03-27-2020 10:03 AM - edited 03-28-2020 06:36 AM
Hi,
So, we have a VPN hosting ASR1001 running on IOS 15.5(3)S10. We have been experiencing flaps on several IKEv1 and 2 Route based (VTI Tunnel Protection) IPSec VPN during the hourly IPSec rekey. I'm not sure when it started and haven't been able to find any bugs related to this issue in the IOS 15.5(3)S10.
There are several articles online about how to fix such rekey flaps in a Cisco ASA using command "sysopt connection preserve-vpn-flows" which retain the state table information at the re-negotiation of the VPN tunnel. But since we are working on an IOS router and not on a stateful firewall, I haven't been able to find any solution for this issue on the Cisco ASR1001.
So far we have tried
1: keeping the VPN constantly active by sending traffic over it as the thought was that perhaps it is the inactivity that is causing the flaps. That didn't help.
2: Making 1 end a responder only, didn't help either.
Is there any suggestions or fixes for this? The issue is occuring on both IKEv1 and 2 Route Based VPNs (VTI).
Kind regards
03-28-2020 06:28 AM
Hi,
1. Check ikev2 sa lifetime under ikev2 profile configuration on both sides. default is 24 hour if not configured, if yes the value must be the same on both sides.
2. Check lifetime under crypto-map or ipsec profile configuration. both sides must be the same.
3. DPD is disabled by default in Cisco routers if enabled under ikev2 profile, both sides must be same.
4. Check local and remote keys on both sides, config looks like this:
crypto ikev2 keyring yourkeyring
peer endpeer
address x.x.x.x
pre-shared-key local ikev2key
pre-shared-key remote ikev2key or (different from local key)
crypto ikev2 profile yourprofile
authentication local pre-share
authentication remote pre-share
keyring local yourkeyring (crypto ikev2 keyring yourkeyring)
If all this okay on both sides, browse the config from both side.
waiting for your reply.
03-28-2020 06:42 AM
03-28-2020 07:37 AM
Have you checked ipsec transform-set configurations?
03-28-2020 07:48 AM
03-30-2020 01:19 AM
03-30-2020 01:38 AM
Hi Jay,
I have tried to built in my lab environment the situation you described with different ways but no rekey flap occured. Only way to resolve this issue is to analyze both side config and debugging.
As you mentioned rekey flap occurs every hour in phase two. In ikev2 lifetime of ikev2 sa and ipsec sa is not negotiated. whereas in ikev1 the ikev1 sa is negotiated. The ipsec sa under crypto map or ipsec profile config default is 1 hour.
03-30-2020 04:09 AM
Hi,
1. The first thing i would do is to disable the KB lifetime for Phase2, and make use of the time-based lifetime; i would do this on both sides, using the same non-default values (so try not using the default of 1 hour), even though it does not have to match.
crypto ipsec profile TEST
set security-association lifetime kilobytes disable
set security-association lifetime seconds 7200
2. If it's not fixed, i would upgrade both VPN gateway to a recommended (gold star) version.
The rekeying of Phase2 takes place some good seconds (around 30 or so), before the keys actually expire; so as the rekeying takes place, you still use the old SA's, which are about ti expire; upon successful rekeying, the old SA's are deleted and the new ones are used.
SVTI is a VPN technology which is self-triggered, the tunnel negotiation and renegotiation, so you should have no downtime once it's up and running.
Regards,
Cristian Matei.
03-30-2020 05:54 AM
05-16-2023 11:24 AM - edited 05-16-2023 11:25 AM
Did this command "set security-association lifetime kilobytes disable" resolve your issue?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide