This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

IPsec with IPv6 only tunnel to UTM with one-sided routing problems

Hello Community,

I have a strange problem. I have a successfully established IPsec connection between an UTM and a XG firewall. Both products have the latest firmware: UTM with 9.705-3 and the XG with SFOS 18.0.3 MR-3. The IPsec connection is established exclusively via IPv6.
When I send a ping from the XG to a server in the zone of the UTM, I have 100% packet loss - tested via "Diagnostics" -> "Tools" -> "Ping". If I test the address via "Diagnostics" -> "Tools" -> "Route lookup", it also says correctly: "IPv6 is located on the ipsec0. IPv6 is not behind a router".
If I use a ping from the UTM to a server in the XG network via "Support" -> "Tools" -> "Ping Check", all pings arrive (0% packet loss). Only when the ping from the UTM to the XG was successful can I now also ping successfully from the XG to the UTM. However, this only works for about 5 to 15 minutes (if no other traffic is active via the IPsec tunnel during this time). After that, no connection is possible from the XG to the UTM. Only when I send a ping from the UTM to the XG does it work again temporarily.
I have been trying for days to find out where the error is, with the XG or with the UTM, and have also tried to enter static routes, unfortunately without success. What have I overlooked or where do I have to look to find the error?

Greetings
Jan



This thread was automatically locked due to age.
Parents
  • Hello JanZa,

    Thank you for contacting the Sophos Community!

    Can you try enabling SHA2 with 96-bit truncation on the XG and in the UTM.

    XG go to Configure>> VPN >> IPsec Policies >> your policy >> SHA2 with 96-bit truncation

    UTM go to Site-to-Site VPN >> IPsec >> Policies >> your policy >> IPsec authentication algorithm >> SHA2 with 96-bit truncation

    Regards,

    Regards,

  • With this UTM config the connection is established but the same error on ping:

    Log entry:

    2020:12:15-23:46:12 zsophos ipsec_starter[13688]: Starting strongSwan 4.4.1git20100610 IPsec [starter]...
    2020:12:15-23:46:12 zsophos pluto[13701]: Starting IKEv1 pluto daemon (strongSwan 4.4.1git20100610) THREADS VENDORID CISCO_QUIRKS
    2020:12:15-23:46:12 zsophos ipsec_starter[13694]: pluto (13701) started after 20 ms
    2020:12:15-23:46:12 zsophos pluto[13701]: loaded plugins: curl ldap aes des blowfish serpent twofish sha1 sha2 md5 random x509 pubkey pkcs1 pgp dnskey pem sqlite hmac gmp xauth attr attr-sql resolve
    2020:12:15-23:46:12 zsophos pluto[13701]: including NAT-Traversal patch (Version 0.6c) [disabled]
    2020:12:15-23:46:12 zsophos pluto[13701]: Using Linux 2.6 IPsec interface code
    2020:12:15-23:46:13 zsophos pluto[13701]: loading ca certificates from '/etc/ipsec.d/cacerts'
    2020:12:15-23:46:13 zsophos pluto[13701]: loaded ca certificate from '/etc/ipsec.d/cacerts/VPN Signing CA (Sun Oct 4 21:34:19 2015).pem'
    2020:12:15-23:46:13 zsophos pluto[13701]: loading aa certificates from '/etc/ipsec.d/aacerts'
    2020:12:15-23:46:13 zsophos pluto[13701]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts'
    2020:12:15-23:46:13 zsophos pluto[13701]: Changing to directory '/etc/ipsec.d/crls'
    2020:12:15-23:46:13 zsophos pluto[13701]: loading attribute certificates from '/etc/ipsec.d/acerts'
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.14/eth0.14 192.168.14.2:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.76/eth0.76 192.168.76.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.75/eth0.75 192.168.75.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.15/eth0.15 192.168.15.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.65/eth0.65 192.168.65.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth1.55/eth1.55 192.168.55.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth1.25/eth1.25 192.168.25.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.16/eth0.16 192.168.16.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.35/eth0.35 192.168.35.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth3/eth3 192.168.1.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth1/eth1 192.168.179.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface lo/lo 127.0.0.1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.35/eth0.35 2a02:908:2a40:7bde:203:2dff:fe27:fac3:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth1.25/eth1.25 2a02:908:2a40:7bdd:203:2dff:fe27:fac4:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.75/eth0.75 2a02:908:2a40:7bdc:203:2dff:fe27:fac5:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface eth0.14/eth0.14 2a02:908:2a40:7bc0:203:2dff:fe27:fac2:500
    2020:12:15-23:46:13 zsophos pluto[13701]: adding interface lo/lo ::1:500
    2020:12:15-23:46:13 zsophos pluto[13701]: loading secrets from "/etc/ipsec.secrets"
    2020:12:15-23:46:13 zsophos pluto[13701]: listening for IKE messages
    2020:12:15-23:46:13 zsophos pluto[13701]: added connection description "S_Perilex"
    2020:12:15-23:46:13 zsophos pluto[13701]: "S_Perilex" #1: initiating Main Mode
    2020:12:15-23:46:13 zsophos pluto[13701]: ERROR: "S_Perilex" #1: sendto on eth0.14 to 2a02:908:2a44:8be0:201:2eff:fe78:3368:500 failed in main_outI1. Errno 1: Operation not permitted
    2020:12:15-23:46:23 zsophos pluto[13701]: "S_Perilex" #1: received Vendor ID payload [XAUTH]
    2020:12:15-23:46:23 zsophos pluto[13701]: "S_Perilex" #1: received Vendor ID payload [Dead Peer Detection]
    2020:12:15-23:46:23 zsophos pluto[13701]: "S_Perilex" #1: ignoring Vendor ID payload [Cisco-Unity]
    2020:12:15-23:46:23 zsophos pluto[13701]: "S_Perilex" #1: we don't have a cert
    2020:12:15-23:46:23 zsophos pluto[13701]: "S_Perilex" #1: Peer ID is ID_IPV6_ADDR: '2a02:908:2a44:8be0:201:2eff:fe78:3368'
    2020:12:15-23:46:23 zsophos pluto[13701]: "S_Perilex" #1: Dead Peer Detection (RFC 3706) enabled
    2020:12:15-23:46:23 zsophos pluto[13701]: "S_Perilex" #1: ISAKMP SA established
    2020:12:15-23:46:23 zsophos pluto[13701]: "S_Perilex" #2: initiating Quick Mode PUBKEY+ENCRYPT+TUNNEL+PFS+UP {using isakmp#1}
    2020:12:15-23:46:23 zsophos pluto[13701]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="Perilex" address="2a02:908:2a40:7bc0:203:2dff:fe27:fac2" local_net="2a02:908:2a40:7bdd::/64" remote_net="2a02:908:2a44:8be2::/64"
    2020:12:15-23:46:24 zsophos pluto[13701]: "S_Perilex" #2: route-client-v6 output: Failed to send flush request: No such process
    2020:12:15-23:46:24 zsophos pluto[13701]: "S_Perilex" #2: sent QI2, IPsec SA established {ESP=>0xc40115de <0xbd42dbdb DPD} 



    Added log entries
    [edited by: JanZa at 10:47 PM (GMT -8) on 15 Dec 2020]
  • Hello JanZa,

    Please open a case with Support and provide me with the Case ID, so I can follow-up!

    Regards,

  • Will open a ticket as soon as I have access to the support portal again. Had access before, now I get the error message described here: https://support.sophos.com/support/s/article/KB-000040572?language=en_US&c__displayLanguage=en_US.

    I called via phone today and am waiting to be authorised again.

Reply Children
No Data