Quantcast
Viewing all articles
Browse latest Browse all 20028

IPsec tunnel up but no traffic after router

Tunnel is up on both ends.  Routers can ping each other.  The workstation behind the routers can also ping the far router.  I can't ping a far workstation on either side from either the router or the workstation. 

 

Router A -> Can ping Router #2, but not workstation #2

-Workstation #1 (behind Router A) -> Can ping Router B but not workstation #2

 

Router B -> Can ping router A, but not workstation #1

-Workstation #2 -> Can ping Router A but not workstation #1

 

Router A config:

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                established disable
                invalid enable
                new disable
                related disable
            }
        }
        rule 30 {
            action accept
            description "VPN Traffic"
            destination {
                address 192.168.50.0/24
            }
            ipsec {
                match-ipsec
            }
            source {
                address 192.168.51.0/24
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                established disable
                invalid enable
                new disable
                related disable
            }
        }
        rule 30 {
            action accept
            description "VPN Traffic"
            destination {
                address 192.168.50.1
            }
            ipsec {
                match-ipsec
            }
            source {
                address 192.168.51.0/24
            }
        }
        rule 40 {
            action accept
            description IKE-UDP-500
            destination {
                port 500
            }
            protocol udp
        }
        rule 50 {
            action accept
            description ESP-50
            protocol esp
        }
        rule 60 {
            action accept
            description NAT-T-UDP-4500
            destination {
                port 4500
            }
            protocol udp
        }
        rule 70 {
            action accept
            description "Manage Router"
            destination {
                port 22,443
            }
            protocol tcp
            source {
                address 10.10.10.0/24
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 10.10.10.30/24
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address 192.168.50.1/24
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        description "Local 2"
        disable
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
protocols {
    static {
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative disable
            subnet 192.168.50.0/24 {
                default-router 192.168.50.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.50.100 {
                    stop 192.168.50.200
                }
            }
        }
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth2
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5001 {
            description "VPN Traffic"
            destination {
                address 192.168.51.0/24
            }
            exclude
            log disable
            outbound-interface eth0
            protocol all
            source {
                address 192.168.50.0/24
            }
            type masquerade
        }
        rule 5002 {
            description "masquerade for WAN"
            log disable
            outbound-interface eth0
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    gateway-address 10.10.10.1
    host-name ubnt
    login {
        user admin {
            authentication {
                encrypted-password $6$AtmoGUlogc9cdi49$9AwWKRoeXxMEuy0vLfYeMtWqTHGbojjBbGFcYOD1P0/t7Zu1Bt1gZARSNqjnrt/JL7DPyTgEcKP2NuwsHq91a0
            }
            level admin
        }
    }
    name-server 8.8.8.8
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}
vpn {
    ipsec {
        auto-firewall-nat-exclude enable
        esp-group FOO0 {
            compression disable
            lifetime 3600
            mode tunnel
            pfs enable
            proposal 1 {
                encryption aes128
                hash sha1
            }
        }
        ike-group FOO0 {
            ikev2-reauth no
            key-exchange ikev1
            lifetime 28800
            proposal 1 {
                dh-group 14
                encryption aes128
                hash sha1
            }
        }
        ipsec-interfaces {
            interface eth0
        }
        nat-networks {
            allowed-network 0.0.0.0/0 {
            }
        }
        nat-traversal enable
        site-to-site {
            peer 10.10.10.31 {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret IamVPN2008
                }
                connection-type initiate
                default-esp-group FOO0
                ike-group FOO0
                ikev2-reauth inherit
                local-address 10.10.10.30
                tunnel 1 {
                    allow-nat-networks disable
                    allow-public-networks disable
                    esp-group FOO0
                    local {
                        prefix 192.168.50.0/24
                    }
                    remote {
                        prefix 192.168.51.0/24
                    }
                }
            }
        }
    }
}

 

Router B config:

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to LAN"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                established disable
                invalid enable
                new disable
                related disable
            }
        }
        rule 30 {
            action accept
            description "VPN Traffic"
            destination {
                address 192.168.51.0/24
            }
            ipsec {
                match-ipsec
            }
            source {
                address 192.168.50.0/24
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                established disable
                invalid enable
                new disable
                related disable
            }
        }
        rule 30 {
            action accept
            description "VPN Traffic"
            destination {
                address 192.168.51.1
            }
            ipsec {
                match-ipsec
            }
            source {
                address 192.168.50.0/24
            }
        }
        rule 40 {
            action accept
            description IKE-UDP-500
            destination {
                port 500
            }
            protocol udp
        }
        rule 50 {
            action accept
            description ESP-50
            protocol esp
        }
        rule 60 {
            action accept
            description NAT-T-UDP-500
            destination {
                port 500
            }
            protocol udp
        }
        rule 70 {
            action accept
            description "Manage Router"
            destination {
                port 443,22
            }
            protocol tcp
            source {
                address 10.10.10.0/24
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 10.10.10.31/24
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address 192.168.51.1/24
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth3 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth4 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth5 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth6 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth7 {
        disable
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
protocols {
    static {
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative disable
            subnet 192.168.51.0/24 {
                default-router 192.168.51.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.51.100 {
                    stop 192.168.51.200
                }
            }
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5001 {
            description VPN
            destination {
                address 192.168.50.0/24
            }
            exclude
            log disable
            outbound-interface eth0
            protocol all
            source {
                address 192.168.51.0/24
            }
            type masquerade
        }
        rule 5002 {
            description "masquerade for WAN"
            log disable
            outbound-interface eth0
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    gateway-address 10.10.10.1
    host-name ubnt
    login {
        user admin {
            authentication {
                encrypted-password $6$slPmo9YrrlG1zLp$g4ixcwfr5i0gN4JpgqDBoUUAsVr0gACwOgZtVBMdMEXkzEpsrGWomVUoqMEaFF8fuo0r5DDMd4Nzg8QNeXaK7/
                plaintext-password ""
            }
            level admin
        }
        user ubnt {
            authentication {
                encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66.
            }
            level admin
        }
    }
    name-server 8.8.8.8
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}
vpn {
    ipsec {
        auto-firewall-nat-exclude enable
        esp-group FOO0 {
            compression disable
            lifetime 3600
            mode tunnel
            pfs enable
            proposal 1 {
                encryption aes128
                hash sha1
            }
        }
        ike-group FOO0 {
            ikev2-reauth no
            key-exchange ikev1
            lifetime 28800
            proposal 1 {
                dh-group 14
                encryption aes128
                hash sha1
            }
        }
        ipsec-interfaces {
            interface eth0
        }
        nat-networks {
            allowed-network 0.0.0.0/0 {
            }
        }
        nat-traversal enable
        site-to-site {
            peer 10.10.10.30 {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret IamVPN2008
                }
                connection-type initiate
                default-esp-group FOO0
                ike-group FOO0
                ikev2-reauth inherit
                local-address 10.10.10.31
                tunnel 1 {
                    allow-nat-networks disable
                    allow-public-networks disable
                    esp-group FOO0
                    local {
                        prefix 192.168.51.0/24
                    }
                    remote {
                        prefix 192.168.50.0/24
                    }
                }
            }
        }
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1104 */

Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>