• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

dpinger gateway monitoring - strange issue

Scheduled Pinned Locked Moved General pfSense Questions
12 Posts 2 Posters 2.0k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    michmoor LAYER 8 Rebel Alliance
    last edited by michmoor Apr 26, 2023, 5:49 PM Apr 26, 2023, 5:48 PM

    Since 9:15am Eastern today i have been having instability on my IPsec tunnels and my WAN Gateway monitoring IP [ATT DNS server - 68.94.156.11]. At first, i thought this was because of some upstream issue within the ATT network as one of my IPsec tunnel endpoints is on ATT Fiber. Then I started seeing instability on another IPsec endpoint thats on OptimumOnline[New York]. I am running eBGP peering on my IPsecs so i got the additional email spam of routing flapping all day. My inbox is not happy.
    So I ran some mtr traces and noticed that the ATT modem i am using at my location, Arris BGW210-700, in passthrough mode, was seeing drops. So i am thinking it was just the modem issue so i restarted it. The issue still persists where I am losing my routing neighbors and getting gateway packet loss emails.

    My last step in troubleshooting was to change the WAN monitor IP from ATTs DNS server to just the default gateway for my WAN which is 162.193.210.1. Its not the best practice to do this but i was out of ideas.
    All packet loss and bgp down alerts have stopped. Im stable.

    What is,if any, is the relationship between dpinger and IPsec? Why after swapping the monitor address for my WAN_DHCP caused all alerts to stop.

    edit: My IPsec tunnels use the remote IPsec endpoint, another firewall, as the monitor IP. So it uses the tunnel endpoint of say 10.6.106.2/30 where this pfsense with the instability is 10.6.106.1/30

    IPsec tunnels flapping
    d47d2f2e-78a8-4ec7-8bc9-9e934f4c2d3f-image.png
    I made the change at 1:45pm Eastern
    0964883f-4ad8-49ed-81e0-aad6429b117b-image.png

    Firewall: NetGate,Palo Alto-VM,Juniper SRX
    Routing: Juniper, Arista, Cisco
    Switching: Juniper, Arista, Cisco
    Wireless: Unifi, Aruba IAP
    JNCIP,CCNP Enterprise

    1 Reply Last reply Reply Quote 0
    • S
      stephenw10 Netgate Administrator
      last edited by Apr 26, 2023, 11:37 PM

      Dpinger monitors across the VTI links when you have the remote side set up as a gateway. It can be more sensitive that local monitoring simply because it's going over a longer route with more hops.
      The WAN monitoring you had set was seeing packet loss to an extent that it would have been throwing the gateway alarm action. That will have been restarting numerous things including VPNs and BGP. There's a good chance it was just the target not responding though whist the actually connectivity remained good. Or at least good enough.
      Rather than changing the monitor IP to something local it would be better to disable the gateway alarm action to prevent the service restarts.

      Steve

      M 1 Reply Last reply Apr 27, 2023, 1:22 AM Reply Quote 1
      • M
        michmoor LAYER 8 Rebel Alliance @stephenw10
        last edited by michmoor Apr 27, 2023, 2:35 AM Apr 27, 2023, 1:22 AM

        @stephenw10 Thanks for the added color. Ok so if i understand you correctly, if the WAN_DHCP monitoring IP is having packet loss that will interrupt the IPsec tunnel connectivity as well? So if WAN_DHCP is getting packet loss, IPsec will restart the tunnels? Why does a gateway alarm restart the IPsec and BGP process?

        edit

        This is on of the emails i get. From syslog

        4b103386-0aae-4fee-b7fe-ecdf3f5de2fc-image.png

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        M 1 Reply Last reply Apr 27, 2023, 2:56 AM Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @michmoor
          last edited by michmoor Apr 27, 2023, 2:57 AM Apr 27, 2023, 2:56 AM

          @stephenw10 ok I had to read over the documentation again but I think I see what you’re getting at.
          My packet loss thresholds are 10/20.
          So losing 20 packets marks the gateway as down. Pf probably removes the gateway, the default route and nexthop from the route table so naturally anything relying on it such as IPsec will fail too. I suppose raising my threshold would’ve masked the issue.
          Am I right on this?

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          1 Reply Last reply Reply Quote 0
          • S
            stephenw10 Netgate Administrator
            last edited by Apr 27, 2023, 12:28 PM

            It's 10 and 20% loss not total packets. When you only have a single gateway pfSense will not remove it as the default route but it will still run all the gateway scripts which restart things. The gateway action is almost entirely for multiwan setups where a gateway down even needs to restarts services on an alternative WAN connection.

            Yes, changing the gateway thresholds would prevent the alarms and hence the gateway events but simply disabling the action also does that whist still logging the alarms.

            M 1 Reply Last reply Apr 27, 2023, 1:07 PM Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @stephenw10
              last edited by Apr 27, 2023, 1:07 PM

              @stephenw10 Thanks as always. Curious about the gateway scripts..what are they? where can I find them?
              The restarting of things with the packet loss is what tripped me up yesterday.
              I'm going to move forward with your suggestion by disabling the action BUT i do still find the alerting such as packet loss very useful for diagnosing circuit health.

              Do i just disable gateway monitoring to in effect disable the gateway scripts? To confirm once i disable i still will get emails/alerts about packet loss?

              f0bba275-28b1-46a2-b806-372bdbe853a3-image.png

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 0
              • S
                stephenw10 Netgate Administrator
                last edited by Apr 27, 2023, 1:58 PM

                No you want monitoring enabled in order to log events and quality data. Just disable the gateway monitoring action. It's a setting just below that.

                M 1 Reply Last reply Apr 27, 2023, 2:08 PM Reply Quote 1
                • M
                  michmoor LAYER 8 Rebel Alliance @stephenw10
                  last edited by michmoor Apr 27, 2023, 2:16 PM Apr 27, 2023, 2:08 PM

                  @stephenw10
                  Do you know if there is any documentation on these gateway scripts? what they do, how they are tied dpinger?

                  b2ac0d57-7d2d-4290-8015-afb36868d35d-image.png
                  233ea4fb-6f5e-4dcf-99d4-7622be867a97-image.png

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  1 Reply Last reply Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Apr 27, 2023, 2:23 PM

                    There is no specific documentation I'm aware of. We were discussing it internally just yesterday.

                    However you can see what is triggered in /etc/rc.gateway_alarm

                    M 1 Reply Last reply Apr 27, 2023, 2:36 PM Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @stephenw10
                      last edited by Apr 27, 2023, 2:36 PM

                      @stephenw10 Perfect thank you. I think we're settled here.

                      my two cents - a quick blurb in the documentation noting what would happen if there is instability. Knowing that VPNs will restart would've been helpful as i was troubleshooting an upstream issue where as this was at its core a gateway action because of my monitor IP.

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      1 Reply Last reply Reply Quote 0
                      • S
                        stephenw10 Netgate Administrator
                        last edited by Apr 27, 2023, 3:42 PM

                        I agree. Exactly what we were discussing yesterday.

                        This also applies: https://redmine.pfsense.org/issues/13416

                        M 1 Reply Last reply Apr 27, 2023, 3:49 PM Reply Quote 0
                        • M
                          michmoor LAYER 8 Rebel Alliance @stephenw10
                          last edited by Apr 27, 2023, 3:49 PM

                          @stephenw10 This was what i was going to respond to you with in my 2 cents comment but i let it go.
                          The redmine is spot on. If you are doing a Multi-WAN set up than as part of the configuration you should, explicitly, enable gateway actions because thats the whole point. Otherwise, keep the gateway action disabled.
                          The RRD graphs are very valuable so i would keep the monitoring enabled for sure.

                          Thanks again for your help. I think you're 10/10 with my issues now? 😊

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          1 Reply Last reply Reply Quote 1
                          1 out of 12
                          • First post
                            1/12
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                            This community forum collects and processes your personal information.
                            consent.not_received