Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Cisco VXR to Pfsense GRE Tunnel

    Scheduled Pinned Locked Moved IPsec
    2 Posts 1 Posters 359 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mudvayne15
      last edited by

      Hi Everyone,

      I am trying to establish a GRE tunnel between Cisco and Pfsense. Phase 1 and Phase 2 go up however it is unstable, it disconnects from time to time.

      On the Cisco, the configuration below as follow.

      crypto isakmp policy 1
      encr aes 256
      authentication pre-share
      group 5
      crypto isakmp key *************** address 0.0.0.0 0.0.0.0
      !
      !
      crypto ipsec transform-set ipsec-vti esp-aes 256 esp-sha-hmac
      !
      crypto ipsec profile ipsec-vti
      set security-association replay window-size 1024
      set transform-set ipsec-vti
      !
      !
      interface Tunnel34
      ip address 10.255.255.154 255.255.255.252
      tunnel source x.x133.66
      tunnel destination x.x96.242
      tunnel protection ipsec profile ipsec-vti
      !
      ip route 192.168.1.0 255.255.255.0 Tunnel34

      Also, when the connection establishes, I am still unable to reach the LAN portion of each side.

      Anyone can help me on this? Or have done it already?

      Thanks in Advance.

      1 Reply Last reply Reply Quote 0
      • M
        mudvayne15
        last edited by

        Pfsense settings
        Internet Protocol: IPv4
        Interface: WAN
        Authentication method: Mutual PSK
        Negotiation mode: Main
        My identifier: x.x133.66
        Peer identifier: x.x96.242
        Pre-Shared Key:
        Policy Generation: Default
        Proposal Checking: Default
        Encryption algorithm :AES 256bits
        Hash algorithm: SHA
        DH key group: 5
        Lifetime: 28800
        NAT Traversal: Disable
        Dead Peer Detection
        Enable: 10 seconds, 5 retries

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.