Hi,
I have been able to establish the link between my two sites but I am not able to reach my devices fromone side to the other:-(
I have read as much as I could on the topic, tried ot build the right configurations but I'm now stuck. If someone could take a quick look and tell me where I should look, it would be greatly appreciated.
Thanks,
My configs (sanitzed, I think):
firewall { all-ping enable broadcast-ping disable group { network-group PRIVATE_NETS { } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify SOURCE_ROUTE { rule 10 { action modify description "traffic from LAN1 to WAN 1" modify { table 1 } source { address 192.168.101.0/24 } } rule 20 { action modify description "traffic from LAN2 to WAN 2" modify { table 2 } source { address 172.16.101.0/24 } } } modify balance { } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action accept description "Allow VPN traffic from xxx" destination { address 192.168.101.0/24 } ipsec { match-ipsec } log disable protocol all source { address 192.168.201.1-192.168.201.3 } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action accept description "Allow VPN traffic from xxx to the router" destination { address 192.168.101.1 } ipsec { match-ipsec } log disable protocol all source { address 192.168.201.1-192.168.201.3 } } rule 22 { action accept description "Allow IKE-UDP-500" destination { port 500 } log disable protocol udp } rule 23 { action accept description "Allow ESP-50" log disable protocol esp } rule 24 { action accept description "Allow NAT-T-UDP-4500" destination { port 4500 } log disable protocol udp } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description Numericable duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { address dhcp description OVH duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth2 { address 192.168.101.1/24 description "LAN" duplex auto firewall { in { modify SOURCE_ROUTE } } speed auto vif 1 { address 192.168.102.1/24 description "VLAN A" disable mtu 1500 } vif 10 { address 172.16.101.1/24 description "VLAN L" firewall { in { modify SOURCE_ROUTE } } } } ethernet eth3 { disable duplex auto speed auto } ethernet eth4 { disable duplex auto speed auto } ethernet eth5 { disable duplex auto speed auto } ethernet eth6 { disable duplex auto speed auto } ethernet eth7 { disable duplex auto speed auto } loopback lo { } } protocols { /snip...snip/ } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 192.168.101.0/24 { default-router 192.168.101.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.101.100 { stop 192.168.101.199 } } unifi-controller 192.168.101.5 } } shared-network-name LAN2 { authoritative disable subnet 172.16.101.0/24 { default-router 172.16.101.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 172.16.101.100 { stop 172.16.101.130 } } } } dns { dynamic { interface eth0 { service dyndns { /snip...snip/ } web dyndns } } forwarding { cache-size 150 listen-on eth2 listen-on eth2.10 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { description "Exclude IPsec from local to remote from NAT" destination { address 192.168.201.0/24 } exclude log disable outbound-interface eth0 protocol all source { address 192.168.101.0/24 } type masquerade } rule 5001 { description "masquerade for WAN" outbound-interface eth0 type masquerade } rule 5002 { description "masquerade for WAN 2" outbound-interface eth1 type masquerade } } ssh { port 22 protocol-version v2 } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } host-name EdgeRouterPro8 login {/snip...snip/ } name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Europe/Paris } vpn { ipsec { auto-firewall-nat-exclude enable esp-group FOO0 { compression disable lifetime 3600 mode tunnel pfs enable proposal 1 { encryption aes128 hash sha1 } } ike-group FOO0 { ikev2-reauth no key-exchange ikev1 lifetime 28800 proposal 1 { dh-group 14 encryption aes128 hash sha1 } } ipsec-interfaces { interface eth0 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable site-to-site { peer 2.2.2.2 { authentication { mode pre-shared-secret pre-shared-secret testing123 } connection-type initiate description MaisonLV ike-group FOO0 ikev2-reauth inherit local-address 1.1.1.1 tunnel 1 { allow-nat-networks disable allow-public-networks disable esp-group FOO0 local { prefix 192.168.101.0/24 } remote { prefix 192.168.201.0/24 } } } } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.5.4884695.160608.1104 */
And the other side:
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 1 { action accept description "Allow established/related" log disable protocol all state { established enable invalid disable new disable related enable } } rule 2 { action drop description "Drop invalid state" log disable protocol all state { established disable invalid enable new disable related disable } } rule 3 { action accept description "Allow VPN traffic from xxx" destination { address 192.168.201.1-192.168.201.3 } ipsec { match-ipsec } log disable protocol all source { address 192.168.101.0/24 } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 1 { action accept description "Allow established / related" log disable protocol all state { established enable invalid disable new disable related enable } } rule 2 { action drop description "Drop invalid state" log disable protocol all state { established disable invalid enable new disable related disable } } rule 3 { action accept description "Allow VPN traffic from xxx to the router" destination { address 192.168.201.1 } ipsec { match-ipsec } log disable protocol all source { address 192.168.101.0/24 } } rule 4 { action accept description "Allow IKE6UDP500" destination { port 500 } log disable protocol udp } rule 5 { action accept description "Allow ESP-50" log disable protocol esp } rule 6 { action accept description "Allow NAT-T-UDP-4500" log disable protocol udp source { port 4500 } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description "Internet LV" duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { disable duplex auto speed auto } ethernet eth2 { address 192.168.201.1/24 description LAN duplex auto speed auto } loopback lo { } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative disable subnet 192.168.201.0/24 { default-router 192.168.201.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.201.2 { stop 192.168.201.3 } } } } dns { forwarding { cache-size 150 listen-on eth0 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { description "Exclude IPsec from local to remote from NAT" destination { address 192.168.101.0/24 } exclude log disable outbound-interface eth0 protocol all source { address 192.168.201.0/24 } type masquerade } rule 5001 { description "masquerade for WAN" log disable outbound-interface eth0 protocol all type masquerade } } ssh { port 22 protocol-version v2 } } system { host-name EdgeRouterLite login { /snip...snip/ } name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipsec enable ipv4 { forwarding enable } ipv6 { forwarding disable } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } vpn { ipsec { auto-firewall-nat-exclude enable esp-group FOO0 { compression disable lifetime 3600 mode tunnel pfs enable proposal 1 { encryption aes128 hash sha1 } } ike-group FOO0 { ikev2-reauth no key-exchange ikev1 lifetime 28800 proposal 1 { dh-group 14 encryption aes128 hash sha1 } } ipsec-interfaces { interface eth0 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable site-to-site { peer 1.1.1.1 { authentication { mode pre-shared-secret pre-shared-secret testing123 } connection-type initiate description MaisonBoyceau ike-group FOO0 ikev2-reauth inherit local-address 2.2.2.2 tunnel 1 { allow-nat-networks disable allow-public-networks disable esp-group FOO0 local { prefix 192.168.201.0/24 } remote { prefix 192.168.101.0/24 } } } } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.5.4884695.160608.1057 */