Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Two Phase 2 entries wont connect other two will

    Scheduled Pinned Locked Moved IPsec
    5 Posts 4 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bhenson1
      last edited by

      Out of the 5 phase 2 entries I have in IPsec, only 3 are connecting:

      These are the settings of one of the working ones:

      Here's one of the ones that doesn't work, setup exactly the same:

      Any idea where I can start troubleshooting? Are there some logs I can look at that might provide more info?

      1 Reply Last reply Reply Quote 0
      • B
        bhenson1
        last edited by

        Nevermind, found the problem. It was in the OpenVPN configuration settings.

        1 Reply Last reply Reply Quote 0
        • T
          Thale
          last edited by

          Would you mind sharing what OpenVPN setting caused the IPSEC phase 2 connection to not connect?  I'd like to know for the knowledge to keep in mind in case I run into something in the future - we have a similar setup.

          Thanks!

          1 Reply Last reply Reply Quote 0
          • J
            jiunnyik
            last edited by

            I'm following thread to know how is OpenVPN will cause Ipsec phase 2 not working.

            I have this issue as well.

            1 Reply Last reply Reply Quote 0
            • G
              gerdesj
              last edited by

              @jiunnyik:

              I'm following thread to know how is OpenVPN will cause Ipsec phase 2 not working.

              I have this issue as well.

              I too would be intrigued to find out more.  One of my tunnels consists of pfSense 2.1.5 <-> pfSense 2.2, one of the P2s is a supernetted range of VLANs, some of which are OpenVPNs (at the 2.1.5 end).  This has been stable for 11 days.

              2.2 end - 192.168.x.0/24
              2.1.5 end - 10.x.0.0/16 + 192.168.x.0/24

              The 10.x is actually lots of 10.x.y.0/24. y=250,251,252 are OpenVPN tunnels.

              IPSEC should not care what subnets or for what purpose or even if they exist locally.

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.