• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Site-to-Site VPN after 2.6 upgrade stop working

IPsec
5
21
2.7k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    SidekickGmbH
    last edited by Mar 26, 2022, 10:49 AM

    After updating to the latest version (2.6.0) on several systems, my Ipsec tunnels no longer work correctly.(15 tunnels, different phase 2, different phase 1, the whole virtual but also application, on Hyper V and on VMWare).
    The tunnels come up, both phases - everything looks good. However, the traffic only flows in one direction through the tunnel.The tunnels come up, both phases - everything looks good.However, the traffic only flows through the tunnel on one side. I have tried to trace for a few hours but somehow I lose the packets on the way back.
    Does anyone have any ideas or similar experiences? (All systems ran without problems until the upgrade).

    S 1 Reply Last reply Mar 28, 2022, 12:48 AM Reply Quote 0
    • S
      SidekickGmbH
      last edited by Mar 26, 2022, 1:00 PM

      downgrade 2.5.0, imported configuration from 2.6 :-) , all VPN online, everything works... 15 tunnelds are working again. On the other hand still 2.6... hmmm

      T 1 Reply Last reply Mar 27, 2022, 11:59 PM Reply Quote 0
      • T
        timboau 0 @SidekickGmbH
        last edited by Mar 27, 2022, 11:59 PM

        @sidekickgmbh Yes same problems with 2.6 - reverting to 2.5 they all work fine

        1 Reply Last reply Reply Quote 0
        • S
          SteveITS Galactic Empire @SidekickGmbH
          last edited by Mar 28, 2022, 12:48 AM

          @sidekickgmbh Did you already read through the changes for IPSec?

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote ๐Ÿ‘ helpful posts!

          T S 2 Replies Last reply Mar 28, 2022, 1:47 AM Reply Quote 0
          • T
            timboau 0 @SteveITS
            last edited by timboau 0 Mar 28, 2022, 1:49 AM Mar 28, 2022, 1:47 AM

            @steveits Couldn't see anything that would suggest a change was made to break IPSEC under 2.6

            Very few packages are loaded - all do reload after the upgrade.
            Cron
            PfBlocker
            Softflowd
            WireGuard

            Often the system will connect all IPSEC VPN sessions then some don't stay connected. Other times after the upgrade some sessions don't establish. Stopping and starting the IPEC daemon will often result in different sessions connecting but not all.

            S 1 Reply Last reply Mar 28, 2022, 1:53 AM Reply Quote 0
            • S
              SteveITS Galactic Empire @timboau 0
              last edited by Mar 28, 2022, 1:53 AM

              @timboau-0 do you have Captive portal by chance? There are some issues and a patch for that.
              I donโ€™t have a site to site but I set up a mobile IPSec yesterday.

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote ๐Ÿ‘ helpful posts!

              T 1 Reply Last reply Mar 28, 2022, 2:00 AM Reply Quote 0
              • T
                timboau 0 @SteveITS
                last edited by Mar 28, 2022, 2:00 AM

                @steveits No - its a pretty basic config other than a bunch of iPSEC tunnels

                1 Reply Last reply Reply Quote 0
                • S
                  SidekickGmbH @SteveITS
                  last edited by Mar 28, 2022, 7:11 AM

                  @steveits Yes, but I could not directly discover anything that could lead to the problem.

                  I have also completely reconfigured some tunnels, other encryptions, other subnets, other access data. Always the same tunnel comes up (phase 1 and 2), data flows from A to B and disappears on the way back. Wireshark etc. I am stuck because the packets are simply gone.

                  S 1 Reply Last reply Mar 28, 2022, 2:18 PM Reply Quote 0
                  • S
                    SidekickGmbH
                    last edited by Mar 28, 2022, 7:15 AM

                    I will do a test setup as soon as I have some time. I still have two 4100s and can try to start with a 2.6 system. Maybe the problem only exists when upgrading.

                    1 Reply Last reply Reply Quote 0
                    • S
                      SteveITS Galactic Empire @SidekickGmbH
                      last edited by Mar 28, 2022, 2:18 PM

                      @sidekickgmbh said in Site-to-Site VPN after 2.6 upgrade stop working:

                      Yes, but I could not directly discover anything that could lead to the problem

                      If you install the System Patches package there's a patch "Fix Captive Portal handling of non-TCP traffic after login (Redmine #12834)" that affects UDP packets.

                      There's also a couple forum threads about captive portal blocking traffic if using limiters, though that doesn't sound like your issue.

                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                      Upvote ๐Ÿ‘ helpful posts!

                      1 Reply Last reply Reply Quote 0
                      • S
                        SidekickGmbH
                        last edited by Mar 31, 2022, 1:27 PM

                        Hello everyone, interim result: The tunnels have not been running since yesterday (same symptoms). I'm now starting to downgrade the other side (then I won't have 2.6 on both sides of the tunnel) and hope that I can get everything stable again.

                        1 Reply Last reply Reply Quote 0
                        • S
                          SidekickGmbH
                          last edited by Mar 31, 2022, 1:29 PM

                          @SteveITS i will try in the lab! Thanks for the tip!

                          1 Reply Last reply Reply Quote 0
                          • N
                            NOCling
                            last edited by Apr 1, 2022, 4:35 AM

                            Set the hardware crypto right, because the 4100 uses QAT and not AES-NI, there was a problem with that.

                            After the change, reboot so everything loads correctly and QAT is active, AES-NI inactive. Is it working now?

                            Netgate 6100 & Netgate 2100

                            S 1 Reply Last reply Apr 1, 2022, 11:13 AM Reply Quote 0
                            • S
                              SidekickGmbH @NOCling
                              last edited by Apr 1, 2022, 11:13 AM

                              @nocling Nope. arhh

                              T 1 Reply Last reply Apr 1, 2022, 1:29 PM Reply Quote 0
                              • T
                                timboau 0 @SidekickGmbH
                                last edited by Apr 1, 2022, 1:29 PM

                                @sidekickgmbh
                                There is something very wrong.. attempting a fresh 2.6 importing only IPsec configs - this isnโ€™t the only post about this. Iโ€™ve offered Netgate or anyone to have a look 2.5 really great - 2.6 upgrades with many IPsec configs horrible downgrading back to 2.5 stable

                                1 Reply Last reply Reply Quote 0
                                • T
                                  timboau 0
                                  last edited by timboau 0 Apr 2, 2022, 6:53 AM Apr 2, 2022, 6:04 AM

                                  So after an afternoon of playing here is what I found.

                                  Update 2.5 to 2.6 - breaks ipsec
                                  Clean 2.6 install - restore backup - breaks ipsec
                                  Clean 2.6 restore parts (interface,nat,rules,ipsec) - all ok!

                                  What a piece of rubbish - running for a while and IPSEC tunnels now drop and won't reconnect

                                  Currently, I can boot 2.6 the tunnels come up and work 100% fine. Then some will drop and just not reconnect - no config changes on either side. They connections drop well before the natural timeouts of the VPN

                                  There are messages
                                  Both sides seem to be attempting to connect but the 2.6 side doesn't reply to the 2.5 trying to connect.
                                  ignoring acquire, connection attempt pending

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    timboau 0
                                    last edited by Apr 3, 2022, 7:35 AM

                                    IPSEC apparently auto-creates rules for incoming port 500 & 4500 traffic - is there any way where I can see these rules listed?

                                    Interestingly I also run NAT 500&4500 for Ipsec internal VPN server - never had an issue with this before. Turned off NAT to the server and didnt seem to make any difference and never has been an issue previouslydidn't

                                    S 1 Reply Last reply Apr 4, 2022, 2:37 PM Reply Quote 0
                                    • S
                                      SteveITS Galactic Empire @timboau 0
                                      last edited by Apr 4, 2022, 2:37 PM

                                      @timboau-0 One can view the rules table:
                                      https://docs.netgate.com/pfsense/en/latest/troubleshooting/firewall.html#ruleset-failing-to-load

                                      "The ruleset can also be verified from the console or Diagnostics > Command in the Shell Execute box by running:

                                      pfctl -f /tmp/rules.debug
                                      "

                                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                      Upvote ๐Ÿ‘ helpful posts!

                                      T 1 Reply Last reply Apr 4, 2022, 10:29 PM Reply Quote 0
                                      • T
                                        timboau 0 @SteveITS
                                        last edited by Apr 4, 2022, 10:29 PM

                                        @steveits the remote subnets im having issues with are the table <vpn_networks> & table <negate_networks> on both devices.

                                        The only rule relating to those tables appears to be scrub from any to <vpn_networks> max-mss 1300
                                        scrub from <vpn_networks> to any max-mss 1300

                                        There are the NAT inbound Redirects in place for Port 500 & 4500 for the internal IPSec server

                                        There appears in place the VPNRules for passing traffic to/from the WAN upstream gateway for each side of the Ipsec connections

                                        1 Reply Last reply Reply Quote 0
                                        • topic:timeago-later,14 days
                                        • T
                                          timboau 0
                                          last edited by Apr 18, 2022, 10:42 PM

                                          Ive had a play with this again over the Easter break - whats the rules around both sides trying to connect to each other at the same time? (under 2.5 it just worked either side brought up the link - in fact, it generally never dropped)
                                          There are multiple entries about:
                                          ignoring acquire, connection attempt pending
                                          On this side, there is an incoming SA (unnamed): #8084 as a responder
                                          there is also an initiator outbound SA (neither connect successfully) after a while they both seem to give up then one side manages to connect first and the link comes up. (this can a few minutes as they battle to connect)
                                          I have this setup still up and running if anyone has any time for a look - doesn't take long for one of the tunnels to drop then not reconnect for a while.
                                          All ipsec configs must be ok - firewall etc all ok as they eventually connect and work as expected they are just dropping really often and then not reconnecting as they did under 2.5

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            8/21
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.