I have two identical soekris 4801 platforms, They are both running m0n0wall 1.34. This is not the first time I've set up ipsec on m0n0wall, but this is the first time I've run into issues that I can't diagnose.
Here's excerpts from the xml dumps of the config on one host
<interface>wan</interface> <network>lan</network> <remote-subnet>172.16.168.0/24</remote-subnet> <remote-gateway>666.666.666.666</remote-gateway> <p1> <mode>main</mode> <encryption-algorithm>3des</encryption-algorithm> <hash-algorithm>md5</hash-algorithm> <dhgroup>2</dhgroup> <lifetime>28800</lifetime> <pre-shared-key>areallylongstringisinhere</pre-shared-key> <authentication_method>pre_shared_key</authentication_method> </p1> <p2> <protocol>esp</protocol> <encryption-algorithm-option>blowfish</encryption-algorithm-option> <hash-algorithm-option>hmac_md5</hash-algorithm-option> <pfsgroup>2</pfsgroup> <lifetime>3600</lifetime> </p2>
And the other host <interface>wan</interface> <local-subnet> <network>lan</network> </local-subnet> <remote-subnet>10.1.1.0/24</remote-subnet> <remote-gateway>555.555.555.555</remote-gateway> <p1> <mode>main</mode> <encryption-algorithm>3des</encryption-algorithm> <hash-algorithm>md5</hash-algorithm> <dhgroup>2</dhgroup> <dhgroup>2</dhgroup> <lifetime>28800</lifetime> <pre-shared-key>samereallylongstringisinhere</pre-shared-key> <authentication_method>pre_shared_key</authentication_method> </p1> <p2> <protocol>esp</protocol> <encryption-algorithm-option>blowfish</encryption-algorithm-option> <hash-algorithm-option>hmac_md5</hash-algorithm-option> <pfsgroup>2</pfsgroup> <lifetime>3600</lifetime> </p2>
Traceroute from one to the other looks like this.
traceroute to 555.555.555.555 (555.555.555.555), 18 hops max, 40 byte packets 1 555-555-555-233.static.provider.net (555.555.555.233) 1.588 ms 3.167 ms 1.530 ms 2 555-555-555-158.static.provider.net (555.555.555.158) 5.264 ms 4.187 ms 4.548 ms 3 xe-7-1-0.edge2.LosAngeles9.Level3.net (4.53.230.61) 4.204 ms 4.235 ms 4.341 ms 4 ae-3-80.edge3.LosAngeles1.Level3.net (4.69.144.137) 4.262 ms ae-2-70.edge3.LosAngeles1.Level3.net (4.69.144.73) 4.318 ms ae-3-80.edge3.LosAngeles1.Level3.net (4.69.144.137) 7.125 ms 5 AMERICAN-IN.edge3.LosAngeles1.Level3.net (4.53.122.14) 7.831 ms 11.102 ms 9.150 ms 6 ar01-gi8-12.sdtc.provider2.net (666.666.666.198) 7.558 ms 7.496 ms 7.364 ms 7 sdtc.ar01.fa1-44.host2.5229.provider.net (666.666.666.67) 7.634 ms 7.737 ms 8.064 ms
The tunnel came up once, it took almost three days. I disabled the tunnel due to other issues in the network. I re-enabled it and I see messages in the logs that show racoon starting up. No errors in the logs. After a week the tunnel still didn't come back up. I've spoken to both network providers to check if they are blocking port 500 or disabling protocol 50 and 51. Everyone tells me their providing bare internet without filtering. Any ideas how I can diagnose this? I've run out of ideas on my end.
|