Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    High Avail secondary node IPs - How to find it

    Scheduled Pinned Locked Moved General pfSense Questions
    45 Posts 4 Posters 2.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance @viragomann
      last edited by

      @viragomann yep. Same interface assignment

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @michmoor
        last edited by

        Im really not understanding why my VTI interfaces are not syncing up.
        The interface assignments are the exact same

        Master
        49472093-4e44-4359-9ff3-c9c625924dce-image.png

        Backup
        6e4bb5ba-48eb-4626-8525-7cffd66eed28-image.png

        de6128e4-e354-463c-8a36-6e6ca7b4fbc6-image.png

        Yet the only interface with firewall rules not syncing is the VTI. Very strange behavior.

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Is it ipsec1 on the primary too or ipsec0?

          Yeah sync can work between any interfaces but it's much better to use a dedicated sync interface if you can.

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @stephenw10
            last edited by

            @stephenw10 ipsec1 on both. I shared pictures above

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Is the IPSec filter option set to VTI mode on both nodes?

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @stephenw10
                last edited by

                @stephenw10 Yep it sure is.

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Hmm, well it's possible to set individual rules to not sync. That might have been done for some reason.

                  M 1 Reply Last reply Reply Quote 0
                  • stephenw10S stephenw10 referenced this topic on
                  • M
                    michmoor LAYER 8 Rebel Alliance @stephenw10
                    last edited by

                    @stephenw10

                    I thought the same as well but the "No XMLRPC Sync" checkbox is unchecked.

                    Logs show no errors. I even tried re-creating the interface and still no luck

                    081b3fcf-0b63-4561-b86b-af67a9d7492c-image.png

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      No error on the Secondary either?

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @stephenw10
                        last edited by michmoor

                        @stephenw10

                        Figured it out.
                        The primary has OPT3 - IPsec1
                        The secondary has OPT4 - IPsec1

                        I was just looking at the IPsec1 identifier but clearly the OPT has to match. So i deleted the interface on the secondary and made sure that when it got recreated the OPT identifier matched. Once that's done Rules synced across.

                        The last thing I'm dealing with now is IPsec failover is very slow. An outage of over 3-4 minutes. CARP WAN address is being used but i do notice in my logs that the firewall keeps trying to initiate a connection using the WAN address and not the WAN CARP address. Is this normal?

                        Eventually, the firewalls speak and all is well.

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        1 Reply Last reply Reply Quote 1
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          What are they connected to?

                          If the IPSec is on the CARP VIP at this end the secondary should start trying to connect as soon as it fails over but the remote side will have to time-out before starts trying.

                          M 1 Reply Last reply Reply Quote 0
                          • M
                            michmoor LAYER 8 Rebel Alliance @stephenw10
                            last edited by

                            @stephenw10 Remote side is me. How do i speed up the cutover? Is there a way?

                            Firewall: NetGate,Palo Alto-VM,Juniper SRX
                            Routing: Juniper, Arista, Cisco
                            Switching: Juniper, Arista, Cisco
                            Wireless: Unifi, Aruba IAP
                            JNCIP,CCNP Enterprise

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              So remote is a mobile IPSec client?

                              You can change the dpd settings for the client so it times out faster.

                              M 1 Reply Last reply Reply Quote 0
                              • M
                                michmoor LAYER 8 Rebel Alliance @stephenw10
                                last edited by

                                @stephenw10 This is an IPsec site2site

                                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                Routing: Juniper, Arista, Cisco
                                Switching: Juniper, Arista, Cisco
                                Wireless: Unifi, Aruba IAP
                                JNCIP,CCNP Enterprise

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Ok well if the other side is pfSense the default values are 10s and 5 failure so you can change that to, say, 5s and 3 failures.

                                  M 1 Reply Last reply Reply Quote 0
                                  • M
                                    michmoor LAYER 8 Rebel Alliance @stephenw10
                                    last edited by michmoor

                                    @stephenw10
                                    Yep we are dealing with two pfSense boxes.
                                    I am changing the value on both sides now and testing. Will let you know.

                                    So something like this?

                                    e1176c48-c8fa-4261-8007-fffa63092db9-image.png

                                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                    Routing: Juniper, Arista, Cisco
                                    Switching: Juniper, Arista, Cisco
                                    Wireless: Unifi, Aruba IAP
                                    JNCIP,CCNP Enterprise

                                    M 1 Reply Last reply Reply Quote 0
                                    • M
                                      michmoor LAYER 8 Rebel Alliance @michmoor
                                      last edited by michmoor

                                      @stephenw10 no deal.

                                      It recovers...but slow.

                                      It might make sense to create another IPsec tunnel to the Backup firewall.
                                      Im thinking i can handle routing by placing both Master and Backup in a Gateway group and set Master as Tier 1 and Backup as Tier 2

                                      edit: i actually don't know how that will work..
                                      Any changes on the Backup will get overwritten...hmmm

                                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                      Routing: Juniper, Arista, Cisco
                                      Switching: Juniper, Arista, Cisco
                                      Wireless: Unifi, Aruba IAP
                                      JNCIP,CCNP Enterprise

                                      1 Reply Last reply Reply Quote 0
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        Check the logs at both ends and see what's happening. Which end is delaying the failover.

                                        How long does it actually take?

                                        M 1 Reply Last reply Reply Quote 0
                                        • M
                                          michmoor LAYER 8 Rebel Alliance @stephenw10
                                          last edited by michmoor

                                          @stephenw10
                                          I initiated a failover on primary and on the secondary i went ahead and tried to establish a tunnel via CLI.

                                          This is the output. The output is from the Backup pfsense trying to initiate a IKE P1 to my home pfsense

                                           sudo swanctl --initiate --ike con1
                                          [IKE] retransmit 1 of request with message ID 0
                                          [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes)
                                          [IKE] retransmit 2 of request with message ID 0
                                          [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes)
                                          [IKE] retransmit 3 of request with message ID 0
                                          [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes)
                                          [IKE] retransmit 4 of request with message ID 0
                                          [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes)
                                          [IKE] retransmit 5 of request with message ID 0
                                          [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes)
                                          [IKE] giving up after 5 retransmits
                                          [IKE] establishing IKE_SA failed, peer not responding
                                          initiate failed: establishing IKE_SA 'con1' failed
                                          
                                          

                                          Now just to let you know firewall at the location I'm managing is sitting behind a Cisco router that is performing NAT
                                          192.168.35.6 is the NAT for the WAN VIP so the pfsense has a RFC1918 WAN address but the Cisco is doing the NAT.
                                          For what its worth i do see translations on the Cisco so that's operating correctly.

                                          Eventually the tunnel will restablish.

                                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                          Routing: Juniper, Arista, Cisco
                                          Switching: Juniper, Arista, Cisco
                                          Wireless: Unifi, Aruba IAP
                                          JNCIP,CCNP Enterprise

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            So 192.168.35.6 is the WAN CARP VIP for the HA pair? You shouldn't have to do anything at the CLI. When the VIP fails over the secondary should try to connect.

                                            What is logged on the other side?

                                            M 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.