High Avail secondary node IPs - How to find it
-
Im really not understanding why my VTI interfaces are not syncing up.
The interface assignments are the exact sameMaster
Backup
Yet the only interface with firewall rules not syncing is the VTI. Very strange behavior.
-
Is it ipsec1 on the primary too or ipsec0?
Yeah sync can work between any interfaces but it's much better to use a dedicated sync interface if you can.
-
@stephenw10 ipsec1 on both. I shared pictures above
-
Is the IPSec filter option set to VTI mode on both nodes?
-
@stephenw10 Yep it sure is.
-
Hmm, well it's possible to set individual rules to not sync. That might have been done for some reason.
-
S stephenw10 referenced this topic on
-
I thought the same as well but the "No XMLRPC Sync" checkbox is unchecked.
Logs show no errors. I even tried re-creating the interface and still no luck
-
No error on the Secondary either?
-
Figured it out.
The primary has OPT3 - IPsec1
The secondary has OPT4 - IPsec1I was just looking at the IPsec1 identifier but clearly the OPT has to match. So i deleted the interface on the secondary and made sure that when it got recreated the OPT identifier matched. Once that's done Rules synced across.
The last thing I'm dealing with now is IPsec failover is very slow. An outage of over 3-4 minutes. CARP WAN address is being used but i do notice in my logs that the firewall keeps trying to initiate a connection using the WAN address and not the WAN CARP address. Is this normal?
Eventually, the firewalls speak and all is well.
-
What are they connected to?
If the IPSec is on the CARP VIP at this end the secondary should start trying to connect as soon as it fails over but the remote side will have to time-out before starts trying.
-
@stephenw10 Remote side is me. How do i speed up the cutover? Is there a way?
-
So remote is a mobile IPSec client?
You can change the dpd settings for the client so it times out faster.
-
@stephenw10 This is an IPsec site2site
-
Ok well if the other side is pfSense the default values are 10s and 5 failure so you can change that to, say, 5s and 3 failures.
-
@stephenw10
Yep we are dealing with two pfSense boxes.
I am changing the value on both sides now and testing. Will let you know.So something like this?
-
@stephenw10 no deal.
It recovers...but slow.
It might make sense to create another IPsec tunnel to the Backup firewall.
Im thinking i can handle routing by placing both Master and Backup in a Gateway group and set Master as Tier 1 and Backup as Tier 2edit: i actually don't know how that will work..
Any changes on the Backup will get overwritten...hmmm -
Check the logs at both ends and see what's happening. Which end is delaying the failover.
How long does it actually take?
-
@stephenw10
I initiated a failover on primary and on the secondary i went ahead and tried to establish a tunnel via CLI.This is the output. The output is from the Backup pfsense trying to initiate a IKE P1 to my home pfsense
sudo swanctl --initiate --ike con1 [IKE] retransmit 1 of request with message ID 0 [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes) [IKE] retransmit 2 of request with message ID 0 [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes) [IKE] retransmit 3 of request with message ID 0 [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes) [IKE] retransmit 4 of request with message ID 0 [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes) [IKE] retransmit 5 of request with message ID 0 [NET] sending packet: from 192.168.35.6[500] to 104.13.92.x[500] (464 bytes) [IKE] giving up after 5 retransmits [IKE] establishing IKE_SA failed, peer not responding initiate failed: establishing IKE_SA 'con1' failed
Now just to let you know firewall at the location I'm managing is sitting behind a Cisco router that is performing NAT
192.168.35.6 is the NAT for the WAN VIP so the pfsense has a RFC1918 WAN address but the Cisco is doing the NAT.
For what its worth i do see translations on the Cisco so that's operating correctly.Eventually the tunnel will restablish.
-
So 192.168.35.6 is the WAN CARP VIP for the HA pair? You shouldn't have to do anything at the CLI. When the VIP fails over the secondary should try to connect.
What is logged on the other side?
-
@stephenw10
So for clarityThe NATs are like this
192.168.35.6 <> x.x.188.125 - CARP VIP
192.168.35.5 <> x.x.188.124 - Secondary WAN pfsense
192.168.35.4 <> x.x.188.123 - Primary WAN pfsenseSo when I failover to backup what i see on my firewall is UDP/500 traffic coming from the Secondary WAN interface (not the CARP) which i found odd. I see that happening for a few times and then after awhile i see the CARP VIP finally reach out and establish a VPN