Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    2.5.2 Update has broken Mobile Client IPSec

    Scheduled Pinned Locked Moved IPsec
    ipsecmobile
    4 Posts 1 Posters 834 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      ldoodle
      last edited by

      Hi

      We've been running a config. that has been working literally flawlessly. I've just upgraded to 2.5.2 and now we get "IKE authentication credentials are unacceptable" in the native Windows 10 VPN client.

      We use EAP-TLS with certs. All certs are still valid. Nothing else has changed other than updating to 2.5.2.

      Site-to-Site tunnels are OK still.

      IKE_AUTH N AUTH_FAILED

      ike-fail.png

      1 Reply Last reply Reply Quote 0
      • L
        ldoodle
        last edited by

        PS: The certs are all provided by pfSense Cert Manager

        1 Reply Last reply Reply Quote 0
        • L
          ldoodle
          last edited by

          If I disable Strict Cert checking it works ok again.

          Not sure how to refresh the CRL without completely generating a new one?

          1 Reply Last reply Reply Quote 0
          • L
            ldoodle
            last edited by

            https://forum.netgate.com/topic/163221/constraint-check-failed-rule_crl_validation-is-stale-but-requires-at-least-good/3

            Same issue as this one, which had no responses.

            @lst_hoe

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.