Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSEC breaks outgoing Loadbalance

    Scheduled Pinned Locked Moved 2.0-RC Snapshot Feedback and Problems - RETIRED
    6 Posts 2 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      GoldServe
      last edited by

      I've traced the problem back to the rule that is inserted before the load balance user rule:

      pass  in  quick  on $LAN  from any  to <vpns> keep state  label "NEGATE_ROUTE: Negate policy route for vpn(s)"</vpns>
      

      The problem is that the <vpn>table is:

      table <vpns> { 0.0.0.0/0 }</vpns>
      

      The code does not identify the IPSEC's address pool, same as in the IPSEC overview page.

      $ph2ent['remoteid']
      ```does not do what it is supposed to do.</vpn>
      1 Reply Last reply Reply Quote 0
      • E
        eri--
        last edited by

        Shuold be fixed in newer snapshots.

        1 Reply Last reply Reply Quote 0
        • G
          GoldServe
          last edited by

          Thanks. Do you have a link to the commit with the fix? I want to integrate this fix in myself because everything I have is so stable right now. I will wait until final before I upgrade.

          Cheers!

          1 Reply Last reply Reply Quote 0
          • E
            eri--
            last edited by

            https://rcs.pfsense.org/projects/pfsense/repos/mainline/commits/1ee3ed0f4c16c2d2b08d0db2426bcbfec7a61059
            https://rcs.pfsense.org/projects/pfsense/repos/mainline/commits/d9a417f8f4068da48d6faad37080ebfa4216a470

            1 Reply Last reply Reply Quote 0
            • G
              GoldServe
              last edited by

              I integrated these fixes and found that the table <vpns>was no longer created which is good but the rule inserted above the load balancing rule still refers to <vpns>and that causes the system to still route everything through default gateway.

              I took out the code to generate the rule for now and all is ok. Was the intention of the rule is to route through default gateway if the destination is part of the VPN subnet? My IPSEC clients get 192.168.50.1 so should the rule really point to that?

              Cheers!</vpns></vpns>

              1 Reply Last reply Reply Quote 0
              • E
                eri--
                last edited by

                You could even flushed the vpns table and be done with it without patching.
                Diagnostic->Tables

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.