Quantcast
Viewing all articles
Browse latest Browse all 20028

ERX IPSec disconnecting approx. every 2 minutes

Hello,

 

I migrated from ERLite to ERX and found out that my IPSec tunnels are re-connecting approx. every two minutes.

 

This is what I see in the charon.log, only messages about creating acquire job and creating delete job:

 

 

root@erx:/var/log# cat charon.log | grep "Nov 29"
Nov 29 11:34:02 08[KNL] creating acquire job for policy 1.1.1.1/32[icmp/8] === 2.2.2.2/32[icmp/8] with reqid {1}
Nov 29 11:34:03 09[IKE] <peer-PUBLIC_IP1-tunnel-1|11> CHILD_SA peer-PUBLIC_IP1-tunnel-4{4} established with SPIs c729a287_i 1dd744d2_o and TS 3.3.3.101/32 === 2.2.2.0/24 
Nov 29 11:34:03 13[IKE] <peer-PUBLIC_IP1-tunnel-1|11> CHILD_SA peer-PUBLIC_IP1-tunnel-2{2} established with SPIs c1f0c5ca_i 8ddcffbe_o and TS 1.1.1.97/32 === 2.2.2.0/24 
Nov 29 11:34:10 12[IKE] <peer-PUBLIC_IP1-tunnel-1|11> CHILD_SA peer-PUBLIC_IP1-tunnel-3{3} established with SPIs c678afc2_i bd4b6d8e_o and TS 3.3.3.100/32 === 2.2.2.0/24 
Nov 29 11:34:30 04[IKE] <peer-PUBLIC_IP1-tunnel-1|11> CHILD_SA peer-PUBLIC_IP1-tunnel-1{1} established with SPIs cdc30fe0_i 85d2e72b_o and TS 1.1.1.1/32 === 2.2.2.0/24 
Nov 29 11:36:47 09[KNL] creating delete job for ESP CHILD_SA with SPI cf79f796 and reqid {1}
Nov 29 11:36:47 13[IKE] <peer-PUBLIC_IP1-tunnel-1|11> initiating Main Mode IKE_SA peer-PUBLIC_IP1-tunnel-1[12] to PUBLIC_IP1
Nov 29 11:36:48 15[KNL] creating acquire job for policy 1.1.1.1/32[icmp/8] === 2.2.2.2/32[icmp/8] with reqid {1}
Nov 29 11:36:50 04[IKE] <peer-PUBLIC_IP1-tunnel-1|12> IKE_SA peer-PUBLIC_IP1-tunnel-1[12] established between PUBLIC_IP2[PUBLIC_IP2]...PUBLIC_IP1[PUBLIC_IP1]
Nov 29 11:36:53 10[IKE] <peer-PUBLIC_IP1-tunnel-1|12> CHILD_SA peer-PUBLIC_IP1-tunnel-4{4} established with SPIs cddafc14_i 648f915f_o and TS 3.3.3.101/32 === 2.2.2.0/24 
Nov 29 11:36:53 09[IKE] <peer-PUBLIC_IP1-tunnel-1|12> CHILD_SA peer-PUBLIC_IP1-tunnel-2{2} established with SPIs ce84614d_i 2969d82d_o and TS 1.1.1.97/32 === 2.2.2.0/24 
Nov 29 11:37:00 10[IKE] <peer-PUBLIC_IP1-tunnel-1|12> CHILD_SA peer-PUBLIC_IP1-tunnel-3{3} established with SPIs cef38d93_i 02b8c0d1_o and TS 3.3.3.100/32 === 2.2.2.0/24 
Nov 29 11:37:20 05[IKE] <peer-PUBLIC_IP1-tunnel-1|12> CHILD_SA peer-PUBLIC_IP1-tunnel-1{1} established with SPIs cde332c9_i 0be85272_o and TS 1.1.1.1/32 === 2.2.2.0/24 
Nov 29 11:39:35 06[KNL] creating delete job for ESP CHILD_SA with SPI c422f415 and reqid {1}
Nov 29 11:39:35 11[IKE] <peer-PUBLIC_IP1-tunnel-1|12> initiating Main Mode IKE_SA peer-PUBLIC_IP1-tunnel-1[13] to PUBLIC_IP1
Nov 29 11:39:36 12[KNL] creating acquire job for policy 1.1.1.1/32[icmp/8] === 2.2.2.2/32[icmp/8] with reqid {1}
Nov 29 11:39:36 05[IKE] <peer-PUBLIC_IP1-tunnel-1|13> IKE_SA peer-PUBLIC_IP1-tunnel-1[13] established between PUBLIC_IP2[PUBLIC_IP2]...PUBLIC_IP1[PUBLIC_IP1]
Nov 29 11:39:38 14[IKE] <peer-PUBLIC_IP1-tunnel-1|13> CHILD_SA peer-PUBLIC_IP1-tunnel-4{4} established with SPIs ce66b215_i 7c01d411_o and TS 3.3.3.101/32 === 2.2.2.0/24 
Nov 29 11:39:38 08[IKE] <peer-PUBLIC_IP1-tunnel-1|13> CHILD_SA peer-PUBLIC_IP1-tunnel-2{2} established with SPIs c545cb86_i 0dfec155_o and TS 1.1.1.97/32 === 2.2.2.0/24 
Nov 29 11:39:45 04[IKE] <peer-PUBLIC_IP1-tunnel-1|13> CHILD_SA peer-PUBLIC_IP1-tunnel-3{3} established with SPIs c6bb3f60_i 0f057e68_o and TS 3.3.3.100/32 === 2.2.2.0/24 
Nov 29 11:40:05 12[IKE] <peer-PUBLIC_IP1-tunnel-1|13> CHILD_SA peer-PUBLIC_IP1-tunnel-1{1} established with SPIs c5ec997a_i af0466b0_o and TS 1.1.1.1/32 === 2.2.2.0/24 
Nov 29 11:42:21 08[KNL] creating delete job for ESP CHILD_SA with SPI cabb7995 and reqid {1}
Nov 29 11:42:21 10[IKE] <peer-PUBLIC_IP1-tunnel-1|13> initiating Main Mode IKE_SA peer-PUBLIC_IP1-tunnel-1[14] to PUBLIC_IP1
Nov 29 11:42:22 09[KNL] creating acquire job for policy 1.1.1.1/32[icmp/8] === 2.2.2.2/32[icmp/8] with reqid {1}
Nov 29 11:42:24 15[IKE] <peer-PUBLIC_IP1-tunnel-1|14> IKE_SA peer-PUBLIC_IP1-tunnel-1[14] established between PUBLIC_IP2[PUBLIC_IP2]...PUBLIC_IP1[PUBLIC_IP1]
Nov 29 11:42:28 10[IKE] <peer-PUBLIC_IP1-tunnel-1|14> CHILD_SA peer-PUBLIC_IP1-tunnel-4{4} established with SPIs ca2c7250_i 7c2954cf_o and TS 3.3.3.101/32 === 2.2.2.0/24 
Nov 29 11:42:28 11[IKE] <peer-PUBLIC_IP1-tunnel-1|14> CHILD_SA peer-PUBLIC_IP1-tunnel-2{2} established with SPIs c7122a68_i b16c74b2_o and TS 1.1.1.97/32 === 2.2.2.0/24 
Nov 29 11:42:35 04[IKE] <peer-PUBLIC_IP1-tunnel-1|14> CHILD_SA peer-PUBLIC_IP1-tunnel-3{3} established with SPIs c575c3d1_i ba3327b8_o and TS 3.3.3.100/32 === 2.2.2.0/24 
Nov 29 11:42:55 09[IKE] <peer-PUBLIC_IP1-tunnel-1|14> CHILD_SA peer-PUBLIC_IP1-tunnel-1{1} established with SPIs cc691738_i 811d1985_o and TS 1.1.1.1/32 === 2.2.2.0/24 
Nov 29 11:45:09 04[KNL] creating delete job for ESP CHILD_SA with SPI cc6093b0 and reqid {1}
Nov 29 11:45:09 10[IKE] <peer-PUBLIC_IP1-tunnel-1|14> initiating Main Mode IKE_SA peer-PUBLIC_IP1-tunnel-1[15] to PUBLIC_IP1
Nov 29 11:45:09 09[IKE] <peer-PUBLIC_IP1-tunnel-1|15> IKE_SA peer-PUBLIC_IP1-tunnel-1[15] established between PUBLIC_IP2[PUBLIC_IP2]...PUBLIC_IP1[PUBLIC_IP1]
Nov 29 11:45:10 12[KNL] creating acquire job for policy 1.1.1.1/32[icmp/8] === 2.2.2.2/32[icmp/8] with reqid {1}
Nov 29 11:45:13 10[IKE] <peer-PUBLIC_IP1-tunnel-1|15> CHILD_SA peer-PUBLIC_IP1-tunnel-4{4} established with SPIs c7f2b79b_i 5102b8cd_o and TS 3.3.3.101/32 === 2.2.2.0/24 
Nov 29 11:45:14 04[IKE] <peer-PUBLIC_IP1-tunnel-1|15> CHILD_SA peer-PUBLIC_IP1-tunnel-2{2} established with SPIs c0b63ade_i 19fcc26f_o and TS 1.1.1.97/32 === 2.2.2.0/24 
Nov 29 11:45:20 07[IKE] <peer-PUBLIC_IP1-tunnel-1|15> CHILD_SA peer-PUBLIC_IP1-tunnel-3{3} established with SPIs c97d5d48_i 10111fe0_o and TS 3.3.3.100/32 === 2.2.2.0/24 
Nov 29 11:45:42 11[IKE] <peer-PUBLIC_IP1-tunnel-1|15> CHILD_SA peer-PUBLIC_IP1-tunnel-1{1} established with SPIs cadf480e_i 3b4c1985_o and TS 1.1.1.1/32 === 2.2.2.0/24 

 

Here is my IPSec configuration, I changed nothing and it is the same as it was on the ERLite:

 

[edit vpn ipsec]
ubnt@erx# show 
 auto-firewall-nat-exclude enable
 esp-group XXX-P2 {
     compression disable
     lifetime 14400
     mode tunnel
     pfs dh-group2
     proposal 1 {
         encryption aes256
         hash sha1
     }
 }
 ike-group XXX-P1 {
     ikev2-reauth no
     key-exchange ikev1
     lifetime 86400
     proposal 1 {
         dh-group 2
         encryption aes256
         hash sha1
     }
 }
 ipsec-interfaces {
     interface eth0
 }
 nat-networks {
     allowed-network 0.0.0.0/0 {
     }
 }
 nat-traversal enable
 site-to-site {
     peer PUBLIC_IP1 {
         authentication {
             mode pre-shared-secret
             pre-shared-secret secret-secret-secret
         }
         connection-type initiate
         ike-group XXX-P1
         ikev2-reauth inherit
         local-address PUBLIC_IP2
         tunnel 1 {
             allow-nat-networks disable
             allow-public-networks disable
             esp-group XXX-P2
             local {
                 prefix 1.1.1.1/32
             }
             remote {
                 prefix 2.2.2.0/24
             }
         }
         tunnel 2 {
             allow-nat-networks disable
             allow-public-networks disable
             esp-group XXX-P2
             local {
                 prefix 1.1.1.97/32
             }
             remote {
                 prefix 2.2.2.0/24
             }
         }
         tunnel 3 {
             allow-nat-networks disable
             allow-public-networks disable
             esp-group XXX-P2
             local {
                 prefix 3.3.3.100/32
             }
             remote {
                 prefix 2.2.2.0/24
             }
         }
         tunnel 4 {
             allow-nat-networks disable
             allow-public-networks disable
             esp-group XXX-P2
             local {
                 prefix 3.3.3.101/32
             }
             remote {
                 prefix 2.2.2.0/24
             }
         }
     }
 }

The situation is the same regardless the IPSec offlod is turned on or off.

 

Anyone facing the same issue?

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles