Thanks for solving this and sharing the solution!

BTW, the pictures were not sent, perhaps try to "paste" them in rather than "attach" them to the email.


On 2024-02-19 20:42, Wally B wrote:
Got this resolved!

The issue is the way StrongSwan (OPNSense IPSec Provider) manages
Phase 2 selectors. For the future if anyone runs into this. Just add
your networks into CloudStack like the documentation says to do. Then
in your OPNSense config add additional networks to Manual SPD entries
under Advanced options on the Phase 2 Settings.

CloudStack VPN Customer Gateway

OPNSense Phase 2:

Thanks!
Wally

On Mon, Feb 19, 2024 at 1:27 PM Wally B <[email protected]>
wrote:

Tried to change the phase 2 selector at 172.16.192.0/16 [5] to a
network on the firewall directly (not just a route the firewall
knows). Getting the same error.

============ cat /var/log/daemon.log | grep 10.2.200.0/23 [6]
===============

Feb 19 03:45:10 r-407-VM ipsec[174957]: 07[CFG] unable to install
policy 10.2.200.0/23 [6] === 10.241.0.0/16 [4] in for reqid 4, the
same policy for reqid 3 exists
Feb 19 03:45:10 r-407-VM ipsec[174957]: 07[CFG] unable to install
policy 10.2.200.0/23 [6] === 10.241.0.0/16 [4] fwd for reqid 4, the
same policy for reqid 3 exists
Feb 19 03:45:10 r-407-VM ipsec[174957]: 07[CFG] unable to install
policy 10.241.0.0/16 [4] === 10.2.200.0/23 [6] out for reqid 4, the
same policy for reqid 3 exists

=========== ipsec statusall =============

vpn-xxx.xxx.xxx.171:  xxx.xxx.xxx.154...xxx.xxx.xxx.171  IKEv1,
dpddelay=30s
vpn-xxx.xxx.xxx.171:   local:  [xxx.xxx.xxx.154] uses pre-shared key
authentication
vpn-xxx.xxx.xxx.171:   remote: [xxx.xxx.xxx.171] uses pre-shared key
authentication
vpn-xxx.xxx.xxx.171:   child:  10.241.0.0/16 [4] ===
192.168.251.0/26 [2] 10.2.200.0/23 [6] TUNNEL, dpdaction=restart
L2TP-PSK:  172.26.0.151...%any  IKEv1/2
L2TP-PSK:   local:  [172.26.0.151] uses pre-shared key
authentication
L2TP-PSK:   remote: uses pre-shared key authentication
L2TP-PSK:   child:  dynamic[udp/l2f] === 0.0.0.0/0[udp] [7]
TRANSPORT
Routed Connections:
L2TP-PSK{517}:  ROUTED, TRANSPORT, reqid 4
L2TP-PSK{517}:   0.0.0.0/0[udp/l2f] [8] === 0.0.0.0/0[udp] [7]
vpn-xxx.xxx.xxx.171{516}:  ROUTED, TUNNEL, reqid 3
vpn-xxx.xxx.xxx.171{516}:   10.241.0.0/16 [4] === 10.2.200.0/23 [6]
192.168.251.0/26 [2]

Any help would be appreciated, currently stuck.

Thanks Again
-Wally

On Sun, Feb 18, 2024 at 12:17 AM Wally B <[email protected]>
wrote:

I'm working on a site to site connection from my VPC to my on prem
OPNsense VPN.

Cloudstack Version 4.19.0
OPNSense Version 23.4.2

I have two P2 selectors setup in OPNsense and i've got a VPN
customer gateway setup with two subnets (
192.168.251.0/26,172.16.192.0/20 [1] ) in Cloudstack.

The issue im running into is, only the first address in my  VPN
customer gateway gets added to the SAD. So, In the above example,
since 192.168.251.0/26 [2] is first I can pass traffic to and from
the VPC to that subnet on prem. However, 172.16.192.0/20 [3] is
not added.

I checked the logs on my VPC VR and found the following.

Feb 18 06:11:56 r-407-VM charon: 07[CFG] unable to install policy
172.16.192.0/20 [3] === 10.241.0.0/16 [4] in for reqid 3, the same
policy for reqid 5 exists
Feb 18 06:11:56 r-407-VM charon: 07[CFG] unable to install policy
172.16.192.0/20 [3] === 10.241.0.0/16 [4] fwd for reqid 3, the
same policy for reqid 5 exists
Feb 18 06:11:56 r-407-VM charon: 07[CFG] unable to install policy
10.241.0.0/16 [4] === 172.16.192.0/20 [3] out for reqid 3, the
same policy for reqid 5 exists

Wondering if i'm just formatting my  VPN customer gateway CIDRs
wrong?

Thanks!
Wally


Links:
------
[1] http://192.168.251.0/26,172.16.192.0/20
[2] http://192.168.251.0/26
[3] http://172.16.192.0/20
[4] http://10.241.0.0/16
[5] http://172.16.192.0/16
[6] http://10.2.200.0/23
[7] http://0.0.0.0/0%5Budp%5D
[8] http://0.0.0.0/0%5Budp/l2f%5D

Reply via email to