Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block with no log rule on WAN breaks IPsec rekeying

    Scheduled Pinned Locked Moved IPsec
    1 Posts 1 Posters 22 Views 1 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F Offline
      femtosize
      last edited by

      To stop the logs getting full of rubbish I added an explicit "block IPv4 any any" to the WAN interfaces on a pair of firewalls which are connected using an IPsec VPN.
      This seemed to work fine until the phase 2s tried to rekey.
      The rekeying failed and the whole VPN was ripped down and reestablished.

      Is that expected?

      Disabling the block rules made everything work properly again.

      Should I have added rules of allow IKE and ESP before the block rule? Or should the automatically added ones been enough?

      Where do the automatically generated IPsec rules end up in processing order?
      Is there a way I can see this?

      Is there a better way to stop the default block rules logging?

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.