Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfSense IPSec to Cisco ASA5500

    Scheduled Pinned Locked Moved IPsec
    7 Posts 3 Posters 9.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      knudsen
      last edited by

      Hi all.

      I have tried to make a Lan-to-Lan IPSec tunnel between my pfSense 1.2.3 and a Cisco ASA 7.2, but keeping getting the message on phase 2 (ASA log):
      All IPSec SA proposals found unacceptable!

      Have anyone managed to establish a IPSec VPN Lan-to-Lan connection and have config for both the ASA and pfSense

      I have also tried to search this board and did not find anything.

      Help needed…  ???

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        The ASA config is covered in the book, but I don't recall if it was 100% tested or not.

        If your proposal isn't matching, check the phase 2 settings on both sides, specifically your transform set on the Cisco, and the items checked on the pfSense side. Set everything explicitly, don't assume defaults (especially on the Cisco).

        Usually the IPsec log on pfSense is quite verbose about a mismatch though. Can you paste the entire log here from a connection attempt?

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • K
          knudsen
          last edited by

          @jimp:

          The ASA config is covered in the book, but I don't recall if it was 100% tested or not.

          Where do I find this book…?

          Regards
          Knudsen

          1 Reply Last reply Reply Quote 0
          • P
            Perry
            last edited by

            http://blog.pfsense.org/?p=509

            /Perry
            doc.pfsense.org

            1 Reply Last reply Reply Quote 0
            • K
              knudsen
              last edited by

              @Perry:

              http://blog.pfsense.org/?p=509

              Not quite the answer I expected… a printed BOOK...!  :o  Can't remember last time I saw a printed book...  ;D

              Anyways - I have checked all settings and verified they are the same... and no default setting - All options set by me...! - And yes I have tried google search, and I can conclude many have the same problems - So it might be nice if anyone have a working template for site-to-site VPN for a pfSense and Cisco ASA...

              The pfSense log:
              Feb 12 20:17:47 racoon: [IPSec tunnel Test ASA]: INFO: IPsec-SA request for xx.xx.xx.xx queued due to no phase1 found.
              Feb 12 20:17:47 racoon: [IPSec tunnel Test ASA]: INFO: initiate new phase 1 negotiation: yy.yy.yy.yy[500]<=>xx.xx.xx.xx[500]
              Feb 12 20:17:47 racoon: INFO: begin Identity Protection mode.
              Feb 12 20:17:47 racoon: INFO: received broken Microsoft ID: FRAGMENTATION
              Feb 12 20:17:48 racoon: INFO: received Vendor ID: CISCO-UNITY
              Feb 12 20:17:48 racoon: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt
              Feb 12 20:17:48 racoon: [IPSec tunnel Test ASA]: INFO: ISAKMP-SA established yy.yy.yy.yy[500]-xx.xx.xx.xx[500] spi:7da9912b3b25e229:53ff666a4b23a207
              Feb 12 20:17:49 racoon: [IPSec tunnel Test ASA]: INFO: initiate new phase 2 negotiation: yy.yy.yy.yy[500]<=>xx.xx.xx.xx[500]
              Feb 12 20:17:49 racoon: ERROR: fatal NO-PROPOSAL-CHOSEN notify messsage, phase1 should be deleted.
              Feb 12 20:17:49 racoon: ERROR: Message: 'WS'.

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                @knudsen:

                Not quite the answer I expected… a printed BOOK...!  :o  Can't remember last time I saw a printed book...  ;D

                I prefer print, but I'm old school that way. :-)

                @knudsen:

                Feb 12 20:17:49 racoon: [IPSec tunnel Test ASA]: INFO: initiate new phase 2 negotiation: yy.yy.yy.yy[500]<=>xx.xx.xx.xx[500]
                Feb 12 20:17:49 racoon: ERROR: fatal NO-PROPOSAL-CHOSEN notify messsage, phase1 should be deleted.

                That still suggests that phase 2 is not matching in some way. Hard to say how, it usually logs something about why, but it may even be a mismatch in the subnet definitions on either end for the internal networks.

                Can you post a listing of the ASA config and screenshots of the pfSense side?

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • K
                  knudsen
                  last edited by

                  @jimp:

                  That still suggests that phase 2 is not matching in some way. Hard to say how, it usually logs something about why, but it may even be a mismatch in the subnet definitions on either end for the internal networks.

                  Can you post a listing of the ASA config and screenshots of the pfSense side?

                  You is almost spot on…

                  I did som debugging on the ASA and discovered a very interesting thing:

                  The access-list for matching interesting traffic was made by the WEB-GUI and was like this:

                  access-list OFFICE_nat0_outbound extended permit interface OFFICE-LAN 192.168.2.0 255.255.255.0

                  Changed this to the ip-address instead, and it worked - just like this:
                  access-list OFFICE_nat0_outbound extended permit ip 192.168.6.0 255.255.255.0 192.168.2.0 255.255.255.0

                  According to log address-mask was not matching when using interface-name in access-lists, but mask was the same all over on interfaces (ie. /24)...!

                  Log from ASA was showing (when I did ICMP ping from pfSense toward ASA):
                  Static Crypto Map check, map = outside_map, seq = 20, ACL does not match proxy IDs src:192.168.1.0 dst:192.168.6.0

                  This is RIGHT...! But the ASA dont like it at all...  ;D  So I changed the interface name to the actual address and mask - and then it worked like a charm...!

                  Thanx for help everyone...

                  Regards
                  Knudsen

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.