Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problems with IPsec in HA

    Scheduled Pinned Locked Moved IPsec
    6 Posts 2 Posters 100 Views 2 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      dcuadrados
      last edited by

      Good afternoon everyone,

      I'm having a problem that is driving me crazy. I have an IPsec tunnel in an HA environment, and the issue is that both HA members are continuously connecting and disconnecting. I’m using the CARP VIP on the WAN interface as stated in the official documentation. DPD is set to 20, I’ve tested with it disabled as well, and the behavior is the same. As I mentioned, one node brings the tunnel up and then the other takes over, and this happens every 3–4 minutes.

      As you can see in the graphs:

      cbe4c5e6-b9e1-4b44-b934-182516bc319e-image.png

      38e25953-e39c-4183-b14b-bbebad1cb7d8-image.png

      Here is my advanced configuration:

      5d09af47-faa3-4270-a4e6-30670db324fe-image.png

      V D 2 Replies Last reply Reply Quote 0
      • V Offline
        viragomann @dcuadrados
        last edited by

        @dcuadrados said in Problems with IPsec in HA:

        I’m using the CARP VIP on the WAN interface as stated in the official documentation.

        Did you also translate IPSec outbound traffic to the CARP VIP?

        D 1 Reply Last reply Reply Quote 0
        • D Offline
          dcuadrados @dcuadrados
          last edited by dcuadrados

          This post is deleted!
          1 Reply Last reply Reply Quote 0
          • D Offline
            dcuadrados @viragomann
            last edited by

            @viragomann

            I have this rule

            1000035312.jpg 1000035314.jpg

            And a gateway to route trafic to the túnel

            1000035315.jpg 1000035313.jpg

            V 1 Reply Last reply Reply Quote 0
            • V Offline
              viragomann @dcuadrados
              last edited by

              @dcuadrados
              I was talking about outbound NAT rules (2) for IPSec from pfSense itself.
              Should look like this:

              Interface: WAN
              Source: network > 127.0.0.0/8
              destination: any
              destination port: 500
              translation: VIP
              static port: checked

              Interface: WAN
              protocol: UDP
              Source: network > 127.0.0.0/8
              destination: any
              destination port: 4500
              translation: VIP

              D 1 Reply Last reply Reply Quote 1
              • D Offline
                dcuadrados @viragomann
                last edited by

                @viragomann OK, I’ve created it this way and I’m going to monitor the status to see what happens and how the tunnel behaves from this point on. Thanks a lot!

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.