Disconnected IPSEC peer problem
Posted: Thu Nov 01, 2012 4:44 pm
Hello!
We deploying IPSEC connections between HQ (cisco ASA) and small branch offices (routerboard).
RB connect to ASA without any problem and works fine.
The problem is if ASA drop ipsec&isakmp SAs after period of inactivity.
As I see RB knows that connection is down because it removes peer from [/ip ipsec remote-peer] but SAs still present in [/ip ipsec installed-sa].
And traffic to tunnel dropped as prohibited. Tunnel cannot not be reestablished until SAs not flushed.
Normal operation
After ASA drops ipsec sa
Flush installed sa and everything fine again
We deploying IPSEC connections between HQ (cisco ASA) and small branch offices (routerboard).
RB connect to ASA without any problem and works fine.
The problem is if ASA drop ipsec&isakmp SAs after period of inactivity.
As I see RB knows that connection is down because it removes peer from [/ip ipsec remote-peer] but SAs still present in [/ip ipsec installed-sa].
And traffic to tunnel dropped as prohibited. Tunnel cannot not be reestablished until SAs not flushed.
Normal operation
Code: Select all
[admin@N3] > /ip ipsec remote-peers print
0 local-address=X.X.X.X remote-address=Y.Y.Y.Y state=established side=initiator established=29m36s
[admin@N3] > /ip ipsec installed-sa print
Flags: A - AH, E - ESP, P - pfs
0 E spi=0xE1C9CEB src-address=Y.Y.Y.Y dst-address=X.X.X.X auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="697c459526423d6add00a9bc4bb183f14fca363a"
enc-key="e8b958a48d7c45f1243b516a1351e7db14b34583d8ca8e61" addtime=nov/01/2012 18:00:00 expires-in=7h30m14s
add-lifetime=6h24m/8h current-bytes=149688
1 E spi=0x44F37007 src-address=X.X.X.X dst-address=Y.Y.Y.Y auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="acb9f886b3bf0629d51ff2116091da923c13ee21"
enc-key="faef95f257f84da59036ac1b34f01eaf773971d293cf7036" addtime=nov/01/2012 18:00:00 expires-in=7h30m14s
add-lifetime=6h24m/8h current-bytes=149772
[admin@N3] > /ping src-address=192.168.33.1 count=2 192.168.1.1
HOST SIZE TTL TIME STATUS
192.168.1.1 56 254 2ms
192.168.1.1 56 254 1ms
sent=2 received=2 packet-loss=0% min-rtt=1ms avg-rtt=1ms max-rtt=2ms
HOST SIZE TTL TIME STATUS
[admin@N3] >
Code: Select all
[admin@N3] > /ip ipsec remote-peers print
[admin@N3] > /ip ipsec installed-sa print
Flags: A - AH, E - ESP, P - pfs
0 E spi=0xE1C9CEB src-address=Y.Y.Y.Y dst-address=X.X.X.X auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="697c459526423d6add00a9bc4bb183f14fca363a"
enc-key="e8b958a48d7c45f1243b516a1351e7db14b34583d8ca8e61" addtime=nov/01/2012 18:00:00 expires-in=7h27m21s
add-lifetime=6h24m/8h current-bytes=156100
1 E spi=0x44F37007 src-address=X.X.X.X dst-address=Y.Y.Y.Y auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="acb9f886b3bf0629d51ff2116091da923c13ee21"
enc-key="faef95f257f84da59036ac1b34f01eaf773971d293cf7036" addtime=nov/01/2012 18:00:00 expires-in=7h27m21s
add-lifetime=6h24m/8h current-bytes=156352
[admin@N3] > /ping src-address=192.168.33.1 count=2 192.168.1.1
HOST SIZE TTL TIME STATUS
192.168.1.1 timeout
192.168.1.1 timeout
sent=2 received=0 packet-loss=100%
HOST SIZE TTL TIME STATUS
Code: Select all
[admin@N3] > /ip ipsec installed-sa flush
[admin@N3] > /ping src-address=192.168.33.1 count=2 192.168.1.1
HOST SIZE TTL TIME STATUS
192.168.1.1 56 254 2ms
192.168.1.1 56 254 2ms
sent=2 received=2 packet-loss=0% min-rtt=2ms avg-rtt=2ms max-rtt=2ms
HOST SIZE TTL TIME STATUS
[admin@N3] > /ip ipsec remote-peers print
0 local-address=X.X.X.X remote-address=Y.Y.Y.Y state=established side=initiator established=15s
[admin@N3] > /ip ipsec installed-sa print
Flags: A - AH, E - ESP, P - pfs
0 E spi=0x47321FF src-address=Y.Y.Y.Y dst-address=X.X.X.X auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="80ba7181dbb482e1ea7f0a95f9758da887a584cc"
enc-key="88d1a0516e4359ac4e9b345c1084a51f7a5f4cc1102a3ecc" addtime=nov/01/2012 18:33:27 expires-in=7h59m42s
add-lifetime=6h24m/8h current-bytes=1624
1 E spi=0x9EFFD9D2 src-address=X.X.X.X dst-address=Y.Y.Y.Y auth-algorithm=sha1 enc-algorithm=3des replay=4
state=mature auth-key="6f588056a4c576a7468ca046c817c87a61635663"
enc-key="e216630082a6848dfe89f4572c80bd3705dd392cf3beff39" addtime=nov/01/2012 18:33:27 expires-in=7h59m42s
add-lifetime=6h24m/8h current-bytes=1624
[admin@N3] >