Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPsec VTI does not pass traffic on 2.6.0

    Scheduled Pinned Locked Moved IPsec
    28 Posts 5 Posters 3.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      timboau 0 @Kev.i.n
      last edited by timboau 0

      @kev-i-n no FQDN in my configs (my IP/Peer address)

      (they all initially connected except one on boot - they just didnt reconnect) - Stopped IPSEC service on both and started again.
      Same sites remained down

      Generally
      IKEv2
      P1 AES256-CGM 128 / AES-XCBC - HD 14
      P2 ESP AES128/AES256-CGM
      Key groups off

      DPD enabled

      Unique ID (replace)
      Filter IPSEC Tunnel and VTI on IPSEC tab (ENC0) anything there?

      1 Reply Last reply Reply Quote 0
      • T
        thatsysadmin @Kev.i.n
        last edited by

        @kev-i-n
        I still had the same issue with the "IP option" I changed it as a troubleshooting measure.

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by jimp

          There appear to be a couple different problems here getting lumped together.

          If your VTI interfaces connect but do not pass traffic, this is the correct thread.

          If you have any other issue on 22.01/2.6.0 such as tunnels failing to connect or reconnect, please start a new thread and post your information there. Be sure to include log entries from both sides as well as the information requested previously in this thread (IPsec config for the tunnel from config.xml and swanctl.conf, ifconfig output, etc).


          Now, back to connected VTIs not passing traffic:

          I'm still not getting the whole picture from these and the thread has gotten a bit mixed up with the other unrelated info. With one of these VTI tunnels in a state that fails to pass traffic I need the following information:

          • The output of ifconfig -a for the ipsecX interface(s)
          • The output of setkey -D and setkey -DP
          • The contents of /var/etc/ipsec/swanctl.conf for the tunnel(s)
          • The contents of config.xml for the tunnel(s) -- both P1 and all P2s

          As with before you can mask private info but try to keep it consistent. For example, replace unique IP addresses consistently, e.g. 1.2.3.4 with A.A.A.A and 9.8.7.6 with B.B.B.B so I can tell they are different IP addresses in the output. Mask or remove any private things like PSKs or identifiers if they are sensitive.

          If both sides are running pfSense software then having the info from both sides would help.

          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          T T 2 Replies Last reply Reply Quote 1
          • T
            timboau 0 @jimp
            last edited by timboau 0

            @jimp Hi very happy to start a new thread - lets call it 2.6.0 ipsec is broken - dont upgrade (yet).

            Seriously - in the few days there appears to a lot of activity around ipsec having issues on 2.6 and people here trying to assist and fix their broken networks (remember this is a release version)

            As a netgate developer how about you start a new thread for Systems that have had ipsec fail after upgrading from 2.5 to 2.6 and from there you can be particular about what information you want to put where.

            Whether it be the VTI is broken, the tunnel is broken, the routing is broken - hey it just stopped working after upgrading. Most customers are coming here looking or answers on why it stopped after upgrading.

            My offer is still open for you to look at a working 2.5 - we can revert to 2.6 and you can diagnose it anyway you want. You can have remote access; Im keen for this to be resolved rather than sitting back concerned im posting into the wrong thread about a general ipsec failure.

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              It is working for the vast majority of people, such a dire warning is unwarranted. It has been thoroughly tested internally and over the last six months or more in snapshots including heavy use on Netgate infrastructure used by all of our employees.

              Keep your thread subjects relevant, for example "IPsec VTI tunnel will not reconnect on 2.6.0" or similar. Do not assume it's happening to anyone but you, and do not assume your problem is identical to others. Only after diagnosing the problem can such a determination be made.

              It's important to keep each report separate so that the details do not get confused.

              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • T
                thatsysadmin @jimp
                last edited by thatsysadmin

                This post is deleted!
                1 Reply Last reply Reply Quote 0
                • T
                  thatsysadmin @jimp
                  last edited by

                  @jimp
                  Here's the outputs.
                  https://github.com/thatsysadmin/pfsense_2.6.0_IPsec_troubleshooting

                  One thing; /var/etc/swanctl.conf doesn't exist, did you mean /var/etc/ipsec/strongswan.conf?

                  jimpJ 1 Reply Last reply Reply Quote 0
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate @thatsysadmin
                    last edited by

                    @thatsysadmin said in IPsec VTI does not pass traffic on 2.6.0:

                    @jimp
                    Here's the outputs.
                    https://github.com/thatsysadmin/pfsense_2.6.0_IPsec_troubleshooting

                    One thing; /var/etc/swanctl.conf doesn't exist, did you mean /var/etc/ipsec/strongswan.conf?

                    I meant /var/etc/ipsec/swanctl.conf, I've edited the post above. I'll check out the other info and see if anything stands out.

                    Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      You have two P2s on that tunnel, one tunnel mode and one VTI. That isn't a valid configuration and it's unnecessary. You should remove the tunnel mode entry (not just disable it). If you do that and then stop IPsec, then start IPsec, it might start working.

                      That would explain the reqid mismatching which is likely why traffic isn't passing. In setkey it shows it's looking for reqid 5001 but in ifconfig the interface is set for 5002.

                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      T 1 Reply Last reply Reply Quote 1
                      • T
                        thatsysadmin @jimp
                        last edited by thatsysadmin

                        @jimp
                        After a reconfiguration of the interfaces, it works. Thanks for all your help.

                        But why would having one of the phase 2s disabled break the whole thing though; shouldn't it be disregarded if it was disabled?

                        T jimpJ 2 Replies Last reply Reply Quote 0
                        • T
                          timboau 0 @thatsysadmin
                          last edited by

                          @thatsysadmin ahh interesting - I think I might have some disabled too.. After 2.5.2 left the status on P2 messed up i've not been actively monitoring them. If you have a testing setup does disabling them at EITHER end break 2.6

                          1 Reply Last reply Reply Quote 0
                          • K
                            Kev.i.n
                            last edited by

                            I too also had some lingering Phase 2's configured for tunnel mode, albeit in a disabled state as they were from before I made the switch to route-based.

                            After wrestling to remove these within 2.5.2 - which required reconfiguring the VTI setup - the VPN eventually started passing traffic again. After this, I took the plunge to 2.6.0 and it came back up successfully without any changes needed.

                            So it does seem like the common issue here in that if using routed mode (VTI) with old tunnel mode phase 2's still setup - even if they're disabled - prevents the s2s from passing traffic.

                            Glad we got there in the end :) Thanks for your assistance @jimp

                            1 Reply Last reply Reply Quote 0
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate @thatsysadmin
                              last edited by

                              @thatsysadmin said in IPsec VTI does not pass traffic on 2.6.0:

                              But why would having one of the phase 2s disabled break the whole thing though; shouldn't it be disregarded if it was disabled?

                              It could probably handle that better, but it's not a valid combination to have a mix of tunnel and VTI even if some are disabled. They should all be the same type, and really there should be at most one VTI P2 per address family (so one IPv4, one IPv6). I'm not sure if we have validation which actively checks for and prevents that yet, though.

                              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.