Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IKEv2 / ISAKMP from iOS device behind pfSense / NAT-T not working

    Scheduled Pinned Locked Moved NAT
    28 Posts 7 Posters 8.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      GomezAddams
      last edited by

      Did I try what? I assume that fix is in the main code, and I'm running 2.2.6 I still periodically see this issue.

      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        Look at the commit referenced on the ticket:

        https://redmine.pfsense.org/projects/pfsense/repository/revisions/bc3e61c4950740128ef7d2200e6399ada2e0fae9/diff/src/etc/inc/filter.inc

        Open up that file on your 2.2.x install and look for the stated lines and make similar edits.

        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        1 Reply Last reply Reply Quote 0
        • G
          GomezAddams
          last edited by

          @jimp:

          Look at the commit referenced on the ticket:

          https://redmine.pfsense.org/projects/pfsense/repository/revisions/bc3e61c4950740128ef7d2200e6399ada2e0fae9/diff/src/etc/inc/filter.inc

          Open up that file on your 2.2.x install and look for the stated lines and make similar edits.

          Cool! I'll give that a try. Is there any way to just download the new filter.inc file instead of making those edits by hand? I don't know the syntax of that file, and I don't want to screw it up.

          The other thing is that I won't know for sure if it fixes the problem. It tends to come and go sporadically.

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            It wouldn't work directly since that commit was for pfSense 2.3, not 2.2.x. Would have to be adjusted by hand on 2.2.x.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • sebdenS
              sebden
              last edited by

              Hello jimp,

              i have the same problem in my 2.2.6 after update from 2.2.4.

              Do i make the changes via built in editor from the gui? It must look like the green right file?

              Greets

              1 Reply Last reply Reply Quote 0
              • G
                GomezAddams
                last edited by

                Just curious - if this is a known bug, why isn't it being addressed in 2.2?

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate
                  last edited by

                  @GomezAddams:

                  Just curious - if this is a known bug, why isn't it being addressed in 2.2?

                  Because:
                  1. Nobody has yet confirmed the fix actually fixes this issue on 2.2.x
                  2. There are not likely to be any further 2.2.x releases with 2.3 being so close

                  Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  1 Reply Last reply Reply Quote 0
                  • sebdenS
                    sebden
                    last edited by

                    Found the solution today!

                    You only have to set a rule under firewall -> nat -> outbound that looks similar to the default rule for port 500. Of course with port 4500 and my lancom behind the pf can digger his tunnels  ;D

                    Hope it helps other people!

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.