On Thu, Mar 06, 2014 at 08:16:34PM +0000, Andy Lemin wrote:
> Hi, haven't read your original email but if my assumptions about your setup 
> are correct is the VPN tunnel dropping every now and then?

Thats correct.  Daemons start up quick, negotiations happen, and then
periodically the tunnel is just not available, despite the SAs being
available on the masters and the slaves.  Disabling -S on isakmpd and
turning off sasyncd makes the tunnel stay up for much longer, 7 hours
and counting.

> You need the static route to point to the internal interface to make sure 
> that packets generated by the firewall itself have a source IP set to the 
> internal net thus allowing the IPSec policy route to be used (as it defines 
> both the source and dest net, not just the dest net like a normal route).

This I have, and packets flow.  Still unclear about which route takes
precedence, encap or inet.

> We had to modify all our monitoring scripts to not 'phone home' if the box is 
> a backup. Only the master firewall can use the VPN.

I've ended up monitoring the host using internal interface, which in
turn tells me the tunnel is available.

> I also submitted some suggested modifications to /etc/rc.d/sasyncd and 
> /etc/rc.d/isakmpd here in the past which makes the setup and failover of VPNs 
> much faster and more stable.

I did see those scripts, though they seem to be more solving the startup
time of the daemons.  My issue is more keeping the service up than start
time.

It sounds like your setup is similar to my own.  You don't see theses
kinds of instability using sasyncd?  If you have a look at my OP, the
sasyncd.conf is in there.  Its possible I have a configuration error,
but just reading over the manpage again, I don't know what it would be.

This is really troubling me.

-- 
Zach

Reply via email to