Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Random IPSec mobile client disconnects on 2.4.5

    Scheduled Pinned Locked Moved IPsec
    3 Posts 3 Posters 405 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • H
      hipgroove
      last edited by hipgroove

      This location has an older SG-2440 running a 2.4 version that works well, but is underpowered for the IPSec site-to-site and mobile user load it's handling. An SG-3100 with 2.4.5 was installed with a restored backup from the SG-2440, with the only changes to the config being interface reassignments and subsequent IPSec SA subnet selections.

      All VPNs work, but now we're seeing random IPSec mobile client disconnects. The clients are all using the Mac OS native VPN client. Users can be connected for hours, and then get disconnected, with the only relevant log entry being:

      Jun  4 12:38:02 PFSenseFW charon: 08[IKE] <165> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
      Jun  4 12:38:02 PFSenseFW charon: 08[IKE] <165> received XAuth vendor ID
      Jun  4 12:38:02 PFSenseFW charon: 08[IKE] <165> received Cisco Unity vendor ID
      Jun  4 12:38:02 PFSenseFW charon: 08[IKE] <165> received DPD vendor ID
      Jun  4 12:38:02 PFSenseFW charon: 08[IKE] <165> 12.12.12.1 is initiating a Aggressive Mode IKE_SA
      Jun  4 12:38:02 PFSenseFW charon: 08[CFG] <165> selected proposal: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
      Jun  4 12:38:02 PFSenseFW charon: 08[CFG] <165> looking for XAuthInitPSK peer configs matching 10.10.10.1...12.12.12.1[groupname]
      Jun  4 12:38:02 PFSenseFW charon: 08[CFG] <165> selected peer config "con-mobile"
      Jun  4 12:38:02 PFSenseFW charon: 08[ENC] <con-mobile|165> generating AGGRESSIVE response 0 [ SA KE No ID V V V V NAT-D NAT-D HASH ]
      Jun  4 12:38:02 PFSenseFW charon: 08[NET] <con-mobile|165> sending packet: from 10.10.10.1[500] to 12.12.12.1[500] (412 bytes)
      Jun  4 12:38:02 PFSenseFW charon: 08[NET] <con-mobile|165> received packet: from 12.12.12.1[4500] to 10.10.10.1[4500] (100 bytes)
      Jun  4 12:38:02 PFSenseFW charon: 08[ENC] <con-mobile|165> parsed AGGRESSIVE request 0 [ HASH NAT-D NAT-D ]
      Jun  4 12:38:02 PFSenseFW charon: 08[IKE] <con-mobile|165> remote host is behind NAT
      Jun  4 12:38:02 PFSenseFW charon: 08[ENC] <con-mobile|165> generating TRANSACTION request 4127191853 [ HASH CPRQ(X_USER X_PWD) ]
      Jun  4 12:38:02 PFSenseFW charon: 08[NET] <con-mobile|165> sending packet: from 10.10.10.1[4500] to 12.12.12.1[4500] (76 bytes)
      Jun  4 12:38:02 PFSenseFW charon: 06[NET] <con-mobile|165> received packet: from 12.12.12.1[4500] to 10.10.10.1[4500] (76 bytes)
      Jun  4 12:38:02 PFSenseFW charon: 06[ENC] <con-mobile|165> parsed TRANSACTION response 4127191853 [ HASH CPRP(X_USER) ]
      Jun  4 12:38:02 PFSenseFW charon: 06[IKE] <con-mobile|165> peer did not respond to our XAuth request
      Jun  4 12:38:02 PFSenseFW charon: 06[IKE] <con-mobile|165> XAuth authentication of 'groupname' failed
      Jun  4 12:38:02 PFSenseFW charon: 06[ENC] <con-mobile|165> generating TRANSACTION request 1210655804 [ HASH CPS(X_STATUS) ]
      Jun  4 12:38:02 PFSenseFW charon: 06[NET] <con-mobile|165> sending packet: from 10.10.10.1[4500] to 12.12.12.1[4500] (76 bytes)
      Jun  4 12:38:02 PFSenseFW charon: 06[NET] <con-mobile|165> received packet: from 12.12.12.1[4500] to 10.10.10.1[4500] (76 bytes)
      Jun  4 12:38:02 PFSenseFW charon: 06[ENC] <con-mobile|165> parsed TRANSACTION response 1210655804 [ HASH CPA(X_STATUS) ]
      Jun  4 12:38:02 PFSenseFW charon: 06[IKE] <con-mobile|165> destroying IKE_SA after failed XAuth authentication
      

      It could be 45 minutes, or 18 hours, but these happen to multiple different clients. Replacing the 3100 with the original 2440 restores proper behavior to those clients. Searches for XAuth issues like this don't lead anywhere useful, at least so far.

      Any ideas?

      J 1 Reply Last reply Reply Quote 0
      • D
        dcugy
        last edited by

        I get the same problem

        1 Reply Last reply Reply Quote 0
        • J
          jgraham5481 @hipgroove
          last edited by

          @hipgroove
          What do your proposals look like? There’s a sweet spot for mac and a sweet spot for windows 10.

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.