Sounds like this http://cvstrac.pfsense.com/tktview?tn=1129,6

On 10/16/06, J. Ryan Earl <[EMAIL PROTECTED]> wrote:
Let me explain something here since I'm not making the problem clear.
The problem has -nothing- at all to do with the Cisco firewall.  The
setsockopt errors occur -well before- any communication with the other
end-point of the VPN tunnel.  Case in point, I can set the other
end-point of the tunnel to be a non-existent IP address and I still get
the setsockopt errors.  I tried making a tunnel to non-Cisco firewalls,
same result.  Furthermore, ISAKMP NAT Transversal is definitely disabled
on the Cisco firewall as per default.

The fact of the matter is there is a disagreement of some sort between
web-configuration GUI front-end and the kernel's network back-end.  The
whole IPSEC_NAT_T thing may be a redherring, but from what I can see
IPSEC_NAT_T is required for the UDP_ENCAP_ESPINUDP_NON_IKE socket option
which is in turn required for network-to-network VPN tunnels with
pre-shared keys.  Software within pfSense--racoon--is trying to set an
unsupported socket option well before any communication with the remote
VPN end-point.  Thus the problem is definitely within pfSense somewhere,
be it the kernel lacking support of a needed option or racoon setting a
bad socket option.  I even switched from ESP to AH on Phase2, but it
still tried doing the UDP_ENCAP_ESPINUDP_NON_IKE socket option and
actually stopped the pfSense firewall from doing any NAT at all for a
minute or so.

 From the quote below, it sounds like I'm the first person to try a
network-to-network VPN tunnel using a pre-shared key on the pfSense
firewall.  Can anyone confirm successfully setting up a
network-to-network VPN tunnel with pre-shared key between a pfSense
firewall and any other non-pfSense firewall?  If I'm missing something
let me know, but all signs point to a problem in pfSense.

Thanks again,
-ryan

Bill Marquette wrote:

> Geee, sure wish people had tested IPSec NAT Traversal when we asked
> for testers.  We got no positive (or negative) feedback and it was
> pulled - too late in the release phase to leave it in for long.  I
> don't know anything about the Cisco side of things, hopefully someone
> else can help you get it configured.  But NAT-T on the Cisco side
> certainly seems to be the source of your problems.
>
> --Bill



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to