Devices:
Sonicwall NSA 2400 running SonicOS Enhanced 5.8.1.8-57o
Sonicwall TZ 215 running: SonicOS Enhanced 5.8.1.8-42o
Sonicwall TZ 210 runnung: SonicOS Enhanced 5.8.1.8-57o
I have an issue with IKE transmissions taking a good portion of my bandwidth. I have a T-1 connection at 3 Mb/s with a sonicwall NSA 2400 working as the default gateway and running VPNs to 6 satellite locations. VPN negotiations on 4 of these VPNs work fine, but I have 2 locations that the IKE negotiations time out when trying to connect to the Peer VPN device (TZ 215 and TZ210 sonicwall)
The Peer device (the TZ 215 & TZ 210) is connected to 2 Netgear MBR 1515 Wireless mobile broadband routers that are connected to 4G service from Verizon wireless. This set up requires the WAN IP address to be set via DHCP at this location.
Even though there is a consistent stream of IKE negotiations listed in the sonicwall logs the connections stay up and are functional. The connection does go down occasionally, mostly in the very early morning (3-5 am local time) otherwise the connection is solid. Between the 2 affected VPNs it can take up as much as 1.5 2 Mb/s of my bandwidth. Being that I only have 3 Mb/s available, this is way too much.
I have checked the logs again and do not find any instances where the IKE time outs were being reported, and found none, so the issue is not happening right now, but I fear it will raise its ugly head again soon.
First thought was that the sonicwall were having trouble with the DHCP assigned IPs for the peer devices, but my VPNs are set to recognize the peers by DNS name, not IP addresses, so this should not really be an issue. Another thought was the tz 215 was just having trouble connecting over the Verizon network, but the VPN is active and I had general connections from my users at the remote location connecting with no issues during the times the errors were posting to the log.
Any ideas as to why IKE transmissions would be failing?
Any idea as to why IKE transmissions would take up so much bandwidth?
Any help would be appreciated,
Sonicwall NSA 2400 running SonicOS Enhanced 5.8.1.8-57o
Sonicwall TZ 215 running: SonicOS Enhanced 5.8.1.8-42o
Sonicwall TZ 210 runnung: SonicOS Enhanced 5.8.1.8-57o
I have an issue with IKE transmissions taking a good portion of my bandwidth. I have a T-1 connection at 3 Mb/s with a sonicwall NSA 2400 working as the default gateway and running VPNs to 6 satellite locations. VPN negotiations on 4 of these VPNs work fine, but I have 2 locations that the IKE negotiations time out when trying to connect to the Peer VPN device (TZ 215 and TZ210 sonicwall)
The Peer device (the TZ 215 & TZ 210) is connected to 2 Netgear MBR 1515 Wireless mobile broadband routers that are connected to 4G service from Verizon wireless. This set up requires the WAN IP address to be set via DHCP at this location.
Even though there is a consistent stream of IKE negotiations listed in the sonicwall logs the connections stay up and are functional. The connection does go down occasionally, mostly in the very early morning (3-5 am local time) otherwise the connection is solid. Between the 2 affected VPNs it can take up as much as 1.5 2 Mb/s of my bandwidth. Being that I only have 3 Mb/s available, this is way too much.
I have checked the logs again and do not find any instances where the IKE time outs were being reported, and found none, so the issue is not happening right now, but I fear it will raise its ugly head again soon.
First thought was that the sonicwall were having trouble with the DHCP assigned IPs for the peer devices, but my VPNs are set to recognize the peers by DNS name, not IP addresses, so this should not really be an issue. Another thought was the tz 215 was just having trouble connecting over the Verizon network, but the VPN is active and I had general connections from my users at the remote location connecting with no issues during the times the errors were posting to the log.
Any ideas as to why IKE transmissions would be failing?
Any idea as to why IKE transmissions would take up so much bandwidth?
Any help would be appreciated,