Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPsec VTI pfSense to UniFi

    Scheduled Pinned Locked Moved IPsec
    unifiipsecubiquiti
    4 Posts 2 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kriechmaden
      last edited by

      Hey there,

      we are trying to setup an IPsec VTI VPN from pfSense (2.4.4-RELEASE-p3) to a Ubiquiti UniFi Security Gateway Pro (USG 4P).
      We have a similar problem like in this thread https://forum.netgate.com/topic/137566/ipsec-vti-to-edgerouter

      The IPsec tunnel comes up but we can't ping the other site.
      When I try to ping the USG we receive the following message:
      "sendto: Network is down"
      From the USG the ping isnt working too.
      We can see the pings/ICMP packets on the tcpdump. They are arriving at enc0 but not passed to the ipsec1000 interface.

      TCPDUMP (Ping from UniFi USG to pfSense):

      [2.4.4-RELEASE][root@fw1]/root: tcpdump -i enc0
      tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
      listening on enc0, link-type ENC (OpenBSD encapsulated IP), capture size 262144 bytes
      18:59:16.991653 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.2
      43.242: ICMP echo request, id 18830, seq 1, length 64
      18:59:17.993508 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 2, length 64
      18:59:19.003181 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 3, length 64
      18:59:20.003406 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 4, length 64
      18:59:21.003296 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 5, length 64
      18:59:22.013359 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 6, length 64
      18:59:23.013081 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 7, length 64
      18:59:24.023411 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 8, length 64
      18:59:25.023160 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 9, length 64
      18:59:26.033296 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 10, length 64
      18:59:27.033205 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 11, length 64
      18:59:28.043571 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 12, length 64
      18:59:29.043329 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 13, length 64
      18:59:30.043253 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 14, length 64
      18:59:31.043221 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 15, length 64
      18:59:32.043248 (authentic,confidential): SPI 0xc78121e7: IP 10.255.243.243 > 10.255.243.242: ICMP echo request, id 18830, seq 16, length 64
      

      Output of ifconfig:

      [2.4.4-RELEASE][root@fw1]/root: ifconfig 
      vtnet0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
              options=c00b8<VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWTSO,LINKSTATE>
              ether 02:00:00:ef:85:e6
              hwaddr 02:00:00:ef:85:e6
              inet6 fe80::ff:feef:85e6%vtnet0 prefixlen 64 scopeid 0x1 
              inet6 XXXX:XXXX:XXXX:XXXX::3 prefixlen 64 
              inet6 XXXX:XXXX:XXXX:XXXX::2 prefixlen 64 vhid 3 
              inet XX.XX.XX.114 netmask 0xfffffff0 broadcast XX.XX.XX.127 
              inet XX.XX.XX.115 netmask 0xfffffff0 broadcast XX.XX.XX.127 vhid 5 
              nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
              media: Ethernet 10Gbase-T <full-duplex>
              status: active
              carp: MASTER vhid 3 advbase 1 advskew 0
              carp: MASTER vhid 5 advbase 1 advskew 0
      vtnet1: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
              options=d00b8<VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWFILTER,VLAN_HWTSO,LINKSTATE>
              ether 26:88:14:13:f6:c0
              hwaddr 26:88:14:13:f6:c0
              inet6 fe80::2488:14ff:fe13:f6c0%vtnet1 prefixlen 64 scopeid 0x2 
              inet6 fd60:fef5:50c0:e3fc::2 prefixlen 64 
              inet6 fd60:fef5:50c0:e3cf::1 prefixlen 64 vhid 4 
              inet 10.0.0.2 netmask 0xfffffc00 broadcast 10.0.3.255 
              inet 10.0.0.1 netmask 0xfffffc00 broadcast 10.0.3.255 vhid 1 
              nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
              media: Ethernet 10Gbase-T <full-duplex>
              status: active
              carp: MASTER vhid 1 advbase 1 advskew 0
              carp: MASTER vhid 4 advbase 1 advskew 0
      vtnet2: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
              options=c00b8<VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWTSO,LINKSTATE>
              ether 72:df:07:2c:37:6b
              hwaddr 72:df:07:2c:37:6b
              inet6 fe80::70df:7ff:fe2c:376b%vtnet2 prefixlen 64 scopeid 0x3 
              inet6 fdf5:3371:813a:5aac::2 prefixlen 64 
              inet6 fdf5:3371:813a:5aac::1 prefixlen 64 vhid 7 
              inet 10.0.8.2 netmask 0xfffffc00 broadcast 10.0.11.255 
              inet 10.0.8.1 netmask 0xfffffc00 broadcast 10.0.11.255 vhid 6 
              nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
              media: Ethernet 10Gbase-T <full-duplex>
              status: active
              carp: MASTER vhid 6 advbase 1 advskew 0
              carp: MASTER vhid 7 advbase 1 advskew 0
      enc0: flags=41<UP,RUNNING> metric 0 mtu 1536
              nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
              groups: enc 
      lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
              options=600003<RXCSUM,TXCSUM,RXCSUM_IPV6,TXCSUM_IPV6>
              inet6 ::1 prefixlen 128 
              inet6 fe80::1%lo0 prefixlen 64 scopeid 0x5 
              inet 127.0.0.1 netmask 0xff000000 
              nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
              groups: lo 
      pflog0: flags=100<PROMISC> metric 0 mtu 33160
              groups: pflog 
      pfsync0: flags=41<UP,RUNNING> metric 0 mtu 1500
              groups: pfsync 
              pfsync: syncdev: vtnet1 syncpeer: 10.0.0.3 maxupd: 128 defer: off
              syncok: 1
      ovpns1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
              options=80000<LINKSTATE>
              inet6 fe80::10d4:df6d:5e75:438d%ovpns1 prefixlen 64 scopeid 0x9 
              inet6 fd75:6d19:84ae:d2c9::1 prefixlen 64 
              inet 10.0.252.1 --> 10.0.252.2 netmask 0xffffffff 
              nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
              groups: tun openvpn 
              Opened by PID 57928
      ovpns2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
              options=80000<LINKSTATE>
      

      Ping from pfSense to UniFi USG:

      2.4.4-RELEASE][root@fw1]/root: ping 10.255.243.243
      PING 10.255.243.243 (10.255.243.243): 56 data bytes
      ping: sendto: Network is down
      ping: sendto: Network is down
      ping: sendto: Network is down
      ping: sendto: Network is down
      ^C
      --- 10.255.243.243 ping statistics ---
      4 packets transmitted, 0 packets received, 100.0% packet loss
      

      VTI interface configuration at UniFi USG

      device-admin@USG-PRO1# show interfaces vti vti64 
       address 10.255.243.243/28
       firewall {
           in {
               ipv6-name LANv6_IN
               name LAN_IN
           }
           local {
               ipv6-name LANv6_LOCAL
               name LAN_LOCAL
           }
           out {
               ipv6-name LANv6_OUT
               name LAN_OUT
           }
       }
      [edit]
      

      IPsec configuration at UniFi USG:

      device-admin@USG-PRO1# show vpn ipsec                                 
       auto-firewall-nat-exclude enable
       esp-group ESP_XX.XX.XX.114 {
           compression disable
           lifetime 3600
           mode tunnel
           pfs disable
           proposal 1 {
               encryption aes256
               hash sha1
           }
       }
       ike-group IKE_XX.XX.XX.114 {
           key-exchange ikev2
           lifetime 28800
           proposal 1 {
               dh-group 16
               encryption aes256
               hash sha1
           }
       }
       ipsec-interfaces {
           interface pppoe2
       }
       nat-networks {
           allowed-network 0.0.0.0/0 {
           }
       }
       nat-traversal enable
       site-to-site {
           peer XX.XX.XX.114 {
               authentication {
                   mode pre-shared-secret
                   pre-shared-secret "secret-key-here"
               }
               connection-type initiate
               ike-group IKE_XX.XX.XX.114
               local-address XX.XX.XX.253
               vti {
                   bind vti64
                   esp-group ESP_XX.XX.XX.114
               }
           }
       }
      [edit]
      

      pfSense IPsec setup:

      Bildschirmfoto 2020-01-14 um 19.39.48.png

      Bildschirmfoto 2020-01-14 um 19.38.52.png

      Bildschirmfoto 2020-01-14 um 19.38.21.png

      Bildschirmfoto 2020-01-14 um 19.34.30.png

      Bildschirmfoto 2020-01-14 um 19.34.17.png

      Bildschirmfoto 2020-01-14 um 19.34.03.png

      K 1 Reply Last reply Reply Quote 0
      • K
        kriechmaden
        last edited by

        Has anyone an Idea how to fix this Issue, that the pfSense receives the traffic at the correct interface and we can send traffic to the other site without receiving the "Network is down" error.

        1 Reply Last reply Reply Quote 0
        • K
          Konstanti @kriechmaden
          last edited by Konstanti

          @kriechmaden
          Hi
          ifconfig does not show that the vti tunnel is up (There is no vti tunnel in the list of interfaces, ipsec1000, for example)
          This is the output of ifconfig on my PFSense .

          enc0: flags=41<UP,RUNNING> metric 0 mtu 1536
             nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
             groups: enc 
          lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
             options=600003<RXCSUM,TXCSUM,RXCSUM_IPV6,TXCSUM_IPV6>
             inet6 ::1 prefixlen 128 
             inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4 
             inet 127.0.0.1 netmask 0xff000000 
             nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
             groups: lo 
          pflog0: flags=100<PROMISC> metric 0 mtu 33160
             groups: pflog 
          pfsync0: flags=0<> metric 0 mtu 1500
             groups: pfsync 
             syncpeer: 224.0.0.240 maxupd: 128 defer: on
             syncok: 1
          ipsec1000: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1400
             tunnel inet 10.3.100.1 --> 10.3.100.100
             inet6 fe80::a00:27ff:fe02:c8c1%ipsec1000 prefixlen 64 scopeid 0x7 
             inet 10.6.106.1 --> 10.6.106.2 netmask 0xfffffffc 
             nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
             reqid: 1000
             groups: ipsec 
          
          1 Reply Last reply Reply Quote 0
          • K
            kriechmaden
            last edited by kriechmaden

            @Konstanti said in IPsec VTI pfSense to UniFi:

            @kriechmaden
            Hi
            ifconfig does not show that the vti tunnel is up (There is no vti tunnel in the list of interfaces, ipsec1000, for example)
            This is the output of ifconfig on my PFSense .
            enc0: flags=41<UP,RUNNING> metric 0 mtu 1536
            nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
            groups: enc
            lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
            options=600003<RXCSUM,TXCSUM,RXCSUM_IPV6,TXCSUM_IPV6>
            inet6 ::1 prefixlen 128
            inet6 fe80::1%lo0 prefixlen 64 scopeid 0x4
            inet 127.0.0.1 netmask 0xff000000
            nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
            groups: lo
            pflog0: flags=100<PROMISC> metric 0 mtu 33160
            groups: pflog
            pfsync0: flags=0<> metric 0 mtu 1500
            groups: pfsync
            syncpeer: 224.0.0.240 maxupd: 128 defer: on
            syncok: 1
            ipsec1000: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1400
            tunnel inet 10.3.100.1 --> 10.3.100.100
            inet6 fe80::a00:27ff:fe02:c8c1%ipsec1000 prefixlen 64 scopeid 0x7
            inet 10.6.106.1 --> 10.6.106.2 netmask 0xfffffffc
            nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
            reqid: 1000
            groups: ipsec

            [2.4.4-RELEASE][root@fw1]/root: ifconfig
            vtnet0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
                    options=c00b8<VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWTSO,LINKSTATE>
                    ether 02:00:00:ef:85:e6
                    hwaddr 02:00:00:ef:85:e6
                    inet6 fe80::ff:feef:85e6%vtnet0 prefixlen 64 scopeid 0x1 
                    inet6 XXXX:XXXX:XXXX:XXXX::3 prefixlen 64 
                    inet6 XXXX:XXXX:XXXX:XXXX::2 prefixlen 64 vhid 3 
                    inet XXX.XXX.XXX.114 netmask 0xfffffff0 broadcast XXX.XXX.XXX.XXX 
                    inet XXX.XXX.XXX.115 netmask 0xfffffff0 broadcast XXX.XXX.XXX.XXX vhid 5 
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    media: Ethernet 10Gbase-T <full-duplex>
                    status: active
                    carp: MASTER vhid 3 advbase 1 advskew 0
                    carp: MASTER vhid 5 advbase 1 advskew 0
            vtnet1: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
                    options=c00b8<VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWTSO,LINKSTATE>
                    ether 26:88:14:13:f6:c0
                    hwaddr 26:88:14:13:f6:c0
                    inet6 fe80::2488:14ff:fe13:f6c0%vtnet1 prefixlen 64 scopeid 0x2 
                    inet6 fd60:fef5:50c0:e3fc::2 prefixlen 64 
                    inet6 fd60:fef5:50c0:e3cf::1 prefixlen 64 vhid 4 
                    inet 10.0.0.2 netmask 0xfffffc00 broadcast 10.0.3.255 
                    inet 10.0.0.1 netmask 0xfffffc00 broadcast 10.0.3.255 vhid 1 
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    media: Ethernet 10Gbase-T <full-duplex>
                    status: active
                    carp: MASTER vhid 1 advbase 1 advskew 0
                    carp: MASTER vhid 4 advbase 1 advskew 0
            vtnet2: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
                    options=c00b8<VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWTSO,LINKSTATE>
                    ether 72:df:07:2c:37:6b
                    hwaddr 72:df:07:2c:37:6b
                    inet6 fe80::70df:7ff:fe2c:376b%vtnet2 prefixlen 64 scopeid 0x3 
                    inet6 fdf5:3371:813a:5aac::2 prefixlen 64 
                    inet6 fdf5:3371:813a:5aac::1 prefixlen 64 vhid 7 
                    inet 10.0.8.2 netmask 0xfffffc00 broadcast 10.0.11.255 
                    inet 10.0.8.1 netmask 0xfffffc00 broadcast 10.0.11.255 vhid 6 
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    media: Ethernet 10Gbase-T <full-duplex>
                    status: active
                    carp: MASTER vhid 6 advbase 1 advskew 0
                    carp: MASTER vhid 7 advbase 1 advskew 0
            enc0: flags=41<UP,RUNNING> metric 0 mtu 1536
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    groups: enc 
            lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
                    options=600003<RXCSUM,TXCSUM,RXCSUM_IPV6,TXCSUM_IPV6>
                    inet6 ::1 prefixlen 128 
                    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x5 
                    inet 127.0.0.1 netmask 0xff000000 
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    groups: lo 
            pflog0: flags=100<PROMISC> metric 0 mtu 33160
                    groups: pflog 
            pfsync0: flags=41<UP,RUNNING> metric 0 mtu 1500
                    groups: pfsync 
                    pfsync: syncdev: vtnet1 syncpeer: 10.0.0.3 maxupd: 128 defer: off
                    syncok: 1
            ovpns1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
                    options=80000<LINKSTATE>
                    inet6 fe80::10d4:df6d:5e75:438d%ovpns1 prefixlen 64 scopeid 0x8 
                    inet6 fd75:6d19:84ae:d2c9::1 prefixlen 64 
                    inet 10.0.252.1 --> 10.0.252.2 netmask 0xffffffff 
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    groups: tun openvpn 
                    Opened by PID 87483
            ovpns2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
                    options=80000<LINKSTATE>
                    inet6 fe80::10d4:df6d:5e75:438d%ovpns2 prefixlen 64 scopeid 0x9 
                    inet6 fd9f:17e9:b703:fb61::1 prefixlen 64 
                    inet 10.0.248.1 --> 10.0.248.2 netmask 0xffffffff 
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    groups: tun openvpn 
                    Opened by PID 92953
            ovpns3: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
                    options=80000<LINKSTATE>
                    inet6 fe80::10d4:df6d:5e75:438d%ovpns3 prefixlen 64 scopeid 0xa 
                    inet6 fd27:dd3e:7e8e:d32e::1 prefixlen 64 
                    inet 10.0.244.1 --> 10.0.244.2 netmask 0xffffffff 
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    groups: tun openvpn 
                    Opened by PID 11769
            ovpns4: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
                    options=80000<LINKSTATE>
                    inet6 fe80::10d4:df6d:5e75:438d%ovpns4 prefixlen 64 scopeid 0xb 
                    inet6 fd7d:a519:4cbf:b745::1 prefixlen 64 
                    inet 10.255.243.241 --> 10.255.243.242 netmask 0xffffffff 
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    groups: tun openvpn 
                    Opened by PID 18031
            ipsec1000: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
                    tunnel inet XXX.XXX.XXX.114 --> XXX.XXX.XXX.253
                    inet6 fe80::10d4:df6d:5e75:438d%ipsec1000 prefixlen 64 scopeid 0xc 
                    inet 10.252.243.242 --> 10.252.243.243 netmask 0xfffffff0 
                    nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
                    reqid: 1000
                    groups: ipsec 
            

            Very strange the tunnel is now up and it seems to be working.
            Niw the problem is, that if we ping the other site no response from the host is coming. But on a tcpdum we see, that the ICMP reuqest was received and the echo is send.

            Ping from UniFi to pfSense:

            tcpdump on the pfSense

            [2.4.4-RELEASE][root@fw1]/root: tcpdump -i ipsec1000
            tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
            listening on ipsec1000, link-type NULL (BSD loopback), capture size 262144 bytes
            16:09:14.055108 IP ip114.ip-51-75-157.eu > 10.1.0.2: ICMP echo request, id 34846, seq 51345, length 44
            16:09:14.148584 IP 10.252.243.242 > 10.252.243.243: ICMP echo request, id 2268, seq 997, length 8
            16:09:14.248284 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 27647, seq 10, length 64
            16:09:14.248326 IP 10.252.243.242 > 10.252.243.243: ICMP echo reply, id 27647, seq 10, length 64
            16:09:14.388477 IP ip114.ip-51-75-157.eu > 10.1.0.2: ICMP echo request, id 34846, seq 51346, length 44
            16:09:14.568088 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 223, length 64
            16:09:14.568148 IP 10.252.243.242 > 10.252.243.243: ICMP echo reply, id 19207, seq 223, length 64
            16:09:14.659358 IP 10.252.243.242 > 10.252.243.243: ICMP echo request, id 2268, seq 998, length 8
            16:09:15.055940 IP ip114.ip-51-75-157.eu > 10.1.0.2: ICMP echo request, id 34846, seq 51348, length 44
            16:09:15.169418 IP 10.252.243.242 > 10.252.243.243: ICMP echo request, id 2268, seq 999, length 8
            16:09:15.249018 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 27647, seq 11, length 64
            16:09:15.249038 IP 10.252.243.242 > 10.252.243.243: ICMP echo reply, id 27647, seq 11, length 64
            16:09:15.389457 IP ip114.ip-51-75-157.eu > 10.1.0.2: ICMP echo request, id 34846, seq 51349, length 44
            16:09:15.569286 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 224, length 64
            16:09:15.569363 IP 10.252.243.242 > 10.252.243.243: ICMP echo reply, id 19207, seq 224, length 64
            16:09:15.690172 IP 10.252.243.242 > 10.252.243.243: ICMP echo request, id 2268, seq 1000, length 8
            16:09:16.057022 IP ip114.ip-51-75-157.eu > 10.1.0.2: ICMP echo request, id 34846, seq 51351, length 44
            16:09:16.227717 IP 10.252.243.242 > 10.252.243.243: ICMP echo request, id 2268, seq 1001, length 8
            16:09:16.248121 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 27647, seq 12, length 64
            16:09:16.248179 IP 10.252.243.242 > 10.252.243.243: ICMP echo reply, id 27647, seq 12, length 64
            16:09:16.390299 IP ip114.ip-51-75-157.eu > 10.1.0.2: ICMP echo request, id 34846, seq 51352, length 44
            16:09:16.578063 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 225, length 64
            16:09:16.578156 IP 10.252.243.242 > 10.252.243.243: ICMP echo reply, id 19207, seq 225, length 64
            16:09:16.764230 IP 10.252.243.242 > 10.252.243.243: ICMP echo request, id 2268, seq 1002, length 8
            ^C
            24 packets captured
            24 packets received by filter
            0 packets dropped by kernel
            [2.4.4-RELEASE][root@fw1]/root: tcpdump -i enc0
            tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
            listening on enc0, link-type ENC (OpenBSD encapsulated IP), capture size 262144 bytes
            16:09:22.578118 (authentic,confidential): SPI 0xc24b31ec: IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 231, length 64
            16:09:22.578170 (authentic,confidential): SPI 0xc7901687: IP 10.252.243.242 > 10.252.243.243: ICMP echo reply, id 19207, seq 231, length 64
            16:09:23.049116 (authentic,confidential): SPI 0xc7901687: IP 10.252.243.242 > 10.252.243.243: ICMP echo request, id 2268, seq 1014, length 8
            16:09:23.054739 (authentic,confidential): SPI 0xc7901687: IP ip114.ip-51-75-157.eu > 10.1.0.2: ICMP echo request, id 34846, seq 51372, length 44
            16:09:23.247988 (authentic,confidential): SPI 0xc24b31ec: IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 27647, seq 19, length 64
            16:09:23.248049 (authentic,confidential): SPI 0xc7901687: IP 10.252.243.242 > 10.252.243.243: ICMP echo reply, id 27647, seq 19, length 64
            16:09:23.388236 (authentic,confidential): SPI 0xc7901687: IP ip114.ip-51-75-157.eu > 10.1.0.2: ICMP echo request, id 34846, seq 51373, length 44
            16:09:23.563408 (authentic,confidential): SPI 0xc7901687: IP 10.252.243.242 > 10.252.243.243: ICMP echo request, id 2268, seq 1015, length 8
            16:09:23.577872 (authentic,confidential): SPI 0xc24b31ec: IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 232, length 64
            16:09:23.577917 (authentic,confidential): SPI 0xc7901687: IP 10.252.243.242 > 10.252.243.243: ICMP echo reply, id 19207, seq 232, length 64
            16:09:24.055579 (authentic,confidential): SPI 0xc7901687: IP ip114.ip-51-75-157.eu > 10.1.0.2: ICMP echo request, id 34846, seq 51375, length 44
            16:09:24.077415 (authentic,confidential): SPI 0xc7901687: IP 10.252.243.242 > 10.252.243.243: ICMP echo request, id 2268, seq 1016, length 8
            ^C
            12 packets captured
            12 packets received by filter
            0 packets dropped by kernel
            

            ping command on the UniFi site:

            device-admin@USG-PRO1:~$ ping 10.252.243.242
            PING 10.252.243.242 (10.252.243.242) 56(84) bytes of data.
            ^C^C
            --- 10.252.243.242 ping statistics ---
            31 packets transmitted, 0 received, 100% packet loss, time 30050ms
            
            
            device-admin@USG-PRO1:~$ ping 10.252.243.243
            PING 10.252.243.243 (10.252.243.243) 56(84) bytes of data.
            64 bytes from 10.252.243.243: icmp_req=1 ttl=64 time=0.146 ms
            64 bytes from 10.252.243.243: icmp_req=2 ttl=64 time=0.125 ms
            64 bytes from 10.252.243.243: icmp_req=3 ttl=64 time=0.148 ms
            64 bytes from 10.252.243.243: icmp_req=4 ttl=64 time=0.113 ms
            ^C
            --- 10.252.243.243 ping statistics ---
            4 packets transmitted, 4 received, 0% packet loss, time 3000ms
            rtt min/avg/max/mdev = 0.113/0.133/0.148/0.014 ms
            

            Ping from pfSense to UniFi:

            tcpdump on UniFi:

            root@USG-PRO1:~# tcpdump -i vti64
            tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
            listening on vti64, link-type RAW (Raw IP), capture size 262144 bytes
            16:11:21.689119 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 350, length 64
            16:11:22.688719 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 351, length 64
            16:11:23.689212 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 352, length 64
            16:11:24.688916 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 353, length 64
            16:11:25.690202 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 354, length 64
            16:11:26.699178 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 355, length 64
            16:11:27.699096 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 356, length 64
            16:11:28.699099 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 357, length 64
            16:11:29.709125 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 358, length 64
            16:11:30.709099 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 359, length 64
            16:11:31.719095 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 360, length 64
            16:11:32.720917 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 361, length 64
            16:11:33.729182 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 362, length 64
            16:11:34.739091 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 363, length 64
            16:11:35.739018 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 364, length 64
            16:11:36.739108 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 365, length 64
            16:11:37.749104 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 366, length 64
            16:11:38.749143 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 367, length 64
            16:11:39.749049 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 368, length 64
            16:11:40.759056 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 369, length 64
            16:11:41.759098 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 370, length 64
            16:11:42.759097 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 371, length 64
            16:11:43.759065 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 372, length 64
            16:11:44.759087 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 373, length 64
            16:11:45.759073 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 374, length 64
            16:11:46.759099 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 375, length 64
            16:11:47.760307 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 376, length 64
            16:11:48.772532 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 377, length 64
            16:11:49.779243 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 378, length 64
            16:11:50.789094 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 379, length 64
            16:11:51.789082 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 380, length 64
            16:11:52.789099 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 381, length 64
            16:11:53.789073 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 382, length 64
            16:11:54.789129 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 383, length 64
            16:11:55.788908 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 384, length 64
            16:11:56.788971 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 385, length 64
            16:11:57.789097 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 386, length 64
            16:11:58.789057 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 387, length 64
            16:11:59.789097 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 388, length 64
            16:12:00.789103 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 389, length 64
            16:12:01.789119 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 390, length 64
            16:12:02.789123 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 391, length 64
            16:12:03.789111 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 392, length 64
            16:12:04.789085 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 393, length 64
            16:12:05.789154 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 394, length 64
            16:12:06.789099 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 395, length 64
            16:12:07.789096 IP 10.252.243.243 > 10.252.243.242: ICMP echo request, id 19207, seq 396, length 64
            ^C
            47 packets captured
            47 packets received by filter
            0 packets dropped by kernel
            

            Ping command on pfSense:

            [2.4.4-RELEASE][root@fw1]/root: ping 10.252.243.243
            PING 10.252.243.243 (10.252.243.243): 56 data bytes
            ^C
            --- 10.252.243.243 ping statistics ---
            10 packets transmitted, 0 packets received, 100.0% packet loss
            [2.4.4-RELEASE][root@fw1]/root: ping 10.252.243.242
            PING 10.252.243.242 (10.252.243.242): 56 data bytes
            ^C
            --- 10.252.243.242 ping statistics ---
            15 packets transmitted, 0 packets received, 100.0% packet loss
            
            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.