Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSec connection goes stale when high throughput

    Scheduled Pinned Locked Moved IPsec
    23 Posts 4 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      reiven @keyser
      last edited by reiven

      @keyser I did it because there wasn't a common denominator for Windows 10/11, Mac OS High Sierra / Ventura, Android 9-13, iOS 14-16 and Linux :) ... which is fine with everything.

      With this configuration the stalling occurs on every platform. Windows - Android - Mac (haven't tested on iOS / Linux)

      keyserK 2 Replies Last reply Reply Quote 0
      • keyserK
        keyser Rebel Alliance @reiven
        last edited by keyser

        @reiven True if you are using the wizard driven creation of the VPN on clients :-)
        If you are in control of the clients, you should consider just creating the tunnel on them with a profile tool/commandline statement. Then you can setup the ciphers and transforms as you desire (and restrict them to just one).

        Love the no fuss of using the official appliances :-)

        1 Reply Last reply Reply Quote 0
        • X
          xylem @keyser
          last edited by

          @keyser We do not have a CPIC-8955 Accelerator Card with Intel QuickAssist Technology installed in the Netgate 1537. I assume that QAT is therefore useless, right?

          keyserK 1 Reply Last reply Reply Quote 0
          • keyserK
            keyser Rebel Alliance @xylem
            last edited by

            @xylem said in IPSec connection goes stale when high throughput:

            @keyser We do not have a CPIC-8955 Accelerator Card with Intel QuickAssist Technology installed in the Netgate 1537. I assume that QAT is therefore useless, right?

            Ahh, yeah, that’s right. The 1537/41 XEON based boxes does not have QAT built-in. Sorry about the confusion.

            Love the no fuss of using the official appliances :-)

            1 Reply Last reply Reply Quote 0
            • keyserK
              keyser Rebel Alliance @reiven
              last edited by

              @reiven said in IPSec connection goes stale when high throughput:

              With this configuration the stalling occurs on every platform. Windows - Android - Mac (haven't tested on iOS / Linux)

              If the issue is the same as GCM on my ARM box, it’s actually the entire IPSec stack that stops when the issue occurs. So that would stop any other tunnels running - regardless of the ciphers they are using. But - that is on the ARM based boxes - that might be because the HW accelerator is involved in the issue.

              Love the no fuss of using the official appliances :-)

              1 Reply Last reply Reply Quote 0
              • N
                NOCling
                last edited by

                Look like if the rekey is a problem, check up your log files.
                Do you have a look on it?

                Netgate 6100 & Netgate 2100

                X 1 Reply Last reply Reply Quote 0
                • X
                  xylem @NOCling
                  last edited by

                  @nocling I have configured the tunnel again with the following settings:
                  Screenshot 2023-01-27 224329.png

                  Disconnected the tunnel manually and reconnected it.
                  After that I started downloading files from the remote NAS.
                  After the tunnel was established, no further log entries are visible.

                  Log Local Site

                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> nothing to initiate
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> activating new tasks
                  Jan 27 23:06:40	charon	99941	08[CHD] <con2|122> CHILD_SA con2{316} state change: INSTALLING => INSTALLED
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> CHILD_SA con2{316} established with SPIs c18a90ef_i c133b9e9_o and TS 192.168.10.0/24|/0 === 192.168.20.0/24|/0
                  Jan 27 23:06:40	charon	99941	08[CHD] <con2|122> SPI 0xc133b9e9, src IP_LOCAL_SITE dst IP_REMOTE_SITE
                  Jan 27 23:06:40	charon	99941	08[CHD] <con2|122> adding outbound ESP SA
                  Jan 27 23:06:40	charon	99941	08[CHD] <con2|122> SPI 0xc18a90ef, src IP_REMOTE_SITE dst IP_LOCAL_SITE
                  Jan 27 23:06:40	charon	99941	08[CHD] <con2|122> adding inbound ESP SA
                  Jan 27 23:06:40	charon	99941	08[CHD] <con2|122> using AES_GCM_16 for encryption
                  Jan 27 23:06:40	charon	99941	08[CHD] <con2|122> CHILD_SA con2{316} state change: CREATED => INSTALLING
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> config: 192.168.20.0/24|/0, received: 192.168.20.0/24|/0 => match: 192.168.20.0/24|/0
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> selecting traffic selectors for other:
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> config: 192.168.10.0/24|/0, received: 192.168.10.0/24|/0 => match: 192.168.10.0/24|/0
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> selecting traffic selectors for us:
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> configured proposals: ESP:AES_GCM_16_256/MODP_4096/NO_EXT_SEQ
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> received proposals: ESP:AES_GCM_16_256/NO_EXT_SEQ
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> proposal matches
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> selecting proposal:
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> maximum IKE_SA lifetime 27765s
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> scheduling rekeying in 24885s
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> IKE_SA con2[122] state change: CONNECTING => ESTABLISHED
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> IKE_SA con2[122] established between IP_LOCAL_SITE[IP_LOCAL_SITE]...IP_REMOTE_SITE[IP_REMOTE_SITE]
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> authentication of 'IP_REMOTE_SITE' with pre-shared key successful
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> received ESP_TFC_PADDING_NOT_SUPPORTED notify
                  Jan 27 23:06:40	charon	99941	08[ENC] <con2|122> parsed IKE_AUTH response 1 [ IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr ]
                  Jan 27 23:06:40	charon	99941	08[NET] <con2|122> received packet: from IP_REMOTE_SITE[500] to IP_LOCAL_SITE[500] (201 bytes)
                  Jan 27 23:06:40	charon	99941	08[NET] <con2|122> sending packet: from IP_LOCAL_SITE[500] to IP_REMOTE_SITE[500] (270 bytes)
                  Jan 27 23:06:40	charon	99941	08[ENC] <con2|122> generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) CERTREQ IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> establishing CHILD_SA con2{316} reqid 5
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> configured proposals: ESP:AES_GCM_16_256/NO_EXT_SEQ
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> 192.168.20.0/24|/0
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> proposing traffic selectors for other:
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> 192.168.10.0/24|/0
                  Jan 27 23:06:40	charon	99941	08[CFG] <con2|122> proposing traffic selectors for us:
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> successfully created shared key MAC
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> authentication of 'IP_LOCAL_SITE' (myself) with pre-shared key
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> sending cert request for "CN=mobile-ipsec-ca-bern"
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> IKE_AUTH task
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> IKE_CERT_PRE task
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> reinitiating already active tasks
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> received 1 cert requests for an unknown ca
                  Jan 27 23:06:40	charon	99941	08[IKE] <con2|122> received cert request for unknown ca with keyid 33:6f:1a:1a:f1:b6:24:fa:4f:cc:d7:1a:0c:1f:f3:71:87:ac:a6:6e
                  Jan 27 23:06:39	charon	99941	08[CFG] <con2|122> received supported signature hash algorithms: sha256 sha384 sha512 identity
                  Jan 27 23:06:39	charon	99941	08[CFG] <con2|122> selected proposal: IKE:AES_GCM_16_256/PRF_HMAC_SHA2_256/MODP_4096
                  Jan 27 23:06:39	charon	99941	08[CFG] <con2|122> configured proposals: IKE:AES_GCM_16_256/PRF_HMAC_SHA2_256/MODP_4096
                  Jan 27 23:06:39	charon	99941	08[CFG] <con2|122> received proposals: IKE:AES_GCM_16_256/PRF_HMAC_SHA2_256/MODP_4096
                  Jan 27 23:06:39	charon	99941	08[CFG] <con2|122> proposal matches
                  Jan 27 23:06:39	charon	99941	08[CFG] <con2|122> selecting proposal:
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> received CHILDLESS_IKEV2_SUPPORTED notify
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> received SIGNATURE_HASH_ALGORITHMS notify
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> received FRAGMENTATION_SUPPORTED notify
                  Jan 27 23:06:39	charon	99941	08[ENC] <con2|122> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
                  Jan 27 23:06:39	charon	99941	08[NET] <con2|122> received packet: from IP_REMOTE_SITE[500] to IP_LOCAL_SITE[500] (745 bytes)
                  Jan 27 23:06:39	charon	99941	08[NET] <con2|122> sending packet: from IP_LOCAL_SITE[500] to IP_REMOTE_SITE[500] (712 bytes)
                  Jan 27 23:06:39	charon	99941	08[ENC] <con2|122> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
                  Jan 27 23:06:39	charon	99941	08[CFG] <con2|122> sending supported signature hash algorithms: sha256 sha384 sha512 identity
                  Jan 27 23:06:39	charon	99941	08[CFG] <con2|122> configured proposals: IKE:AES_GCM_16_256/PRF_HMAC_SHA2_256/MODP_4096
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> IKE_SA con2[122] state change: CREATED => CONNECTING
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> initiating IKE_SA con2[122] to IP_REMOTE_SITE
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating IKE_AUTH_LIFETIME task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating CHILD_CREATE task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating IKE_CONFIG task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating IKE_CERT_POST task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating IKE_AUTH task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating IKE_CERT_PRE task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating IKE_NATD task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating IKE_INIT task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating IKE_VENDOR task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> activating new tasks
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> queueing CHILD_CREATE task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> queueing IKE_AUTH_LIFETIME task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> queueing IKE_CONFIG task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> queueing IKE_CERT_POST task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> queueing IKE_AUTH task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> queueing IKE_CERT_PRE task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> queueing IKE_NATD task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> queueing IKE_INIT task
                  Jan 27 23:06:39	charon	99941	08[IKE] <con2|122> queueing IKE_VENDOR task
                  Jan 27 23:06:39	charon	99941	10[CHD] <con2|121> CHILD_SA con2{314} state change: INSTALLED => DESTROYING
                  Jan 27 23:06:39	charon	99941	10[IKE] <con2|121> IKE_SA con2[121] state change: DELETING => DESTROYING
                  Jan 27 23:06:39	charon	99941	10[NET] <con2|121> sending packet: from IP_LOCAL_SITE[500] to IP_REMOTE_SITE[500] (65 bytes)
                  Jan 27 23:06:39	charon	99941	10[ENC] <con2|121> generating INFORMATIONAL request 2 [ D ]
                  Jan 27 23:06:39	charon	99941	10[IKE] <con2|121> sending DELETE for IKE_SA con2[121]
                  Jan 27 23:06:39	charon	99941	10[IKE] <con2|121> IKE_SA con2[121] state change: ESTABLISHED => DELETING
                  Jan 27 23:06:39	charon	99941	10[IKE] <con2|121> deleting IKE_SA con2[121] between IP_LOCAL_SITE[IP_LOCAL_SITE]...IP_REMOTE_SITE[IP_REMOTE_SITE]
                  Jan 27 23:06:39	charon	99941	10[IKE] <con2|121> activating IKE_DELETE task
                  Jan 27 23:06:39	charon	99941	10[IKE] <con2|121> activating new tasks
                  Jan 27 23:06:39	charon	99941	10[IKE] <con2|121> queueing IKE_DELETE task
                  Jan 27 23:06:26	charon	99941	08[CHD] CHILD_SA con2{315} state change: CREATED => ROUTED
                  Jan 27 23:06:26	charon	99941	08[CFG] installing 'con2'
                  Jan 27 23:06:26	charon	99941	08[CHD] CHILD_SA con2{305} state change: ROUTED => DESTROYING
                  Jan 27 23:06:26	charon	99941	08[CFG] uninstalling 'con2'
                  Jan 27 23:06:26	charon	99941	08[CFG] updated vici connection: con2
                  Jan 27 23:06:26	charon	99941	08[CFG] child con2:
                  Jan 27 23:06:26	charon	99941	08[CFG] conn con2:
                  

                  Log Remote Site

                  Jan 27 23:06:40	charon	20256	14[NET] <con1|12> sending packet: from IP_REMOTE_SITE[500] to IP_LOCAL_SITE[500] (201 bytes)
                  Jan 27 23:06:40	charon	20256	14[ENC] <con1|12> generating IKE_AUTH response 1 [ IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr ]
                  Jan 27 23:06:40	charon	20256	14[CHD] <con1|12> CHILD_SA con1{26} state change: INSTALLING => INSTALLED
                  Jan 27 23:06:40	charon	20256	14[IKE] <con1|12> CHILD_SA con1{26} established with SPIs c133b9e9_i c18a90ef_o and TS 192.168.20.0/24|/0 === 192.168.10.0/24|/0
                  Jan 27 23:06:40	charon	20256	14[CHD] <con1|12> SPI 0xc18a90ef, src IP_REMOTE_SITE dst IP_LOCAL_SITE
                  Jan 27 23:06:40	charon	20256	14[CHD] <con1|12> adding outbound ESP SA
                  Jan 27 23:06:40	charon	20256	14[CHD] <con1|12> SPI 0xc133b9e9, src IP_LOCAL_SITE dst IP_REMOTE_SITE
                  Jan 27 23:06:40	charon	20256	14[CHD] <con1|12> adding inbound ESP SA
                  Jan 27 23:06:40	charon	20256	14[CHD] <con1|12> using AES_GCM_16 for encryption
                  Jan 27 23:06:40	charon	20256	14[CHD] <con1|12> CHILD_SA con1{26} state change: CREATED => INSTALLING
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> config: 10.10.10.0/24|/0, received: 192.168.10.0/24|/0 => no match
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> config: 192.168.10.0/24|/0, received: 192.168.10.0/24|/0 => match: 192.168.10.0/24|/0
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> selecting traffic selectors for other:
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> config: 192.168.20.0/24|/0, received: 192.168.20.0/24|/0 => match: 192.168.20.0/24|/0
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> config: 192.168.20.0/24|/0, received: 192.168.20.0/24|/0 => match: 192.168.20.0/24|/0
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> selecting traffic selectors for us:
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> selected proposal: ESP:AES_GCM_16_256/NO_EXT_SEQ
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> configured proposals: ESP:AES_GCM_16_256/MODP_4096/NO_EXT_SEQ, ESP:AES_GCM_16_256/MODP_2048/NO_EXT_SEQ, ESP:AES_GCM_16_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_384_192/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_256/HMAC_SHA2_512_256/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_384_192/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_192/HMAC_SHA2_512_256/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_256_128/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_384_192/MODP_2048/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA2_512_256/MODP_2048/NO_EXT_SEQ
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> received proposals: ESP:AES_GCM_16_256/NO_EXT_SEQ
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> proposal matches
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> selecting proposal:
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> found matching child config "con1" with prio 10
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> candidate "con1" with prio 5+5
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> 10.10.10.0/24|/0
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> 192.168.10.0/24|/0
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> proposing traffic selectors for other:
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> 192.168.20.0/24|/0
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> 192.168.20.0/24|/0
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> proposing traffic selectors for us:
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> looking for a child config for 192.168.20.0/24|/0 === 192.168.10.0/24|/0
                  Jan 27 23:06:40	charon	20256	14[IKE] <con1|12> maximum IKE_SA lifetime 30568s
                  Jan 27 23:06:40	charon	20256	14[IKE] <con1|12> scheduling rekeying in 27400s
                  Jan 27 23:06:40	charon	20256	14[IKE] <con1|12> IKE_SA con1[12] state change: CONNECTING => ESTABLISHED
                  Jan 27 23:06:40	charon	20256	14[IKE] <con1|12> IKE_SA con1[12] established between IP_REMOTE_SITE[IP_REMOTE_SITE]...IP_LOCAL_SITE[IP_LOCAL_SITE]
                  Jan 27 23:06:40	charon	20256	14[IKE] <con1|12> successfully created shared key MAC
                  Jan 27 23:06:40	charon	20256	14[IKE] <con1|12> authentication of 'IP_REMOTE_SITE' (myself) with pre-shared key
                  Jan 27 23:06:40	charon	20256	14[IKE] <con1|12> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
                  Jan 27 23:06:40	charon	20256	14[IKE] <con1|12> authentication of 'IP_LOCAL_SITE' with pre-shared key successful
                  Jan 27 23:06:40	charon	20256	14[CFG] <con1|12> selected peer config 'con1'
                  Jan 27 23:06:40	charon	20256	14[CFG] <12> candidate "con1", match: 20/20/3100 (me/other/ike)
                  Jan 27 23:06:39	charon	20256	14[CHD] <con1|11> CHILD_SA con1{25} state change: INSTALLED => DESTROYING
                  Jan 27 23:06:39	charon	20256	14[IKE] <con1|11> IKE_SA con1[11] state change: DELETING => DESTROYING
                  Jan 27 23:06:39	charon	20256	14[NET] <con1|11> sending packet: from IP_REMOTE_SITE[500] to IP_LOCAL_SITE[500] (57 bytes)
                  Jan 27 23:06:39	charon	20256	14[ENC] <con1|11> generating INFORMATIONAL response 2 [ ]
                  Jan 27 23:06:39	charon	20256	14[IKE] <con1|11> IKE_SA deleted
                  Jan 27 23:06:39	charon	20256	14[IKE] <con1|11> IKE_SA con1[11] state change: ESTABLISHED => DELETING
                  Jan 27 23:06:39	charon	20256	14[IKE] <con1|11> deleting IKE_SA con1[11] between IP_REMOTE_SITE[IP_REMOTE_SITE]...IP_LOCAL_SITE[IP_LOCAL_SITE]
                  Jan 27 23:06:39	charon	20256	14[IKE] <con1|11> received DELETE for IKE_SA con1[11]
                  Jan 27 23:06:39	charon	20256	14[ENC] <con1|11> parsed INFORMATIONAL request 2 [ D ]
                  Jan 27 23:06:39	charon	20256	14[NET] <con1|11> received packet: from IP_LOCAL_SITE[500] to IP_REMOTE_SITE[500] (65 bytes)
                  

                  I don't know if this is helpful....

                  keyserK 1 Reply Last reply Reply Quote 0
                  • N
                    NOCling
                    last edited by

                    Looks good, do you see a working rekey?

                    Jan 28 09:04:23	charon	88416	05[KNL] creating rekey job for CHILD_SA ESP/0xc69ac11a/x.x.x.x
                    

                    But i have to use AES_CBC_256 to my 2100.

                    Netgate 6100 & Netgate 2100

                    X 2 Replies Last reply Reply Quote 0
                    • keyserK
                      keyser Rebel Alliance @xylem
                      last edited by

                      @xylem It looks right. Rellay interesting if this issue is the CGM cipher problem on AMD64 hardware. To be fair your symptoms are different, so it’s unlikely it’s the same issue. Looks more like a rekey problem like @NOCling suggested.

                      Love the no fuss of using the official appliances :-)

                      1 Reply Last reply Reply Quote 0
                      • X
                        xylem @NOCling
                        last edited by

                        @nocling Unfortunately, I do not receive any log entries after the tunnel is established. But strangely enough I can access the remote network. Iperf3 to the remote pfSense also works. File download from the remote NAS starts without problems with 100 MB/s and suddenly stops after a few GB. Without log entries it is quite difficult. How can I get to the bottom of this problem?

                        1 Reply Last reply Reply Quote 0
                        • X
                          xylem @NOCling
                          last edited by

                          @nocling As a test, I disabled the AES-NI CPU Crypto and set up a site-to-site tunnel with the following settings:
                          Phase 1:
                          AES128-GCM (128 bits) SHA256 14 (2048 bit)
                          Phase 2:
                          ESP AES256-GCM (128 bits) 14 (2048 bit)

                          Now the download does not break anymore. The throughput is about 20 MB/s. Logs after the connection is established are still not available.

                          1 Reply Last reply Reply Quote 0
                          • N
                            NOCling
                            last edited by

                            Ok, that sounds not good.

                            I use Mobike and DPD in P1
                            What did you setup in the Advanced IPsec Settings Settings?
                            I use:
                            Configure Unique IDs as yes
                            Make before Break yes
                            Asynchronous Cryptography yes

                            Netgate 6100 & Netgate 2100

                            X 1 Reply Last reply Reply Quote 0
                            • X
                              xylem @NOCling
                              last edited by

                              @nocling I have not activated MOBIKE. From my point of view, this is not necessary for a site-to-site VPN connection.

                              Here are my P1 Settings:
                              Screenshot 2023-01-29 150303.png

                              Here are my Advanced IPsec Settings:
                              Screenshot 2023-01-29 150111.png

                              I also activated Asynchronous Cryptography, but I didn't see any advantages during testing, so I deactivated it again.

                              I am at a loss and do not know if the problem is due to the pfSense settings. With the Netgate 1537, do drivers for the hardware also have to be updated in addition to the pfSense? Or is this done with the installation of pfSense? System -> Netgate Firmware Upgrade shows that this function is not available for this hardware.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.