This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

[XG18.0.1] SD-WAN Policy Routing not working for System Traffic and VoIP

I have a brand new XG 125 installed in Factory Status with SFOS 18.0.1.

  • Current precedence for routing: SD-WAN policy route, Static route, VPN route
  • Policy route also applies to system-generated and reply traffic

With these settings I'm still having routing issues.

I have set a tunnel-based IPsec VPN connection.

The routings to the networks behind the VPN are SD-WAN Policy Routings.

For the normal traffic of clients behind the XG the SD-WAN Policy Routing is working fine.

But there are exceptions:

  • VoIP traffic
    I have a phone system that is behind the IPsec VPN. When I initiate the connection my voice packets are not routed correctly.
    I can listen to the other side, but the other side doesn't hear me.
    With packet capture I can see that my voice packets are routed to the WAN interface.
    Only after entering a static routing for the network of the phone system did my packets route through the VPN
    When the other side initiates the connection I have no issues.
    I had the same issue with VoIP also with another XG 125 that was updated from 17.5.12 to 18.0.1

  • System DNS traffic
    I have a series of DNS routes set in the XG. The DNS servers are behind the IPsec VPN.
    Here too I can see that the DNS requests are being routed to the WAN.
    Here too, only after entering a static routing did the system-initiated DNS requests go into the tunnel.

In my understanding this should not be so.

SD-WAN Policy Routing should do all the routing for the configured networks and should not require static routing.

Are these problems I'm encountering a real issue, or am I missing something?



This thread was automatically locked due to age.
Parents Reply Children
  • Hallo Toni,

    as I said in my first article this is a SFOS 18.01 installation and I'm using a routing based tunnel IPsec.

    This kind of IPsec tunnel needs a specific (static or SD-WAN) routing for each network I want to address on both sides of the connection because the networks are not defined in the IPsec connection itself.

    I know that policy-based IPsecs work differently and that system traffic for that kind of IPsec needs to be configured in the console for each tunnel by a couple of commands.

    I've been doing this for more than 5 years now.

    My problem is with the routing in the new SFOS 18 using Tunnel-IPsec.

    Or possibly with routing generally because the Tunnel-IPsec is just a new network with two interfaces - local side and remote side - through which I'm routing traffic.

    It appears that for some traffic SD-WAN routes don't apply even when set as having precedence and as working also for system traffic and reply traffic. 

  • You should review the conntrack and check the matching SD-WAN Policy. 

    As in matter of fact, if the pbr rule apply, it will route the traffic. Likely you rule simply does not apply. 

    Every conntrack entry indicates, which pbr will be applied by the flag: pbrid_dir0=0 pbrid_dir1=0 

     

    About VOIP, likely you are only applying it to SIP and not the UDP data traffic because pbr is not aware of the SIP helper. 

    About System generated traffic, likely your source / destination network does not apply to the traffic, hence it will not work. 

     

     

    For example:

    Creating a DNS rule with ANY and service DNS:

     

     

    Will switch the DNS Traffic:

    pbrid_dir0=1 pbrid_dir1=0