I'll check back later this evening or Monday day sometime.

Thanks,

Vaughn

Scott Ullrich wrote:
This is an old image.  The snapshot server has been down for some
time...  Try again 2-3 hours from now or on Monday.

Scott


On 3/30/07, Vaughn L. Reid III <[EMAIL PROTECTED]> wrote:
I just tried implementing IPSEC over an OPT interface using the
pfsense.iso file from March 29, 2007 at 7:19 p.m.

Here are my results.  IPSEC will not work over my OPT2 Interface without
adding specific firewall rules to the OPT2 interface to allow UDP 500
and ESP to connect to that interface's IP address.

Once I manually add the rules, the tunnels get created and work
correctly over the OPT2 interface.  Before I manually added the rules to
the OPT2 interface, I noticed that there was no SAD listing to the
tunnel being tested.  Both ends of the tunnel were, however, listed on
the SPD tab of the IPSEC tunnel diagnostic page.

Once I added the needed firewall rules to the OPT2 interface, the VPN
tunnel immediately set up and started working.  At that time, the proper
entries appeared in the SAD on the IPSEC diagnostic page.

Also, I noticed during the loading of the pfsense firewall software
while it was connecting services, etc. that an error message appeared
that stated that there was an invalid argument foreach on line 7 of the
/etc/inc/vslb.inc file.  Don't quote me on the line number, but I'm
pretty sure it was line 7.  I'm not sure if this is related to my IPSEC
issue, but I thought I'd comment in case it is relevant.

Thanks,

Vaughn Reid III

Tunge2 wrote:
> If this is working it would be a great step a head :)
>
> -----Oorspronkelijk bericht-----
> Van: Vaughn L. Reid III [mailto:[EMAIL PROTECTED]
> Verzonden: vrijdag 30 maart 2007 1:08
> Aan: support@pfsense.com
> Onderwerp: Re: [pfSense Support] IPSEC over an OPT interface Problems
>
> Have the IPSEC changes been committed and built yet? I'm looking at the
> update files, and they all still say March 27 2007.  I'm using this
> repository http://snapshots.pfsense.com/FreeBSD6/RELENG_1/updates/
>
> Should I be looking somewhare else for the update with the IPSEC fix?
>
> Thanks,
>
> Vaughn
>
> On Thu, 29 Mar 2007 15:26:58 -0400, "Vaughn L. Reid III"
> <[EMAIL PROTECTED]> said:
>
>> Thanks for your hard work.  I appreciate it and I'm sure my customers
>> do too.
>>
>> Vaughn
>>
>> Vaughn L. Reid III wrote:
>>
>>> The ones ones that say Computer Support are from the test tunnel
>>> that I created to use OPT2.
>>>
>>> The interfaces on this machine are labeled like this:
>>>
>>> LAN => em0
>>> WAN => em1
>>> ATTDSL => em4 -- This is the OPT interface that I was using for the
>>> Computer Support VPN test wireless => em2
>>>
>>> Vaughn
>>>
>>> Scott Ullrich wrote:
>>>
>>>> Okay, so that I am on the same page as you.  Those $wan rules
>>>> should have read $optX ??
>>>>
>>>> Scott
>>>>
>>>>
>>>> On 3/29/07, Vaughn L. Reid III <[EMAIL PROTECTED]> wrote:
>>>>
>>>>> Oops!  Sorry for the double post.
>>>>>
>>>>> Vaughn L. Reid III wrote:
>>>>>
>>>>>> Here is the relevant text of my rules.debug file.  It looks like
>>>>>> the interface on the connection "computer support" has the same
>>>>>> interface as the rest of the tunnels.  This is the test
>>>>>> connection that should be using OPT3.
>>>>>>
>>>>>> # let out anything from the firewall host itself and decrypted
>>>>>> IPsec traffic pass out quick on $lan proto icmp keep state label
>>>>>> "let out anything from firewall host itself"
>>>>>> pass out quick on $wan proto icmp keep state label "let out
>>>>>> anything from firewall host itself"
>>>>>> pass out quick on em1 all keep state label "let out anything
>>>>>> from firewall host itself"
>>>>>> # pass traffic from firewall -> out anchor "firewallout"
>>>>>> pass out quick on em1 all keep state label "let out anything
>>>>>> from firewall host itself"
>>>>>> pass out quick on em0 all keep state label "let out anything
>>>>>> from firewall host itself"
>>>>>> pass out quick on em4 all keep state label "let out anything
>>>>>> from firewall host itself"
>>>>>> pass out quick on em2 all keep state label "let out anything
>>>>>> from firewall host itself"
>>>>>> pass out quick on $pptp all keep state label "let out anything
>>>>>> from firewall host itself pptp"
>>>>>> pass out quick on $enc0 keep state label "IPSEC internal host to
>>>>>>
>>>>> host"
>>>>>
>>>>>> # let out anything from the firewall host itself and decrypted IPsec
>>>>>> traffic
>>>>>> pass out quick on em4 proto icmp keep state label "let out anything
>>>>>> from firewall host itself"
>>>>>> pass out quick on em4 all keep state label "let out anything from
>>>>>> firewall host itself"
>>>>>>
>>>>>>
>>>>>> # VPN Rules
>>>>>> pass out quick on $wan proto udp from 209.218.218.138 to
>>>>>> 65.119.178.137 port = 500 keep state label "IPSEC: Fire Station 3 -
>>>>>> outbound isakmp"
>>>>>> pass in quick on $wan proto udp from 65.119.178.137 to
>>>>>>
>>>>> 209.218.218.138
>>>>>
>>>>>> port = 500 keep state label "IPSEC: Fire Station 3 - inbound isakmp"
>>>>>> pass out quick on $wan proto esp from 209.218.218.138 to
>>>>>> 65.119.178.137 keep state label "IPSEC: Fire Station 3 - outbound
>>>>>>
> esp
>
>>>>>> proto"
>>>>>> pass in quick on $wan proto esp from 65.119.178.137 to
>>>>>>
>>>>> 209.218.218.138
>>>>>
>>>>>> keep state label "IPSEC: Fire Station 3 - inbound esp proto"
>>>>>> pass out quick on $wan proto udp from 209.218.218.138 to
>>>>>> 65.119.178.129 port = 500 keep state label "IPSEC: Street
>>>>>>
>>>>> Department -
>>>>>
>>>>>> outbound isakmp"
>>>>>> pass in quick on $wan proto udp from 65.119.178.129 to
>>>>>>
>>>>> 209.218.218.138
>>>>>
>>>>>> port = 500 keep state label "IPSEC: Street Department - inbound
>>>>>>
>>>>> isakmp"
>>>>>
>>>>>> pass out quick on $wan proto esp from 209.218.218.138 to
>>>>>> 65.119.178.129 keep state label "IPSEC: Street Department - outbound
>>>>>> esp proto"
>>>>>> pass in quick on $wan proto esp from 65.119.178.129 to
>>>>>>
>>>>> 209.218.218.138
>>>>>
>>>>>> keep state label "IPSEC: Street Department - inbound esp proto"
>>>>>> pass out quick on $wan proto udp from 209.218.218.138 to
>>>>>> 65.119.178.154 port = 500 keep state label "IPSEC: Fire Station 2 -
>>>>>> outbound isakmp"
>>>>>> pass in quick on $wan proto udp from 65.119.178.154 to
>>>>>>
>>>>> 209.218.218.138
>>>>>
>>>>>> port = 500 keep state label "IPSEC: Fire Station 2 - inbound isakmp"
>>>>>> pass out quick on $wan proto esp from 209.218.218.138 to
>>>>>> 65.119.178.154 keep state label "IPSEC: Fire Station 2 - outbound
>>>>>>
> esp
>
>>>>>> proto"
>>>>>> pass in quick on $wan proto esp from 65.119.178.154 to
>>>>>>
>>>>> 209.218.218.138
>>>>>
>>>>>> keep state label "IPSEC: Fire Station 2 - inbound esp proto"
>>>>>> pass out quick on $wan proto udp from 209.218.218.138 to
>>>>>>
> 70.227.28.14
>
>>>>>> port = 500 keep state label "IPSEC: EMS Building - outbound isakmp" >>>>>> pass in quick on $wan proto udp from 70.227.28.14 to 209.218.218.138 >>>>>> port = 500 keep state label "IPSEC: EMS Building - inbound isakmp"
>>>>>> pass out quick on $wan proto esp from 209.218.218.138 to
>>>>>>
> 70.227.28.14
>
>>>>>> keep state label "IPSEC: EMS Building - outbound esp proto"
>>>>>> pass in quick on $wan proto esp from 70.227.28.14 to 209.218.218.138
>>>>>> keep state label "IPSEC: EMS Building - inbound esp proto"
>>>>>> pass out quick on $wan proto udp from 209.218.218.138 to
>>>>>>
>>>>> 70.237.44.110
>>>>>
>>>>>> port = 500 keep state label "IPSEC: Computer Support - outbound
>>>>>>
>>>>> isakmp"
>>>>>
>>>>>> pass in quick on $wan proto udp from 70.237.44.110 to
>>>>>>
> 209.218.218.138
>
>>>>>> port = 500 keep state label "IPSEC: Computer Support - inbound
>>>>>>
>>>>> isakmp"
>>>>>
>>>>>> pass out quick on $wan proto esp from 209.218.218.138 to
>>>>>>
>>>>> 70.237.44.110
>>>>>
>>>>>> keep state label "IPSEC: Computer Support - outbound esp proto"
>>>>>> pass in quick on $wan proto esp from 70.237.44.110 to
>>>>>>
> 209.218.218.138
>
>>>>>> keep state label "IPSEC: Computer Support - inbound esp proto"
>>>>>>
>>>>>> pass in quick on em0 inet proto tcp from any to $loopback port 8021
>>>>>> keep state label "FTP PROXY: Allow traffic to localhost"
>>>>>> pass in quick on em0 inet proto tcp from any to $loopback port 21
>>>>>>
>>>>> keep
>>>>>
>>>>>> state label "FTP PROXY: Allow traffic to localhost"
>>>>>> pass in quick on em1 inet proto tcp from port 20 to (em1) port >
>>>>>>
>>>>> 49000
>>>>>
>>>>>> user proxy flags S/SA keep state label "FTP PROXY: PASV mode data
>>>>>> connection"
>>>>>> # enable ftp-proxy
>>>>>> pass in quick on em4 inet proto tcp from any to $loopback port 8022
>>>>>> keep state label "FTP PROXY: Allow traffic to localhost"
>>>>>> pass in quick on em4 inet proto tcp from any to $loopback port 21
>>>>>>
>>>>> keep
>>>>>
>>>>>> state label "FTP PROXY: Allow traffic to localhost"
>>>>>>
>>>>>> Vaughn
>>>>>>
>>>>>>
>>>>>> Scott Ullrich wrote:
>>>>>>
>>>>>>> On 3/29/07, Vaughn L. Reid III <[EMAIL PROTECTED]>
>>>>>>>
>>>>> wrote:
>>>>>
>>>>>>>> I didn't get the request, but I'll be happy check to see if
>>>>>>>>
>>>>> rules are
>>>>>
>>>>>>>> being added.  Should I remove the manual rules that I created
>>>>>>>>
> first
>
>>>>>>>> before checking?
>>>>>>>>
>>>>>>> Yes, please.   Then open up /tmp/rules.debug and look for "VPN
>>>>>>> Rules"..  Below that marker is the system generated IPSEC rules.
>>>>>>>
> Do
>
>>>>>>> you see entries for the OPT interface?
>>>>>>>
>>>>>>> Scott
>>>>>>>
>>>>>>>
>>>>>>>
>>>>> ---------------------------------------------------------------------
>>>>>
>>>>>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>>>>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>>>>>
>>>>>>>
>>>>>>
> ---------------------------------------------------------------------
>
>>>>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>>>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>>>>
>>>>>>
>>>>> ---------------------------------------------------------------------
>>>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>>>
>>>>>
>>>>>
>>>> ---------------------------------------------------------------------
>>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>>
>>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>
>>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>> For additional commands, e-mail: [EMAIL PROTECTED]
>>
>>

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to