Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

IPsec tunnel keep disconnecting after some days

Hi everyone,

I've got an ipsec tunnel between two sophos XG vm firewalls (both updated to firmware v.19). The tunnel is between head office and a small branch office, created using the vpn wizard. At the end of the wizard everything is ok, new settings have been saved, the tunnel comes up as aspected but, after a certain period (about a couple of weeks) the tunnel goes down and there are no way to built it up again!...

I've checked the strongswan log and there it seems that the IKE_SA was established but after  there are a lots retrasmit of request with ID 0 ending with sending DPD request.

part of the log:

2022-06-17 09:34:26Z 24[NET] <235> received packet: from 95.254.*.*[500] to 93.49.*.*[500] (548 bytes)
2022-06-17 09:34:26Z 24[ENC] <235> parsed ID_PROT request 0 [ SA V V V V V V ]
2022-06-17 09:34:26Z 24[IKE] <235> received XAuth vendor ID
2022-06-17 09:34:26Z 24[IKE] <235> received DPD vendor ID
2022-06-17 09:34:26Z 24[IKE] <235> received Cisco Unity vendor ID
2022-06-17 09:34:26Z 24[IKE] <235> received FRAGMENTATION vendor ID
2022-06-17 09:34:26Z 24[IKE] <235> received NAT-T (RFC 3947) vendor ID
2022-06-17 09:34:26Z 24[IKE] <235> received draft-ietf-ipsec-nat-t-ike-02\n vendor ID
2022-06-17 09:34:26Z 24[IKE] <235> 95.254.*.* is initiating a Main Mode IKE_SA
2022-06-17 09:34:26Z 24[ENC] <235> generating ID_PROT response 0 [ SA V V V V V ]
2022-06-17 09:34:26Z 24[NET] <235> sending packet: from 93.49.*.*[500] to 95.254.*.*[500] (180 bytes)
2022-06-17 09:34:26Z 12[NET] <235> received packet: from 95.254.*.*[500] to 93.49.*.*[500] (652 bytes)
2022-06-17 09:34:26Z 12[ENC] <235> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
2022-06-17 09:34:26Z 12[IKE] <235> remote host is behind NAT
2022-06-17 09:34:26Z 12[ENC] <235> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
2022-06-17 09:34:26Z 12[NET] <235> sending packet: from 93.49.*.*[500] to 95.254.*.*[500] (652 bytes)
2022-06-17 09:34:26Z 07[NET] <235> received packet: from 95.254.*.*[4500] to 93.49.*.*[4500] (92 bytes)
2022-06-17 09:34:26Z 07[ENC] <235> parsed ID_PROT request 0 [ ID HASH ]
2022-06-17 09:34:26Z 07[CFG] <235> looking for pre-shared key peer configs matching 93.49.*.*...95.254.*.*[*]
2022-06-17 09:34:26Z 07[CFG] <235> selected peer config "TN_BZ-1"
2022-06-17 09:34:26Z 07[IKE] <TN_BZ-1|235> IKE_SA TN_BZ-1[235] established between 93.49.*.*[*]...95.254.*.*[*]
2022-06-17 09:34:26Z 07[IKE] <TN_BZ-1|235> scheduling rekeying in 11841s
2022-06-17 09:34:26Z 07[IKE] <TN_BZ-1|235> maximum IKE_SA lifetime 12381s
2022-06-17 09:34:26Z 07[ENC] <TN_BZ-1|235> generating ID_PROT response 0 [ ID HASH ]
2022-06-17 09:34:26Z 07[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (92 bytes)
2022-06-17 09:34:30Z 06[NET] <TN_BZ-1|235> received packet: from 95.254.*.*[4500] to 93.49.*.*[4500] (92 bytes)
2022-06-17 09:34:30Z 06[IKE] <TN_BZ-1|235> received retransmit of request with ID 0, retransmitting response
2022-06-17 09:34:30Z 06[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (92 bytes)
2022-06-17 09:34:37Z 27[NET] <TN_BZ-1|235> received packet: from 95.254.*.*[4500] to 93.49.*.*[4500] (92 bytes)
2022-06-17 09:34:37Z 27[IKE] <TN_BZ-1|235> received retransmit of request with ID 0, retransmitting response
2022-06-17 09:34:37Z 27[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (92 bytes)
2022-06-17 09:34:50Z 28[NET] <TN_BZ-1|235> received packet: from 95.254.*.*[4500] to 93.49.*.*[4500] (92 bytes)
2022-06-17 09:34:50Z 28[IKE] <TN_BZ-1|235> received retransmit of request with ID 0, retransmitting response
2022-06-17 09:34:50Z 28[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (92 bytes)
2022-06-17 09:34:56Z 29[IKE] <TN_BZ-1|235> sending DPD request
2022-06-17 09:34:56Z 29[ENC] <TN_BZ-1|235> generating INFORMATIONAL_V1 request 2524585234 [ HASH N(DPD) ]
2022-06-17 09:34:56Z 29[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (108 bytes)
2022-06-17 09:35:14Z 15[NET] <TN_BZ-1|235> received packet: from 95.254.*.*[4500] to 93.49.*.*[4500] (92 bytes)
2022-06-17 09:35:14Z 15[IKE] <TN_BZ-1|235> received retransmit of request with ID 0, retransmitting response
2022-06-17 09:35:14Z 15[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (92 bytes)
2022-06-17 09:35:26Z 18[IKE] <TN_BZ-1|235> sending DPD request
2022-06-17 09:35:26Z 18[ENC] <TN_BZ-1|235> generating INFORMATIONAL_V1 request 1819235277 [ HASH N(DPD) ]
2022-06-17 09:35:26Z 18[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (108 bytes)
2022-06-17 09:35:56Z 18[NET] <TN_BZ-1|235> received packet: from 95.254.*.*[4500] to 93.49.*.*[4500] (92 bytes)
2022-06-17 09:35:56Z 18[IKE] <TN_BZ-1|235> received retransmit of request with ID 0, retransmitting response
2022-06-17 09:35:56Z 18[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (92 bytes)
2022-06-17 09:35:56Z 29[IKE] <TN_BZ-1|235> sending DPD request
2022-06-17 09:35:56Z 29[ENC] <TN_BZ-1|235> generating INFORMATIONAL_V1 request 1644324080 [ HASH N(DPD) ]
2022-06-17 09:35:56Z 29[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (108 bytes)
2022-06-17 09:36:26Z 18[IKE] <TN_BZ-1|235> sending DPD request
2022-06-17 09:36:26Z 18[ENC] <TN_BZ-1|235> generating INFORMATIONAL_V1 request 3964829410 [ HASH N(DPD) ]
2022-06-17 09:36:26Z 18[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (108 bytes)
2022-06-17 09:36:56Z 12[IKE] <TN_BZ-1|235> sending DPD request
2022-06-17 09:36:56Z 12[ENC] <TN_BZ-1|235> generating INFORMATIONAL_V1 request 1366719710 [ HASH N(DPD) ]
2022-06-17 09:36:56Z 12[NET] <TN_BZ-1|235> sending packet: from 93.49.*.*[4500] to 95.254.*.*[4500] (108 bytes)
2022-06-17 09:37:06Z 10[JOB] <TN_BZ-1|235> DPD check timed out, enforcing DPD action
2022-06-17 09:37:06Z 10[DMN] <TN_BZ-1|235> [GARNER-LOGGING] (child_alert) ALERT: IKE message retransmission timed out.

Any idea how to solve it?



This thread was automatically locked due to age.
Parents Reply Children
No Data
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?