Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPsec VTI with Palo Alto

    Scheduled Pinned Locked Moved IPsec
    18 Posts 7 Posters 4.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      msnetworks
      last edited by

      Hello,

      the fix is working perfect with psk mode.

      Is it possible to use the fix with certificate-based ipsec?

      Regards,
      Martin

      jimpJ 1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Try it and see?

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate @msnetworks
          last edited by

          @msnetworks said in IPsec VTI with Palo Alto:

          the fix is working perfect with psk mode.

          Is it possible to use the fix with certificate-based ipsec?

          These changes only affect IPsec Phase 2 (IPsec SA), so your Phase 1/IKE/ISAKMP settings won't matter for this. So long as they match the other end properly it should work.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • M
            msnetworks
            last edited by

            Hi,

            I've tested it with certificate based authentication and ikev2. Everything works fine.

            Thank you.

            1 Reply Last reply Reply Quote 0
            • D
              dragon2611
              last edited by dragon2611

              I think this is possibly also an issue with fortigates, interestingly in that scenario the tunnel comes up and works for a while then dies.

              I notice an error in the phase2 where the pfsense end is sending the IP of the tunnel (172.xxx.xxx.xxx) instead of 0.0.0.0

              Trying the patch although I'm not sure if that actually helped as I'm seeing a lot of

              07[KNL] <con1000|1> querying policy 0.0.0.0/0|/0 === 0.0.0.0/0|/0 in failed, not found 
              

              I'm using a CARP/VIP for the VPN so that might complicate things further.
              Edit: Removed the strict interface binding I'd set earlier when troubleshooting It's up at the moment but we will see if it dies again.

              Edit2: Seems I had a misconfigured DH group in the phase2 on the fortigate side, not actually sure how that even worked on first connect with that problem present.

              Y 1 Reply Last reply Reply Quote 0
              • Y
                Yathus @dragon2611
                last edited by

                @dragon2611 said in IPsec VTI with Palo Alto:

                I think this is possibly also an issue with fortigates, interestingly in that scenario the tunnel comes up and works for a while then dies.

                i have the same problem.

                i create a VTI between two Pfsense 2.4.4-p1 and Pfsense 2.4.4-p2.
                I add static route and policies in LAN site for remote subnet.
                Tunnel goes up, i can ping from both side then after some time (may be one or two minutes) it's down but it' come back after some time...

                I check P1 and P2 for encryption, all is right.

                Y 1 Reply Last reply Reply Quote 0
                • Y
                  Yathus @Yathus
                  last edited by

                  @yathus said in IPsec VTI with Palo Alto:

                  @dragon2611 said in IPsec VTI with Palo Alto:

                  I think this is possibly also an issue with fortigates, interestingly in that scenario the tunnel comes up and works for a while then dies.

                  i have the same problem.

                  it's solved. I had a static route using same subnet on remote side.
                  I used a different subnet for VTI and IPSec is stable now.

                  I put MSS on VTI Interface too, don't know if it's required or not.

                  1 Reply Last reply Reply Quote 0
                  • M
                    mountainlion
                    last edited by

                    @Yathus what was your mss setting?

                    Y 1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      I wouldn't put any settings in unless you know they are needed. Lowering MSS might reduce throughput (increase packets-per-second for the same payload) for no reason.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • Y
                        Yathus @mountainlion
                        last edited by

                        @mountainlion

                        I'm using 1200 as MSS because it's required by my datacenter (DoS Protection)

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.