Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

XFRM Interface flapping after HA failover

Hi all,

today I made an manual failover to the auxiliary device. On the auxiliary device the XFRM interfaces began to flapping. On both tunnel ends I had many interface up and down events (ervery few seconds). The IPSec Tunnel itself seems to be stable (WebAdmin shows a green status). Both firewalls shown the tunnel as up. OSPF shows no neighbors available. 

After I switched back to first device, the XFRM interfaces become stable and most tunnels are back online, some tunnels needed manually restarted to work again.

The HQ firewall is an XGS5500 with SFOS 19.0.1. Most site firewalls runs also on 19.0.1. We have also some firewalls witch runs on SFOS 19.5, these boxes had also the flapping XFRM interfaces. 

 anybody an idea what this behavior causes?

Ben



This thread was automatically locked due to age.
Parents Reply
  • Hi Ben, good to know the update to SFOS 19.5 solved the problem. 

    Thanks for the access-id details. Some additional observations based on the Logs .   There are some IKE SA collisions as the IKE and ESP rekeying appears to be triggered simultaneously from the peer node. This is due to the Phase-1 and Phase-2 Lifetime values being configured the same on the peer(Initiator0 and Responder Nodes. 

    XGS5500_CI02_SFOS 19.0.1 MR-1-Build365# grep collision /log/charon.log | wc -l

    456



    The IKE collisions also cause duplicate SAs and the number of SAs increases over time and other issues. 




    A suggestion would be to clone or create a similar IPsec Policy/Profile (IKEv2_RSP), but with the increased phase-1 and phase-2 Key lifetime values say by 1/2 hour over the Peer(Initiator Node) IPsec Policy/Profile and use the new IPsec Policy in the IPsec connections.

    https://community.sophos.com/sophos-xg-firewall/f/recommended-reads/122440/best-practice-for-site-to-site-policy-based-ipsec-vpn#mcetoc_1f5rpj2kd8




    Regards,
    Vamshi

Children
No Data