Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect

    Scheduled Pinned Locked Moved IPsec
    20 Posts 9 Posters 3.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate @MarcO42
      last edited by

      @marco42 said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

      Hi,
      I also need to install this one:

      • https://github.com/pfsense/pfsense/commit/4e5857b656c7bfd59efadbb9a124876a5516c7df.patch

      That is the same as ead6515637a34ce6e170e2d2b0802e4fa1e63a00 which is in the list above already, but the commit you linked is to master and ead6515637a34ce6e170e2d2b0802e4fa1e63a00 is to RELENG_2_5_0 -- they both apply cleanly but it's better to use the one from the appropriate branch.

      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • M
        Morlock
        last edited by

        Hi,

        Just wanted to give some feedback that after the upgrade of one side of a VTI-connection between two pfSenses, IPsec failed with "trap not found, unable to acquire reqid".

        Reconfiguration did not help, applying all the patches above did. I will revert to a VM snapshot anyway and wait for a maintenance release.

        jimpJ 1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate @Morlock
          last edited by

          @morlock said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

          "trap not found, unable to acquire reqid"

          That isn't a fatal error, it's normal with VTI.

          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          M 1 Reply Last reply Reply Quote 0
          • M
            Morlock @jimp
            last edited by

            @jimp Ok, then it didn't connect for some other reason that is not logged with my settings. I hadn't really time to look into it more detailed. I had applied the first six patches first, but only 731957f945af90d6a75f0e33f91a440a6a55736 eventually made a difference.

            1 Reply Last reply Reply Quote 0
            • D
              dyener @jimp
              last edited by

              @jimp Thank you for compiling this convenient list of patches! Can I apply them to pfSense Plus 21.02 devices, or are they only for pfSense CE 2.5? I'm trying to make a basic IPsec tunnel between an SG-1100 and a homebuilt box, and cannot get it to work with those respective software versions. Forgive the question, as I have never tried using patches before. Also, do I need to revert the patches when the next upgrade becomes available, or is it safe to apply the upgrade on top of them? Thank you again!

              C 1 Reply Last reply Reply Quote 0
              • C
                ComputerFreek @dyener
                last edited by

                Just a question, why is this not in an official fix or release yet? I have 3 firewalls spread out between my parents, my friends house and my own running the community edition. I don't understand why this hasn't been fixed yet. My ipsec tunnels are down even after a fresh install. I'm just confused why it is taking so long for this to become a "fix".

                1 Reply Last reply Reply Quote 1
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  Making a new release takes time, effort, and testing. There are still numerous things we're actively investigating.

                  Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • B
                    beejee
                    last edited by

                    After upgraded to version 21.02-RELEASE-p1, my Netgate XG-7100 kept getting disconnected to a remote Cisco RV042 (even though it showed as connected). The IPsec tunnel had been working smoothly for a year without any hiccup now decided to act up. There is no pattern when it would stop the connection, most of the time just within couple minutes. I applied the 7 patches as advised about but still no luck. My tunnel is using IKEv1, AES_CBC (128), HMAC_SHA1_96, PRF_HMAC_SHA1, MODP_768. I am under the pressure to get it back on track. Please help! Thank you.

                    1 Reply Last reply Reply Quote 0
                    • B
                      beejee
                      last edited by

                      I finally got my IPsec tunnel to work without interruption on my Netgate XG-7100 by turning of the Hardware Crypto. I believe it is a work around solution since the Hardware Crypto has to be off.

                      jimpJ 1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate @beejee
                        last edited by

                        @beejee said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

                        I finally got my IPsec tunnel to work without interruption on my Netgate XG-7100 by turning of the Hardware Crypto. I believe it is a work around solution since the Hardware Crypto has to be off.

                        Which hardware crypto option did you have enabled on there? If it was AES-NI, that sounds similar to an issue we're already tracking. If it's not, it could be a different problem. On the XG-7100 you can switch from AES-NI to QAT which should be equal to or faster in performance and potentially more stable as the issues we're aware of only affect AES-NI at the moment.

                        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        B 1 Reply Last reply Reply Quote 2
                        • B
                          beejee
                          last edited by

                          @jimp said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

                          Which hardware crypto option did you have enabled on there?

                          You were right. It was "AES-NI and BSD Cryto Device (aesni,cryptodev)" option. I believe it would be the best option for my appliance overall.

                          I will try the "QAT" as your suggested sometime tonight. Thank you!

                          1 Reply Last reply Reply Quote 0
                          • B
                            beejee
                            last edited by

                            @jimp said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

                            On the XG-7100 you can switch from AES-NI to QAT which should be equal to or faster in performance and potentially more stable

                            Yes my XG-7100 IPsec tunnel is working smoothly with "Intel QuickAssist (QAT)" on. My CPU Type is "Intel(R) Atom(TM) CPU C3558 @ 2.20GHz". I actually don't know where to check if my IPsec tunnel is really using the QAT since I didn't see it is listed anywhere in the Dashboard. The Dashboard mentioned that "AES-NI CPU Crypto: Yes (inactive)" instead.

                            1 Reply Last reply Reply Quote 0
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate
                              last edited by

                              The next update will show QAT on the dashboard properly, but for now you can check:

                              1. That the module is loaded:
                                : kldstat | grep qat
                                 5    1 0xffffffff84322000    146e0 qat.ko
                                 6    1 0xffffffff84337000    9f521 qat_c3xxxfw.ko
                                
                              2. That the device is consuming interrupts (will increase as traffic is encrypted/decrypted through IPsec):
                                : vmstat -i | egrep 'total|qat'
                                interrupt                          total       rate
                                irq300: qat0                      489041          0
                                

                              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              D 1 Reply Last reply Reply Quote 1
                              • B
                                beejee
                                last edited by

                                @jimp Awesome! I think my IPsec is really utilizing the QAT. Thank you so much!
                                I downloaded a large file through the tunnel and checked the stat:

                                :kldstat | grep qat
                                 3    1 0xffffffff83f22000    146e0 qat.ko
                                 4    1 0xffffffff83f37000    9f521 qat_c3xxxfw.ko
                                
                                :vmstat -i | egrep 'total|qat'
                                interrupt                          total       rate
                                irq293: qat0                       43576          1
                                irq294: qat0                       27168          1
                                irq295: qat0                        7909          0
                                irq296: qat0                       18777          0
                                
                                :vmstat -i | egrep 'total|qat'
                                interrupt                          total       rate
                                irq293: qat0                      396393          9
                                irq294: qat0                       39664          1
                                irq295: qat0                       19005          0
                                irq296: qat0                       47598          1
                                
                                
                                1 Reply Last reply Reply Quote 1
                                • B
                                  brians @jimp
                                  last edited by brians

                                  @jimp Thanks I had problem with tunnel to a Cisco router where I could ping but then sending any traffic through would kill the tunnel. Switching my 5100 to QAT seems to have fixed this issue.

                                  I have another tunnel between the SG-5100 and an older SG-2220.. enabling QAT on the 2200 is slower than using AES-NI - iperf3 test are 220Mbps with AES-NI and only around 100Mbps on QAT when I enable it on the SG-2220.

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    danjeman @jimp
                                    last edited by danjeman

                                    @jimp Guessing the Dashboard display for QAT or other crypto modules didn't make it to 21.02.2 - at least my XG-7100's still show 'AES-NI CPU Crypto: Yes (inactive) - no mention of QAT anywhere that I can find on a Dashboard widget etc.

                                    jimpJ 1 Reply Last reply Reply Quote 0
                                    • jimpJ
                                      jimp Rebel Alliance Developer Netgate @danjeman
                                      last edited by

                                      @danjeman said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

                                      @jimp Guessing the Dashboard display for QAT or other crypto modules didn't make it to 21.02.2 - at least my XG-7100's still show 'AES-NI CPU Crypto: Yes (inactive) - no mention of QAT anywhere that I can find on a Dashboard widget etc.

                                      It's there on 21.05 snapshots, didn't make it into 21.02.2.

                                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                                      Need help fast? Netgate Global Support!

                                      Do not Chat/PM for help!

                                      1 Reply Last reply Reply Quote 1
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.