Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

IP SEC site-to-site terminates and establishes every 2,5 minutes

Hi,

IPSec Client-SA is deleted every 2,5 minutes. Main-IPSec-SA stay avtive.

System: XGS v19.5




2023-01-26 15:58:42Z 20[NET] <STATION010-1|4> received packet: from 109.40.222.222[41135] to 111.222.333.444[4500] (1236 bytes)
2023-01-26 15:58:42Z 20[ENC] <STATION010-1|4> parsed CREATE_CHILD_SA request 6 [ EF(1/2) ]
2023-01-26 15:58:42Z 20[ENC] <STATION010-1|4> received fragment #1 of 2, waiting for complete IKE message
2023-01-26 15:58:42Z 15[NET] <STATION010-1|4> received packet: from 109.40.222.222[41135] to 111.222.333.444[4500] (244 bytes)
2023-01-26 15:58:42Z 15[ENC] <STATION010-1|4> parsed CREATE_CHILD_SA request 6 [ EF(2/2) ]
2023-01-26 15:58:42Z 15[ENC] <STATION010-1|4> received fragment #2 of 2, reassembling fragmented IKE message
2023-01-26 15:58:42Z 15[ENC] <STATION010-1|4> parsed CREATE_CHILD_SA request 6 [ SA No KE TSi TSr ]
2023-01-26 15:58:42Z 15[IKE] <STATION010-1|4> DH group MODP_4096 inacceptable, requesting MODP_2048
2023-01-26 15:58:42Z 15[IKE] <STATION010-1|4> failed to establish CHILD_SA, keeping IKE_SA
2023-01-26 15:58:42Z 15[ENC] <STATION010-1|4> generating CREATE_CHILD_SA response 6 [ N(INVAL_KE) ]
2023-01-26 15:58:42Z 15[NET] <STATION010-1|4> sending packet: from 111.222.333.444[4500] to 109.40.222.222[41135] (80 bytes)
2023-01-26 15:58:43Z 29[NET] <STATION010-1|4> received packet: from 109.40.222.222[41135] to 111.222.333.444[4500] (1152 bytes)
2023-01-26 15:58:43Z 29[ENC] <STATION010-1|4> parsed CREATE_CHILD_SA request 7 [ SA No KE TSi TSr ]
2023-01-26 15:58:43Z 29[KNL] <STATION010-1|4> ipsec_offload enabled
2023-01-26 15:58:43Z 29[KNL] <STATION010-1|4> ipsec_offload interface Port2_ppp
2023-01-26 15:58:43Z 29[KNL] <STATION010-1|4> ipsec_offload enabled
2023-01-26 15:58:43Z 29[KNL] <STATION010-1|4> ipsec_offload interface Port2_ppp
2023-01-26 15:58:43Z 29[IKE] <STATION010-1|4> CHILD_SA STATION010-1{29} established with SPIs c166c000_i c6a6566a_o and TS 192.168.200.0/24 === 192.168.201.74/32
2023-01-26 15:58:43Z 29[APP] <STATION010-1|4> [COP-UPDOWN] (ref_counting) ref_count: 0 to 1 ++ up ++ (192.168.200.0/24#192.168.201.74/32)
2023-01-26 15:58:43Z 29[APP] <STATION010-1|4> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 0 to 1 ++ up ++ (111.222.333.444#109.40.222.222#n)
2023-01-26 15:58:43Z 29[APP] <STATION010-1|4> [COP-UPDOWN] (cop_updown_invoke_once) UID: 4 Net: Local 111.222.333.444 Remote 109.40.222.222 Connection: STATION010 Fullname: STATION010-1
2023-01-26 15:58:43Z 29[APP] <STATION010-1|4> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' up-client
2023-01-26 15:58:43Z 29[ENC] <STATION010-1|4> generating CREATE_CHILD_SA response 7 [ SA No KE TSi TSr ]
2023-01-26 15:58:43Z 29[NET] <STATION010-1|4> sending packet: from 111.222.333.444[4500] to 109.40.222.222[41135] (480 bytes)
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'STATION010' result --> id: '12', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec remote updown ++ up ++
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_gateway_chains -t json -s nosync -b '{"local_server":"111.222.333.444","remote_server":"109.40.222.222","action":"enable","family":"0","conntype":"ntn","compress":"0"}'': success 0
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown ++ up ++
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid              || '/'               || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel      JOIN tblhost AS h             ON h.hostid = rel.hostid          JOIN tblhost AS nath                ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1      AND rel.hostlocation = 'L'      AND h.netid = $2     AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
2023-01-26 15:58:43Z 10[APP]
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) connection 'STATION010' using  interface 'ipsec0'
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN][NET] (get_src_ip) source address for 192.168.200.0 is IP: 192.168.110.30
2023-01-26 15:58:43Z 10[APP]
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route add 192.168.201.74/32 dev ipsec0 src 192.168.110.30 table 220': success 0
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN] (add_routes) no routes to add for STATION010 on interface ipsec0
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"111.222.333.444","peer":"109.40.222.222","mynet":"192.168.200.0/24","peernet":"192.168.201.74/32","connop":"1","iface":"Port2_ppp","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"12"}'': success 0
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': success 0
2023-01-26 15:58:43Z 10[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1

....


2023-01-26 16:01:13Z 25[NET] <STATION010-1|4> received packet: from 109.40.222.222[41135] to 111.222.333.444[4500] (80 bytes)
2023-01-26 16:01:13Z 25[ENC] <STATION010-1|4> parsed INFORMATIONAL request 8 [ D ]
2023-01-26 16:01:13Z 25[IKE] <STATION010-1|4> received DELETE for ESP CHILD_SA with SPI c6a6566a
2023-01-26 16:01:13Z 25[IKE] <STATION010-1|4> closing CHILD_SA STATION010-1{29} with SPIs c166c000_i (0 bytes) c6a6566a_o (0 bytes) and TS 192.168.200.0/24 === 192.168.201.74/32
2023-01-26 16:01:13Z 25[IKE] <STATION010-1|4> sending DELETE for ESP CHILD_SA with SPI c166c000
2023-01-26 16:01:13Z 25[IKE] <STATION010-1|4> CHILD_SA closed
2023-01-26 16:01:13Z 25[APP] <STATION010-1|4> [COP-UPDOWN] (ref_counting) ref_count: 1 to 0 -- down -- (192.168.200.0/24#192.168.201.74/32)
2023-01-26 16:01:13Z 25[APP] <STATION010-1|4> [COP-UPDOWN] (ref_counting_remote) ref_count_remote: 1 to 0 -- down -- (111.222.333.444#109.40.222.222#n)
2023-01-26 16:01:13Z 25[APP] <STATION010-1|4> [COP-UPDOWN] (cop_updown_invoke_once) UID: 4 Net: Local 111.222.333.444 Remote 109.40.222.222 Connection: STATION010 Fullname: STATION010-1
2023-01-26 16:01:13Z 25[APP] <STATION010-1|4> [COP-UPDOWN] (cop_updown_invoke_once) Tunnel: User '' Peer-IP '' my-IP '' down-client
2023-01-26 16:01:13Z 25[ENC] <STATION010-1|4> generating INFORMATIONAL response 8 [ D ]
2023-01-26 16:01:13Z 25[NET] <STATION010-1|4> sending packet: from 111.222.333.444[4500] to 109.40.222.222[41135] (80 bytes)
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN][DB] (db_conn_info) hostname: 'STATION010' result --> id: '12', mode: 'ntn', tunnel_type: '0', subnet_family:'0'
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec remote updown -- down --
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_gateway_chains -t json -s nosync -b '{"local_server":"111.222.333.444","remote_server":"109.40.222.222","action":"disable","family":"0","conntype":"ntn","compress":"0"}'': success 0
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) ---- exec subnet updown -- down --
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) [NTN] NTN get actual...
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN][DB] (db_query) No data retrieved from query: 'SELECT ( nath.netid              || '/'               || nath.netmask ) AS natedlan FROM   tblvpnconnhostrel AS rel      JOIN tblhost AS h             ON h.hostid = rel.hostid          JOIN tblhost AS nath                ON rel .natedhost = nath.hostid WHERE  rel.connectionid = $1      AND rel.hostlocation = 'L'      AND h.netid = $2     AND h.netmask = $3 LIMIT  1;' status: 2 rows: 0
2023-01-26 16:01:13Z 31[APP]
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN] (do_cop_updown_invoke_once) connection 'STATION010' using  interface 'ipsec0'
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN][NET] (get_src_ip) source address for 192.168.200.0 is IP: 192.168.110.30
2023-01-26 16:01:13Z 31[APP]
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN][SHELL] (run_shell) 'ip route del 192.168.201.74/32 dev ipsec0 src 192.168.110.30 table 220': success 0
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN] (add_routes) no routes to del for STATION010 on interface ipsec0
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN][SHELL] (run_shell) '/bin/service fwm:vpn_connection_chains -t json -s nosync -b '{"me":"111.222.333.444","peer":"109.40.222.222","mynet":"192.168.200.0/24","peernet":"192.168.201.74/32","connop":"0","iface":"unknown","myproto":"0","myport":"0","peerproto":"0","peerport":"0","conntype":"ntn","actnet":"","compress":"0","conn_id":"12"}'': success 0
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=2': success 0
2023-01-26 16:01:13Z 31[APP] [COP-UPDOWN][SHELL] (run_shell) 'conntrack -D --not-protonum=6 --inzone-outzone=5': error returned 1

some Ideas or hints?

Thanks,



This thread was automatically locked due to age.
Parents Reply Children
No Data