<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Connecting WinXP Cisco VPN client to PFSense IPSEC]]></title><description><![CDATA[<p dir="auto">Can anyone confirm whether what i am trying to accomplish is possible / not possible / not supported?</p>
<p dir="auto">I am trying to connect to PFSense IPSEC VPN (directly on the internet) from Windows XP (behind a NAT router) with Cisco VPN client. I'm using Preshared Key.</p>
<p dir="auto">It fails to connect, giving these logs.</p>
<p dir="auto">At the Cisco client:</p>
<p dir="auto">–--------------------------------------------------------------------------------<br />
Cisco Systems VPN Client Version 4.6.02.0011<br />
Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved.<br />
Client Type(s): Windows, WinNT<br />
Running on: 5.1.2600 Service Pack 2</p>
<h2><a class="anchor-offset" name="304-cm-0x63100002-begin-connection-process-br-305-cvpnd-0xe3400001-microsoft-ipsec-policy-agent-service-stopped-successfully-br-306-cm-0x63100004-establish-secure-connection-using-ethernet-br-307-cm-0x63100024-attempt-connection-with-server-quot-ss.ss.ss.ss-quot-br-308-ike-0x6300003b-attempting-to-establish-a-connection-with-ss.ss.ss.ss.-br-309-ike-0x63000013-sending-gt-gt-gt-isakmp-oak-ag-sa-ke-non-id-vid-xauth-vid-dpd-vid-nat-t-vid-frag-vid-unity-to-ss.ss.ss.ss-br-310-ipsec-0x63700008-ipsec-driver-successfully-started-br-311-ipsec-0x63700014-deleted-all-keys-br-312-ike-0x6300002f-received-isakmp-packet-peer-ss.ss.ss.ss-br-313-ike-0x63000014-receiving-lt-lt-lt-isakmp-oak-ag-sa-ke-non-id-hash-vid-dpd-from-ss.ss.ss.ss-br-314-ike-0x63000001-peer-supports-dpd-br-315-ike-0x63000001-ios-vendor-id-contruction-successful-br-316-ike-0x63000013-sending-gt-gt-gt-isakmp-oak-ag-hash-notify-status_initial_contact-vid-vid-unity-to-ss.ss.ss.ss-br-317-ike-0x63000083-ike-port-in-use-local-port-0x01f4-remote-port-0x01f4-br-318-cm-0x6310000e-established-phase-1-sa.-1-crypto-active-ike-sa-0-user-authenticated-ike-sa-in-the-system-br-319-ike-0x63000017-marking-ike-sa-for-deletion-i_cookie-ca23216d1a1008f8-r_cookie-e2b66e44790e28b4-reason-del_reason_non_unity_peer-br-320-ike-0x63000013-sending-gt-gt-gt-isakmp-oak-info-hash-del-to-ss.ss.ss.ss-br-321-ike-0x6300004b-discarding-ike-sa-negotiation-i_cookie-ca23216d1a1008f8-r_cookie-e2b66e44790e28b4-reason-del_reason_non_unity_peer-br-322-cm-0x63100014-unable-to-establish-phase-1-sa-with-server-quot-ss.ss.ss.ss-quot-because-of-quot-del_reason_non_unity_peer-quot-br-323-cm-0x63100025-initializing-cvpndrv-br-324-ike-0x63000001-ike-received-signal-to-terminate-vpn-connection-br-325-ike-0x63000086-microsoft-ipsec-policy-agent-service-started-successfully-br-326-ipsec-0x63700014-deleted-all-keys-br-327-ipsec-0x63700014-deleted-all-keys-br-328-ipsec-0x63700014-deleted-all-keys-br-329-ipsec-0x6370000a-ipsec-driver-successfully-stopped"></a>304 CM/0x63100002         Begin connection process<br />
305 CVPND/0xE3400001         Microsoft IPSec Policy Agent service stopped successfully<br />
306 CM/0x63100004         Establish secure connection using Ethernet<br />
307 CM/0x63100024         Attempt connection with server "ss.ss.ss.ss"<br />
308 IKE/0x6300003B         Attempting to establish a connection with ss.ss.ss.ss.<br />
309 IKE/0x63000013         SENDING &gt;&gt;&gt; ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to ss.ss.ss.ss<br />
310 IPSEC/0x63700008         IPSec driver successfully started<br />
311 IPSEC/0x63700014         Deleted all keys<br />
312 IKE/0x6300002F         Received ISAKMP packet: peer = ss.ss.ss.ss<br />
313 IKE/0x63000014         RECEIVING &lt;&lt;&lt; ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(dpd)) from ss.ss.ss.ss<br />
314 IKE/0x63000001         Peer supports DPD<br />
315 IKE/0x63000001         IOS Vendor ID Contruction successful<br />
316 IKE/0x63000013         SENDING &gt;&gt;&gt; ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to ss.ss.ss.ss<br />
317 IKE/0x63000083         IKE Port in use - Local Port =  0x01F4, Remote Port = 0x01F4<br />
318 CM/0x6310000E         Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system<br />
319 IKE/0x63000017         Marking IKE SA for deletion  (I_Cookie=CA23216D1A1008F8 R_Cookie=E2B66E44790E28B4) reason = DEL_REASON_NON_UNITY_PEER<br />
320 IKE/0x63000013         SENDING &gt;&gt;&gt; ISAKMP OAK INFO *(HASH, DEL) to ss.ss.ss.ss<br />
321 IKE/0x6300004B         Discarding IKE SA negotiation (I_Cookie=CA23216D1A1008F8 R_Cookie=E2B66E44790E28B4) reason = DEL_REASON_NON_UNITY_PEER<br />
322 CM/0x63100014         Unable to establish Phase 1 SA with server "ss.ss.ss.ss" because of "DEL_REASON_NON_UNITY_PEER"<br />
323 CM/0x63100025         Initializing CVPNDrv<br />
324 IKE/0x63000001         IKE received signal to terminate VPN connection<br />
325 IKE/0x63000086         Microsoft IPSec Policy Agent service started successfully<br />
326 IPSEC/0x63700014         Deleted all keys<br />
327 IPSEC/0x63700014         Deleted all keys<br />
328 IPSEC/0x63700014         Deleted all keys<br />
329 IPSEC/0x6370000A         IPSec driver successfully stopped</h2>
<p dir="auto">and at the IPSEC log in PFSense</p>
<hr />
<p dir="auto">racoon: INFO: respond new phase 1 negotiation: ss.ss.ss.ss[500]&lt;=&gt;cc.cc.cc.cc[56512]<br />
racoon: INFO: begin Aggressive mode.<br />
racoon: INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt<br />
racoon: INFO: received Vendor ID: DPD<br />
racoon: INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02<br />
racoon: INFO: received broken Microsoft ID: FRAGMENTATION<br />
racoon: INFO: received Vendor ID: CISCO-UNITY<br />
racoon: WARNING: ignore INITIAL-CONTACT notification, because it is only accepted after phase1.<br />
racoon: INFO: received Vendor ID: CISCO-UNITY<br />
racoon: INFO: ISAKMP-SA established ss.ss.ss.ss[500]-cc.cc.cc.cc[56512] spi:ca23216d1a1008f8:e2b66e44790e28b4<br />
racoon: ERROR: delete payload with invalid doi:0.<br />
–--------------------------------------------------------------------------------</p>
<p dir="auto">Again, anyone can help me by telling if what i'm trying to do is possible or not?</p>
<p dir="auto">Thanks.</p>
]]></description><link>https://forum.netgate.com/topic/2837/connecting-winxp-cisco-vpn-client-to-pfsense-ipsec</link><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 16:36:07 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/2837.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 Dec 2006 00:01:27 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Connecting WinXP Cisco VPN client to PFSense IPSEC on Wed, 03 Jan 2007 18:15:47 GMT]]></title><description><![CDATA[<p dir="auto">Have a look at the free IPSEC clients mentioned here: http://forum.pfsense.org/index.php/topic,2009.msg11516.html#msg11516</p>
<p dir="auto">For OpenVPN have a look at these GUI clients:<br />
http://openvpn.se/<br />
http://openvpn.net/gui.html</p>
]]></description><link>https://forum.netgate.com/post/146773</link><guid isPermaLink="true">https://forum.netgate.com/post/146773</guid><dc:creator><![CDATA[hoba]]></dc:creator><pubDate>Wed, 03 Jan 2007 18:15:47 GMT</pubDate></item><item><title><![CDATA[Reply to Connecting WinXP Cisco VPN client to PFSense IPSEC on Wed, 03 Jan 2007 17:32:35 GMT]]></title><description><![CDATA[<p dir="auto">Thanks for your thoughts on this, valnar.</p>
<p dir="auto">Would you recommend the OpenVPN client, then?  Perhaps I need try to it out again…</p>
]]></description><link>https://forum.netgate.com/post/146768</link><guid isPermaLink="true">https://forum.netgate.com/post/146768</guid><dc:creator><![CDATA[strick1226]]></dc:creator><pubDate>Wed, 03 Jan 2007 17:32:35 GMT</pubDate></item><item><title><![CDATA[Reply to Connecting WinXP Cisco VPN client to PFSense IPSEC on Wed, 03 Jan 2007 16:30:46 GMT]]></title><description><![CDATA[<p dir="auto">Cisco supports IPSEC, but I believe it uses some proprietary techniques such as "Group authentication" which may not be compatible.  It also needs a user authentication mechanism.  I've never been successful (or wanted to) in getting the Cisco VPN client to connect to anything other than a Cisco device.  That would be an IOS router, 3000 concentrator, PIX or ASA.</p>
<p dir="auto">Robert</p>
]]></description><link>https://forum.netgate.com/post/146764</link><guid isPermaLink="true">https://forum.netgate.com/post/146764</guid><dc:creator><![CDATA[valnar]]></dc:creator><pubDate>Wed, 03 Jan 2007 16:30:46 GMT</pubDate></item><item><title><![CDATA[Reply to Connecting WinXP Cisco VPN client to PFSense IPSEC on Wed, 20 Dec 2006 18:45:18 GMT]]></title><description><![CDATA[<p dir="auto">I'm also very interested in this.  Wondering if there would be enough interest to post a bounty?</p>
]]></description><link>https://forum.netgate.com/post/146193</link><guid isPermaLink="true">https://forum.netgate.com/post/146193</guid><dc:creator><![CDATA[strick1226]]></dc:creator><pubDate>Wed, 20 Dec 2006 18:45:18 GMT</pubDate></item><item><title><![CDATA[Reply to Connecting WinXP Cisco VPN client to PFSense IPSEC on Fri, 15 Dec 2006 02:22:18 GMT]]></title><description><![CDATA[<p dir="auto">Has someone got any experience trying to hook up Cisco VPN client to PFSense?</p>
<p dir="auto">Just asking again, since I'm kindda stuck on the issue :)</p>
<p dir="auto">I did see lots of entries about site to site VPN with Cisco devices, but couldn't find info regarding the Cisco VPN client for making VPN connection for individual machines..</p>
]]></description><link>https://forum.netgate.com/post/145852</link><guid isPermaLink="true">https://forum.netgate.com/post/145852</guid><dc:creator><![CDATA[BasR]]></dc:creator><pubDate>Fri, 15 Dec 2006 02:22:18 GMT</pubDate></item></channel></rss>