Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IPSEC - Auto generated rules are ignored, preventing tunnel renewal #8414

Open
qit-jules opened this issue Mar 7, 2025 · 0 comments
Open
Labels
support Community support

Comments

@qit-jules
Copy link

qit-jules commented Mar 7, 2025

Important notices

Before you add a new report, we ask you kindly to acknowledge the following:

Describe the bug

The automatically created VPN rules for IPsec do not allow traffic on the WAN interface. The traffic runs into the "Default Deny" rule. This issue has been observed across several updates. There is no block statement before the automatic rules.

To Reproduce

When creating an IPSEC (legacy) IKEv1 or IKEv2, firewall rules are created automatically, and the tunnel comes up. Occasionally, when the tunnel renews, the incoming VPN requests run against the "Default Block Rule" for UDP/500 or UDP/4500, even though these ports are set to allow in the automatic rules. The issue is inconsistent, because many other VPN tunnels are not blocked.

Expected behavior

The automatic rules should be considered before the default deny, allowing the IPSEC tunnel to build.

Describe alternatives you considered

Creating manual "Allow" rules for UDP/500 or UDP/4500 bypasses the issue. Deleting the manual "Allow" rule after bypassing the issue does not break the traffic flow again until the tunnel needs to renew. When the tunnel renews and if no manual rule is in place, the tunnel will fail to build because of Default deny.

Screenshots

Image

Relevant log files

(see screenshot)

Additional context

Add any other context about the problem here.

Environment

Software version used and hardware type if relevant, e.g.:

OPNsense 24.7.11_2-amd64
FreeBSD 14.1-RELEASE-p6
HA pair of virtual machines deployed in VMware

@AdSchellevis AdSchellevis added the support Community support label Mar 7, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
support Community support
Development

No branches or pull requests

2 participants