Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSEC connectivity dropping (tunnel stays UP)

    Scheduled Pinned Locked Moved IPsec
    5 Posts 3 Posters 724 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      armandelli
      last edited by

      Hello guys;

      About a month from now we have started experiencing some issues regarding our IPSEC connection do AWS.

      Basically we lose connection to our AWS instances although the IPSEC tunnel appears connected on the webui and the connection is normalized only after around 30-40 min or when we manually disconnect and connect the tunnel.

      Attached follows my configuration and part of the IPSEC logs from the moment the moment happens. I´ve activated a more verbose log mode and will monitor it fot more information.
      Capturar2.PNG Capturar3.PNG Capturar4.PNG Capturar1.PNG

      QUEDA-VPN-LOG.txt

      I have already recreated the VPN connections on AWS and on PFSENSE, double checked all configuration (IKE versios, key and networks) but the problem persists.

      Any ideas on this?

      Thanks a lot!

      Andre.

      K 1 Reply Last reply Reply Quote 0
      • K
        Konstanti @armandelli
        last edited by

        @armandelli
        Hello
        What device is on the other side of the tunnel ?
        Cisco ?
        In my opinion , there is a problem in the remote side
        Note that starting at 08: 10: 41, the remote side begins to close the connections.

        Nov 22 08:10:41 srvfw02 charon: 09[IKE] <con5000|2> received DELETE for ESP CHILD_SA with SPI b26262a5
        Nov 22 08:10:41 srvfw02 charon: 09[IKE] <con5000|2> closing CHILD_SA con5000{29} with SPIs c78cf6e8_i (9333422 bytes) b26262a5_o (71040 bytes) and TS 172.23.1.0/24|/0 === 172.31.0.0/16|/0
        
        Nov 22 08:14:15 srvfw02 charon: 14[IKE] <con5000|2> received DELETE for ESP CHILD_SA with SPI 25f06df5
        Nov 22 08:14:15 srvfw02 charon: 14[IKE] <con5000|2> closing CHILD_SA con5001{30} with SPIs c5649cba_i (5500748 bytes) 25f06df5_o (3841456 bytes) and TS 10.16.0.0/16|/0 === 172.31.0.0/16|/0
        
        Nov 22 08:16:17 srvfw02 charon: 06[IKE] <con5000|2> received DELETE for ESP CHILD_SA with SPI b9884f1c
        Nov 22 08:16:17 srvfw02 charon: 06[IKE] <con5000|2> closing CHILD_SA con5003{31} with SPIs c8eb8f42_i (3988132 bytes) b9884f1c_o (1890702160 bytes) and TS 10.0.0.0/16|/0 === 172.32.0.0/16|/0
        
        Nov 22 08:17:43 srvfw02 charon: 06[IKE] <con5000|2> received DELETE for ESP CHILD_SA with SPI 60eafc3a
        Nov 22 08:17:43 srvfw02 charon: 06[IKE] <con5000|2> closing CHILD_SA con5002{32} with SPIs cbd8db6d_i (182517679 bytes) 60eafc3a_o (898633496 bytes) and TS 10.0.0.0/16|/0 === 172.31.0.0/16|/0
        
        
        

        It is necessary to look logs of the second participant of connection

        A 1 Reply Last reply Reply Quote 0
        • A
          armandelli @Konstanti
          last edited by

          @Konstanti Hi! The other side is an AWS VPC!

          I'll see if I can view their logs somehow.

          Tks!

          awebsterA 1 Reply Last reply Reply Quote 0
          • awebsterA
            awebster @armandelli
            last edited by

            @armandelli I would look closely at the Phase 2 lifetime on both sides. The dump doesn't show it, neither does your screenshot, but both sides must agree to use the same lifetime. If AWS is using shorter lifetime than pfSense, it will tear down the sessions.

            –A.

            A 1 Reply Last reply Reply Quote 0
            • A
              armandelli @awebster
              last edited by

              @awebster Hello! Thanks for the input!

              I've checked the Phase 2 configuration and they are using a lifetime of 3600, as per AWS configuration file.

              ! #2: IPSec Configuration
              !
              ! The IPSec transform set defines the encryption, authentication, and IPSec
              ! mode parameters.
              ! Category "VPN" connections in the GovCloud region have a minimum requirement of AES128, SHA2, and DH Group 14.
              ! Please note, you may use these additionally supported IPSec parameters for encryption like AES256 and other DH groups like 2, 5, 14-18, 22, 23, and 24.
              ! Higher parameters are only available for VPNs of category "VPN," and not for "VPN-Classic".

              Expand the VPN configuration clicking in "+" and then create a new Phase2 entry as follows:

              ***a. Disabled :uncheck
              b. Mode : Tunnel
              c. Local Network : Type: LAN subnet
              Address : ! Enter your local network CIDR in the Address tab
              d. Remote Network : Type : Network
              Address : ! Enter your remote network CIDR in the Address tab
              e. Description : Amazon-IPSec-vpnxxx

              Phase 2 proposal (SA/Key Exchange)
              a. Protocol : ESP
              b. Encryption algorithms :aes128
              c. Hash algorithms : hmac-sha1-96
              d. PFS key group : 2
              e. Lifetime : 3600 seconds
              ***

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.