Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

ER-Poe5 ipsec hardware offload not working

$
0
0

I have an er-poe5 with ipsec site to site vpn to another edgerouter lite. It seems like the hw-offload dosent work because when I transfer files over the link I get max 5MB/sec and the cpu is running at 100%

Could anyone have a look at my config to see if I am using features that disables hw-offload?

 

show configuration | no-more
firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group BOGONS {
            network 10.0.0.0/8
            network 100.64.0.0/10
            network 127.0.0.0/8
            network 169.254.0.0/16
            network 172.16.0.0/12
            network 192.0.0.0/24
            network 192.0.2.0/24
            network 192.168.0.0/16
            network 198.18.0.0/15
            network 198.51.100.0/24
            network 203.0.113.0/24
            network 224.0.0.0/4
            network 240.0.0.0/4
        }
    }
    ipv6-name Internet-To-LAN {
        default-action drop
        description "Internet to LAN"
        rule 1 {
            action accept
            description "Drop Incoming IPv6 unless related"
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            state {
                invalid enable
            }
        }
    }
    ipv6-name LAN-To-Internet {
        default-action accept
        description "LAN to Internet"
        rule 1 {
            action accept
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            state {
                invalid enable
            }
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action drop
            description "SRC Bogons"
            log disable
            protocol all
            source {
                group {
                    network-group BOGONS
                }
            }
        }
        rule 22 {
            action drop
            description "DST Bogons"
            destination {
                group {
                    network-group BOGONS
                }
            }
            log disable
            protocol all
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 1 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 3 {
            action accept
            description ESP
            log disable
            protocol esp
        }
        rule 4 {
            action accept
            description "udp port 500"
            destination {
                port 500
            }
            log disable
            protocol udp
        }
        rule 5 {
            action accept
            description "udp port 4500"
            destination {
                port 4500
            }
            log disable
            protocol udp
        }
        rule 6 {
            action accept
            description "udp port 1701"
            destination {
                port 1701
            }
            ipsec {
                match-ipsec
            }
            log disable
            protocol udp
        }
        rule 8 {
            action accept
            description "GRE over IPsec"
            ipsec {
                match-ipsec
            }
            protocol gre
        }
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description ESP
            log disable
            protocol esp
        }
        rule 30 {
            action accept
            description "UDP port 500"
            destination {
                port 500
            }
            log disable
            protocol udp
        }
        rule 40 {
            action accept
            description "UDP port 4500"
            destination {
                port 4500
            }
            log disable
            protocol udp
        }
        rule 50 {
            action accept
            description GRE
            log disable
            protocol gre
        }
        rule 60 {
            action accept
            description "UDP 1701"
            destination {
                port 1701
            }
            log disable
            protocol udp
        }
        rule 70 {
            action accept
            description "Backdoor Sandbox"
            log disable
            protocol all
            source {
                address x.x.x.x
            }
        }
        rule 80 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description "Altibox Internet"
        dhcp-options {
            default-route update
            default-route-distance 210
            name-server no-update
        }
        duplex auto
        firewall {
            in {
                ipv6-name Internet-To-LAN
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        poe {
            output off
        }
        speed auto
    }
    ethernet eth1 {
        address 2a01:79d:7375:4215::1/64
        address 192.168.253.1/27
        description TV
        duplex auto
        ipv6 {
            dup-addr-detect-transmits 1
            router-advert {
                cur-hop-limit 64
                link-mtu 1280
                managed-flag false
                max-interval 300
                other-config-flag false
                prefix 2a01:79d:7375:4215::/64 {
                    autonomous-flag true
                    on-link-flag true
                    valid-lifetime 2592000
                }
                reachable-time 0
                retrans-timer 0
                send-advert true
            }
        }
        poe {
            output off
        }
        speed auto
    }
    ethernet eth2 {
        description "Main switch port 2"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth3 {
        description "Unify Cloud key"
        duplex auto
        poe {
            output 48v
        }
        speed auto
    }
    ethernet eth4 {
        description "Accesspunkt stuen"
        duplex auto
        poe {
            output 48v
        }
        speed auto
    }
    loopback lo {
        address 172.25.5.1/32
    }
    switch switch0 {
        address 10.11.12.1/24
        address 2a01:79d:7375:4214:feed:dead:beef:1/64
        description Switch
        ipv6 {
            dup-addr-detect-transmits 1
            router-advert {
                cur-hop-limit 64
                link-mtu 1280
                managed-flag false
                max-interval 300
                other-config-flag false
                prefix 2a01:79d:7375:4214::/64 {
                    autonomous-flag true
                    on-link-flag true
                    valid-lifetime 2592000
                }
                reachable-time 0
                retrans-timer 0
                send-advert true
            }
        }
        mtu 1500
        switch-port {
            interface eth2 {
            }
            interface eth3 {
            }
            interface eth4 {
            }
            vlan-aware disable
        }
        vif 512 {
            address 192.168.255.1/24
            description Barnenett
            mtu 1500
        }
        vif 513 {
            address 192.168.254.1/24
            description Ungdomsnett
            mtu 1500
        }
    }
    tunnel tun0 {
        address 2a01:79c::/30
        description "Altibox 6RD"
        encapsulation sit
        local-ip x.x.x.x
        multicast disable
        remote-ip 213.167.115.92
        ttl 255
    }
    vti vti0 {
        address 172.25.25.1/30
        description "Vpn to Sandbox-Rack"
        mtu 1436
    }
    vti vti1 {
        address 172.25.25.5/30
        description "Vpn to Anders sin VPS"
    }
}
policy {
    prefix-list RFC1918PREFIXES {
        rule 1 {
            action permit
            le 32
            prefix 10.0.0.0/8
        }
        rule 2 {
            action permit
            le 32
            prefix 172.16.0.0/12
        }
        rule 3 {
            action permit
            le 32
            prefix 192.168.0.0/16
        }
    }
    route-map ONLYRFC1918PREFIXES {
        rule 10 {
            action permit
            match {
                ip {
                    address {
                        prefix-list RFC1918PREFIXES
                    }
                }
            }
        }
        rule 666 {
            action deny
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface switch0
    lan-interface eth1
    wan-interface eth0
}
protocols {
    ospf {
        area 0 {
            network 172.25.25.0/30
            network 172.25.25.4/30
        }
        parameters {
            abr-type cisco
            router-id 172.25.5.1
        }
        redistribute {
            connected {
                metric-type 2
                route-map ONLYRFC1918PREFIXES
            }
        }
    }
    static {
        interface-route6 ::/0 {
            next-hop-interface tun0 {
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN2 {
            authoritative enable
            subnet 10.11.12.0/24 {
                default-router 10.11.12.1
                dns-server 10.11.12.1
                dns-server 8.8.4.4
                lease 86400
                start 10.11.12.38 {
                    stop 10.11.12.243
                }
                static-mapping UniFi-CloudKey {
                    ip-address 10.11.12.39
                    mac-address 80:2a:a8:4d:0f:32
                }
                static-mapping printer8FD5C1DD {
                    ip-address 10.11.12.46
                    mac-address c4:8e:8f:d5:c1:dd
                }
            }
        }
        shared-network-name eth1 {
            subnet 192.168.253.0/27 {
                default-router 192.168.253.1
                dns-server 192.168.253.1
                lease 86400
                start 192.168.253.2 {
                    stop 192.168.253.30
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on switch0
            listen-on switch0.512
            listen-on switch0.513
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    lldp {
        interface switch0 {
        }
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    snmp {
        community snmpread {
            authorization ro
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
        contact trrunde
    }
    ssh {
        port 22
        protocol-version v2
    }
    upnp2 {
        listen-on switch0
        nat-pmp disable
        secure-mode disable
        wan eth0
    }
}
system {
    domain-name runde.wtf
    host-name erpoe5
    login {
        user ubnt {
            authentication {
                encrypted-password ****************
            }
            level admin
        }
    }
    name-server 8.8.8.8
    name-server 208.67.222.222
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec enable
        ipv4 {
            forwarding enable
            gre enable
            vlan enable
        }
        ipv6 {
            forwarding enable
            vlan enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Europe/Oslo
    traffic-analysis {
        dpi enable
        export enable
    }
}
vpn {
    ipsec {
        auto-firewall-nat-exclude enable
        esp-group FOO0 {
            compression disable
            lifetime 3600
            mode tunnel
            pfs enable
            proposal 1 {
                encryption aes256
                hash sha1
            }
        }
        ike-group FOO0 {
            ikev2-reauth no
            key-exchange ikev1
            lifetime 28800
            proposal 1 {
                dh-group 14
                encryption aes256
                hash sha1
            }
        }
        ipsec-interfaces {
            interface eth0
        }
        nat-networks {
            allowed-network 0.0.0.0/0 {
            }
        }
        nat-traversal enable
        site-to-site {
            peer x.x.x.x {
                authentication {
                    pre-shared-secret ****************
                }
                connection-type initiate
                ike-group FOO0
                ikev2-reauth inherit
                local-address x.x.x.x
                vti {
                    bind vti1
                    esp-group FOO0
                }
            }
            peer x.x.x.x {
                authentication {
                    mode rsa
                    pre-shared-secret ****************
                    rsa-key-name erl-altibox
                }
                connection-type initiate
                description Sandbox
                ike-group FOO0
                ikev2-reauth inherit
                local-address x.x.x.x
                vti {
                    bind vti0
                    esp-group FOO0
                }
            }
        }
    }
    rsa-keys {
        rsa-key-name erl-altibox {
            rsa-key ****************
        }
    }
}
ubnt@erpoe5:~$

ubnt@erpoe5:~$ show ubnt offload

IP offload module : loaded
IPv4
forwarding: enabled
vlan : enabled
pppoe : disabled
gre : enabled
IPv6
forwarding: enabled
vlan : enabled
pppoe : disabled

IPSec offload module: loaded

Traffic Analysis :
export : enabled
dpi : enabled
ubnt@erpoe5:~$


Viewing all articles
Browse latest Browse all 60861

Trending Articles