Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSec lan-to-lan doesn't work after PfSense upgrade to 2.2

    Scheduled Pinned Locked Moved IPsec
    21 Posts 10 Posters 8.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mdima
      last edited by

      mmmhhh… there is something wired.
      It worked after I forced NAT-T in both nodes. But... if from one node I try to access the webconfigurator of the Main office pfsenes, that box just REBOOTS!! :S

      This is veeeeery wired... I think I'm going to rollback to version 2.1.5 very soon! :(

      1 Reply Last reply Reply Quote 0
      • A
        Arthur
        last edited by

        same probleme here !

        ikev1 main mode
        all ok with racoon (2.1.5) before  update to 2.2.

        1 Reply Last reply Reply Quote 0
        • M
          mdima
          last edited by

          it was too bad, I had to roll-back both firewalls on the main office.

          I mean, the VPN was working, not so stable as on version 2.1.5 but was working, but the "I access the webconfigurator from a remote node and I crash the system" was too much for a production environment. :(

          1 Reply Last reply Reply Quote 0
          • C
            Clouseau
            last edited by

            Try on 2.2 to set Phase 1 Key Exchange version to auto. It helped me to get the other end back.

            –--------------------------------------------------------------
            Multible Alix 2D13, APU1,APU2,APU3 - pfSense 2.4.x 64bit
            Multible Vmware vSphere - pfSense 2.4.x 64bit

            pfSense - FreeNAS - OwnCloud

            1 Reply Last reply Reply Quote 0
            • R
              Riccardo90
              last edited by

              Tonight i decided to rollback the pfsense configuration to 2.1.5 and i think to do not upgrade 'till the issue with VPNs will be solved.

              Personally, i don't know why they decided to replace racoon with another service that is causing a lot of issues with VPNs, racoon works very well!…

              Riccardo

              1 Reply Last reply Reply Quote 0
              • C
                Clouseau
                last edited by

                2.2 <=> 2.2 works with IKEv2.
                2.1.5 <=> 2.2 Dont work at all with IKEv1 Confirm!

                So far ipsec with strogSwan has been like using ALPHA release. Sorry to say this, but I have also a lot of troubles with ipsec with version 2.2-RELEASE. Mobile VPN works only with IP identifier, site-to-site wont work at all between 2.1.5 - 2.2.

                IPSEC must ge a lot of attention now - this feels like we have pfSense's "Vista" here!

                Version 2.2.1 must be here tomorrow? :-X

                –--------------------------------------------------------------
                Multible Alix 2D13, APU1,APU2,APU3 - pfSense 2.4.x 64bit
                Multible Vmware vSphere - pfSense 2.4.x 64bit

                pfSense - FreeNAS - OwnCloud

                1 Reply Last reply Reply Quote 0
                • J
                  JoelLinn
                  last edited by

                  @Riccardo:

                  Tonight i decided to rollback the pfsense configuration to 2.1.5 and i think to do not upgrade 'till the issue with VPNs will be solved.

                  Personally, i don't know why they decided to replace racoon with another service that is causing a lot of issues with VPNs, racoon works very well!…

                  Riccardo

                  Because racoon is outdated like shit and does not support state of the art mobile connections. I has it's own bugs which could be worked around "easily" fiddling with the config.
                  Frankly, there seem to be serious ipsec issues with 2.2 but as there were 0 bugs when they decided to roll the release out, I think a lack of adequate testing may be the reason. Perhaps the community should have done more in the pre-release time.

                  1 Reply Last reply Reply Quote 0
                  • T
                    Thale
                    last edited by

                    @JoelLinn:

                    Frankly, there seem to be serious ipsec issues with 2.2 but as there were 0 bugs when they decided to roll the release out, I think a lack of adequate testing may be the reason. Perhaps the community should have done more in the pre-release time.

                    Could be, but I didn't see the problem in 2.2-RC with a 12-9-2014 build.  After upgrading 1 of the 2 routers in a dual-wan CARP test, however, I can never establish a connection with the 2.2-RELEASE router but when it fails over to the 2.2-RC router IPSEC works.

                    1 Reply Last reply Reply Quote 0
                    • C
                      Clouseau
                      last edited by

                      Because racoon is outdated like shit and does not support state of the art mobile connections. I has it's own bugs which could be worked around "easily" fiddling with the config.
                      Frankly, there seem to be serious ipsec issues with 2.2 but as there were 0 bugs when they decided to roll the release out, I think a lack of adequate testing may be the reason. Perhaps the community should have done more in the pre-release time.

                      Yes - racoon might be outdated like shit, but strongSwan is buggy like Flash. I rather work with one working back end with it's known limitations rather than all around buggy back end with numerous problems. Look at this forum - it's full of mysterious problems. If this would be done correctly - racoon should be here as one ipsec default core and strongSwan as option. Jimp and Ermal has done a lot effort to get 2.2 out, but this ipsec part seem to be epic failure. Ipsec is so important part of pfSense that community of pfSense should fix this fast - I mean FAST!

                      !!! Now DO NOT UPDATE TO 2.2 IF YOU USE IPSEC !!!!!

                      It will be catastrophic failure in operative use!

                      –--------------------------------------------------------------
                      Multible Alix 2D13, APU1,APU2,APU3 - pfSense 2.4.x 64bit
                      Multible Vmware vSphere - pfSense 2.4.x 64bit

                      pfSense - FreeNAS - OwnCloud

                      1 Reply Last reply Reply Quote 0
                      • E
                        eri--
                        last edited by

                        Please do not hijack threads of others.
                        Solve your problems on your posts.

                        1 Reply Last reply Reply Quote 0
                        • J
                          JoelLinn
                          last edited by

                          To come back to the problem, if the tunnel is up but no traffic is coming through, can you further specify it?
                          Is there only some traffic (like small ping packets) that get through or is it nothing at all.
                          Because I experience a problem where fragmented packets get lost. https://forum.pfsense.org/index.php?topic=87610.0
                          Maybe you want to perform similar analysis to confirm that your current problem is similar or not.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.