[strongSwan] Traffic Pauses to IKEv1 VPN with Juniper ISG 1000
Mahesh Neelakanta
neelakanta at gmail.com
Sun Dec 13 17:06:06 CET 2015
Hi,
I have a Strongswan VPN server that is being used to terminate VPN
connections with multiple endpoints. Most of the existing endpoints are
cisco, sophos, etc. Recently I have a Juniper ISG 1000 endpoint that is
posing some intermittent traffic problems.
The exact issue is that traffic over the VPN pauses after some (random)
time. The tunnel itself is up and at the next rekey traffic starts flowing
again. If I reduce the re-key time from 3600s down to 600s, the problem is
reduced significantly. I did verify with the remote side that their keylife
is 3600s. We do not have DPD enabled. There is constant traffic so there
are no periods of inactivity.
During the periods where traffic pauses, ipsec statusall report shows no
more packets in bytes_i (whereas bytes_o is still increasing).
Here is the config on our end (IPs and subnets have been changed for
security):
config setup
uniqueids = no
charondebug = ike 2
conn %default
keyingtries=%forever
dpdaction=none
conn vpn-juniper-prd
left=%defaultroute
leftid=42.75.5.14 # Our actual local IP is 10.20.1.18, we are
NATed going out
leftsubnet=5.22.11.21/32
right=168.42.68.5
rightid=168.42.68.5
rightsubnet=12.23.0.0/16
keyexchange=ikev1
ikelifetime=28800s
ike=aes128-sha1-modp1024
esp=aes128-sha1-modp1024
keylife=3600m
type=tunnel
compress=no
authby=secret
auto=start
Notice that the last "bytes_i" shows 145s ago (ipsec statusall output):
vpn-juniper-prd: %any...168.42.68.5 IKEv1
vpn-juniper-prd: local: [42.75.5.14] uses pre-shared key authentication
vpn-juniper-prd: remote: [168.42.68.5] uses pre-shared key authentication
vpn-juniper-prd: child: 5.22.11.21/32 === 12.23.0.0/16 TUNNEL
vpn-juniper-prd[1]: ESTABLISHED 110 minutes ago,
10.20.1.18[42.75.5.14]...168.42.68.5[168.42.68.5]
vpn-juniper-prd[1]: IKEv1 SPIs: a8ed9dd3b567a578_i* 97dbd6dbb3683aa4_r,
pre-shared key reauthentication in 5 hours
vpn-juniper-prd[1]: IKE proposal:
AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
vpn-juniper-prd{44}: REKEYED, TUNNEL, reqid 4, expires in 10 minutes
vpn-juniper-prd{44}: 5.22.11.21/32 === 12.23.0.0/16
vpn-juniper-prd{52}: INSTALLED, TUNNEL, reqid 4, ESP SPIs: c3fdc693_i
9d90fe7f_o
vpn-juniper-prd{52}: AES_CBC_128/HMAC_SHA1_96, 24197112 bytes_i *(26366
pkts, 145s ago*), 8889197 bytes_o (31780 pkts, 0s ago), rekeying in 10
minutes
vpn-juniper-prd{52}: 5.22.11.21/32 === 12.23.0.0/16
During that time, we still see packets going in/out via the eth0 interface :
03:38:52.349565 IP 10.20.1.18 > 168.42.68.5:
ESP(spi=0x9d90fe7f,seq=0x7c0f), length 132
03:38:52.363916 IP 168.42.68.5 > 10.20.1.18:
ESP(spi=0xc3fdc693,seq=0x5cd3), length 132
03:38:52.548261 IP 168.42.68.5 > 10.20.1.18:
ESP(spi=0xc3fdc693,seq=0x5cd4), length 100
03:38:52.564198 IP 168.42.68.5 > 10.20.1.18:
ESP(spi=0xc3fdc693,seq=0x5cd5), length 100
03:38:53.357693 IP 10.20.1.18 > 168.42.68.5:
ESP(spi=0x9d90fe7f,seq=0x7c10), length 132
03:38:53.371666 IP 168.42.68.5 > 10.20.1.18:
ESP(spi=0xc3fdc693,seq=0x5cd6), length 132
03:38:54.365616 IP 10.20.1.18 > 168.42.68.5:
ESP(spi=0x9d90fe7f,seq=0x7c11), length 132
03:38:54.379533 IP 168.42.68.5 > 10.20.1.18:
ESP(spi=0xc3fdc693,seq=0x5cd7), length 132
03:38:55.250707 IP 168.42.68.5 > 10.20.1.18:
ESP(spi=0xc3fdc693,seq=0x5cd8), length 100
03:38:55.373593 IP 10.20.1.18 > 168.42.68.5:
ESP(spi=0x9d90fe7f,seq=0x7c12), length 132
03:38:55.387695 IP 168.42.68.5 > 10.20.1.18:
ESP(spi=0xc3fdc693,seq=0x5cd9), length 132
thanks,
mahesh
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20151213/69bc1afe/attachment.html>
More information about the Users
mailing list