Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSec from remote to LAN connections are dropped

    Scheduled Pinned Locked Moved 2.1 Snapshot Feedback and Problems - RETIRED
    14 Posts 6 Posters 7.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M Offline
      mdima
      last edited by

      Hi,
      on the latest Beta (2.1-BETA1 - i386 - 2013/2/5 20:22:25) something strange happens that didn't happen in the previous Beta releases.

      In an IPSec VPN, when I connect from the Remote Network (192.168.0.0/24) to the local network (192.168.22.0/24) the connections are not established, even if in the IPSec Interface (enc0) there is a rule like: From "Remote Network" to "Local Network", IPV4, Prot: any, Ports: any, Allow).

      In the "System Logs: Firewall" page there is something strange, I see the drops as "inverted" (source/destination) the local/remote network. For example, if I try to connect from remote to the WebConfigurator, in the firewall log I see:
      Source: <webconfigurator ip="" address="">, port: 80
      Destination: <remote ip="">, port xxxxxx
      Proto: TCP:R (or TCP:SA), etc.
      …
      while I would expect the opposite (from <remote ip="">, port: xxxxx, TO: <webconfigurator ip="" address="">, port: 80.

      The strange thing is that if I reload the firewall rules, for a second it works, then it does not work anymore...

      Any ideas? Until yesterday everything was working fine...

      Thanks,
      Michele</webconfigurator></remote></remote></webconfigurator>

      1 Reply Last reply Reply Quote 0
      • I Offline
        iamzam
        last edited by

        I am seeing similar problems, starting yesterday, where I can connect from local to remote over ipsec but it will drop after a small period of time, it always seems to be around 30 to 35 seconds.

        This was on both the latest 2/5 snapshot and the earlier one from 2/5

        2.1-BETA1 (amd64)
        built on Tue Feb 5 20:25:07 EST 2013
        FreeBSD 8.3-RELEASE-p5

        1 Reply Last reply Reply Quote 0
        • G Offline
          ggzengel
          last edited by

          Firewall rules on ipsec not working.
          Only icmp passes.

          1 Reply Last reply Reply Quote 0
          • E Offline
            eri--
            last edited by

            Canyou try gving the value 0x0002 to the tunable net.enc.in.ipsec_filter_mask?

            1 Reply Last reply Reply Quote 0
            • G Offline
              ggzengel
              last edited by

              That's it.
              It's working again.

              Can you explain?

              1 Reply Last reply Reply Quote 0
              • E Offline
                eri--
                last edited by

                What kind of tunnel you have?
                Can you show your configuration?

                1 Reply Last reply Reply Quote 0
                • B Offline
                  bardelot
                  last edited by

                  @ggzengel:

                  Can you explain?

                  The sysctl variable defines what will be passed to the firewall.

                  From the corresponding man entry [1]:

                  For the incoming path a value of 0x1 means "before stripping off the outer header'" and 0x2 means "after stripping off the outer header''.

                  [1] http://www.freebsd.org/cgi/man.cgi?query=enc&apropos=0&sektion=4&manpath=FreeBSD+8.3-RELEASE&arch=default&format=html

                  1 Reply Last reply Reply Quote 0
                  • G Offline
                    ggzengel
                    last edited by

                    The sysctl variable defines what will be passed to the firewall.

                    What has changed that it is necessary?

                    What kind of tunnel you have?
                    Can you show your configuration?

                    Nothing special.

                    
                    		 <phase1><ikeid>1</ikeid>
                    			<interface>wan</interface>
                    			<remote-gateway>pfsense.hq2</remote-gateway>
                    			<mode>aggressive</mode>
                    			<myid_type>fqdn</myid_type>
                    			<myid_data>hq1</myid_data>
                    			<peerid_type>fqdn</peerid_type>
                    			<peerid_data>hq2</peerid_data>
                    			 <encryption-algorithm><name>aes</name>
                    				<keylen>128</keylen></encryption-algorithm> 
                    			<hash-algorithm>sha1</hash-algorithm>
                    			<dhgroup>2</dhgroup>
                    			<lifetime>3600</lifetime>
                    			<pre-shared-key>hdhdhdjdjdhdj</pre-shared-key>
                    			 <private-key><certref>4cdc19617089e</certref>
                    			 <caref><authentication_method>pre_shared_key</authentication_method>
                    			 <proposal_check><nat_traversal>off</nat_traversal>
                    			<dpd_delay>10</dpd_delay>
                    			<dpd_maxfail>5</dpd_maxfail></proposal_check></caref></private-key></phase1> 
                    		 <phase2><ikeid>1</ikeid>
                    			<mode>tunnel</mode>
                    			 <localid><type>network</type>
                    
                    <address>10.19.0.0</address>
                    
                    				<netbits>22</netbits></localid> 
                    			 <remoteid><type>network</type>
                    
                    <address>10.19.8.0</address>
                    
                    				<netbits>22</netbits></remoteid> 
                    			<protocol>esp</protocol>
                    			 <encryption-algorithm-option><name>aes</name>
                    				<keylen>128</keylen></encryption-algorithm-option> 
                    			<hash-algorithm-option>hmac_sha1</hash-algorithm-option>
                    			<pfsgroup>2</pfsgroup>
                    			<lifetime>3600</lifetime>
                    			<pinghost>10.19.9.1</pinghost></phase2> 
                    
                    
                    1 Reply Last reply Reply Quote 0
                    • G Offline
                      ggzengel
                      last edited by

                      What has changed that it is necessary?

                      I answer myself.
                      If have seen last commit from ermal:
                      https://github.com/bsdperimeter/pfsense/commit/94395d8672f48b96528684cb9f98f082c8c52875

                      1 Reply Last reply Reply Quote 0
                      • M Offline
                        mdima
                        last edited by

                        mmmhhh… something changed in the release, since the configuration has not been altered pre and post the update.

                        Do we have to apply the change in "net.enc.in.ipsec_filter_mask" or someone will revert the change in pfSense that caused the problem?

                        Thanks,
                        Michele

                        1 Reply Last reply Reply Quote 0
                        • G Offline
                          ggzengel
                          last edited by

                          Do we have to apply the change in "net.enc.in.ipsec_filter_mask" or someone will revert the change in pfSense that caused the problem?

                          Ermal has reverted the change. Until next snapshot you have to apply sysctl manual.
                          Don't forget to delete net.enc.in.ipsec_filter_mask if you have applied the next snapshot because this has not to be set manual under normal circumstances.

                          1 Reply Last reply Reply Quote 0
                          • R Offline
                            rkelleyrtp
                            last edited by

                            Very timely thread.  I just upgraded from 2.0.2 to 2.1 beta and all my RDP sessions across the IPSec tunnels kept timing out.  After adding the "net.enc.in.ipsec_filter_mask" tunable with value 0x0002 worked perfectly!

                            1 Reply Last reply Reply Quote 0
                            • M Offline
                              mdima
                              last edited by

                              With the latest release (2.1-BETA1 (i386) \ Wed Feb 6 19:40:53 EST 2013) seems working fine…

                              For the ones who added the "net.enc.in.ipsec_filter_mask", seems they should remove it! ;)

                              Thanks to Ermal for fixing it!

                              Michele

                              1 Reply Last reply Reply Quote 0
                              • E Offline
                                eri--
                                last edited by

                                Yeah, sorry for the trouble and thank you for the reports.
                                The fix is intended for some ipsec configs but i will check how to make it less problematic.

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.