Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    site to site VPN between pfSense 2.7.0 and Cisco ASR1001-X (1NG): phase 2 not working

    Scheduled Pinned Locked Moved IPsec
    17 Posts 3 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      viragomann @getcom
      last edited by viragomann

      @getcom
      I don't know anymore. That war 2 y ago.

      Maybe the docs can help: Troubleshooting IPsec VPNs

      I would try "Configuration backend", because the helpful entries were logged with "[CFG]".

      1 Reply Last reply Reply Quote 0
      • K
        Konstanti @getcom
        last edited by

        @getcom

        Hi, you have an error with traffic selectors (TS) on the Cisco side when establishing PHASE-2 , which is strange, since everything seems to be configured correctly, both the access list and the reverse mask. If possible, show the entire connection log on the PF side (phase-1 and phase-2)

        getcomG 1 Reply Last reply Reply Quote 0
        • getcomG
          getcom @Konstanti
          last edited by

          @Konstanti said in site to site VPN between pfSense 2.7.0 and Cisco ASR1001-X (1NG): phase 2 not working:

          If possible, show the entire connection log on the PF side (phase-1 and phase-2)

          This is the debug log : https://pastes.io/gcas2bfucl
          I hopefully removed the second (working) tunnel log entries completely...
          The public IPs are masked except the first digit to get a better overview.
          Is the CIDR "|/0" in the local and remote network maybe the root cause?

          K 1 Reply Last reply Reply Quote 0
          • K
            Konstanti @getcom
            last edited by Konstanti

            @getcom

            It is difficult to say anything affirmatively , there is a lot of unnecessary information in the logs (such a high level of logging ,in my opinion, it is unnecessary) . now, unfortunately, I can 't look at the log again right now ( the service issues an error )
            , But in the morning I saw that the traffic selectors on your side are configured correctly
            If I were you, I would talk to the Cisco admin again so that he checks all the settings

            3 22:23:00 pfsense1 charon[98668]: 01[CFG] <con3|7> proposing traffic selectors for us:
            Apr 3 22:23:00 pfsense1 charon[98668]: 01[CFG] <con3|7> 10.242.62.128/26|/0
            reverse mask 0.0.0.63

            Apr 3 22:23:00 pfsense1 charon[98668]: 01[CFG] <con3|7> proposing traffic selectors for other:
            Apr 3 22:23:00 pfsense1 charon[98668]: 01[CFG] <con3|7> 172.18.0.0/21|/0
            reverse mask 0.0.7.255

            It is necessary to check the ACL configured by the Cisco admin,
            The screenshot shows that everything is configured correctly

            b3c450a7-8929-4a16-9f21-305833a0dc8f-image.png
            But maybe some settings were saved incorrectly.

            for example, there is an error in the ACL name

            70311ff3-7a3a-4cb1-8ff6-bcf43a4075fe-image.png

            V 1 Reply Last reply Reply Quote 0
            • V
              viragomann @Konstanti
              last edited by

              @Konstanti said in site to site VPN between pfSense 2.7.0 and Cisco ASR1001-X (1NG): phase 2 not working:

              If I were you, I would talk to the Cisco admin again so that he checks all the settings

              Agree with this. Since his site is not accepting the traffic selector, it's on him to find out the reason for the issue and resolve it. There should be logs with more details on this.

              As mentioned, I was in a similar situation in the past. I got the config settings from the remote admin, set up the tunnel accordingly, but also got "TS_UNACCEPT" from the remote site.
              It took me hours to proof that the issue was on his device.

              Here is the log section, I sent to him:
              6228ae44-e236-4ddb-8c3b-6f511707aa36-grafik.png

              His answer was then, he missed a setting, which explicitly excluded our network from the enc domain.
              Whatever this means. I don't know his device.

              @getcom said in site to site VPN between pfSense 2.7.0 and Cisco ASR1001-X (1NG): phase 2 not working:

              Is the CIDR "|/0" in the local and remote network maybe the root cause?

              No, I don't think. I use also "abnormal" subnets and all tunnels work well.
              d69ba4ce-068a-4444-a894-d28c54040f72-grafik.png

              getcomG 1 Reply Last reply Reply Quote 0
              • getcomG
                getcom @viragomann
                last edited by

                @viragomann
                Same here. We have also plenty of tunnels running without any issue, also with different subnets. But this is also on their side. Their tunnels are also running without any issues.
                I will get back to him. If I have any news, I will let you know.
                pastes.io with my logfile link is not working anymore. It redirects now to pastebin.ai : https://pastebin.ai/gcas2bfucl

                37e08f95-4ff3-4341-9859-969de8641832-grafik.png

                getcomG 1 Reply Last reply Reply Quote 0
                • getcomG
                  getcom @getcom
                  last edited by

                  Last outcome is that the Cisco admin will check every setting.
                  I told him to check if any ACL has a deny condition for the used subnets (e.g. overlapping) and he also should check if there is any typo in ACL naming.
                  Additionally I setup the pfSense to responder only to see what traffic selectors is coming from his side. I assume that he is not able to connect phase 2 because of a mistake on his side. We will see...

                  getcomG 1 Reply Last reply Reply Quote 0
                  • getcomG
                    getcom @getcom
                    last edited by getcom

                    After ten months the Cisco admin found out that he had a typo in one of his profiles...
                    The site to site VPN is working now as expected.

                    V 1 Reply Last reply Reply Quote 0
                    • V
                      viragomann @getcom
                      last edited by

                      @getcom
                      🤦
                      I guess, it is an unerring admin of a big company likewise it was in my case.

                      getcomG 1 Reply Last reply Reply Quote 0
                      • getcomG
                        getcom @viragomann
                        last edited by

                        @viragomann said in site to site VPN between pfSense 2.7.0 and Cisco ASR1001-X (1NG): phase 2 not working:

                        @getcom
                        🤦
                        I guess, it is an unerring admin of a big company likewise it was in my case.

                        a 150% admin...and yes a big company.
                        I sent him the log extracts in April and told him that I thought the problem might be a typo in the profile. Of course, he didn't believe me. Then we had a long, detailed e-mail ping-pong until he understood that he needed to look more closely at his Cisco router...

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.