This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Release of v17 MR-2?

Hej,

now that MR-1 has appeared, I wanted to ask when MR-2 will appear? The problems and instabilities of IPSec in v17 (especially in connection with V16.5) are very annoying.



This thread was automatically locked due to age.
  • i have no special character on my psk's... result IS the same.

  • Your key is NOT too long, right ?  Because MR2 cannot handle keys as long as what MR1 was able.

    I do not remember how many however.  60 maybe

    Paul Jr

  • Nope, not even close to 60

  • apalm123 said:
    Support said that they cause issues and were supposed to be fixed in MR-2. (Ticket NC-23039)

    The fix is in MR-2, don't know the reason why its not in the release notes. Will forward that info to the release manager.

  • I recall having to shorten our PSK as well from what was configured in 16.5. May have also had to remove some characters per the other issue someone had posted but I don't recall exactly.

  • Support has sent me a couple of new things to try. I'm waiting to get some time scheduled with the network engineer on the other end to try them out, but thought someone else might be able to test them before I get to. Here's what they said.

     

    The lifetimes need to be set to Phase1: 10800 and Phase2: 3600

    If you are using SHA2 you have to select the option for 96-bit truncation

     

    In my case I'm not using SHA2, so that's not my issue, but it might help someone else. I'm curious to see if the lifetime settings have any effect.

    In the meantime I have brought a decommissioned ASA back online in our network and have removed the affected tunnel from our XG and am now running it off of that. I'll continue testing because I'd like to just have the XG if possible. This issue has been so aggravating....

  • Support set me up with phase 1 28800 (not 10800 like they told you) and phase 2 3600 even though that's not what the ASA was at for either ph1 or ph2. Ikev1. They remoted in and made a new one for me using the prebuilt remote office template. With this, the best I ever got was for it to stay up for 1 week, and that was a huge improvement, but as soon as my constant ping PC pinging the other side day and night had to reboot, tunnel between xg105 and ASA never stayed up again after that. The key life settings did not at all match the ASA. but matching them didn't help at all so, I welcomed the change.
  • None of the config above would work with azure. Maybe aws.

  • Just a quick update. I've been working with the GES team, but so far no changes. I was able to upgrade to MR3 and they got the tunnel to establish. It ran for almost a week and then started disconnecting every few hours. High availability completely breaks the tunnel.

     

    The thing that still seems to work, even though it shouldn't, is that if I switch the ipsec profile from Main Mode to Aggressive Mode the tunnel becomes more stable and will only disconnect about once a day rather than every few hours. This is strange because the ASA on the other end is set to Main Mode, and the vpn profile is not even supposed to be compatible with Aggressive Mode. It actually makes the selection list on tunnel profile blank. So this appears to be a definite bug. We're discussing switching back to Cisco. This issue has become a deal breaker for us.

     

    Anyone else had any luck?

  • We're in the same boat.  Not an ASA but connecting to a Cisco Router at HQ.   Disconnects multiple times a day.  In our case the tunnel loses some of it's SA's that get established. Out of 9 SA's  that are part of the tunnel only one or two show green in the vpn connection and the site goes down. A reconnect will re-establish it, but what a pain in the butt. 

     

    If anyone as a rock solid VPN connection to  a cisco device I would love to know what configuration you're using.   

     

    -Scott