Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSec issues on 24.03 - sessions dropping

    Scheduled Pinned Locked Moved IPsec
    20 Posts 6 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • maverickwsM
      maverickws
      last edited by

      Hi there,

      So I have a site-to-site VPN I updated the firewall here remotes are on 23.09.1 since can't be upgraded.

      I don't know if the issue is related to being one version behind, but then I have the IPSec UP from 24.03 any session (SSH, MYSQL, RDP) are constantly failing.

      Reverted my boot environment to 23.09.1 and the VPN works marvellously. As always.

      Issue confirmed both on 24.03 and 24.03_1

      The logs by the way don't have anything relevant beside that log spam that is known. And the VPN connection doesn't appear to "drop" only traffic

      M 1 Reply Last reply Reply Quote 0
      • M
        mcury Rebel Alliance @maverickws
        last edited by mcury

        @maverickws Check this thread

        dead on arrival, nowhere to be found.

        maverickwsM 1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Yup if you're using VTI tunnels check the State Interface Binding change.

          maverickwsM 1 Reply Last reply Reply Quote 0
          • jimpJ jimp moved this topic from Problems Installing or Upgrading pfSense Software on
          • maverickwsM
            maverickws @mcury
            last edited by

            @mcury hi there thank you for your reply and sorry for my delay it was a holiday here yesterday.
            So I read through that topic, and my setup has VTI tunnels, the option I have selected on IPsec Filter Mode is "Filter IPsec Tunnel, Transport, and VTI on IPsec tab (enc0)

            Now I didn't quite understand the resolution, say the bugzila issue as well, could you explain how did you overcome the issue? I have both IPsec site-to-site and mobile.

            M 1 Reply Last reply Reply Quote 0
            • maverickwsM
              maverickws @stephenw10
              last edited by

              @stephenw10 said in IPSec issues on 24.03 - sessions dropping:

              Yup if you're using VTI tunnels check the State Interface Binding change.

              Sorry where is this?

              1 Reply Last reply Reply Quote 0
              • M
                mcury Rebel Alliance @maverickws
                last edited by

                @maverickws said in IPSec issues on 24.03 - sessions dropping:

                IPsec Filter Mode is "Filter IPsec Tunnel, Transport, and VTI on IPsec tab (enc0)

                Since you are using mobile IPsec and VTI at the same time, don't change this setting.

                In 24.03, there was this change State Policy
                Check if setting this option to Floating States will fix your problem.

                a5a1366f-9772-49f5-89d2-b4a85196006b-image.png

                dead on arrival, nowhere to be found.

                1 Reply Last reply Reply Quote 1
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  It's in System > Advanced > Firewall&NAT: Firewall State Policy.

                  That's the global setting. Setting it to floating goes back to the same behaviour as 23.09.1.

                  If that works you can also set that per rule so you add them to allow the IPSec and set the global value back to interface-bound.

                  1 Reply Last reply Reply Quote 1
                  • jimpJ
                    jimp Rebel Alliance Developer Netgate
                    last edited by

                    There are specific recommendations for VTI in the docs that cover this as well:

                    https://docs.netgate.com/pfsense/en/latest/config/advanced-firewall-nat.html#interface-bound-states

                    Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                    Need help fast? Netgate Global Support!

                    Do not Chat/PM for help!

                    1 Reply Last reply Reply Quote 3
                    • maverickwsM
                      maverickws
                      last edited by

                      Hi and thank you all for the information and support.

                      I have some follow-up questions, given the State Policy changes and traffic interface bound, but not getting exactly why is it impacting my traffic?

                      What would I put in the rule to have it fixed on Interface Bound mode?
                      (I am unable to test right now only in a few hours to put it back on 24.03 and change the State Policy option to see if it fixes the issue.

                      jimpJ 1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate @maverickws
                        last edited by

                        @maverickws said in IPSec issues on 24.03 - sessions dropping:

                        I have some follow-up questions, given the State Policy changes and traffic interface bound, but not getting exactly why is it impacting my traffic?

                        It's explained in detail in the link I posted in the section about VTI.

                        What would I put in the rule to have it fixed on Interface Bound mode?

                        I just updated the docs with better info about the per-rule workaround, it'll be up in ~10 minutes once the build finishes.

                        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        M 1 Reply Last reply Reply Quote 2
                        • M
                          michmoor LAYER 8 Rebel Alliance @jimp
                          last edited by michmoor

                          @jimp
                          Question Jim. Because this bit me and a few others would it be reasonable to make an exception for IPsec traffic flows and a note in the webUI or documentation about this and to change at the admins own risk?
                          So the IPsec interfaces with VTI get the floating policy state change only.

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by stephenw10

                            The ideal solution here is to fix the IPSec pfil handling so traffic is filtered on the same interfaces in and out as expected. We are looking at that (again) but the work there is non-trivial!

                            1 Reply Last reply Reply Quote 2
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate
                              last edited by

                              If fixing the OS level issues doesn't work out we might consider an option for automatically handling the floating policy rules for VTI but we're hoping to avoid that if possible.

                              Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              1 Reply Last reply Reply Quote 1
                              • maverickwsM
                                maverickws
                                last edited by

                                Hi all,

                                So from my understanding, please correct me if I'm wrong, if I would maintain the option for Interface Bound, I would add a rule to the Floating rules on the IPsec interface as described in Rules with Floating Policy Set ?

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Yes exactly.

                                  maverickwsM 1 Reply Last reply Reply Quote 0
                                  • maverickwsM
                                    maverickws @stephenw10
                                    last edited by

                                    perfect thank you I will test today and tell how it goes.

                                    D 1 Reply Last reply Reply Quote 0
                                    • maverickwsM
                                      maverickws
                                      last edited by

                                      Ok so I was able to reboot the router and booted into 24.03

                                      I've added the rule as described to the IPsec interface on the floating rules, put it on top of any other IPsec rules and so far my connections seem to be stable, been testing for over 5 minutes both terminal and RDP.

                                      Next week I'll be able to test further. Have a nice weekend you all

                                      1 Reply Last reply Reply Quote 1
                                      • D
                                        danjeman @maverickws
                                        last edited by

                                        @maverickws I had this issue today... looks like adding advanced rule options for floating states on the ipsec rules and a floating outbound one too as per the docs does the trick ๐Ÿ‘

                                        maverickwsM 1 Reply Last reply Reply Quote 1
                                        • maverickwsM
                                          maverickws @danjeman
                                          last edited by

                                          @danjeman howdy.
                                          I only added one floating rule, what you mean by two rules?

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            If you need to create connections across the tunnel in both directions you need a floating outbound rule with floating state binding set to allow the replies. It's shown in the doc there now.
                                            https://docs.netgate.com/pfsense/en/latest/config/advanced-firewall-nat.html#interface-bound-states

                                            So you might only add one floating rule and edit the existing IPSec rule. Two rules are needed if none existed.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.