Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Update from 2.3 to 2.4.2 Causes individual Phase 2's to not reconnect after IKE rekey

    Scheduled Pinned Locked Moved IPsec
    11 Posts 4 Posters 1.8k Views 6 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      dkase279
      last edited by

      This is my frequent flier.

      0_1528821757542_8f21f0b2-f863-41c4-9620-8a1481daac2c-image.png

      There are 4 identical P2's with the below config, but only one of them goes down. It's connected to a SonicWALL on the other side, and SonicWALL doesn't allow for separate P2 settings. Again, ran solidly for over a year on 2.3 with no config changes.

      0_1528821872253_30e2c460-7c25-4424-8c1b-4ee8364e524a-image.png

      1 Reply Last reply Reply Quote 0
      • B Offline
        berapp
        last edited by

        Were you able to resolve this problem? I am having what seems to be the same problem.

        1 Reply Last reply Reply Quote 0
        • D Offline
          dkase279
          last edited by

          Nope. No resolution. So far, the best we’ve been able to do is change the P1 and P2 rekeys to 24 hours, try to keep them going during the day, and have a quick VPN setup on the Oncall person’s phone so they can disconnect the P1 real quick as soon as the alert comes in that the site is unreachable. Not a solution at all, and it’s driving me nuts while I’m Oncall. I guess this is what we get for using Community-based software and not paying for software support from Netgate...

          1 Reply Last reply Reply Quote 0
          • L Offline
            leo.f
            last edited by

            Same here. I'm on version 2.4.3 and have an IPSEC VPN with 6 P2 with rekey lifetime of 1 hour and a P1 with rekey lifetime in 8 hours. I've noticed that even with P1 up, all hosts behind P2 network is offline. So I have to manually go to Status > IPSEC to disconnect and reconnect the P1 tunnel.

            When this rekey occurs without monitoring, I've noticed that the tunnel is down for about 5-10 minutes and reconnects again. My other peer is a Checkpoint vendor. Any idea to keep all sessions behind a P2 tunnel?

            Thanks

            1 Reply Last reply Reply Quote 0
            • B Offline
              berapp
              last edited by

              I upgraded to 2.4.3 just before you posted this response. I'm still having the problem. I did find a similar thread. here

              1 Reply Last reply Reply Quote 0
              • D Offline
                dkase279
                last edited by

                I've definitely had that particular issue before. In this case now though, the Old P2's aren't hanging around. There's still only 1 P2, and that one only takes traffic one-way. It's really odd.

                1 Reply Last reply Reply Quote 0
                • L Offline
                  leo.f
                  last edited by

                  Does anyone have the same issue with Pfsense in both sides?

                  1 Reply Last reply Reply Quote 0
                  • H Offline
                    Harow
                    last edited by

                    guys are you experiencing a similar issue to this that I am having?

                    https://forum.netgate.com/topic/132900/ipsec-phase-2-duplicate-causes-vpn-tunnel-to-get-stuck

                    1 Reply Last reply Reply Quote 0
                    • D Offline
                      dkase279
                      last edited by

                      leo.f - I haven't had the problem with any of my setups that have PFSense on both sides. Currently I have about a dozen sites that have IPSEC from PFSense to PFSense, and we've never seen the problem on any of those links.

                      Harow - I absolutely have seen that issue more than once, but so far, it hasn't actually impacted functioning. It just displays with tons of P2's but the primary P2 still functions fine. I always considered it a cosmetic GUI glitch.

                      H 1 Reply Last reply Reply Quote 0
                      • H Offline
                        Harow @dkase279
                        last edited by

                        @dkase279 mine prevents the tunnel from working as client machines can not ping through to my main site via the VPN. I'm going to log a call with Netgate if possible as it's preventing service. I also might put logs on here once it happens again.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.