<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[IPsec Tunnel to Azure Not Working Since 21.02]]></title><description><![CDATA[<p dir="auto">I have two pfSense devices, a SG-3100 which was upgraded to 21.02-p1, and a XG-7100 2.4.5-p1.  Both connect via IPsec to Azure.  Both have identical configuration.  Once the SG-3100 was upgraded, it immediately stopped connecting.  In other threads, jimp linked to 6 hotfixes; all of them have been applied, the SG-3100 still cannot connect.</p>
<p dir="auto">Here’s my configuration on Azure, I’m using PowerShell to ensure the exact same policy is applied to both tunnels:</p>
<pre><code>New-AzIpsecPolicy -IkeEncryption AES256 -IkeIntegrity SHA384 -DhGroup ECP384 -IpsecEncryption GCMAES256 -IpsecIntegrity GCMAES256 -PfsGroup ECP384 -SALifeTimeSeconds 3600 -SADataSizeKilobytes 500000
</code></pre>
<p dir="auto">/var/etc/ipsec/swanctl.conf from the SG-3100</p>
<pre><code># This file is automatically generated. Do not edit
connections {
	bypass {
		remote_addrs = 127.0.0.1
		children {
			bypasslan {
				local_ts = &lt;Internal Network&gt;
				remote_ts = &lt;Internal Network&gt;
				mode = pass
				start_action = trap
			}
		}
	}
	con1000 {
		fragmentation = yes
		unique = replace
		strictcrlpolicy = yes
		version = 2
		proposals = aes256-sha384-ecp384
		dpd_delay = 10s
		dpd_timeout = 60s
		rekey_time = 3240s
		reauth_time = 0s
		over_time = 360s
		rand_time = 360s
		encap = no
		mobike = no
		local_addrs = &lt;PF IP&gt;
		remote_addrs = &lt;Azure VNG IP&gt;
		pools = 
		local {
			id = &lt;PF IP&gt;
			auth = psk
		}
		remote {
			id =  &lt;Azure VNG IP&gt;
			auth = psk
		}
		children {
			con1000 {
				dpd_action = trap
				mode = tunnel
				policies = yes
				life_time = 3600s
				rekey_time = 3240s
				rand_time = 360s
				start_action = trap
				remote_ts = &lt;Azure Network&gt;
				local_ts = &lt;Internal Network&gt;
				esp_proposals = aes256gcm128-ecp384
			}
		}
	}
}
secrets {
	ike-0 {
		secret = &lt;PSK&gt;
		id-0 = %any
		id-1 = &lt;Azure VNG IP&gt;
	}
}

</code></pre>
<p dir="auto">/var/etc/ipsec/ipsec.conf from the XG-7100</p>
<pre><code># This file is automatically generated. Do not edit
connections {
	bypass {
		remote_addrs = 127.0.0.1
		children {
			bypasslan {
				local_ts = &lt;Internal Network&gt;
				remote_ts = &lt;Internal Network&gt;
				mode = pass
				start_action = trap
			}
		}
	}
	con1000 {
		fragmentation = yes
		unique = replace
		strictcrlpolicy = yes
		version = 2
		proposals = aes256-sha384-ecp384
		dpd_delay = 10s
		dpd_timeout = 60s
		rekey_time = 3240s
		reauth_time = 0s
		over_time = 360s
		rand_time = 360s
		encap = no
		mobike = no
		local_addrs = &lt;PF IP&gt;
		remote_addrs = &lt;Azure VNG IP&gt;
		pools = 
		local {
			id = &lt;PF IP&gt;
			auth = psk
		}
		remote {
			id =  &lt;Azure VNG IP&gt;
			auth = psk
		}
		children {
			con1000 {
				dpd_action = trap
				mode = tunnel
				policies = yes
				life_time = 3600s
				rekey_time = 3240s
				rand_time = 360s
				start_action = trap
				remote_ts = &lt;Azure Network&gt;
				local_ts = &lt;Internal Network&gt;
				esp_proposals = aes256gcm128-ecp384
			}
		}
	}
}
secrets {
	ike-0 {
		secret = &lt;PSK&gt;
		id-0 = %any
		id-1 = &lt;Azure VNG IP&gt;
	}
}

</code></pre>
<p dir="auto">IPsec log from the SG-3100</p>
<pre><code>Feb 27 10:34:22	charon	24787	14[NET] &lt;2521&gt; received packet: from &lt;Azure VNG IP&gt;[500] to &lt;PF IP&gt;[500] (376 bytes)
Feb 27 10:34:22	charon	24787	14[ENC] &lt;2521&gt; parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) V V V V ]
Feb 27 10:34:22	charon	24787	14[CFG] &lt;2521&gt; looking for an IKEv2 config for &lt;PF IP&gt;...&lt;Azure VNG IP&gt;
Feb 27 10:34:22	charon	24787	14[IKE] &lt;2521&gt; no IKE config found for &lt;PF IP&gt;...&lt;Azure VNG IP&gt;, sending NO_PROPOSAL_CHOSEN
Feb 27 10:34:22	charon	24787	14[ENC] &lt;2521&gt; generating IKE_SA_INIT response 0 [ N(NO_PROP) ]
Feb 27 10:34:22	charon	24787	14[NET] &lt;2521&gt; sending packet: from &lt;PF IP&gt;[500] to &lt;Azure VNG IP&gt;[500] (36 bytes)
Feb 27 10:34:22	charon	24787	14[IKE] &lt;2521&gt; IKE_SA (unnamed)[2521] state change: CREATED =&gt; DESTROYING
</code></pre>
]]></description><link>https://forum.netgate.com/topic/161507/ipsec-tunnel-to-azure-not-working-since-21-02</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 04:56:18 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/161507.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 27 Feb 2021 18:50:55 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to IPsec Tunnel to Azure Not Working Since 21.02 on Sun, 28 Feb 2021 02:16:31 GMT]]></title><description><![CDATA[<p dir="auto"><a href="https://redmine.pfsense.org/issues/11526" target="_blank" rel="noopener noreferrer nofollow ugc">https://redmine.pfsense.org/issues/11526</a></p>
]]></description><link>https://forum.netgate.com/post/968868</link><guid isPermaLink="true">https://forum.netgate.com/post/968868</guid><dc:creator><![CDATA[jimp]]></dc:creator><pubDate>Sun, 28 Feb 2021 02:16:31 GMT</pubDate></item><item><title><![CDATA[Reply to IPsec Tunnel to Azure Not Working Since 21.02 on Sun, 28 Feb 2021 02:15:46 GMT]]></title><description><![CDATA[<p dir="auto">Figured it out.  Once I disabled "Strict CRL Checking", the connection started working.  Both the SG-3100 running 21.02-p1, and the XG-7100 running 2.4.5-p1 had Strict CRL Checking enabled.  Looks like the behavior changed between the two versions.</p>
<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/jimp">@<bdi>jimp</bdi></a> I'd consider this a bug, since it'd be impossible to ever verify CRLs on a PSK, so a global CRL setting should have no effect on a PSK-based IPsec tunnels.</p>
]]></description><link>https://forum.netgate.com/post/968867</link><guid isPermaLink="true">https://forum.netgate.com/post/968867</guid><dc:creator><![CDATA[KStarRunner]]></dc:creator><pubDate>Sun, 28 Feb 2021 02:15:46 GMT</pubDate></item><item><title><![CDATA[Reply to IPsec Tunnel to Azure Not Working Since 21.02 on Sat, 27 Feb 2021 22:51:44 GMT]]></title><description><![CDATA[<p dir="auto">Here's the view from the Azure portal, and using PowerShell:<br />
<img src="/assets/uploads/files/1614466019777-azureipsec.png" alt="AzureIPsec.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">Here's from the pfSense GUI:<br />
<img src="/assets/uploads/files/1614466230701-azurep1.png" alt="AzureP1.png" class=" img-fluid img-markdown" /><br />
<img src="/assets/uploads/files/1614466238389-azurep2.png" alt="AzureP2.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">Again, the XG-7100 is configured identically, the only difference (besides the model) is the XG-7100 is running 2.4.5-p1.</p>
]]></description><link>https://forum.netgate.com/post/968836</link><guid isPermaLink="true">https://forum.netgate.com/post/968836</guid><dc:creator><![CDATA[KStarRunner]]></dc:creator><pubDate>Sat, 27 Feb 2021 22:51:44 GMT</pubDate></item></channel></rss>