[strongSwan] Stongswan and Meraki
Michael Schwartzkopff
ms at sys4.de
Tue Mar 3 10:09:03 CET 2020
On 26.02.20 23:50, Mark wrote:
> Hi,
>
> I have a couple of random seeming problems between Meraki MX devices and
> Strongswan via pfsense and I'm at a bit of a loss on how to gather more
> information. Hoping for some pointers here
>
> The Meraki side is their latest firmware and the pfsense is running
> FreeBSD strongSwan U5.7.1/K11.2-RELEASE-p10. I have several sets of
> these vpn's but the most problematic one has around 40 phase 1 peers,
> each with 2 or 3 phase 2 configurations, this is on a single pfsense
> instance with the 40 phase 1 peers being mx devices on the internet.
>
> These are all IKEv1 configurations.
>
> For the most part, we have solid and reliable VPN's among the devices,
> but sometimes the two endpoints appear to get out of sync. This can
> happen every few days or it can happen every couple of hours.
>
> I see instances of the strongswan side successfully rekeying, but the
> Meraki side logging an SPI expiration and never having logged an
> established event for that same SPI. The result is that the pfsense side
> will send traffic forever but the MX apparently just discards the
> incoming traffic.
>
> In other instances, I will see sometimes 5 or 6 phase 2 SPI pairs for
> the same network set on the same conneciton
>
> In either of these two cases, my operational symptom will be that
> traffic is not passing. In both cases, an ipsec down connection &&
> ipsec up connection makes traffic flow again.
>
> I've engaged Meraki many times including as the problems are happening,
> and I always get an inconclusive answer/ no answer.
>
> This is an example config, they're generally all the same for the
> different phase 1 and phase 2 connections
>
> conn con1000
> fragmentation = yes
> keyexchange = ikev1
> reauth = yes
> forceencaps = yes
> mobike = no
>
> rekey = yes
> installpolicy = yes
> type = tunnel
> dpdaction = restart
> dpddelay = 10s
> dpdtimeout = 60s
> auto = route
> left = leftnet
> right = rghtnet
> leftid = leftid
> ikelifetime = 28800s
> lifetime = 3600s
> ike = aes256-sha1-modp1024!
> esp = aes256-sha1,aes192-sha1,aes128-sha1!
> leftauth = psk
> rightauth = psk
> rightid = rightid
> aggressive = no
> rightsubnet = 10.1.1.0/24
> leftsubnet = 10.10.1.0/24
>
>
> I suspect that some of my problems might be related to delivery problems
> for the encapsulated packets over the internet but I don't know how I
> can go about knowing that. I have the ability to capture packets on the
> wan side of the pfsense/strongswan devices, but I don't quite know what
> I'm looking for in the network traffic.
>
> Any pointers to help me get the data I need to make these tunnels way
> more reliable?
>
> Thanks
>
> Mark
Please send logs of both sides during an outage.
Mit freundlichen Grüßen,
--
[*] sys4 AG
https://sys4.de, +49 (89) 30 90 46 64
Schleißheimer Straße 26/MG,80333 München
Sitz der Gesellschaft: München, Amtsgericht München: HRB 199263
Vorstand: Patrick Ben Koetter, Marc Schiffbauer, Wolfgang Stief
Aufsichtsratsvorsitzender: Florian Kirstein
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20200303/d738a442/attachment-0001.sig>
More information about the Users
mailing list