Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VPN point to point

    Scheduled Pinned Locked Moved General pfSense Questions
    40 Posts 2 Posters 3.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rmainero
      last edited by

      Hi.
      I have a Pfsense with version 2.7, configure 2 vpn point, they work correctly, but one falls after a while and does not lift if I do not deactivate both points and activate them again.
      Someone can tell me what may be going on.
      Thank you

      1 Reply Last reply Reply Quote 0
      • jimpJ jimp moved this topic from Forum Feedback on
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        What type of VPN?

        What logged when it fails?

        What is logged when it tries to come back up?

        Steve

        R 1 Reply Last reply Reply Quote 0
        • R
          rmainero @stephenw10
          last edited by

          @stephenw10

          I have a pfsence 2.7 with 2 vpn tunnel at the end of the tunnel there is a cisco 881, the tunnel is ipsec.

          But one of the tunnels stops working and only resumes if I disable both tunnels and activate them again

          I'm going to pass you the log tomorrow so you see it

          thank you

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            If there are no logs showing it trying to come back up and failing then perhaps there is no traffic to initiate it.

            R 1 Reply Last reply Reply Quote 0
            • R
              rmainero @stephenw10
              last edited by

              @stephenw10

              Hello, I pass the log

              Sep 22 07:18:03 charon 57999 16[NET] <con1|1108> received packet: from 190.106.82.252[500] to 190.13.88.176[500] (304 bytes)
              Sep 22 07:18:03 charon 57999 16[IKE] <con1|1108> received retransmit of response with ID 0, but next request already sent
              Sep 22 07:18:06 charon 57999 16[IKE] <con1|1108> sending retransmit 3 of request message ID 0, seq 3
              Sep 22 07:18:06 charon 57999 16[NET] <con1|1108> sending packet: from 190.13.88.176[4500] to 190.106.82.252[4500] (76 bytes)
              Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> sending DPD request
              Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> queueing ISAKMP_DPD task
              Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> activating new tasks
              Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> activating ISAKMP_DPD task
              Sep 22 07:18:07 charon 57999 16[ENC] <con2|689> generating INFORMATIONAL_V1 request 1418999662 [ HASH N(DPD) ]
              Sep 22 07:18:07 charon 57999 16[NET] <con2|689> sending packet: from 190.13.88.176[500] to 200.0.211.137[500] (92 bytes)
              Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> activating new tasks
              Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> nothing to initiate
              Sep 22 07:18:07 charon 57999 16[NET] <con2|689> received packet: from 200.0.211.137[500] to 190.13.88.176[500] (92 bytes)
              Sep 22 07:18:07 charon 57999 16[ENC] <con2|689> parsed INFORMATIONAL_V1 request 2879668186 [ HASH N(DPD_ACK) ]
              Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> activating new tasks
              Sep 22 07:18:07 charon 57999 16[IKE] <con2|689> nothing to initiate
              Sep 22 07:18:08 charon 57999 12[CFG] vici client 516 connected
              Sep 22 07:18:08 charon 57999 06[CFG] vici client 516 registered for: list-sa
              Sep 22 07:18:08 charon 57999 06[CFG] vici client 516 requests: list-sas
              Sep 22 07:18:08 charon 57999 06[CFG] vici client 516 disconnected

              stephenw10S 1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator @rmainero
                last edited by

                @rmainero said in VPN point to point:

                Sep 22 07:18:03 charon 57999 16[NET] <con1|1108> received packet: from 190.106.82.252[500] to 190.13.88.176[500] (304 bytes)
                Sep 22 07:18:03 charon 57999 16[IKE] <con1|1108> received retransmit of response with ID 0, but next request already sent

                This message implies the other side is either not receiving the replies or is rejecting them. What do the logs at the remote side of that tunnel show?

                R 1 Reply Last reply Reply Quote 0
                • R
                  rmainero @stephenw10
                  last edited by

                  @stephenw10 Captura de pantalla 2023-09-26 071455.png Captura de pantalla 2023-09-26 071354.png

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    That looks like the same side of the tunnel. Do you have any logs from the other side?

                    R 1 Reply Last reply Reply Quote 0
                    • R
                      rmainero @stephenw10
                      last edited by

                      @stephenw10

                      Do you want any record on the side of the cisco?

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Any errors shown. From the pfSense logs it looks like the other side is either not seeing packets we are sending or is rejecting them.

                        R 1 Reply Last reply Reply Quote 0
                        • R
                          rmainero @stephenw10
                          last edited by

                          @stephenw10 said in VPN point to point:

                          Any errors shown. From the pfSense logs it looks like the other side is either not seeing packets we are sending or is rejecting them.

                          Ok, I'll send them to you tomorrow, because now it's up and working.

                          R 1 Reply Last reply Reply Quote 0
                          • R
                            rmainero @rmainero
                            last edited by

                            @rmainero

                            you can pass me an email where you reverse a full video of the error

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              You can upload files for me here: https://nc.netgate.com/nextcloud/index.php/s/ai7Km5LsYWZRQMf

                              R 1 Reply Last reply Reply Quote 0
                              • R
                                rmainero @stephenw10
                                last edited by

                                @stephenw10
                                I already uploaded the file

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Hmm, nothing instantly jumps out but something that can cause a connection to succeed once then fail is an encryption mismatch at phase2. If it matches phase1 it will initially use that for phase2 in an IKEv2 connection but then fail at rekey. Check that.

                                  It could also be something con figured with more allowed at one end. So pfSense will allow connections that configured with one of the enabled algorithms but the other end might only have one.

                                  If you can copy/paste the complete logs from when it's failing it's much easier to review than a video.

                                  R 1 Reply Last reply Reply Quote 0
                                  • R
                                    rmainero @stephenw10
                                    last edited by

                                    @stephenw10 said in VPN point to point:

                                    If you can copy/paste the complete logs from when it's failing it's much easier to review than a video.
                                    Captura de pantalla 2023-09-27 070335.png

                                    debug cisco 881.txt

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      When does it fail, after how long? When it first rekeys?

                                      R 1 Reply Last reply Reply Quote 0
                                      • R
                                        rmainero @stephenw10
                                        last edited by

                                        @stephenw10 said in VPN point to point:

                                        When does it fail, after how long? When it first rekeys?

                                        I pick it up at 7 am and at 14 pm it falls off and I pick it up again manually. If you think I can give you access to see the team as a whole, my English is not very good

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Mmm, it looks like the re-auth time is ~7h so that lines up; it fails at re-auth.

                                          Really I would want to see the full log from both sides covering the time where it tries to re-auth and fails.

                                          I would also compare the VPN config from both sides carefully. It looks like one side allows connections the other side would refuse.

                                          The error shown is a key mismatch:
                                          https://docs.netgate.com/pfsense/en/latest/troubleshooting/ipsec-logs.html#phase-1-pre-shared-key-mismatch
                                          But since it can connect when pfSense establishes the tunnel that appears to be correct. Unless somehow Cisco has multiple keys.

                                          Steve

                                          R 1 Reply Last reply Reply Quote 0
                                          • R
                                            rmainero @stephenw10
                                            last edited by

                                            @stephenw10 said in VPN point to point:

                                            But since it can connect when pfSense establishes the tunnel that appears to be correct. Unless somehow Cisco has multiple keys.

                                            This started after the update of pfsense to 2.7 before the configurations were in des and md5, what generates noise is that the other point works correctly the problem is only this point

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.