<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[SG-3100 21.02 IKEv2 S2S to SG-1100 21.02]]></title><description><![CDATA[<p dir="auto">After some troubleshoot i got the Tunnel up and running. But there are a Problem.<br />
Data going out on both Sides, but no incoming.</p>
<p dir="auto">I try a IPsec to any Rule, to eliminate a change in the Ruleset, as an effekt of the Upgrade. But no.</p>
<p dir="auto">IPSec is the only VPN i use, but after the Upgdate, i run into this error, and now im out of ideeas to troubleshoot.<br />
I use IPv4 with Dyndns and Distinguished name on both Sides.<br />
Remote GW in P1 is the dyndns name of the Peer.</p>
<p dir="auto">SG-3100 Side:<br />
<img src="/assets/uploads/files/1613770884357-d461bb36-c58f-4085-9e51-1c2acc9fa949-image.png" alt="d461bb36-c58f-4085-9e51-1c2acc9fa949-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">SG-1100 Side:<br />
<img src="/assets/uploads/files/1613771004310-2138cff9-b756-4282-90e2-41050a15ae1a-image.png" alt="2138cff9-b756-4282-90e2-41050a15ae1a-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">SG-3100:</p>
<pre><code class="language-java"># This file is automatically generated. Do not edit
connections {
        bypass {
                remote_addrs = 127.0.0.1
                children {
                        bypasslan {
                                local_ts = 192.168.10.0/24
                                remote_ts = 192.168.10.0/24
                                mode = pass
                                start_action = trap
                        }
                }
        }
        con-mobile : con-mobile-defaults {
                # Stub to load con-mobile-defaults
        }
        con500000 {
                fragmentation = yes
                unique = replace
                version = 2
                proposals = aes256-sha256-modp2048
                dpd_delay = 10s
                dpd_timeout = 60s
                rekey_time = 25920s
                reauth_time = 0s
                over_time = 2880s
                rand_time = 2880s
                encap = no
                mobike = yes
                local_addrs = WAN-IP
                remote_addrs = xxx.spdns.org
                pools =
                local {
                        id = fqdn:yyy.spdns.org
                        auth = psk
                }
                remote {
                        id = fqdn:xxx.spdns.org
                        auth = psk
                }
                children {
                        con500000 {
                                dpd_action = trap
                                mode = tunnel
                                policies = yes
                                life_time = 3600s
                                rekey_time = 3240s
                                rand_time = 360s
                                start_action = trap
                                remote_ts = 192.168.166.0/21
                                local_ts = 192.168.0.0/18
                                esp_proposals = aes256-sha256-modp2048
                        }
                }
        }
}
</code></pre>
<p dir="auto">SG-1100</p>
<pre><code class="language-java"># This file is automatically generated. Do not edit
connections {
        bypass {
                remote_addrs = 127.0.0.1
                children {
                        bypasslan {
                                local_ts = 192.168.166.0/24
                                remote_ts = 192.168.166.0/24
                                mode = pass
                                start_action = trap
                        }
                }
        }
        con-mobile : con-mobile-defaults {
                # Stub to load con-mobile-defaults
        }
        con300000 {
                fragmentation = yes
                unique = replace
                version = 2
                proposals = aes256-sha256-modp2048
                dpd_delay = 10s
                dpd_timeout = 60s
                rekey_time = 25920s
                reauth_time = 0s
                over_time = 2880s
                rand_time = 2880s
                encap = no
                mobike = yes
                local_addrs = WAN-IP
                remote_addrs = yyy.spdns.org
                pools =
                local {
                        id = fqdn:xxx.spdns.org
                        auth = psk
                }
                remote {
                        id = fqdn:yyy.spdns.org
                        auth = psk
                }
                children {
                        con300000 {
                                dpd_action = trap
                                mode = tunnel
                                policies = yes
                                life_time = 3600s
                                rekey_time = 3240s
                                rand_time = 360s
                                start_action = trap
                                remote_ts = 192.168.0.0/18
                                local_ts = 192.168.160.0/21
                                esp_proposals = aes256-sha256-modp2048
                        }
                }
        }

</code></pre>
<p dir="auto">Any Ideas?</p>
]]></description><link>https://forum.netgate.com/topic/161113/sg-3100-21-02-ikev2-s2s-to-sg-1100-21-02</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 13:57:13 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/161113.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 19 Feb 2021 21:57:44 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to SG-3100 21.02 IKEv2 S2S to SG-1100 21.02 on Fri, 23 Apr 2021 09:24:28 GMT]]></title><description><![CDATA[<p dir="auto">Now I have found following system log messages on my SG-3100:</p>
<p dir="auto">cesa1: TDMA descriptors pool exhaused. Consider increasing CESA_TDMA_DESCRIPTORS.</p>
<p dir="auto">Somebody saw something similar?</p>
<p dir="auto">Could be related to that here:</p>
<p dir="auto"><a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=226682" target="_blank" rel="noopener noreferrer nofollow ugc">Bug 226682 - ARMADA38X: Running out of CESA TDMA descriptors for disk I/O on GELI SSD</a></p>
]]></description><link>https://forum.netgate.com/post/979490</link><guid isPermaLink="true">https://forum.netgate.com/post/979490</guid><dc:creator><![CDATA[NOCling]]></dc:creator><pubDate>Fri, 23 Apr 2021 09:24:28 GMT</pubDate></item><item><title><![CDATA[Reply to SG-3100 21.02 IKEv2 S2S to SG-1100 21.02 on Sat, 17 Apr 2021 10:13:20 GMT]]></title><description><![CDATA[<p dir="auto">Resolved</p>
<p dir="auto">The SafeXcel Crypto driver was the issue.<br />
After deactivating and Reboot, the SG-1100 works as expected.<br />
At pfsense 21.02 this Driver isn't nessary for the crypto support.</p>
<p dir="auto">IPsec Performance ist very nice, AES-CBC-256 SHA256 DH14, round about 40% CPU at 50MBit/s.</p>
]]></description><link>https://forum.netgate.com/post/978401</link><guid isPermaLink="true">https://forum.netgate.com/post/978401</guid><dc:creator><![CDATA[NOCling]]></dc:creator><pubDate>Sat, 17 Apr 2021 10:13:20 GMT</pubDate></item><item><title><![CDATA[Reply to SG-3100 21.02 IKEv2 S2S to SG-1100 21.02 on Wed, 14 Apr 2021 20:57:29 GMT]]></title><description><![CDATA[<p dir="auto">Now both Upgraded to 02/21/2 but, AES_CBC don't work.<br />
SG-3100 works fine, but the SG-1100 has a problem with AES_CBC.</p>
<p dir="auto">Tunnel go up, but no data coming in. If I switch the P1 / P2 from AES_CBC to AES_GCM, data flow is normal, but on SG-3100 no longer hardware crypto offloading.</p>
<p dir="auto">The tunnel between SG-3100 and a x86 test VM works fine with AES_CBC, therefore I assume that the fault is in the SG-1100. The SafeXcel crypto driver is active, but switching it off, no difference.</p>
<p dir="auto">Can anyone confirm this behavior?</p>
]]></description><link>https://forum.netgate.com/post/977924</link><guid isPermaLink="true">https://forum.netgate.com/post/977924</guid><dc:creator><![CDATA[NOCling]]></dc:creator><pubDate>Wed, 14 Apr 2021 20:57:29 GMT</pubDate></item><item><title><![CDATA[Reply to SG-3100 21.02 IKEv2 S2S to SG-1100 21.02 on Sat, 20 Feb 2021 23:41:02 GMT]]></title><description><![CDATA[<p dir="auto">Here are one try from Syslog.</p>
<pre><code>charon[38059]: 08[NET] &lt;1477&gt; received packet: from 203.0.113.0[500] to 198.51.100.0[500] (464 bytes)
charon[38059]: 08[ENC] &lt;1477&gt; parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
charon[38059]: 08[CFG] &lt;1477&gt; looking for an IKEv2 config for 198.51.100.0...203.0.113.0
charon[38059]: 08[CFG] &lt;1477&gt;   candidate: 198.51.100.0...0.0.0.0/0, ::/0, prio 1052
charon[38059]: 08[CFG] &lt;1477&gt;   candidate: 198.51.100.0...Dyndns, prio 3100
charon[38059]: 08[CFG] &lt;1477&gt; found matching ike config: 198.51.100.0...Dyndns with prio 3100
charon[38059]: 08[IKE] &lt;1477&gt; 203.0.113.0 is initiating an IKE_SA
charon[38059]: 08[IKE] &lt;1477&gt; IKE_SA (unnamed)[1477] state change: CREATED =&gt; CONNECTING
charon[38059]: 08[CFG] &lt;1477&gt; selecting proposal:
charon[38059]: 08[CFG] &lt;1477&gt;   proposal matches
charon[38059]: 08[CFG] &lt;1477&gt; received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
charon[38059]: 08[CFG] &lt;1477&gt; configured proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
charon[38059]: 08[CFG] &lt;1477&gt; selected proposal: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048
charon[38059]: 08[CFG] &lt;1477&gt; received supported signature hash algorithms: sha256 sha384 sha512 identity
charon[38059]: 08[CFG] &lt;1477&gt; sending supported signature hash algorithms: sha256 sha384 sha512 identity
charon[38059]: 08[IKE] &lt;1477&gt; sending cert request for "CN=Dyndns, C=DE, ST=Place, L=Cloudtown, O=Cloudcorp"
charon[38059]: 08[ENC] &lt;1477&gt; generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
charon[38059]: 08[NET] &lt;1477&gt; sending packet: from 198.51.100.0[500] to 203.0.113.0[500] (497 bytes)
charon[38059]: 08[NET] &lt;1477&gt; received packet: from 203.0.113.0[4500] to 198.51.100.0[4500] (352 bytes)
charon[38059]: 08[ENC] &lt;1477&gt; parsed IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
charon[38059]: 08[IKE] &lt;1477&gt; received cert request for unknown ca with keyid 6d:d3:e9:ba:51:59:24:60:34:9e:b3:64:2b:28:98:13:fd:5b:24:c7
charon[38059]: 08[IKE] &lt;1477&gt; received 1 cert requests for an unknown ca
charon[38059]: 08[CFG] &lt;1477&gt; looking for peer configs matching 198.51.100.0[Dyndns]...203.0.113.0[Dyndns]
charon[38059]: 08[CFG] &lt;1477&gt;   candidate "con-mobile", match: 20/1/1052 (me/other/ike)
charon[38059]: 08[CFG] &lt;1477&gt;   candidate "con500000", match: 20/20/3100 (me/other/ike)
charon[38059]: 08[CFG] &lt;con500000|1477&gt; selected peer config 'con500000'
charon[38059]: 08[IKE] &lt;con500000|1477&gt; authentication of 'Dyndns' with pre-shared key successful
charon[38059]: 08[IKE] &lt;con500000|1477&gt; received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
charon[38059]: 08[IKE] &lt;con500000|1477&gt; peer supports MOBIKE
charon[38059]: 08[IKE] &lt;con500000|1477&gt; got additional MOBIKE peer address: 192.168.100.10
charon[38059]: 08[IKE] &lt;con500000|1477&gt; got additional MOBIKE peer address: 192.168.166.1
charon[38059]: 08[IKE] &lt;con500000|1477&gt; authentication of 'Dyndns' (myself) with pre-shared key
charon[38059]: 08[IKE] &lt;con500000|1477&gt; successfully created shared key MAC
charon[38059]: 08[IKE] &lt;con500000|1477&gt; IKE_SA con500000[1477] established between 198.51.100.0[Dyndns]...203.0.113.0[Dyndns]
charon[38059]: 08[IKE] &lt;con500000|1477&gt; IKE_SA con500000[1477] state change: CONNECTING =&gt; ESTABLISHED
charon[38059]: 08[IKE] &lt;con500000|1477&gt; scheduling rekeying in 23520s
charon[38059]: 08[IKE] &lt;con500000|1477&gt; maximum IKE_SA lifetime 26400s
charon[38059]: 08[CFG] &lt;con500000|1477&gt; looking for a child config for 192.168.0.0/18|/0 === 192.168.160.0/21|/0
charon[38059]: 08[CFG] &lt;con500000|1477&gt; proposing traffic selectors for us:
charon[38059]: 08[CFG] &lt;con500000|1477&gt;  192.168.0.0/18|/0
charon[38059]: 08[CFG] &lt;con500000|1477&gt; proposing traffic selectors for other:
charon[38059]: 08[CFG] &lt;con500000|1477&gt;  192.168.160.0/21|/0
charon[38059]: 08[CFG] &lt;con500000|1477&gt;   candidate "con500000" with prio 5+5
charon[38059]: 08[CFG] &lt;con500000|1477&gt; found matching child config "con500000" with prio 10
charon[38059]: 08[CFG] &lt;con500000|1477&gt; selecting proposal:
charon[38059]: 08[CFG] &lt;con500000|1477&gt;   proposal matches
charon[38059]: 08[CFG] &lt;con500000|1477&gt; received proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ
charon[38059]: 08[CFG] &lt;con500000|1477&gt; configured proposals: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ
charon[38059]: 08[CFG] &lt;con500000|1477&gt; selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/NO_EXT_SEQ
charon[38059]: 08[CFG] &lt;con500000|1477&gt; selecting traffic selectors for us:
charon[38059]: 08[CFG] &lt;con500000|1477&gt;  config: 192.168.0.0/18|/0, received: 192.168.0.0/18|/0 =&gt; match: 192.168.0.0/18|/0
charon[38059]: 08[CFG] &lt;con500000|1477&gt; selecting traffic selectors for other:
charon[38059]: 08[CFG] &lt;con500000|1477&gt;  config: 192.168.160.0/21|/0, received: 192.168.160.0/21|/0 =&gt; match: 192.168.160.0/21|/0
charon[38059]: 08[CHD] &lt;con500000|1477&gt; CHILD_SA con500000{20} state change: CREATED =&gt; INSTALLING
charon[38059]: 08[CHD] &lt;con500000|1477&gt;   using AES_CBC for encryption
charon[38059]: 08[CHD] &lt;con500000|1477&gt;   using HMAC_SHA2_256_128 for integrity
charon[38059]: 08[CHD] &lt;con500000|1477&gt; adding inbound ESP SA
charon[38059]: 08[CHD] &lt;con500000|1477&gt;   SPI 0xceb40bab, src 203.0.113.0 dst 198.51.100.0
charon[38059]: 08[CHD] &lt;con500000|1477&gt; adding outbound ESP SA
charon[38059]: 08[CHD] &lt;con500000|1477&gt;   SPI 0xcc34b838, src 198.51.100.0 dst 203.0.113.0
charon[38059]: 08[IKE] &lt;con500000|1477&gt; CHILD_SA con500000{20} established with SPIs ceb40bab_i cc34b838_o and TS 192.168.0.0/18|/0 === 192.168.160.0/21|/0
charon[38059]: 08[CHD] &lt;con500000|1477&gt; CHILD_SA con500000{20} state change: INSTALLING =&gt; INSTALLED
charon[38059]: 08[ENC] &lt;con500000|1477&gt; generating IKE_AUTH response 1 [ IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) ]
charon[38059]: 08[NET] &lt;con500000|1477&gt; sending packet: from 198.51.100.0[4500] to 203.0.113.0[4500] (336 bytes)
charon[38059]: 10[NET] &lt;con500000|1477&gt; received packet: from 203.0.113.0[4500] to 198.51.100.0[4500] (80 bytes)
charon[38059]: 10[ENC] &lt;con500000|1477&gt; parsed INFORMATIONAL request 2 [ N(AUTH_FAILED) ]
charon[38059]: 10[IKE] &lt;con500000|1477&gt; received DELETE for IKE_SA con500000[1477]
charon[38059]: 10[IKE] &lt;con500000|1477&gt; deleting IKE_SA con500000[1477] between 198.51.100.0[Dyndns]...203.0.113.0[Dyndns]
charon[38059]: 10[IKE] &lt;con500000|1477&gt; IKE_SA con500000[1477] state change: ESTABLISHED =&gt; DELETING
charon[38059]: 10[IKE] &lt;con500000|1477&gt; IKE_SA deleted
charon[38059]: 10[ENC] &lt;con500000|1477&gt; generating INFORMATIONAL response 2 [ ]
charon[38059]: 10[NET] &lt;con500000|1477&gt; sending packet: from 198.51.100.0[4500] to 203.0.113.0[4500] (80 bytes)
charon[38059]: 10[IKE] &lt;con500000|1477&gt; IKE_SA con500000[1477] state change: DELETING =&gt; DESTROYING
charon[38059]: 10[CHD] &lt;con500000|1477&gt; CHILD_SA con500000{20} state change: INSTALLED =&gt; DESTROYING
</code></pre>
]]></description><link>https://forum.netgate.com/post/966064</link><guid isPermaLink="true">https://forum.netgate.com/post/966064</guid><dc:creator><![CDATA[NOCling]]></dc:creator><pubDate>Sat, 20 Feb 2021 23:41:02 GMT</pubDate></item></channel></rss>