Sophos Firewall v22 EAP is now available! Click here to learn more.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

S2S IPSec VPN Not Working Through Edge Switch

Hello,

We recently upgraded our firewall appliances (4 units @ 2 HA stacks) from XG330 units to XGS3300 units. With the XGS units we were able to use an Ubiquiti EdgeSwitch to split the single handoffs (two total at each location - one for each service) from the ISP for both the WAN connection and the EPL connection (direct connection between the two locations). This worked perfectly fine with the XG330 units and was very reliable and stable and is currently working for the WAN connection. However, after having upgraded to the XGS3300 units, the IPSec VPN (uses the EPL connection) will establish between the two locations, but the dropped packets are horrible and ultimately result in the firewalls "terminating" the connection forcing a manual reconnect/reinitiate of the connection. I worked with Sophos Support for several hours on the issue and they stated it was a rekey overlap and had to do with the number of DH groups. So, we dropped that back down to four instead of six (tried one even). This did not change anything. We tried recreating profiles, using stock profiles, and everything Sophos Support could throw at it in regard to IPSec profile settings to no avail. I ultimately had to remove the edge devices and go directly to the primary firewall at each location. This works for the interim, but we are now no longer automatically HA (have to manually move WAN/EPL cables from the primary to auxiliary and back again) and cannot perform any system updates until HA is re-established.

Sophos Support was unable to assist in any potential edge switch configurations since it was not a Sophos device. We have since acquired a CS1010-8FP unit to test at the edge. However, upon initial configuration and edge placement, I cannot get the firewalls to establish the IPSec VPN through the Sophos switch. Before I reach out to support and schedule an onsite day to further troubleshoot the issues, I thought I would give it a whirl on here to see what else can be done from my side as I am all out of ideas.

Ideally, I would like to get the current Ubiquiti EdgeSwitch to work, but I would settle for the Sophos just so that HA can be re-established. Considering that method, what settings do I need to change on the Sophos switch to dumb it down to treat blocks of ports basically as a hub to split the ISP handoffs to both firewalls in the HA stack? On the Ubiquiti all services (CDP, STP, Flow Control, Port Isolation, LACP, etc.) were disabled, and three ports were assigned an untagged vlan (not used anywhere else) and other vlans excluded/blocked and this worked. It's always been pretty easy to split a handoff, but these XGS3300 units are not digging it for IPSec. Does anything potentially need changed on the firewall interface(s)? Any advice would be greatly appreciated.

IPSec Profiles: Head office (IKEv2) and Branch office (IKEv2) - both cloned and DH group dropped to four selections instead of the default six

XG330: SFOS v20 MR2

XGS3300: SFOS v21 GA

Thank you,

James



This thread was automatically locked due to age.
  • __________________________________________________________________________________________________________________

  • Thank you for the suggestion. I assume this has to be done on both ends, correct? Is this a new "feature" for the XGS unit? I'm just trying to wrap my head around why it works directly connected, but not through an edge switch.

    Thank you,

    James

  • Could be related to MSS Clapping:  Sophos Firewall: MSS Clamping and IPsec Acceleration  

    __________________________________________________________________________________________________________________

  • XGS3300_RL01_SFOS 21.0.0 GA-Build169 HA-Primary# iptables -nvxL -t mangle | grep ipsec
    0 0 TCPMSS tcp -- ipsec0 * 0.0.0.0/0 0.0.0.0/0 - tcp flags:0x06/0x02 TCPMSS set 1327
    0 0 TCPMSS tcp -- * ipsec0 0.0.0.0/0 0.0.0.0/0 - tcp flags:0x06/0x02 TCPMSS set 1327

    It appears based on the output above that MSS Clamping is already configured. Would you recommend I drop the MSS more or just disable acceleration? Interestingly enough, we have a second IPSec VPN that uses our WAN connection (offsite backup storage) and we never have any connection issues with them.

    Thank you,

    James

  • You could try disable it first and then check, if it improves your issue or not. 

    __________________________________________________________________________________________________________________

  • Unfortunately, disabling IPSec Acceleration on both ends did not change anything.

    Thank you,

    James

  • To be sure: Did you do a Restore of your Backup from XG? 

    __________________________________________________________________________________________________________________

  • Yes. The XGS was "restored" from our XG backup. We backed up the XG, powered on the XGS, restored using the XG backup just produced and once initialized, moved all the connections from XG to XGS.

    Thank you,

    James

  • I was able to obtain an unmanaged switch (literally a dumb switch) to place at the edge and incurred the same packet drops after the IPSec VPN was established. I am now confident that is has to do with the firewall itself. I'm not familiar enough with IPSec to know the impact MTU/MSS have on connections. Below are the settings currently configured (defaults). Are there any flags with these?

    Edge SW:    1518 MTU/??? MSS

    FW XFRM:    1400 MTU/1360 MSS

    FW INT:    1500 MTU/1460 MSS

    Thank you,

    James

  • Hello,

    could you try to reduce this to 1300?

    iptables -t mangle -A POSTROUTING -o ipsec0 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --set-mss 1300

    You got to delete the other entries before.

    Mit freundlichem Gruß, best regards from Germany,

    Philipp Rusch

    New Vision GmbH, Germany
    Sophos Silver-Partner

    If a post solves your question please use the 'Verify Answer' button.

1 2