Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFsense 2.2.4 & Cisco ASA5505 IPSec - one way connection only

    Scheduled Pinned Locked Moved IPsec
    8 Posts 5 Posters 2.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mrito
      last edited by

      Dear All,
      I've just setup an IPSec Site-to-Site VPN using PFSense 2.2.4 and ASA5505 and was able to establish VPN connection.

      Site A :
      Subnet: 192.168.1.0/24
      Cisco ASA 5505 IP: 192.168.1.2
      LAN users Default Gateway: 192.168.1.2

      Site B:
      Subnet: 172.16.0.0/16
      PFSense IP: 172.16.9.5

      LAN users Default Gateway: 172.16.9.3
      172.16.9.3 is our Cisco Managed Switch which handle Inter-VLAN connection.

      All users on Site B can access the LAN of Site A, but Site A cannot access the LAN of Site B.

      I did some routing on PFSense & ASA5505 but still Site A cannot access Site B. Any advise please?

      Regards,
      Malvin

      1 Reply Last reply Reply Quote 0
      • C
        corradolab
        last edited by

        Can you ping pfSense box from site A?

        Do you already have a route like this
        ROUTE ADD 192.168.1.0 MASK 255.255.225.0 172.16.9.5
        on all site B clients or on site B default gateway?

        Do you have an "allow" rule on the pfSense IPsec page (in Firewall / Rules)?

        Regards,
          Corrado

        1 Reply Last reply Reply Quote 0
        • M
          mrito
          last edited by

          No, I can't ping pfSense from Site A.

          Yes I tried adding route on some PC on Site B clients and even the Cisco Route but still no luck.

          Allow Rule on PFSense IPsec is also wide open.

          On my cisco box, I'm receiving the message below:
          3 Oct 27 2015 11:34:41 305005 172.16.9.39 No translation group found for icmp src LAN:192.168.1.100 dst LAN:172.16.9.39 (type 8, code 0)

          Sorry, I'm no good with Cisco configuration.

          Regards,
          Malvin

          1 Reply Last reply Reply Quote 0
          • C
            cmb
            last edited by

            The "No translation group found" from the ASA probably indicates you're missing a NAT exclusion for the VPN networks on the ASA.

            1 Reply Last reply Reply Quote 0
            • M
              mrito
              last edited by

              Sorry as I'm totally not good in Cisco commands. How do I translate that into Cisco ASA config? Can you show me the command?

              Thanks,
              Malvin

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                If you don't know what he said you should probably ask a cisco forum.

                In a nutshell you have to exclude your VPN networks from NAT or they get natted and break your VPN.

                L2L Example

                Topology:

                192.168.1.x/24 inside(ASA1)outside ===VPN===outside(ASA2)inside 192.168.2.0/24

                If you were configuring ASA1 nat exemption for this L2L tunnel, it would look like this:

                object network obj-local

                subnet 192.168.1.0 255.255.255.0

                object network obj-remote

                subnet 192.168.2.0 255.255.255.0

                nat (inside,outside) 1 source static obj-local obj-local destination static obj-remote obj-remote

                https://supportforums.cisco.com/document/44566/asa-83-nat-exemption-example-basic-l2l-vpn-and-basic-ra-vpn

                Basically says "Don't NAT these networks." Or, more precisely, NAT these networks but NAT them to themselves. Totally convoluted, but that's the way it is.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • M
                  mrito
                  last edited by

                  Hi,
                  I already added a NAT Exempt on my ASA5505, but still Site A cannot access Site B network. Still cannot PING Site B PFSense box. Any suggestion please?

                  Regards,
                  Malvin

                  ![ASA5505 NAT.JPG](/public/imported_attachments/1/ASA5505 NAT.JPG)
                  ![ASA5505 NAT.JPG_thumb](/public/imported_attachments/1/ASA5505 NAT.JPG_thumb)

                  1 Reply Last reply Reply Quote 0
                  • J
                    jeffvfren
                    last edited by

                    I'm used to have Bytes-In Zero, Bytes-Out OK problem.
                    After enable Maximum MSS in IPsec > Advanced Setting and give the value 1250 solved my problem.
                    Not sure whether the same setting can apply to your case.

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.