Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Still IPSec Problems with 2.2.2

    Scheduled Pinned Locked Moved IPsec
    23 Posts 6 Posters 4.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mkaishar
      last edited by

      So having multiple P2 networks is still a problem.

      Other office with pfsense 2.2.2 connecting to same sonicwalls but only 1 P2 network…no problems.

      1 Reply Last reply Reply Quote 0
      • B
        brumm
        last edited by

        Hello!

        Big Big Problems here…..

        We have changed Internetprovider and i have a mixed openvpn and ipsec configuration with about 50 sites.
        now i changed all openvpn connections to 2.2.2 machine, no problem

        rest is fortigate firewalls, all possible versions and hardware... i am facing massive problems with IPSEC.

        it is not easy to go back, i am changing from 2.0.1 machine to 2.2.2

        any ideas - which is the last known stable version with working ipsec with multiple p2 and certifcates?

        And will it be possible to load the config of 2.2.2 in an older pfsense version?

        is pfsense thinking of fixing this mess? i used 2.0 and 2.1 alot and actually love it , 2.2.2 is a desaster.

        regards
        martin

        1 Reply Last reply Reply Quote 0
        • D
          doktornotor Banned
          last edited by

          @brumm:

          any ideas - which is the last known stable version with working ipsec with multiple p2 and certifcates?

          2.1.5

          1 Reply Last reply Reply Quote 0
          • B
            brumm
            last edited by

            thank you - will my 2.2.2 configuration apply?
            would be alot of work to manually configure all tunnels again.

            regards
            Martin

            1 Reply Last reply Reply Quote 0
            • D
              doktornotor Banned
              last edited by

              No, you cannot use 2.2.2 configuration. You can use the 2.0.1 one.

              1 Reply Last reply Reply Quote 0
              • M
                mkaishar
                last edited by

                Same issues again, after lifetime expires, no traffic passing, forcing a disconnect/reconnect of ipsec enables traffic again.

                anyone else having these issues?

                1 Reply Last reply Reply Quote 0
                • B
                  brumm
                  last edited by

                  i have even more problems. p2 only enables from one side (initiator/responder),
                  some p2 just do not activate automatically, manual identifier when using certificates.
                  rekeying problems, etc etc.

                  all in all absolutly unstable - ofcourse other side did not change - so it is not a problem of fortigate firewalls.

                  the 2.0.1 setup was now running well for years now.

                  regards
                  martin

                  1 Reply Last reply Reply Quote 0
                  • M
                    mkaishar
                    last edited by

                    I can reproduce problem very quickly

                    P2 lifetime dropped to 300 seconds and when it expires, traffic stops

                    Oh well back to 2.1.5 because 2.2.x is not production ready from my experiences so far

                    1 Reply Last reply Reply Quote 0
                    • C
                      cmb
                      last edited by

                      @mkaishar:

                      I can reproduce problem very quickly

                      P2 lifetime dropped to 300 seconds and when it expires, traffic stops

                      Dropped lifetime on both ends or just one?

                      Could you share the IPsec portion of your config? Minus PSKs/certs is fine.

                      1 Reply Last reply Reply Quote 0
                      • C
                        cmb
                        last edited by

                        @brumm:

                        i have even more problems. p2 only enables from one side (initiator/responder),
                        some p2 just do not activate automatically, manual identifier when using certificates.
                        rekeying problems, etc etc.

                        Could you share the IPsec portion of your config? Minus PSKs/certs is fine.

                        1 Reply Last reply Reply Quote 0
                        • M
                          mkaishar
                          last edited by

                          @cmb:

                          @mkaishar:

                          I can reproduce problem very quickly

                          P2 lifetime dropped to 300 seconds and when it expires, traffic stops

                          Dropped lifetime on both ends or just one?

                          Could you share the IPsec portion of your config? Minus PSKs/certs is fine.

                          Both ends…sure I will put it together give me a little bit of time.

                          1 Reply Last reply Reply Quote 0
                          • M
                            mkaishar
                            last edited by

                            attached screen shots of pfsense and sonicwall

                            pfsense1.png
                            pfsense1.png_thumb
                            pfsense2.png
                            pfsense2.png_thumb
                            pfsense3.png
                            pfsense3.png_thumb
                            pfsense4.png
                            pfsense4.png_thumb
                            pfsense5.png
                            pfsense5.png_thumb
                            sonicwall1.png
                            sonicwall1.png_thumb
                            sonicwall1a.png
                            sonicwall1a.png_thumb
                            sonicwall2.png
                            sonicwall2.png_thumb
                            sonicwall3.png
                            sonicwall3.png_thumb
                            sonicwall4.png
                            sonicwall4.png_thumb
                            sonicwall5.png
                            sonicwall5.png_thumb
                            sonicwall6.png
                            sonicwall6.png_thumb

                            1 Reply Last reply Reply Quote 0
                            • M
                              mkaishar
                              last edited by

                              Last night around 7:30PM PST I removed one P2, so each tunnel (15) only has one P2 running and there are no issues even after P2 lifetime (86400) expired.

                              Which as confirmed 2.2.2 still has issues unfortunately with IPSec and multiple P2.

                              1 Reply Last reply Reply Quote 0
                              • D
                                doktornotor Banned
                                last edited by

                                There was an issue with using the + button to create more P2s. Unconvinced the configuration upgrade code ever fixed that.

                                1 Reply Last reply Reply Quote 0
                                • M
                                  mkaishar
                                  last edited by

                                  I didn't clone the first P2 to create the second P2, they were all manually created.

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    tbo2k
                                    last edited by

                                    We are also having the same issues. This is driving us crazy.
                                    With 2.1.5 we had absolutely no problems.
                                    With 2.2.2 first everything looked ok so we updated like 2 weeks ago since 2.2 was
                                    But after some time random tunnels stopped working. We get this problem with many tunnels (but not all of them).

                                    We have like 100+ Tunnels on some sites.

                                    The issues almost only occur between pfsense firewalls, no matter if 2.2.2 or 2.2.1.

                                    • Sometimes after phase2 lifetime ends (we default to 3600 seconds = 1hour) no data is passed through the new tunnel
                                    • if the subnet-mask gets changed the sad will not be deleted (you need to completely destroy ipsec with restart daemon)
                                    • sometimes the tunnel is only established from the other side
                                    • sometimes random sa don't get reestablished, from 20 P2-SA between to sides we have 19 or 18 working.
                                    • when chaning ikev1 to ikev2 the established SA must manually be stopped to restart we ikev2
                                    • This happens no matter what settings. IKEv2, IKEv1, nothing is really stable.
                                    • with ikev2 some phase2 settings don't work at all (having subnets like 192.168.1.0/24 <-> 192.168.2.0/24 + 192.168.1.1/32 <-> 192.168.3.1/32
                                    • This sometimes also happens with single-P2-SA (single network to network) tunnels
                                    • 2.2.1 looks more stable than 2.2.2, we have less issues with 2.2.1 sites

                                    The frustrating thing is that it is not reproducable. Some sites work without issues. This after years of stable VPN.
                                    Another frustrating thing is the Log output.
                                    It either says nothing or tells too much and did not really help to detemine the reason for connection issues (new tunnel, wrong proposals, network mismatch).

                                    The bad is, that we cannot downgrade all systems since we went from 2.1.5 to 2.2.1 and after that to 2.2.2

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      mkaishar
                                      last edited by

                                      I noticed one pfsense to fortigate tunnel did not exhibit the same problems where traffic stops flowing after lifetime expiration

                                      After more in depth review of all settings (I've been at this for weeks now and getting exhausted)

                                      I had P2 lifetime expiration set different between pfsense and fortigate

                                      So…I changed settings:

                                      All remote (sonicwalls & fortigates) P1 lifetime is 28800
                                      All remote (sonicwalls & fortigates) P2 lifetime is 3600

                                      All pfsense P1 lifetime is 28800
                                      All pfsense P2 lifetime is 86400

                                      Each tunnel has at least 2 P2 networks, some tunnels have 4 P2 networks

                                      It's been stable, traffic continues to flow so far even after lifetime expiration on pfsense P1 or P2

                                      Now the question...is this safe security practices?

                                      I don't know, but I think I can live with it for the time being.

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        mkaishar
                                        last edited by

                                        @mkaishar:

                                        I noticed one pfsense to fortigate tunnel did not exhibit the same problems where traffic stops flowing after lifetime expiration

                                        After more in depth review of all settings (I've been at this for weeks now and getting exhausted)

                                        I had P2 lifetime expiration set different between pfsense and fortigate

                                        So…I changed settings:

                                        All remote (sonicwalls & fortigates) P1 lifetime is 28800
                                        All remote (sonicwalls & fortigates) P2 lifetime is 3600

                                        All pfsense P1 lifetime is 28800
                                        All pfsense P2 lifetime is 86400

                                        ~~Each tunnel has at least 2 P2 networks, some tunnels have 4 P2 networks

                                        It's been stable, traffic continues to flow so far even after lifetime expiration on pfsense P1 or P2

                                        Now the question…is this safe security practices?

                                        I don't know, but I think I can live with it for the time being.~~

                                        Doesn't work with the sonicwalls, oh well back to research again and disabling multiple P2 networks!

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          cmb
                                          last edited by

                                          @mkaishar:

                                          I didn't clone the first P2 to create the second P2, they were all manually created.

                                          The reqids should be fine in that case. Seems they end up losing their unique reqids in this circumstance. If that's the case (check "ipsec statusall" for the reqid, it should be unique on every P2), that's this: https://redmine.pfsense.org/issues/4665

                                          1 Reply Last reply Reply Quote 0
                                          • C
                                            cmb
                                            last edited by

                                            It appears strongswan 5.3.0 fixed something where setting the reqid explicitly is no longer required to work around other issues, and omitting reqid from ipsec.conf appears to work around the conflicting reqid problem. If you're on 2.2.2 already, gitsyncing to latest RELENG_2_2 is adequate to get those changes, or just comment out both instances of these lines in /etc/inc/vpn.inc:

                                            if (!empty($reqids[$idx]))
                                            $ipsecfin .= "\treqid = " . $reqids[$idx] . "\n";
                                            

                                            by changing it to:

                                            //if (!empty($reqids[$idx]))
                                            //$ipsecfin .= "\treqid = " . $reqids[$idx] . "\n";
                                            

                                            Matching this change:
                                            https://github.com/pfsense/pfsense/commit/afd0c1f2c9c46eaa8e496e98bea8a8e0887d504f

                                            Then go to VPN>IPsec, click Save, and stop, then start strongswan. Or just reboot to be really sure everything previous is fully cleared out.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.