1

A couple of weeks back we have created google cloud classic VPN and created a tunnel with other on-premise network the connection was established successfully and we are able to access their application(s) but after a couple of hours, VPN started disconnects intermittently. I have observed establishing IKE_SA failed, peer not responding error in the logs.

When VPN goes down the VPN tunnel status was sometimes NO INCOMING PACKETS and sometimes FIRST HANDSHAKE. I don't know what is happening.

VPN configuration details:

  1. Region: us-east1
  2. Routing type: Policy-based
  3. IKE version: IKEv2

Logs:

1.  creating acquire job for policy with reqid {1}
2.  initiating IKE_SA vpn_BB.BBB.BBB.BBB[21328] to BB.BBB.BBB.BBB
3.  generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) ]
4.  sending packet: from AA.AAA.AAA.AAA[500] to BB.BBB.BBB.BBB[500] (892 bytes)
5.  retransmit 1 of request with message ID 0 
6.  sending packet: from AA.AAA.AAA.AAA[500] to BB.BBB.BBB.BBB[500] (892 bytes)
7.  retransmit 2 of request with message ID 0
8.  sending packet: from AA.AAA.AAA.AAA[500] to BB.BBB.BBB.BBB[500] (892 bytes)
9.  creating acquire job for policy with reqid {1}
10. ignoring acquire, connection attempt pending
11. retransmit 3 of request with message ID 0
12. sending packet: from AA.AAA.AAA.AAA[500] to BB.BBB.BBB.BBB[500] (892 bytes)
13. retransmit 4 of request with message ID 0 
14. sending packet: from AA.AAA.AAA.AAA[500] to BB.BBB.BBB.BBB[500] (892 bytes)
15. retransmit 5 of request with message ID 0 
16. sending packet: from AA.AAA.AAA.AAA[500] to BB.BBB.BBB.BBB[500] (892 bytes)
17. creating acquire job for policy with reqid {1}
18. ignoring acquire, connection attempt pending
19. giving up after 5 retransmits
20. establishing IKE_SA failed, peer not responding

Can someone explain what's going on?

Please check the latest logs of my GCP VPN

1.  peer didn't accept DH group MODP_2048, it requested MODP_1024
2.  remote host is behind NAT
3.  authentication of 'AA.AAA.AAA.AAA' (myself) with pre-shared key
4.  establishing CHILD_SA vpn_ BB.BBB.BBB.BBB
5.  generating IKE_AUTH request 1 [ IDi N(INIT_CONTACT) IDr AUTH SA TSi TSr N(EAP_ONLY) ]
6.  parsed IKE_AUTH response 1 [ IDr AUTH N(CRASH_DET) SA TSi TSr N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) N(ADD_TS_POSS) ]
7.  authentication of ' BB.BBB.BBB.BBB' with pre-shared key successful
8.  IKE_SA vpn_ BB.BBB.BBB.BBB [21588] established between AA.AAA.AAA.AAA [AA.AAA.AAA.AAA]... BB.BBB.BBB.BBB [BB.BBB.BBB.BBB]
9.  scheduling rekeying in 35937s
10. maximum IKE_SA lifetime 36537s
11. received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding
12. Remote traffic selectors narrowed for Child SA: vpn_ BB.BBB.BBB.BBB. Configured TS: [XX.XXX.X.X/24 YYY.YY.YYY.Y/24 ], negotiated TS:[XX.XXX.X.X/24 ]. Please verify configuration on the remote side
13. handling HA CHILD_SA vpn_ BB.BBB.BBB.BBB{66} ZZ.ZZZ.Z.Z/24 === XX.XXX.X.X/24 (segment in: 1, out: 1)
14. CHILD_SA vpn_68.112.246.185{66} established with SPIs 07ab7fec_i de049161_o and TS ZZ.ZZZ.Z.Z/24 === XX.XXX.X.X/24
15. sending DPD request
Aqap Test
  • 11
  • 3
  • Can you re-establish the VPN connection or it stopped working completely ? Please update your question with some more details (logs preferably). – Wojtek_B Apr 30 '21 at 11:04
  • No, it is running currently but sometimes it is down and sometimes up. please check the updated logs. – Aqap Test Apr 30 '21 at 12:37
  • where are your on-premises end located? – surfingonthenet Apr 30 '21 at 12:56
  • Nothing stands out in the attached logs. Is there a way you can provide more logs from the other end - just before the moment the connection breaks and after it's reconnected ? Do you have to do anything particular to restart the connection or it reconnects automatically after a few tries ? – Wojtek_B Apr 30 '21 at 13:01
  • Sorry, I don't have hands-on experience on this if I miss anything or providing insufficient data please let me know I will check and update you. it reconnects automatically I'm not doing anything. – Aqap Test Apr 30 '21 at 14:11
  • Can you provide more details on what VPN software / device you're using on premises ? Some more information about how's everything set up would also help - otherwise I can only guess. – Wojtek_B May 06 '21 at 13:46

1 Answers1

0

Was a solution ever found for this issue? I'm encountering a similar issue where a GCP VPN and a customer drops several days after initial connection. The only way i've found to get the VPN back online is to have the customer reset the connection on their end.

Logs at the approximate time the vpn dropped shows:

parsed CREATE_CHILD_SA request 51 [ SA No KE TSi TSr N(ESP_TFC_PAD_N) N(NON_FIRST_FRAG) ]

received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC padding

Warning: Local traffic selectors narrowed for Child SA: vpn_###.###.### Configured TS: [###.###.###/32], negotiated TS:[###.###.###/32[tcp/65001] ###.###.###/32 ]. Please verify configuration on the remote side.

Warning: Remote traffic selectors narrowed for Child SA: vpn_###.###.###.###. Configured TS: [###.###.###.###/32 ], negotiated TS:[###.###.###.###/32[tcp/60394] ###.###.###.###/32 ]. Please verify configuration on the remote side.

handling HA CHILD_SA vpn_###.###.###.###{4302} ###.###.###.###/32 === ###.###.###.###/32 (segment in: 1*, out: 1*)

generating CREATE_CHILD_SA response 51 [ SA No KE TSi TSr ]

Note: After the above messages are logged the next 5 messages repeat over and over until the vpn connection is reset on the customer side.

sending packet: from ###.###.###.###[500] to ###.###.###.###[500] (476 bytes)

sending DPD request

generating INFORMATIONAL_V1 request 3569313833 [ HASH N(DPD) ]

parsed INFORMATIONAL_V1 request 1654888155 [ HASH N(DPD_ACK) ]

sending packet: from ###.###.###.###[500] to ###.###.###.###[500] (92 bytes)

received packet: from ###.###.###.###[500] to ###.###.###.###[500] (92 bytes)

Editing to add: This issue has been in place for about 3 years until the client performed an update (firmware I believe) on their firewalls, The issue now occurs weekly and VPN will not reconnect without customer bouncing their end of the VPN.

Ricky
  • 31
  • 1
  • This does not really answer the question. If you have a different question, you can ask it by clicking [Ask Question](https://serverfault.com/questions/ask). To get notified when this question gets new answers, you can [follow this question](https://meta.stackexchange.com/q/345661). Once you have enough [reputation](https://serverfault.com/help/whats-reputation), you can also [add a bounty](https://serverfault.com/help/privileges/set-bounties) to draw more attention to this question. - [From Review](/review/late-answers/519161) – Dave M Apr 29 '22 at 16:55