Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [SOLUCIONADO] IPsec No proposal chosen

    Scheduled Pinned Locked Moved Español
    10 Posts 3 Posters 6.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • O
      odric
      last edited by

      ¿Alguien puede ayudarme? tengo un túnel site to site con pfsense 2.2 a un sonywall y la conexión me da estos mensajes recurrentes. ???

      el caso es que funciona, pero de vez en cuando se cae la conexión y no se si tendrá algo que ver. :o

      Gracias  ;)

      Feb 19 11:22:08 charon: 09[ENC] generating INFORMATIONAL_V1 request 1212684313 [ N(NO_PROP) ]
      Feb 19 11:22:08 charon: 09[NET] sending packet: from (IP WAN)[500] to (IP Remota)[500] (40 bytes)
      Feb 19 11:22:48 charon: 09[NET] received packet: from (IP Remota) [500] to  (IP WAN)[500] (216 bytes)
      Feb 19 11:22:48 charon: 09[ENC] parsed ID_PROT request 0 [ SA V V V V V V V ]
      Feb 19 11:22:48 charon: 09[IKE] <4739> no IKE config found for  (IP WAN)…(IP Remota), sending NO_PROPOSAL_CHOSEN
      Feb 19 11:22:48 charon: 09[IKE] no IKE config found for  (IP WAN)…(IP Remota), sending NO_PROPOSAL_CHOSEN

      1 Reply Last reply Reply Quote 0
      • belleraB
        bellera
        last edited by

        Google ipsec pfsense sonicwall

        1 Reply Last reply Reply Quote 0
        • O
          odric
          last edited by

          Hola, esa guía es la que seguí para montarlo. Alguna vez me ha conectado y funcionado bien. Pero hoy se ha caido y no hay forma de que levante. Deshabilitado el tunel, reiniciado el servicio, nada.

          hace cosas raras, se reinicia cada 60 segundos aprox y no llega a haber tráfico en el tunel.

          adjunto una imagen para que veáis alguna curiosidad. Luego desaparece la de Connecting y queda el de conectado pero no funciona.

          Debería de actualizar (actualmente tengo versión 2.2

          Gracias.

          Apr 22 13:58:50 	charon: 06[NET] sending packet: from 192.168.150.1[500] to 194.xx.xx.xx[500] (152 bytes)
          Apr 22 13:58:50 	charon: 06[NET] received packet: from REMOTEIP[500] to 192.168.150.1[500] (280 bytes)
          Apr 22 13:58:50 	charon: 06[ENC] parsed ID_PROT request 0 [ KE NAT-D NAT-D No V V V V ]
          Apr 22 13:58:50 	charon: 06[ENC] received unknown vendor ID: 52:2c:a3:f6
          Apr 22 13:58:50 	charon: 06[IKE] <58> received XAuth vendor ID
          Apr 22 13:58:50 	charon: 06[IKE] received XAuth vendor ID
          Apr 22 13:58:50 	charon: 06[ENC] received unknown vendor ID: 80:01:00:00
          Apr 22 13:58:50 	charon: 06[IKE] <58> received DPD vendor ID
          Apr 22 13:58:50 	charon: 06[IKE] received DPD vendor ID
          Apr 22 13:58:50 	charon: 06[IKE] <58> local host is behind NAT, sending keep alives
          Apr 22 13:58:50 	charon: 06[IKE] local host is behind NAT, sending keep alives
          Apr 22 13:58:50 	charon: 06[ENC] generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
          Apr 22 13:58:50 	charon: 06[NET] sending packet: from 192.168.150.1[500] to 194.xx.xx.xx[500] (236 bytes)
          Apr 22 13:58:50 	charon: 06[NET] received packet: from REMOTEIP[4500] to 192.168.150.1[4500] (92 bytes)
          Apr 22 13:58:50 	charon: 06[ENC] parsed ID_PROT request 0 [ ID HASH N(INITIAL_CONTACT) ]
          Apr 22 13:58:50 	charon: 06[CFG] looking for pre-shared key peer configs matching 192.168.150.1...REMOTEIP[REMOTEIP]
          Apr 22 13:58:50 	charon: 06[CFG] selected peer config "con1000"
          Apr 22 13:58:50 	charon: 06[IKE] <con1000|58> IKE_SA con1000[58] established between 192.168.150.1[WANIP]...REMOTEIP]
          Apr 22 13:58:50 	charon: 06[IKE] IKE_SA con1000[58] established between 192.168.150.1[WANIP]...REMOTEIP
          Apr 22 13:58:50 	charon: 06[IKE] <con1000|58> scheduling reauthentication in 28242s
          Apr 22 13:58:50 	charon: 06[IKE] scheduling reauthentication in 28242s
          Apr 22 13:58:50 	charon: 06[IKE] <con1000|58> maximum IKE_SA lifetime 28782s
          Apr 22 13:58:50 	charon: 06[IKE] maximum IKE_SA lifetime 28782s
          Apr 22 13:58:50 	charon: 06[ENC] generating ID_PROT response 0 [ ID HASH ]
          Apr 22 13:58:50 	charon: 06[NET] sending packet: from 192.168.150.1[4500] to REMOTEIP[4500] (68 bytes)
          Apr 22 13:58:50 	charon: 06[IKE] <con1000|55> destroying duplicate IKE_SA for peer '194.xx.xx.xx', received INITIAL_CONTACT
          Apr 22 13:58:50 	charon: 06[IKE] destroying duplicate IKE_SA for peer 'REMOTEIP', received INITIAL_CONTACT
          Apr 22 13:58:50 	charon: 06[KNL] unable to delete SAD entry with SPI c0f951ce: No such file or directory (2)
          Apr 22 13:58:57 	charon: 11[NET] received packet: from REMOTEIP[4500] to 192.168.150.1[4500] (92 bytes)
          Apr 22 13:58:57 	charon: 11[IKE] <con1000|58> received retransmit of request with ID 0, retransmitting response
          Apr 22 13:58:57 	charon: 11[IKE] received retransmit of request with ID 0, retransmitting response
          Apr 22 13:58:57 	charon: 11[NET] sending packet: from 192.168.150.1[4500] to 194.xx.xx.xx[4500] (68 bytes)
          Apr 22 13:59:06 	charon: 11[NET] received packet: from REMOTEIP[4500] to 192.168.150.1[4500] (92 bytes)
          Apr 22 13:59:06 	charon: 11[IKE] <con1000|58> received retransmit of request with ID 0, retransmitting response
          Apr 22 13:59:06 	charon: 11[IKE] received retransmit of request with ID 0, retransmitting response
          Apr 22 13:59:06 	charon: 11[NET] sending packet: from 192.168.150.1[4500] to REMOTEIP[4500] (68 bytes)
          Apr 22 13:59:06 	charon: 11[KNL] creating acquire job for policy 192.168.150.1/32|/0 === 194.179.72.108/32|/0 with reqid {1}
          Apr 22 13:59:06 	charon: 06[ENC] generating QUICK_MODE request 1260588757 [ HASH SA No KE ID ID ]
          Apr 22 13:59:06 	charon: 06[NET] sending packet: from 192.168.150.1[4500] to REMOTEIP[4500] (308 bytes)
          Apr 22 13:59:10 	charon: 06[IKE] <con1000|58> sending retransmit 1 of request message ID 1260588757, seq 1
          Apr 22 13:59:10 	charon: 06[IKE] sending retransmit 1 of request message ID 1260588757, seq 1
          Apr 22 13:59:10 	charon: 06[NET] sending packet: from 192.168.150.1[4500] to REMOTEIP[4500] (308 bytes)</con1000|58></con1000|58></con1000|58></con1000|55></con1000|58></con1000|58></con1000|58>
          

          tunel_duplicado.png
          tunel_duplicado.png_thumb

          1 Reply Last reply Reply Quote 0
          • belleraB
            bellera
            last edited by

            Parece que hace la fase 1 y no sigue.

            https://doc.pfsense.org/index.php/IPsec_Troubleshooting#Normal_.2F_OK_Connection

            Activa Debug a ver qué más podemos ver:

            https://doc.pfsense.org/index.php/Advanced_IPsec_Settings

            1 Reply Last reply Reply Quote 0
            • O
              odric
              last edited by

              Hola de nuevo y gracias por contestar.
              Actualicé a la versión 2.2.2 y parecía todo bien.
              Tengo dos túneles REMOTE1 y REMOTE2. El segundo se ha caido este fin desemana y no quiere funcionar. Activé los logs y esto es lo que tiene:

              ¿Alguna idea?

              Una vez intenté activar un tunel OpenVPN site to site y me tiró las conexiones IPsec, deshabilité el tunel OpenVPN porque no conectaba y reconecté las conexiones IPsec sin problemas. ¿Puede haber alguna relación?

              
              Apr 25 10:53:37	charon: 13[IKE] <con1000|2009>sending DPD request
              Apr 25 10:53:37	charon: 13[IKE] <con1000|2009>sending DPD request
              Apr 25 10:53:37	charon: 13[ENC] <con1000|2009>generating INFORMATIONAL_V1 request 2022976848 [ HASH N(DPD) ]
              Apr 25 10:53:37	charon: 13[NET] <con1000|2009>sending packet: from 192.168.150.1[4500] to REMOTE1[4500] (84 bytes)
              Apr 25 10:53:37	charon: 13[NET] <con1000|2009>received packet: from REMOTE1[4500] to 192.168.150.1[4500] (84 bytes)
              Apr 25 10:53:37	charon: 13[ENC] <con1000|2009>parsed INFORMATIONAL_V1 request 4201881736 [ HASH N(DPD_ACK) ]
              Apr 25 10:53:45	charon: 13[IKE] <2300> sending keep alive to REMOTE1[500]
              Apr 25 10:53:45	charon: 13[IKE] <2300> sending keep alive to REMOTE1[500]
              Apr 25 10:53:47	charon: 13[IKE] <con1000|2009>sending DPD request
              Apr 25 10:53:47	charon: 13[IKE] <con1000|2009>sending DPD request
              Apr 25 10:53:47	charon: 13[ENC] <con1000|2009>generating INFORMATIONAL_V1 request 400793340 [ HASH N(DPD) ]
              Apr 25 10:53:47	charon: 13[NET] <con1000|2009>sending packet: from 192.168.150.1[4500] to REMOTE1[4500] (84 bytes)
              Apr 25 10:53:47	charon: 13[NET] <con1000|2009>received packet: from REMOTE1[4500] to 192.168.150.1[4500] (84 bytes)
              Apr 25 10:53:47	charon: 13[ENC] <con1000|2009>parsed INFORMATIONAL_V1 request 2138457174 [ HASH N(DPD_ACK) ]
              Apr 25 10:53:55	charon: 13[JOB] <2300> deleting half open IKE_SA after timeout
              Apr 25 10:53:57	charon: 15[IKE] <con1000|2009>sending DPD request
              Apr 25 10:53:57	charon: 15[IKE] <con1000|2009>sending DPD request
              Apr 25 10:53:57	charon: 15[ENC] <con1000|2009>generating INFORMATIONAL_V1 request 3453592459 [ HASH N(DPD) ]
              Apr 25 10:53:57	charon: 15[NET] <con1000|2009>sending packet: from 192.168.150.1[4500] to REMOTE1[4500] (84 bytes)
              Apr 25 10:53:57	charon: 15[NET] <con1000|2009>received packet: from REMOTE1[4500] to 192.168.150.1[4500] (84 bytes)
              Apr 25 10:53:57	charon: 15[ENC] <con1000|2009>parsed INFORMATIONAL_V1 request 2613038798 [ HASH N(DPD_ACK) ]
              Apr 25 10:54:06	charon: 15[IKE] <con2|2294>retransmit 5 of request with message ID 0
              Apr 25 10:54:06	charon: 15[IKE] <con2|2294>retransmit 5 of request with message ID 0
              Apr 25 10:54:06	charon: 15[NET] <con2|2294>sending packet: from 192.168.130.1[500] to REMOTE2[500] (324 bytes)
              Apr 25 10:54:07	charon: 15[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:07	charon: 15[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:07	charon: 15[ENC] <con1000|2009>generating INFORMATIONAL_V1 request 1212184714 [ HASH N(DPD) ]
              Apr 25 10:54:07	charon: 15[NET] <con1000|2009>sending packet: from 192.168.150.1[4500] to REMOTE1[4500] (84 bytes)
              Apr 25 10:54:07	charon: 15[NET] <con1000|2009>received packet: from REMOTE1[4500] to 192.168.150.1[4500] (84 bytes)
              Apr 25 10:54:07	charon: 15[ENC] <con1000|2009>parsed INFORMATIONAL_V1 request 3732841539 [ HASH N(DPD_ACK) ]
              Apr 25 10:54:11	charon: 07[CFG] received stroke: terminate 'con2'
              Apr 25 10:54:11	charon: 15[IKE] <con2|2294>destroying IKE_SA in state CONNECTING without notification
              Apr 25 10:54:11	charon: 15[IKE] <con2|2294>destroying IKE_SA in state CONNECTING without notification
              Apr 25 10:54:11	charon: 04[CFG] received stroke: initiate 'con2'
              Apr 25 10:54:11	charon: 07[IKE] <con2|2301>initiating IKE_SA con2[2301] to REMOTE2
              Apr 25 10:54:11	charon: 07[IKE] <con2|2301>initiating IKE_SA con2[2301] to REMOTE2
              Apr 25 10:54:11	charon: 07[ENC] <con2|2301>generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
              Apr 25 10:54:11	charon: 07[NET] <con2|2301>sending packet: from 192.168.130.1[500] to REMOTE2[500] (324 bytes)
              Apr 25 10:54:15	charon: 07[IKE] <con2|2301>retransmit 1 of request with message ID 0
              Apr 25 10:54:15	charon: 07[IKE] <con2|2301>retransmit 1 of request with message ID 0
              Apr 25 10:54:15	charon: 07[NET] <con2|2301>sending packet: from 192.168.130.1[500] to REMOTE2[500] (324 bytes)
              Apr 25 10:54:17	charon: 07[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:17	charon: 07[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:17	charon: 07[ENC] <con1000|2009>generating INFORMATIONAL_V1 request 2973678887 [ HASH N(DPD) ]
              Apr 25 10:54:17	charon: 07[NET] <con1000|2009>sending packet: from 192.168.150.1[4500] to REMOTE1[4500] (84 bytes)
              Apr 25 10:54:17	charon: 07[NET] <con1000|2009>received packet: from REMOTE1[4500] to 192.168.150.1[4500] (84 bytes)
              Apr 25 10:54:17	charon: 07[ENC] <con1000|2009>parsed INFORMATIONAL_V1 request 939179093 [ HASH N(DPD_ACK) ]
              Apr 25 10:54:22	charon: 12[IKE] <con2|2301>retransmit 2 of request with message ID 0
              Apr 25 10:54:22	charon: 12[IKE] <con2|2301>retransmit 2 of request with message ID 0
              Apr 25 10:54:22	charon: 12[NET] <con2|2301>sending packet: from 192.168.130.1[500] to REMOTE2[500] (324 bytes)
              Apr 25 10:54:27	charon: 12[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:27	charon: 12[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:27	charon: 12[ENC] <con1000|2009>generating INFORMATIONAL_V1 request 2180186270 [ HASH N(DPD) ]
              Apr 25 10:54:27	charon: 12[NET] <con1000|2009>sending packet: from 192.168.150.1[4500] to REMOTE1[4500] (84 bytes)
              Apr 25 10:54:27	charon: 12[NET] <con1000|2009>received packet: from REMOTE1[4500] to 192.168.150.1[4500] (84 bytes)
              Apr 25 10:54:27	charon: 12[ENC] <con1000|2009>parsed INFORMATIONAL_V1 request 3393194558 [ HASH N(DPD_ACK) ]
              Apr 25 10:54:35	charon: 12[IKE] <con2|2301>retransmit 3 of request with message ID 0
              Apr 25 10:54:35	charon: 12[IKE] <con2|2301>retransmit 3 of request with message ID 0
              Apr 25 10:54:35	charon: 12[NET] <con2|2301>sending packet: from 192.168.130.1[500] to REMOTE2[500] (324 bytes)
              Apr 25 10:54:36	charon: 12[NET] <2302> received packet: from REMOTE1[500] to 192.168.150.1[500] (172 bytes)
              Apr 25 10:54:36	charon: 12[ENC] <2302> parsed ID_PROT request 0 [ SA V V V V V ]
              Apr 25 10:54:36	charon: 12[ENC] <2302> received unknown vendor ID: 5b:36:2b:c8:20:f6:00:08
              Apr 25 10:54:36	charon: 12[IKE] <2302> received NAT-T (RFC 3947) vendor ID
              Apr 25 10:54:36	charon: 12[IKE] <2302> received NAT-T (RFC 3947) vendor ID
              Apr 25 10:54:36	charon: 12[IKE] <2302> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
              Apr 25 10:54:36	charon: 12[IKE] <2302> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
              Apr 25 10:54:36	charon: 12[IKE] <2302> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
              Apr 25 10:54:36	charon: 12[IKE] <2302> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
              Apr 25 10:54:36	charon: 12[IKE] <2302> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
              Apr 25 10:54:36	charon: 12[IKE] <2302> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
              Apr 25 10:54:36	charon: 12[IKE] <2302> REMOTE1 is initiating a Main Mode IKE_SA
              Apr 25 10:54:36	charon: 12[IKE] <2302> REMOTE1 is initiating a Main Mode IKE_SA
              Apr 25 10:54:36	charon: 12[ENC] <2302> generating ID_PROT response 0 [ SA V V V V ]
              Apr 25 10:54:36	charon: 12[NET] <2302> sending packet: from 192.168.150.1[500] to REMOTE1[500] (152 bytes)
              Apr 25 10:54:36	charon: 06[NET] <2302> received packet: from REMOTE1[500] to 192.168.150.1[500] (280 bytes)
              Apr 25 10:54:36	charon: 06[ENC] <2302> parsed ID_PROT request 0 [ KE NAT-D NAT-D No V V V V ]
              Apr 25 10:54:36	charon: 06[ENC] <2302> received unknown vendor ID: 40:4b:f4:39:52:2c:a3:f6
              Apr 25 10:54:36	charon: 06[IKE] <2302> received XAuth vendor ID
              Apr 25 10:54:36	charon: 06[IKE] <2302> received XAuth vendor ID
              Apr 25 10:54:36	charon: 06[ENC] <2302> received unknown vendor ID: da:8e:93:78:80:01:00:00
              Apr 25 10:54:36	charon: 06[IKE] <2302> received DPD vendor ID
              Apr 25 10:54:36	charon: 06[IKE] <2302> received DPD vendor ID
              Apr 25 10:54:36	charon: 06[IKE] <2302> local host is behind NAT, sending keep alives
              Apr 25 10:54:36	charon: 06[IKE] <2302> local host is behind NAT, sending keep alives
              Apr 25 10:54:36	charon: 06[ENC] <2302> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
              Apr 25 10:54:36	charon: 06[NET] <2302> sending packet: from 192.168.150.1[500] to REMOTE1[500] (236 bytes)
              Apr 25 10:54:37	charon: 06[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:37	charon: 06[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:37	charon: 06[ENC] <con1000|2009>generating INFORMATIONAL_V1 request 96035541 [ HASH N(DPD) ]
              Apr 25 10:54:37	charon: 06[NET] <con1000|2009>sending packet: from 192.168.150.1[4500] to REMOTE1[4500] (84 bytes)
              Apr 25 10:54:37	charon: 06[NET] <con1000|2009>received packet: from REMOTE1[4500] to 192.168.150.1[4500] (84 bytes)
              Apr 25 10:54:37	charon: 06[ENC] <con1000|2009>parsed INFORMATIONAL_V1 request 2018776121 [ HASH N(DPD_ACK) ]
              Apr 25 10:54:47	charon: 06[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:47	charon: 06[IKE] <con1000|2009>sending DPD request
              Apr 25 10:54:47	charon: 06[ENC] <con1000|2009>generating INFORMATIONAL_V1 request 1557657604 [ HASH N(DPD) ]
              Apr 25 10:54:47	charon: 06[NET] <con1000|2009>sending packet: from 192.168.150.1[4500] to REMOTE1[4500] (84 bytes)
              Apr 25 10:54:47	charon: 06[NET] <con1000|2009>received packet: from REMOTE1[4500] to 192.168.150.1[4500] (84 bytes)
              Apr 25 10:54:47	charon: 06[ENC] <con1000|2009>parsed INFORMATIONAL_V1 request 3596244849 [ HASH N(DPD_ACK) ]</con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con2|2301></con2|2301></con2|2301></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con2|2301></con2|2301></con2|2301></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con2|2301></con2|2301></con2|2301></con2|2301></con2|2301></con2|2301></con2|2301></con2|2294></con2|2294></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con2|2294></con2|2294></con2|2294></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009></con1000|2009> 
              
              1 Reply Last reply Reply Quote 0
              • belleraB
                bellera
                last edited by

                ¿Cómo tienes estas opciones?

                If a tunnel comes up initially, but then fails after a Phase 1 or Phase 2 expiration, try changing the following settings on both ends of the tunnel:

                System > Advanced, Miscellaneous tab: uncheck Prefer Old IPsec SA (VPN > IPsec, Advanced Settings tab on pfSense 2.2+)
                    On the IPsec Phase 1 settings, disable NAT Traversal (NAT-T)
                    On the IPsec Phase 1 settings, enable DPD
                    On the IPsec Phase 2 settings, enter an Automaitcally Ping Host in the remote Phase 2 subnet.

                https://doc.pfsense.org/index.php/IPsec_Troubleshooting#Renegotiation_Errors

                Una vez intenté activar un tunel OpenVPN site to site y me tiró las conexiones IPsec

                Bueno, si hiciste la prueba con las mismas subredes es posible que se liara el tema. Ambas VPN pueden coexistir.

                Si te da igual emplear IPSEC u OpenVPN, te sugiero emplees la última. Normalmente se usa IPSEC porque es más conocida pero OpenVPN es más versátil.

                http://es.wikipedia.org/wiki/OpenVPN#Comparaci.C3.B3n_entre_OpenVPN_e_IPsec_VPN

                1 Reply Last reply Reply Quote 0
                • gersonofstoneG
                  gersonofstone
                  last edited by

                  hola

                  Para empezar si actualizaste de 2.1.x a 2.2.x es un problema grande, el demomio que gestiona las comunicaciones sobre ipsec en la version 2.1.x se llama raccon con la actualizcion se cambio por strongswan, al parecer tiene tiene algunas funcionalidades nuevas.. pero eso es otro cuento

                  Me paso lo mismo con ciertos tuneles, que tiene una ip Virtual no se si sea tu caso y con el ajuste de las reglas NAT de salida con el puerto 500

                  Papu!! :V

                  1 Reply Last reply Reply Quote 0
                  • O
                    odric
                    last edited by

                    De momento parece que funciona bien.

                    El túnel que me estaba dando problemas parece que tenía algo del otro extremo mal. Reiniciamos los dos lados y ok.
                    Desde que actualicé de la versión 2.2 a la 2.2.2 ha mejorado la estabilidad y los túneles funcionan. Llevo más de una semana si que se caigan.

                    Muchas gracias por los aportes.

                    1 Reply Last reply Reply Quote 0
                    • belleraB
                      bellera
                      last edited by

                      Gracias también a ti por informar de la resolución.

                      1 Reply Last reply Reply Quote 0
                      • O
                        odric
                        last edited by

                        Vuelve a caerse el tunel  :-\ ya no se que hacer. a ver si alguien majo sabe que pasa. 8)

                        Gracias

                        Tengo 2 tuneles configurados

                        Tunel con el que tengo problema, ahora está desconectado túnel 194.xx.xx.xa pero aparece como activo.
                        Tengo cortado el acceso a la ip 195.xx.xx.xx Pero aparecen intentos de conexión.
                        Por otro lado tengo otro pfsense al que no le hago los nateos en el router y conecta con el remoto. De hecho cuando falla la conexión desde este firewall tengo que conectar con el otro (si funciona, que no siempre, dejo la conexión así y genero reglas de enrutado. A veces conecta pero sin trafico y deshabilito y vuelvo a conectar desde el primero y entonces vuelve a funcionar durante un tiempo.
                        Pfsense 2.2.2

                        
                        May 21 19:43:36	charon: 06[IKE] <59759> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:43:36	charon: 06[IKE] <59759> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:43:36	charon: 06[ENC] <59759> generating ID_PROT response 0 [ SA V V V V ]
                        May 21 19:43:36	charon: 06[NET] <59759> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes)
                        May 21 19:43:41	charon: 06[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:43:41	charon: 06[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:44:02	charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:44:02	charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:44:06	charon: 16[JOB] <59759> deleting half open IKE_SA after timeout
                        May 21 19:44:16	charon: 16[NET] <59760> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes)
                        May 21 19:44:16	charon: 16[ENC] <59760> parsed ID_PROT request 0 [ SA V V V V V V V ]
                        May 21 19:44:16	charon: 16[ENC] <59760> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51
                        May 21 19:44:16	charon: 16[IKE] <59760> received DPD vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received DPD vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received NAT-T (RFC 3947) vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received NAT-T (RFC 3947) vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:44:16	charon: 16[IKE] <59760> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:44:16	charon: 16[IKE] <59760> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:44:16	charon: 16[ENC] <59760> generating ID_PROT response 0 [ SA V V V V ]
                        May 21 19:44:16	charon: 16[NET] <59760> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes)
                        May 21 19:44:22	charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:44:22	charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:44:42	charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:44:42	charon: 16[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:44:46	charon: 16[JOB] <59760> deleting half open IKE_SA after timeout
                        May 21 19:44:56	charon: 16[NET] <59761> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes)
                        May 21 19:44:56	charon: 16[ENC] <59761> parsed ID_PROT request 0 [ SA V V V V V V V ]
                        May 21 19:44:56	charon: 16[ENC] <59761> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51
                        May 21 19:44:56	charon: 16[IKE] <59761> received DPD vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received DPD vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received NAT-T (RFC 3947) vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received NAT-T (RFC 3947) vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:44:56	charon: 16[IKE] <59761> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:44:56	charon: 16[IKE] <59761> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:44:56	charon: 16[ENC] <59761> generating ID_PROT response 0 [ SA V V V V ]
                        May 21 19:44:56	charon: 16[NET] <59761> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes)
                        May 21 19:44:59	charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2)
                        May 21 19:44:59	charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2)
                        May 21 19:45:00	charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2)
                        May 21 19:45:00	charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2)
                        May 21 19:45:02	charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:45:02	charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:45:22	charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:45:22	charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:45:26	charon: 11[JOB] <59761> deleting half open IKE_SA after timeout
                        May 21 19:45:36	charon: 11[NET] <59762> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes)
                        May 21 19:45:36	charon: 11[ENC] <59762> parsed ID_PROT request 0 [ SA V V V V V V V ]
                        May 21 19:45:36	charon: 11[ENC] <59762> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51
                        May 21 19:45:36	charon: 11[IKE] <59762> received DPD vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received DPD vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received NAT-T (RFC 3947) vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received NAT-T (RFC 3947) vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:45:36	charon: 11[IKE] <59762> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:45:36	charon: 11[IKE] <59762> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:45:36	charon: 11[ENC] <59762> generating ID_PROT response 0 [ SA V V V V ]
                        May 21 19:45:36	charon: 11[NET] <59762> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes)
                        May 21 19:45:42	charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:45:42	charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:45:47	charon: 11[NET] <59762> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes)
                        May 21 19:45:47	charon: 11[IKE] <59762> received retransmit of request with ID 0, retransmitting response
                        May 21 19:45:47	charon: 11[IKE] <59762> received retransmit of request with ID 0, retransmitting response
                        May 21 19:45:47	charon: 11[NET] <59762> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes)
                        May 21 19:46:02	charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:46:02	charon: 11[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:46:02	charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2)
                        May 21 19:46:02	charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2)
                        May 21 19:46:03	charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2)
                        May 21 19:46:03	charon: 11[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2)
                        May 21 19:46:05	charon: 07[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2)
                        May 21 19:46:05	charon: 07[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2)
                        May 21 19:46:06	charon: 07[NET] <59762> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes)
                        May 21 19:46:06	charon: 07[IKE] <59762> received retransmit of request with ID 0, retransmitting response
                        May 21 19:46:06	charon: 07[IKE] <59762> received retransmit of request with ID 0, retransmitting response
                        May 21 19:46:06	charon: 07[NET] <59762> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes)
                        May 21 19:46:06	charon: 07[JOB] <59762> deleting half open IKE_SA after timeout
                        May 21 19:46:22	charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:46:22	charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:46:42	charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:46:42	charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:46:46	charon: 07[NET] <59763> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes)
                        May 21 19:46:46	charon: 07[ENC] <59763> parsed ID_PROT request 0 [ SA V V V V V V V ]
                        May 21 19:46:46	charon: 07[ENC] <59763> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51
                        May 21 19:46:46	charon: 07[IKE] <59763> received DPD vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received DPD vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received NAT-T (RFC 3947) vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received NAT-T (RFC 3947) vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:46:46	charon: 07[IKE] <59763> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:46:46	charon: 07[IKE] <59763> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:46:46	charon: 07[ENC] <59763> generating ID_PROT response 0 [ SA V V V V ]
                        May 21 19:46:46	charon: 07[NET] <59763> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes)
                        May 21 19:47:02	charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:47:02	charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:47:16	charon: 07[JOB] <59763> deleting half open IKE_SA after timeout
                        May 21 19:47:22	charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:47:22	charon: 07[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:47:24	charon: 07[KNL] <con1000|59586>unable to query SAD entry with SPI ca1cb129: No such file or directory (2)
                        May 21 19:47:24	charon: 07[KNL] <con1000|59586>unable to query SAD entry with SPI 8ef432ca: No such file or directory (2)
                        May 21 19:47:26	charon: 12[NET] <59764> received packet: from 195.xx.xx.xx[500] to 192.168.150.1[500] (216 bytes)
                        May 21 19:47:26	charon: 12[ENC] <59764> parsed ID_PROT request 0 [ SA V V V V V V V ]
                        May 21 19:47:26	charon: 12[ENC] <59764> received unknown vendor ID: 4f:45:51:7b:4f:7f:6e:65:7a:7b:43:51
                        May 21 19:47:26	charon: 12[IKE] <59764> received DPD vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received DPD vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received NAT-T (RFC 3947) vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received NAT-T (RFC 3947) vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-03 vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-02 vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> received draft-ietf-ipsec-nat-t-ike-00 vendor ID
                        May 21 19:47:26	charon: 12[IKE] <59764> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:47:26	charon: 12[IKE] <59764> 195.xx.xx.xx is initiating a Main Mode IKE_SA
                        May 21 19:47:26	charon: 12[ENC] <59764> generating ID_PROT response 0 [ SA V V V V ]
                        May 21 19:47:26	charon: 12[NET] <59764> sending packet: from 192.168.150.1[500] to 195.xx.xx.xx[500] (152 bytes)
                        May 21 19:47:42	charon: 12[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]
                        May 21 19:47:42	charon: 12[IKE] <con1000|59586>sending keep alive to 194.xx.xx.xa[4500]</con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586></con1000|59586> 
                        

                        conexiones.png
                        conexiones.png_thumb
                        conexiones1.png
                        conexiones1.png_thumb
                        conexiones2Phase1.png
                        conexiones2Phase1.png_thumb
                        conexiones3Phase2.png
                        conexiones3Phase2.png_thumb

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.