Project

General

Profile

Actions

Feature #1520

closed

Option to disable the automatic default gateway (re)selection

Added by Jim Pingle almost 13 years ago. Updated about 12 years ago.

Status:
Closed
Priority:
Normal
Assignee:
-
Category:
Gateways
Target version:
Start date:
05/12/2011
Due date:
% Done:

0%

Estimated time:
Plus Target Version:
Release Notes:

Description

The method that moves the default gateway to another gateway when the preferred goes down is very convenient, but we need some mechanism to disable that action or at least a way to flag certain gateways as being ineligible for default.

There are many scenarios where a certain gateway should/must be excluded, or there is only one valid default despite having many gateways to choose from.

Actions #1

Updated by Chris Buechler almost 13 years ago

from what we discussed on this previously, rather than selecting a default or not, there should be 3 options in a drop down - yes (it's the default unless it's down), no (it's never the default), and eligible (it can become the default if the default is down).

I'm not sure this behavior of changing gateways should be retained at all for v2.0.

Actions #2

Updated by Ermal Luçi almost 13 years ago

  • Target version changed from 2.0 to 2.1

This has been disabled at all for now.
Switch to 2.1 as target.

Actions #3

Updated by Seth Mos almost 13 years ago

One of the issues that came up was with Racoon. Even if the default gateway came back to the WAN interface the tunnels never came back up. Restarting racoon did not prove to fix things. I ended up rebooting the firewall before everything came back up normally. The WAN interface was never actually down in my case, but the monitor IP failed for roughly 30 seconds which was enough to cause the default switch.

What may have happened here is that there might have been GRE traffic states created on the OPT interface which could then cause issues. IPsec communicates over UDP for the control but GRE is used for the transport. The few tunnels that were bound to the OPT interface kept working, also after a restart. Leading me to believe it might be a state issue or assymetric routing.

Static IPsec tunnels on the OPT interface employ static routes to make sure that all traffic goes out the correct gateway. In my case Racoon was also bound to a CARP vip as this is a Carp cluster and this is the main VPN server.

Gateway failover does not make much sense for a CARP cluster really, all tunnels are terminated via the WAN interface.

Looks like this is related to ticket #1508. I never checked that the route actually failed back.

Actions #4

Updated by Chris Buechler almost 13 years ago

Seth's referring to ESP rather than GRE there

Actions #5

Updated by Ermal Luçi about 12 years ago

The short version is racoon need to learn to differentiate packets by their incoming interface.
A patch is present on racoon mailing lists but also a RECVIF sockopt might help in this case as well.

Actions #6

Updated by Chris Buechler about 12 years ago

  • Status changed from New to Closed

this particular feature as noted in the original post is good and has been since 2.0, if there are other issues they need their own ticket.

Actions

Also available in: Atom PDF