Wiki

                      1 Reply Last reply Reply Quote 0
                      • I
                        Ilikethisdevice
                        last edited by

                        Still nothing.

                        I added the rules on the WAN interface and I still see no activity.

                        1 Reply Last reply Reply Quote 0
                        • X
                          XIII
                          last edited by

                          this is done on the device that is the default gateway not pfSense.

                          If you made the change at this device then see what the IPSec logs say

                          -Chris Stutzman
                          Sys0:2.0.1: AMD Sempron 140 @2.7 1024M RAM 100GHD
                          Sys1:2.0.1: Intel P4 @2.66 1024M RAM 40GHD
                          freedns.afraid.org - Free DNS dynamic DNS subdomain and domain hosting.
                          Check out the pfSense Wiki

                          1 Reply Last reply Reply Quote 0
                          • I
                            Ilikethisdevice
                            last edited by

                            Still no dice. Are these devices flaky when they are running virtually?

                            1 Reply Last reply Reply Quote 0
                            • X
                              XIII
                              last edited by

                              there are quite a few people running pfSense in a VM (I dont)
                              I would suggest doing a traceroute, and looking at the logs on all systems (default gateway, pfSense) as it sounds like the route is not being forwarded/routed to the pfSense system, but the VPN is up.

                              -Chris Stutzman
                              Sys0:2.0.1: AMD Sempron 140 @2.7 1024M RAM 100GHD
                              Sys1:2.0.1: Intel P4 @2.66 1024M RAM 40GHD
                              freedns.afraid.org - Free DNS dynamic DNS subdomain and domain hosting.
                              Check out the pfSense Wiki

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.