Navigation

    Netgate Discussion Forum
    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search

    IPSec VTI Tunnel to Unifi USG

    IPsec
    1
    1
    87
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      hannesclp last edited by hannesclp

      Solved: We have hit a bug (https://forum.netgate.com/topic/161833/issue-with-21-02-and-not-with-2-5-0) and therefor things didn't work as expected.

      Hi everyone,

      I am pretty new to the pfsense community and in the process of evaluating if we switch from Cisco appliances to netgate.
      We have a couple of XG-7100-1U devices for testing running pfsense 21.02-RELEASE-p1.

      In some locations we have Unifi USG-4-Pro devices running which we connect with a ipsec site2site vti based tunnels to our cisco appliances. Unfortunately I am struggling a bit to connect one of the USGs via vti to pfsense. Both appliances are directly connected to the internet with static ips.
      First the link comes up and is routed perfectly. ICMP traffic passes through but as soon as we put some traffic on it, the tunnel collapses.

      Here is our config on the pfsense appliance:
      Phase1:
      p1-1.jpg
      96425636-72f1-493c-b505-5eabf2f67b21-image.png

      Phase 2:
      71ea4db7-c0ac-4d14-95ab-ae35a3c900cb-image.png
      b8416511-4112-4c38-a2af-dd16932f195b-image.png

      USG (I am saving you basic info such as ip etc., they are triple checked and perfectly inline though ;-) ):
      6c0d5f5a-6771-4f08-aaf9-cac750dae429-image.png

      I have already played with the MTUs and the MSS clamping features. Nothing so far. There is not option in the USG to define a transport network ip set such as in the pfsense. We managed with other ipsec systems though to get it to work anyway. I have tried setting something like 0.0.0.0/0 in the pfsense as well and some other combinations. No luck so far.
      The firewalls are both wide open and the routes are set (ICMP traffic is flowing both directions till the collapse). When the tunnel collapses the phase 1 and 2 both show as up and connected.
      Interesting is that the automatically by pfsense created gateway is always offline. This might be due to the above describe transport net issue.
      14a0b1be-708b-4c8a-9fca-280d588a16fd-image.png

      Since both pfsense and the usg are based on strongswan I figure there must be a way to get it work ;-) Maybe someone here has a good hint for me? I have been putting quite some hours into it so far.

      Thanks,
      Hannes

      1 Reply Last reply Reply Quote 0
      • First post
        Last post

      Products

      • Platform Overview
      • TNSR
      • pfSense
      • Appliances

      Services

      • Training
      • Professional Services

      Support

      • Subscription Plans
      • Contact Support
      • Product Lifecycle
      • Documentation

      News

      • Media Coverage
      • Press
      • Events

      Resources

      • Blog
      • FAQ
      • Find a Partner
      • Resource Library
      • Security Information

      Company

      • About Us
      • Careers
      • Partners
      • Contact Us
      • Legal
      Our Mission

      We provide leading-edge network security at a fair price - regardless of organizational size or network sophistication. We believe that an open-source security model offers disruptive pricing along with the agility required to quickly address emerging threats.

      Subscribe to our Newsletter

      Product information, software announcements, and special offers. See our newsletter archive to sign up for future newsletters and to read past announcements.

      © 2021 Rubicon Communications, LLC | Privacy Policy