Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect

    Scheduled Pinned Locked Moved IPsec
    20 Posts 9 Posters 3.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dyener @jimp
      last edited by

      @jimp Thank you for compiling this convenient list of patches! Can I apply them to pfSense Plus 21.02 devices, or are they only for pfSense CE 2.5? I'm trying to make a basic IPsec tunnel between an SG-1100 and a homebuilt box, and cannot get it to work with those respective software versions. Forgive the question, as I have never tried using patches before. Also, do I need to revert the patches when the next upgrade becomes available, or is it safe to apply the upgrade on top of them? Thank you again!

      C 1 Reply Last reply Reply Quote 0
      • C
        ComputerFreek @dyener
        last edited by

        Just a question, why is this not in an official fix or release yet? I have 3 firewalls spread out between my parents, my friends house and my own running the community edition. I don't understand why this hasn't been fixed yet. My ipsec tunnels are down even after a fresh install. I'm just confused why it is taking so long for this to become a "fix".

        1 Reply Last reply Reply Quote 1
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          Making a new release takes time, effort, and testing. There are still numerous things we're actively investigating.

          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • B
            beejee
            last edited by

            After upgraded to version 21.02-RELEASE-p1, my Netgate XG-7100 kept getting disconnected to a remote Cisco RV042 (even though it showed as connected). The IPsec tunnel had been working smoothly for a year without any hiccup now decided to act up. There is no pattern when it would stop the connection, most of the time just within couple minutes. I applied the 7 patches as advised about but still no luck. My tunnel is using IKEv1, AES_CBC (128), HMAC_SHA1_96, PRF_HMAC_SHA1, MODP_768. I am under the pressure to get it back on track. Please help! Thank you.

            1 Reply Last reply Reply Quote 0
            • B
              beejee
              last edited by

              I finally got my IPsec tunnel to work without interruption on my Netgate XG-7100 by turning of the Hardware Crypto. I believe it is a work around solution since the Hardware Crypto has to be off.

              jimpJ 1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate @beejee
                last edited by

                @beejee said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

                I finally got my IPsec tunnel to work without interruption on my Netgate XG-7100 by turning of the Hardware Crypto. I believe it is a work around solution since the Hardware Crypto has to be off.

                Which hardware crypto option did you have enabled on there? If it was AES-NI, that sounds similar to an issue we're already tracking. If it's not, it could be a different problem. On the XG-7100 you can switch from AES-NI to QAT which should be equal to or faster in performance and potentially more stable as the issues we're aware of only affect AES-NI at the moment.

                Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                B 1 Reply Last reply Reply Quote 2
                • B
                  beejee
                  last edited by

                  @jimp said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

                  Which hardware crypto option did you have enabled on there?

                  You were right. It was "AES-NI and BSD Cryto Device (aesni,cryptodev)" option. I believe it would be the best option for my appliance overall.

                  I will try the "QAT" as your suggested sometime tonight. Thank you!

                  1 Reply Last reply Reply Quote 0
                  • B
                    beejee
                    last edited by

                    @jimp said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

                    On the XG-7100 you can switch from AES-NI to QAT which should be equal to or faster in performance and potentially more stable

                    Yes my XG-7100 IPsec tunnel is working smoothly with "Intel QuickAssist (QAT)" on. My CPU Type is "Intel(R) Atom(TM) CPU C3558 @ 2.20GHz". I actually don't know where to check if my IPsec tunnel is really using the QAT since I didn't see it is listed anywhere in the Dashboard. The Dashboard mentioned that "AES-NI CPU Crypto: Yes (inactive)" instead.

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      The next update will show QAT on the dashboard properly, but for now you can check:

                      1. That the module is loaded:
                        : kldstat | grep qat
                         5    1 0xffffffff84322000    146e0 qat.ko
                         6    1 0xffffffff84337000    9f521 qat_c3xxxfw.ko
                        
                      2. That the device is consuming interrupts (will increase as traffic is encrypted/decrypted through IPsec):
                        : vmstat -i | egrep 'total|qat'
                        interrupt                          total       rate
                        irq300: qat0                      489041          0
                        

                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      D 1 Reply Last reply Reply Quote 1
                      • B
                        beejee
                        last edited by

                        @jimp Awesome! I think my IPsec is really utilizing the QAT. Thank you so much!
                        I downloaded a large file through the tunnel and checked the stat:

                        :kldstat | grep qat
                         3    1 0xffffffff83f22000    146e0 qat.ko
                         4    1 0xffffffff83f37000    9f521 qat_c3xxxfw.ko
                        
                        :vmstat -i | egrep 'total|qat'
                        interrupt                          total       rate
                        irq293: qat0                       43576          1
                        irq294: qat0                       27168          1
                        irq295: qat0                        7909          0
                        irq296: qat0                       18777          0
                        
                        :vmstat -i | egrep 'total|qat'
                        interrupt                          total       rate
                        irq293: qat0                      396393          9
                        irq294: qat0                       39664          1
                        irq295: qat0                       19005          0
                        irq296: qat0                       47598          1
                        
                        
                        1 Reply Last reply Reply Quote 1
                        • B
                          brians @jimp
                          last edited by brians

                          @jimp Thanks I had problem with tunnel to a Cisco router where I could ping but then sending any traffic through would kill the tunnel. Switching my 5100 to QAT seems to have fixed this issue.

                          I have another tunnel between the SG-5100 and an older SG-2220.. enabling QAT on the 2200 is slower than using AES-NI - iperf3 test are 220Mbps with AES-NI and only around 100Mbps on QAT when I enable it on the SG-2220.

                          1 Reply Last reply Reply Quote 0
                          • D
                            danjeman @jimp
                            last edited by danjeman

                            @jimp Guessing the Dashboard display for QAT or other crypto modules didn't make it to 21.02.2 - at least my XG-7100's still show 'AES-NI CPU Crypto: Yes (inactive) - no mention of QAT anywhere that I can find on a Dashboard widget etc.

                            jimpJ 1 Reply Last reply Reply Quote 0
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate @danjeman
                              last edited by

                              @danjeman said in pfSense 2.5 to pfSense 2.5 IPsec tunnel fails to connect:

                              @jimp Guessing the Dashboard display for QAT or other crypto modules didn't make it to 21.02.2 - at least my XG-7100's still show 'AES-NI CPU Crypto: Yes (inactive) - no mention of QAT anywhere that I can find on a Dashboard widget etc.

                              It's there on 21.05 snapshots, didn't make it into 21.02.2.

                              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              1 Reply Last reply Reply Quote 1
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.