- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
01-21-2022 02:51 AM
Hello everyone,
I have observed that when a failover occurs on an active/passive cluster the IPSEC tunnels to AWS all go down and take a time to recover.
I have verified that the traffic goes down and does not communicate for a time of about 5-10 minutes.
Has anyone else seen this problem and do you know how I can fix it?
I would also like to comment that the tunnels are 2 by 2 with PBF and failover next hop created to not have problems of asymmetries.
Regards
02-07-2022 06:51 AM
Hi @Alpalo ,
Normally HA2 link is used to sync IPSEC SAs from Active to Passive firewall. Can you check if passive firewalls are having IPSEC SAs synced ?
Also I would recommend you to verify traffic as well as system logs related to the tunnel traffic to see if you are seeing any unwanted logs there.
02-25-2022 02:26 AM
Hi
We see the same thing.
If you configure tunnel monitoring - that seems to bring up the tunnel(s) again quickly. But they will disconnect - in our case approx. 60 seconds after failover.
BR,
Morten
06-08-2022 01:28 PM
I too observe the same behaviour with the same setup as your with the AWS standard 2 tunnels they have you setup. We lose about 60 seconds while they re-establish.
how would one check if ipsec is being synced properly Sutare ?
06-10-2022 07:00 AM
Hi @abettencourt ,
To check if IPsec SA were synced just login to the passive member and confirm you see established SAs.
06-10-2022 08:09 AM
yes they are all synced ipsec, but no ike obviously.
this is the same for AWS and non-AWs tunnels, however only the AWS tunnels go down during these failovers.
08-03-2022 02:20 AM
Not sure if you found a solution to this...
As stated here in the KB article:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVGCA0
My interpretation of reading that means if the tunnel goes down (or presumably being initially set up) it will only be negotiated by interesting traffic, so you have several options to keep that interesting traffic:
02-05-2023 02:17 AM
Hi @abettencourt , @Alpalo ,
It is almost an year when this was posted, have you found a solution?
Last week we did some failover tests, related to other issues and we experience the same issue first hand.
I haven't completely figure it out, but it looks like it is related to how AWS will handle phase2 when phase1 is down.
As already mentioned HA will sync only phase2, which means in event of failover secondary member will have phase2 to AWS up and will try to use it, but there will be no phase1. Firewall will believe tunnel is up and try to use the phase2 that it "inherit" from primary peer, but I am guessing AWS will reject the traffic, because it is using phase2 for which there is no valid phase1.
It is interesting to note, that when forcing phase1 to negotiate using "test vpn ike-sa gateway .." command, tunnel will start working immediately. In the logs I can see that after phase1 negotiation phase2 is also renewed.
This KB mention some interesting solution - https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HAuZCAW&lang=en_US%E2%80%A...
Here they quickly suggest that you can create log forwarding action with HTTP profile, when failover event is triggered, FW to send API to itself to test phase1, which will bring AWS tunnel back to functional immediately after failover.
I am still puzzled what exactly is causing this issue, but something with IKEv2 phase1 liveness check could be the explanation.
I want to made some more tests with IKEv2 liveness check disabled or with tunnel monitor enabled.
02-28-2023 07:51 AM
Hi Astardzhiev!
Thanks so much for the reply.
I never did find a solution to the issue no, so this is very interesting to see. I did however arrive at the same conclusion of the issue though - figured it was the phase1 as you can see the rekeys pop up as soon as it starts ( the traffic continues to flow for a few seconds after failing over before AWS notices phase 1 is different)
Your possible solution seems like its going at the top of my list of things to test however! excited to see a possible workaround for this.
02-28-2023 08:18 AM
Hi @abettencourt ,
I forgot to share my results...
TL;DR enabling tunnel monitor monitoring the AWS tunnel IP is working perfect..
I was able reproduce the issue with manual failover and every time noticed that although phase2 seems up, traffic is not working. In our case we run BGP and we notice that BGP went down and says down for long time.
As you know AWS establish two separate tunnels. so first I enabled tunnel monitor for one of those tunnel and perform another failover.
Tunnel monitor failed couple of seconds after the failover, which seems to trigger new tunnel negotiation (at least how I explain it to myself).
Since AWS peer is working the new tunnel is established almost immediately.
Using default valued for tunnel monitor profile (3sec/5 threshold) were enough to keep the BGP peering up.
I am still puzzled why this is happening exactly. During my initial setup I explicitly decided to not enable tunnel monitor, because we are using BGP which should achieve the dynamic switch over when tunnels are down..
03-02-2023 07:31 AM - edited 03-02-2023 07:34 AM
Tunnel goes down due IKE not being synchronized between HA peers. Most likely AWS will bring tunnel down due DPD failure.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HAuZCAW
Try:
"To being up phase 1 automatically, use the HTTP Log Forwarding feature known as "log to action". If the firewall sees a HA event in the logs, configure "log to action" to trigger the command "test vpn ike-sa" to bring up phase 1 automatically in the event of a failover."
05-14-2024 02:41 AM
Hi all,
Anyone that has an example of the payload to get this type of 'log to action' working?
Thanks a lot!
Greeting
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!