On Tue, Mar 22, 2022 at 02:38:15AM +0000, Philipp Buehler wrote:
>Am 21.03.2022 19:04 schrieb rea...@catastrophe.net:
>> The flows look correct in the SA table on server-west and traffic leaves
>> on
>> enc0, hits vio0 on server-east as ESP traffic, but then is dropped.
>> Again,
>> only when I also start a ping on server-east (10.254.255.1) to
>> server-west
>> (10.255.255.1) does the original ping session see replies.
>
>Out of balance / asymmetric rule set not generating needed state.
>
[..]
>Check back your actual interfaces (vio0..) for ESP traffic allowance.
>The '@73' and '@58' already indicates a major difference so check for 'pass
>... proto esp'.

Thanks. There are only differences as one side has other rules for 
local access (some web server, etc.).

Rules on both sides are:

# server-east 
--------------
pass in  proto udp from any to self port { isakmp, ipsec-nat-t } keep state 
pass out proto udp from any to any port { isakmp, ipsec-nat-t } keep state

pass in  proto { esp, ah } from any to vio0 keep state 
pass out proto { esp, ah } from vio0 to any keep state

pass on log enc0 keep state (if-bound) tagged VPN.LAX
pass on log enc0 keep state (if-bound)

# server-west
--------------
pass in  proto udp from any to self port { isakmp, ipsec-nat-t } keep state 
pass out proto udp from any to any port { isakmp, ipsec-nat-t } keep state

pass in  proto { esp, ah } from any to em0 keep state 
pass out proto { esp, ah } from em0 to any keep state

pass on log enc0 keep state (if-bound) tagged VPN.ORD
pass on log enc0 keep state (if-bound)

Reply via email to