Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Tunnel is working, but no traffic over it

    IPsec
    1
    3
    5.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      El Snorro
      last edited by

      I have set up a ipsec tunnel with my Pfsense box (2.0) and my Zyxel NBG460 (home) router, the tunnel comes up easily and show up active on the pfsense box and the Zyxel, but i cant ping from both sides.
      I try to ping from a workstation behind the pfsense to a workstation behind the home router, but it fails. When i try from home workstation to workstations behind pfsense it fails too…
      I do have a firewall rule on the ipsec tab allow 'any to any' (all proto's and ports)
      This is my racoon.conf:

      
      # This file is automatically generated. Do not edit
      path pre_shared_key "/var/etc/psk.txt";
      
      path certificate  "/var/etc";
      
      listen
      {
      	adminsock "/var/db/racoon/racoon.sock" "root" "wheel" 0660;
      	isakmp 84.53.113.133 [500];
      	isakmp_natt 84.53.113.133 [4500];
      }
      
      remote 84.82.252.146
      {
      	ph1id 1;
      	exchange_mode main;
      	my_identifier address 192.168.0.1;
      	peers_identifier address 192.168.3.1;
      	ike_frag on;
      	generate_policy = off;
      	initial_contact = on;
      	nat_traversal = on;
      
      	dpd_delay = 10;
      	dpd_maxfail = 5;
      	support_proxy on;
      	proposal_check claim;
      
      	proposal
      	{
      		authentication_method pre_shared_key;
      		encryption_algorithm 3des;
      		hash_algorithm md5;
      		dh_group 2;
      		lifetime time 28800 secs;
      	}
      }
      
      sainfo subnet 192.168.0.1/23 any subnet 192.168.3.1/24 any
      {
      	remoteid 1;
      	encryption_algorithm 3des;
      	authentication_algorithm hmac_md5;
      	pfs_group 1;
      	lifetime time 28800 secs;
      	compression_algorithm deflate;
      }
      
      

      This is the ipsec log:

      
      Dec 9 10:16:40 racoon: [Thijs-Thuis]: INFO: IPsec-SA established: ESP 84.53.113.133[500]->84.82.252.146[500] spi=3024575947(0xb4475dcb) 
      Dec 9 10:16:40 racoon: [Thijs-Thuis]: INFO: IPsec-SA established: ESP 84.82.252.146[0]->84.53.113.133[0] spi=258636965(0xf6a7ca5) 
      Dec 9 10:16:40 racoon: INFO: Adjusting peer's encmode UDP-Tunnel(61443)->Tunnel(1) 
      Dec 9 10:16:40 racoon: INFO: Adjusting my encmode UDP-Tunnel->Tunnel 
      Dec 9 10:16:40 racoon: WARNING: attribute has been modified. 
      Dec 9 10:16:39 racoon: INFO: NAT detected -> UDP encapsulation (ENC_MODE 1->61443). 
      Dec 9 10:16:39 racoon: [Thijs-Thuis]: INFO: initiate new phase 2 negotiation: 84.53.113.133[500]<=>84.82.252.146[500] 
      Dec 9 10:16:38 racoon: [Thijs-Thuis]: INFO: ISAKMP-SA established 84.53.113.133[500]-84.82.252.146[500] spi:539465d20c654c9f:04e75bda866433a6 
      Dec 9 10:16:38 racoon: WARNING: ignore INITIAL-CONTACT notification, because it is only accepted after phase1\. 
      Dec 9 10:16:38 racoon: [Thijs-Thuis]: INFO: KA list add: 84.53.113.133[500]->84.82.252.146[500] 
      Dec 9 10:16:38 racoon: INFO: NAT detected: PEER 
      Dec 9 10:16:38 racoon: INFO: NAT-D payload #1 doesn't match 
      Dec 9 10:16:38 racoon: [Thijs-Thuis]: INFO: Hashing 84.82.252.146[500] with algo #1 
      Dec 9 10:16:38 racoon: INFO: NAT-D payload #0 verified 
      Dec 9 10:16:38 racoon: INFO: Hashing 84.53.113.133[500] with algo #1 
      Dec 9 10:16:38 racoon: INFO: Adding remote and local NAT-D payloads. 
      Dec 9 10:16:38 racoon: INFO: Hashing 84.53.113.133[500] with algo #1 
      Dec 9 10:16:38 racoon: [Thijs-Thuis]: INFO: Hashing 84.82.252.146[500] with algo #1 
      Dec 9 10:16:38 racoon: INFO: Selected NAT-T version: draft-ietf-ipsec-nat-t-ike-00 
      Dec 9 10:16:38 racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00 
      Dec 9 10:16:38 racoon: INFO: begin Identity Protection mode. 
      Dec 9 10:16:38 racoon: [Thijs-Thuis]: INFO: initiate new phase 1 negotiation: 84.53.113.133[500]<=>84.82.252.146[500] 
      Dec 9 10:16:38 racoon: [Thijs-Thuis]: INFO: IPsec-SA request for 84.82.252.146 queued due to no phase1 found. 
      
      

      This the Zyxel configuration:

      The Zyxel (wan 192.168.2.1, lan 192.168.3.1) is behind a ADSL NAT router (192.168.2.254) which is configured IPSEC and ESP ports forwarded to the zyxel.
      VPN has worked to the Zyxel previously with another firewall, so that should not be the problem.

      This is the Zyxel Log:

      
      1 	12/09/2010 10:15:49 	Rule [2] Tunnel built successfully 	84.53.113.133 	192.168.2.1 	IKE
      2 	12/09/2010 10:15:49 	Adjust TCP MSS to 1398 	192.168.2.1 	84.53.113.133 	IKE
      3 	12/09/2010 10:15:49 	Recv:[HASH] 	84.53.113.133 	192.168.2.1 	IKE
      4 	12/09/2010 10:15:49 	Send:[HASH][SA][NONCE] 	192.168.2.1 	84.53.113.133 	IKE
      5 	12/09/2010 10:15:49 	Start Phase 2: Quick Mode 	84.53.113.133 	192.168.2.1 	IKE
      6 	12/09/2010 10:15:49 	Recv:[HASH][SA][NONCE][KE][ID][ID] 	84.53.113.133 	192.168.2.1 	IKE
      7 	12/09/2010 10:15:48 	Phase 1 IKE SA process done 	192.168.2.1 	84.53.113.133 	IKE
      8 	12/09/2010 10:15:48 	Send:[ID][HASH][NOTFY:INIT_CONTACT] 	192.168.2.1 	84.53.113.133 	IKE
      9 	12/09/2010 10:15:48 	Recv:[ID][HASH] 	84.53.113.133 	192.168.2.1 	IKE
      10 	12/09/2010 10:15:48 	Send:[KE][NONCE] 	192.168.2.1 	84.53.113.133 	IKE
      11 	12/09/2010 10:15:47 	Recv:[KE][NONCE][UNKNOWN(130)][UNKN 	84.53.113.133 	192.168.2.1 	IKE
      12 	12/09/2010 10:15:47 	Send:[SA][VID][VID] 	192.168.2.1 	84.53.113.133 	IKE
      13 	12/09/2010 10:15:47 	Recv:[SA][VID][VID][VID][VID][VID][ 	84.53.113.133 	192.168.2.1 	IKE
      14 	12/09/2010 10:15:47 	Recv Main Mode request from [84.53.113.133] 	84.53.113.133 	192.168.2.1 	IKE
      15 	12/09/2010 10:15:47 	Rule [2] Receiving IKE request 	84.53.113.133 	192.168.2.1 	IKE
      16 	12/09/2010 10:14:53 	Send:[HASH][DEL] 	192.168.2.1 	84.53.113.133 	IKE
      17 	12/09/2010 10:14:53 	Adjust TCP MSS to 1460 	192.168.2.1 	84.53.113.133 	IKE
      18 	12/09/2010 10:14:53 	Send:[HASH][DEL] 	192.168.2.1 	84.53.113.133 	IKE 
      
      

      When i log the firewall rules and ping from Zyxel workstation to pfsense workstation i do see traffic coming from 192.168.3.33 'enc0' to lan (192.168.0.151) and the traffic is passed.
      When i ping from pfsense workstation to the zyxel workstation i see traffic from lan (192.168.0.151) going to 192.168.3.33 and getting passed..

      So all looks fine, but i cant ping or do anything else with the tunnel…
      Thanks for your help

      1 Reply Last reply Reply Quote 0
      • E
        El Snorro
        last edited by

        In addition to above post:

        I am running the IPsec tunnel on my OPT1 (wan2ADSL) interface, which is (currently) default gateway. Should I add a static route to route the IPSEC traffic trough OPT1 or not??

        1 Reply Last reply Reply Quote 0
        • E
          El Snorro
          last edited by

          Found out what the problem was.
          My WAN interface is down, and i configered the IPsec tunnel from opt1.
          When i Disabled WAN interface my vpn was working :)

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.