Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [Solved] IPSec 2.2.2 -> 2.2.3 Connected but no traffic

    Scheduled Pinned Locked Moved IPsec
    16 Posts 11 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Y
      yousif
      last edited by

      Not to pile on, but I can also confirm this.  IPsec doesn't work at all in 2.2.3

      1 Reply Last reply Reply Quote 0
      • D
        dharrigan
        last edited by

        Hi,

        Bug created for further investigation.

        https://redmine.pfsense.org/issues/4791

        -=david=-

        1 Reply Last reply Reply Quote 0
        • D
          Darkk
          last edited by

          Yep.  Seems the temporary fix is disable the AES-NI in PfSense and reboot.  I will try this tonight when I get home.  Devs identified the patch and will roll it back to the previous version in the 2.2.4 snapshot.

          1 Reply Last reply Reply Quote 0
          • D
            Darkk
            last edited by

            I am happy to report by disabling AES-NI in PfSense and a reboot fixes the IPSec issue.    Great work finding a quick fix.  The next update will have this issue resolved.  For now we're happy campers.

            1 Reply Last reply Reply Quote 0
            • V
              vbentley
              last edited by

              @Darkk:

              I am happy to report by disabling AES-NI in PfSense and a reboot fixes the IPSec issue.

              That's great news.

              Are you using Pre Shared Keys or RSA Certificates for authentication?

              Trademark Attribution and Credit
              pfSense® and pfSense Certified® are registered trademarks of Electric Sheep Fencing, LLC in the United States and other countries.

              1 Reply Last reply Reply Quote 0
              • D
                Darkk
                last edited by

                I am using pre-shared keys.

                1 Reply Last reply Reply Quote 0
                • C
                  ch1ll1man
                  last edited by

                  Worked for us too, on all 16 firewalls we have running.  Most of them are 4860's or C2758's from PFSENSE so 2.2.4 will be nice to have pushed ASAP, hard to explain stuff like this to customers.

                  1 Reply Last reply Reply Quote 0
                  • Z
                    zanon
                    last edited by

                    Hi all ,
                    same issue spotted here. rolled back to 2.2.2 and waiting for 2.2.4

                    One world of advice, or maybe more correct user request:
                    When you are fixing AES-NI library, could you also fix it so its works under hyper-visor .
                    last we discuss this on this forum, the dev statement was that you are using your own lib based on original BSD one.

                    regards Zanon.

                    1 Reply Last reply Reply Quote 0
                    • H
                      HaburGate
                      last edited by

                      Same issue here.

                      Disabling AES-NI and rebooting seemed to fix it. Thanks to whoever discovered the issue.

                      PGP Key: 0x82A211A2
                      Server:    pool.sks-keyservers.net

                      1 Reply Last reply Reply Quote 0
                      • Y
                        yousif
                        last edited by

                        I just disabled AES-NI and rebooted and it works for me as well.  We have dual redundant firewalls as they are production, so I will wait to update the second one entirely until 2.2.4 is ready.  I hope that is soon; disabling AES-NI seems to have a performance impact on our OpenVPN tunnel performance, as I suppose one should expect with AES-CBC. :P

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.