Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSEC tunnels display "connection established" but can not ping peer internal IP

    2.2 Snapshot Feedback and Problems - RETIRED
    9
    38
    17.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      eri--
      last edited by

      I an unsure why it does not work for some people.

      For me on first setup it works!

      1 Reply Last reply Reply Quote 0
      • S
        sgw
        last edited by

        @ermal:

        I an unsure why it does not work for some people.

        For me on first setup it works!

        Maybe it is related to the upgrade-procedure? Maybe the tunnel configs aren't transferred correctly when we upgrade from 2.1.5 to 2.2-beta?

        1 Reply Last reply Reply Quote 0
        • C
          charliem
          last edited by

          @sgw:

          Maybe it is related to the upgrade-procedure? Maybe the tunnel configs aren't transferred correctly when we upgrade from 2.1.5 to 2.2-beta?

          No, I had a clean 2.2 install that was working well (road warrior config, shrewsoft client), then stopped working at some point with a new snapshot.  I believe it stopped working after pfSense updated Strongswan from 5.1.x to 5.2.0, and/or FreeBSD 10.0 to 10.1 prerelease.  Same symptoms as reported here: tunnel is established, but no traffic can pass.

          @ermal:

          I an unsure why it does not work for some people.

          For me on first setup it works!

          Site-to-site or mobile client?  Can you post a config that works?

          1 Reply Last reply Reply Quote 0
          • E
            eri--
            last edited by

            Next snapshot should fix the issue.

            1 Reply Last reply Reply Quote 0
            • S
              sgw
              last edited by

              @ermal:

              Next snapshot should fix the issue.

              cool. Can you point us at the bug/commit solving this? I am interested in what the issue was? Thanks!

              1 Reply Last reply Reply Quote 0
              • E
                eri--
                last edited by

                The issue was in some hashes had wrong size in the kernel due to some improvements done to ipsec.

                That has been fixed now.

                1 Reply Last reply Reply Quote 0
                • H
                  hoanghaibinh
                  last edited by

                  Thanks a lot! I upgraded to lastest snapshot . It's working now!

                  1 Reply Last reply Reply Quote 0
                  • S
                    sgw
                    last edited by

                    @hoanghaibinh:

                    Thanks a lot! I upgraded to lastest snapshot . It's working now!

                    Same here, great!

                    1 Reply Last reply Reply Quote 0
                    • F
                      filnko
                      last edited by

                      Kinda works for me, although the default gateway get's set to the IPSec connection. (OS X Mavericks)
                      Can't figure out why as I've only chosen the LAN subnet in phase2 and am running a similar config on 2.1.5 without problems.

                      Anyone got the same problem?

                      1 Reply Last reply Reply Quote 0
                      • H
                        hoanghaibinh
                        last edited by

                        @filnko:

                        although the default gateway get's set to the IPSec connection. (OS X Mavericks)

                        Can you show your IPSec config more detail? What do you mean "OS X Mavericks" here?

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.