- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-27-2023 09:16 AM
I'm testing Starlink business and having issues passing traffic over my tunnel. This remote site connects to our data center via an IPsec tunnel. I can get the tunnel up and traceroute to the remote side of the tunnel, but I'm unable to pass traffic. I have "Enable NAT Traversal" selected on my IKE Gateway. The Starlink is set to IP passthrough.
Any help would be appreciated.
04-04-2023 02:39 PM
Hello,
Sorry I didnt see the traffic screen shots before. But it looks like there are missing policies so the traffic is hitting the 'default' policies.
Regards,
03-27-2023 11:23 AM
If you can traceroute to other side over the tunnel it means that some traffic does cross the tunnel successfully right?
03-28-2023 01:33 PM
Yes, I agree, however, I'm unable to ping the management interface of the PA-220. Also from the remote side, I can't ping the gateway that is on the PA-220 for any of my vlans and my Cisco phones do not register.
03-28-2023 05:59 PM
Both sides have Palo?
Do you have access to firewalls on both side?
03-29-2023 08:31 AM
Yes, both sides have Palo Altos. When I'm on-site I have access to both firewalls. I have to unplug the Starlink cable to keep my other tunnel running.
03-29-2023 08:47 AM - edited 03-29-2023 08:48 AM
Check firewall policies on both sides if they permit traffic to/from tunnel zone.
Can you share screenshot of working and not working traffic log from both sides and have at least those columns visible.
04-04-2023 09:30 AM
Thank you for your response. Both sides have policies that permit traffic to/from the tunnel zone. I have another circuit that works with no issues at this site. However, when getting the screenshots you requested I noticed that on Starlink most of the traffic goes Interzone-default policy and is denied.
04-04-2023 02:37 PM
Hello,
Do you have policies in place to allow the traffic to flow via the tunnel? Also how is the 'default', 0.0.0.0/0 route getting advertised on the 'remote' side, or is it a static route?
Regards,
04-04-2023 02:39 PM
Hello,
Sorry I didnt see the traffic screen shots before. But it looks like there are missing policies so the traffic is hitting the 'default' policies.
Regards,
01-06-2024 03:35 PM
I'm having the same problem. It dosn't happen all the time. I think it has to do with esp traffic being blocked
01-08-2024 03:07 AM - edited 01-08-2024 11:05 PM
Is there any solution.?
01-08-2024 07:36 AM
Hello,
For the policy that handles the VPN traffic, do not perform and inspections or ssl decryption, etc. Basically allow all traffic to/from the two IP's that are the VPN endpoints and see how that works out. My guess is that there is UDP traffic getting blocked/dropped.
Regards,
08-23-2024 10:50 AM
Sorry for not responding. I abandoned this project.
Yes the routes are static and looking back at my screenshots I think you are correct that policies were missing.
I'm considering trying StarLink again, I was reviewing what went wrong. Thank you for your help.
10-18-2024 08:24 AM
We had the same issue and StarLink confirmed the following so we are looking into a solution
ESP packets are dropped.
VPNs that rely on protocols 47 (GRE), 50 (ESP), 51 (AH), 115 (L2TP) are dropped by CGNAT at this time.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!