Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Issue with 21.02 and not with 2.5.0

    Scheduled Pinned Locked Moved IPsec
    18 Posts 8 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      beejee
      last edited by

      I think I have the similar situation. After upgraded to version 21.02-RELEASE-p1, my Netgate XG-7100 kept getting disconnected to /from a remote Cisco RV042 even though the IPsec status showed as connected. The IPsec tunnel had been working smoothly for a year without any hiccup now decided to act up. There is no pattern when it would stop the connection, most of the time just within couple minutes. I applied the 7 patches as posted from [https://forum.netgate.com/topic/161523/pfsense-2-5-to-pfsense-2-5-ipsec-tunnel-fails-to-connect/3](link url) but still no luck. I am under the pressure to get it back on track but it looks like there is no other fix.

      1 Reply Last reply Reply Quote 0
      • C
        cybero2912
        last edited by

        For me the problem starts when I have more that one IPSec tunnel.
        If I enable only one, the connection works fine but as soon I enable a second tunnel problem with disconnects starts.

        1 Reply Last reply Reply Quote 0
        • B
          beejee
          last edited by

          I finally got my IPsec tunnel to work without interruption on my Netgate XG-7100 by turning of the Hardware Crypto. I think version 21.02 had something that made the IPsec become no longer able to catch up or sync with the Hardware Crypto. I believe it is a work around solution since the Hardware Crypto has to be off.

          1 Reply Last reply Reply Quote 1
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            If you are using a 5100 or 7100 your best bet is to change the hardware crypto from AES-NI to QAT.

            If you have to stay on AES-NI then you should check and see if any of your tunnels are using SHA256 and if so, change to a different hash (or ideally change over to AES-GCM without a hash).

            You could disable hardware cryptography as well but that will obviously incur a performance penalty if you are pushing significant traffic over IPsec.

            Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            L H F 3 Replies Last reply Reply Quote 1
            • L
              lst_hoe @jimp
              last edited by

              @jimp : Could you please explain why there is a problem with AES-NI and SHA256? I guess this is a very common setting for the SG5100 and heavily used as of today. I also failed to found the "QAT" setting in 2.4.5, so no chance to set this in advance?

              jimpJ 1 Reply Last reply Reply Quote 1
              • H
                hannesclp @jimp
                last edited by

                @jimp Thanks for your advice! We have hit the very same bug and did cost me some hours since have been in evaluation of pfsense and therefor a million other reasons why it could have failed. We are using XG-7100-1U devices in the eval.

                1 Reply Last reply Reply Quote 0
                • jimpJ
                  jimp Rebel Alliance Developer Netgate @lst_hoe
                  last edited by

                  @lst_hoe said in Issue with 21.02 and not with 2.5.0:

                  @jimp : Could you please explain why there is a problem with AES-NI and SHA256? I guess this is a very common setting for the SG5100 and heavily used as of today. I also failed to found the "QAT" setting in 2.4.5, so no chance to set this in advance?

                  The newer AES-NI driver in 21.02/2.5.0 added support for accelerating hashing and that new feature appears to have some issues. It isn't consistently repeatable, though, so we haven't tracked down the exact cause yet.

                  https://redmine.pfsense.org/issues/11524

                  Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                  Need help fast? Netgate Global Support!

                  Do not Chat/PM for help!

                  L 1 Reply Last reply Reply Quote 1
                  • L
                    lst_hoe @jimp
                    last edited by

                    It might be a different issue for our site. I have checked the logs from the failed upgrade and with 21.02_1 (SG5100) and imported working config we got for every IKE_SA_INIT request

                    no IKE config found for x.x.x.x...x.x.x.x, sending NO_PROPOSAL_CHOSEN

                    all the time, so no IPSEC tunnel was working at all. We have three P1 IKEv2 configs, one for Mobile Clients (mostly Windows) and two Site-to-Site tunnels. We have indeed AES-NI enabled and SHA-256 for all Phase 1, but we never seen any tunnel succeed at all?

                    I will try with the second SG5100 device and QAT, but this will take some time.

                    1 Reply Last reply Reply Quote 0
                    • jimpJ
                      jimp Rebel Alliance Developer Netgate
                      last edited by

                      That is likely something else, you should start your own thread with more details, but first check the existing threads which list patches to try. If it can't match the connection there could be one of several solved issues at play with the IPsec config itself.

                      Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                      Need help fast? Netgate Global Support!

                      Do not Chat/PM for help!

                      L 1 Reply Last reply Reply Quote 1
                      • L
                        lst_hoe @jimp
                        last edited by

                        Already found
                        https://redmine.pfsense.org/issues/11442
                        https://redmine.pfsense.org/issues/11555

                        The Mobile Clients use %any and the Site-to-Site FQDN as remote ID :-(

                        1 Reply Last reply Reply Quote 0
                        • jimpJ
                          jimp Rebel Alliance Developer Netgate
                          last edited by

                          You can apply the commits referenced on those issues using the system patches package as mentioned in several other threads.

                          Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          J 1 Reply Last reply Reply Quote 0
                          • J
                            JD 0 @jimp
                            last edited by

                            @jimp I swapped my 5100 over to QAT (with a reboot) and am still seeing random drops. Since the need here is non-critical I'm going to wait for the referenced patches to land in an update and re-test.

                            J 1 Reply Last reply Reply Quote 0
                            • H
                              hannesclp
                              last edited by

                              @jimp Maybe it helps since I saw you only mentioning Sha256: We had the described issue using aes 256 and sha1 on the xg7100 (refer to my above mentioned post).

                              1 Reply Last reply Reply Quote 0
                              • F
                                froussy @jimp
                                last edited by

                                @jimp Good day,

                                I did, on my 5100 change the AES-NI to QAT and it worked..

                                I will try our 7100 tonight!

                                Will keep updated

                                Frank

                                C 1 Reply Last reply Reply Quote 0
                                • C
                                  cybero2912 @froussy
                                  last edited by

                                  but changing or disabling hardware encryption ist not a real solution!
                                  it is a workaround, not more

                                  1 Reply Last reply Reply Quote 0
                                  • J
                                    JD 0 @JD 0
                                    last edited by

                                    @jd-0 Wanted to followup that 21.02.2 (as well as the RC over the last month) completely resolved my random drops issue. Many thanks!

                                    1 Reply Last reply Reply Quote 1
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.