This email will look best in a monospaced font.

changed to aggressive mode on both ends. Pfsense is version 2.3  Changed
the netgear identifiers to pwmtest for the ike policy and pwm-office for
the vpn policy.

I deleted the vpn policy and re-created it.  So here are final settings.

Netgear:

VPN - Auto Policy

General
Policy Name     pwm-office
IKE policy      pwmtest
Remote VPN Endpoint
        Address Type: IP Address
        Address Data: <ip address of pfsense firewall>
SA Life Time    86400 (Seconds)
                0     (Kbytes)
IPSec PFS [checked]     PFS Key Group: Group 2 (1024 Bit)

Traffic Selector
Local IP        Subnet address
                Start IP address: 192.168.1.0           
                Finish IP address: n/a
                Subnet Mask: 255.255.255.0

Remote IP       Subnet address
                Start IP address: 10.0.0.0
                Finish IP address: n/a
                Subnet Mask 255.255.252.0

AH Configuration
Enable Authentication [not checked]     Authentication Algorithm: SHA-1

ESP Configuration
Enable Encryption [checked]     Encryption Algorithm: 3DES
Enable Authentication [checked] Authentication Algorithm: SHA-1

IKE Policy Configuration
General
Policy Name     pwmtest
Direction/Type  Both Directions
Exchange Mode:  Aggressive

Local
Select Local Gateway:   Wan1 (this particular unit has two wann ports with
failover.)
Local Identity Type:    WAN IP Address
Remote Identity Data:   <blank>  (This info doesn't get entered here.)

IKE SA Parameters
Encryption Algorithm:     3DES
Authentication Algorithm: SHA1
Authentication Method:    Pre-Shared Key
                          <your preshared key goes here>
RSA Signature (requires Certificate) [unchecked]
Diffie-Hellman Group      Group 2 (1024 bit)
SA Life Time:             28800

On the pfsense box:

VPN:IPsec:Edit tunnel
Mode:                     Tunnel
Disabled:                 [unchecked]
Interface:                WAN
Local Subnet:             LAN subnet
Remote Subnet:            192.168.1.0/24
Remote Gateway            <WAN Address of the netgear router>
Description               <however you want to describe yours'>

Phase 1 Proposed (Authentication)
Negotiation mode          aggressive
My identifier:            IP Address <my WAN ipaddress>
Encryption algorithm:     3DES
Hash Algorithm:           SHA1
DH Key Group:             2
Lifetime                  28800
Authentication Method:    Pre-shared key
Pre-Shared Key:           <pre shared key goes here.>
Certificate               <blank>
Key                       <blank>
Peer certificate          <blank>

Phase2 proposal (SA/Key Exchange)
Protocol:                 ESP
Encryption algorithms:    3DES
Hash algorithms:          SHA1
PFS key group:            2
Lifetime:                 86400




I hope this helps anyone having trouble.  Thanks for your help Holger.

Curtis



Holger Bauer wrote:
> Try to use aggressive mode on both ends. Also try to setup different 
> identifiers (like combination of UFQDN and passkeyphrase. It looks to me that 
> there is a problem with the identifier. Is one of the ends behind another 
> NAT? Also what version are you running?
> 
> Holger
> 
>> -----Original Message-----
>> From: cmaurand [mailto:[EMAIL PROTECTED]
>> Sent: Monday, September 18, 2006 5:28 PM
>> To: support@pfsense.com
>> Subject: [pfSense Support] pfsense to netgear ipsec vpn
>>
>>
>> Hello,
>>   I'm a relative newbie to ipsec on pfsense.  I'm trying to 
>> establish an
>>  ipsec vpn connection to a netgear FVS124G.  I already have a 
>> connection
>> going to a sonicwall and that runs fine.
>>
>> The configuration on the pfsense is
>>
>>      remote ip address PSK = <the key> and they match
>>      Interface = WAN (and its my primary address)
>>      Local Subnet = LAN Subnet
>>      remote subnet = 192.168.1.0/24
>>      remote gateway = <remote ip address>
>>      Description = Charlotte Corporate
>>
>> Phase 1
>>      Negotiation mode = main
>>      My identifier = My IP address
>>      Encryption algorithm = 3DES
>>      Hash algorithm = SHA1
>>      DH Key group = 2 (1024 bit)
>>      lifetime = 86400
>>      Autentication Method = Pre-Shared Key
>>      Pre-Shared Key = <my psk>
>>
>> Phase 2 (SA/Key Exchange)
>>      Protocol = ESP
>>      Encryption Algorithms = 3DES
>>      Hash Algoritm = SHA1
>>      PFS key group = 2 (1024 bit)
>>      Lifetime = 28800
>>
>> On the Netgear IKE Policy
>>      General
>>              name = pwmtest
>>              Direction/Type = Both Directions
>>              Exchange Mode = Main Mode
>>      Local
>>              Select Local Gateway = Wan1 (69.whatever)
>>              Local Identity type WAN IP Address
>>
>>      Remote
>>              Remote Host Configuration Record = None
>>              Remote Identity Type = WAN IP
>>      
>>      IKE SA Parameters
>>              Encryption Algorithm = 3DES
>>              Authentication Algorithm = SHA1
>>              Authentication Method = Pre-shared Key
>>                      <my key>
>>              Diffie-Hellman (DH) Group = Group 2 (1024 bit)
>>              SA Life Time = 28800
>>
>> On the Netgear VPN Policy
>>      General
>>              Policy Name = pwmtest
>>              IKE Policy = pwmtest
>>              Remote VPN Endpoint Type = IP Address
>>              Remote VPN Endpoint IP Address = <my ip address>
>>      Traffic Selector
>>              Local IP = Subnet address
>>                      Start IP address = 192.168.1.0          
>>              
>>                      Finish IP Address = N/A
>>                      Subnet Mask = 255.255.255.0
>>              Remote IP = Subnet address
>>                      Start IP Address = 10.0.0.0
>>                      Finnish IP Address = n/a
>>                      Subnet Mask = 255.255.252.0
>>
>>      AH Conguration = unchecked
>>
>>      ESP Configuration
>>              Enable Encryption = checked = 3DES
>>              Enable Authentication = checked = SHA-1
>>
>>
>> From the pfsense I get: (some lines wrapped)
>>
>> racoon: INFO: respond new phase 1 negotiation: <local wan
>> ip>[500]<=><remote wan ip>[500]
>> racoon: ERROR: not acceptable Identity Protection mode
>> racoon: ERROR: not acceptable Identity Protection mode
>>
>> Thanks in advance
>>
>> -- 
>> Curtis Maurand
>> Senior Network & Systems Engineer
>> BlueTarp Financial, Inc.
>> 443 Congress St.
>> 6th Floor
>> Portland, ME 04101
>> 207.797.5900 x233 (office)
>> 207.797.3833   (fax)
>> mailto:[EMAIL PROTECTED]
>> http://www.bluetarp.com
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>> For additional commands, e-mail: [EMAIL PROTECTED]
>>
>>
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
> 
> 


-- 
Curtis Maurand
Senior Network & Systems Engineer
BlueTarp Financial, Inc.
443 Congress St.
6th Floor
Portland, ME 04101
207.797.5900 x233 (office)
207.797.3833      (fax)
mailto:[EMAIL PROTECTED]
http://www.bluetarp.com

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to