Quantcast
Viewing all articles
Browse latest Browse all 20028

Can't get traffic on site to site VPN

Hi,

 

I have been able to establish the link between my two sites but I am not able to reach my devices fromone side to the other:-(

 

I have read as much as I could on the topic, tried ot build the right configurations but I'm now stuck. If someone could take a quick look and tell me where I should look, it would be greatly appreciated.

 

Thanks,

 

My configs (sanitzed, I think):

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group PRIVATE_NETS {
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify SOURCE_ROUTE {
        rule 10 {
            action modify
            description "traffic from LAN1 to WAN 1"
            modify {
                table 1
            }
            source {
                address 192.168.101.0/24
            }
        }
        rule 20 {
            action modify
            description "traffic from LAN2 to WAN 2"
            modify {
                table 2
            }
            source {
                address 172.16.101.0/24
            }
        }
    }
    modify balance {
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description "Allow VPN traffic from xxx"
            destination {
                address 192.168.101.0/24
            }
            ipsec {
                match-ipsec
            }
            log disable
            protocol all
            source {
                address 192.168.201.1-192.168.201.3
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description "Allow VPN traffic from xxx to the router"
            destination {
                address 192.168.101.1
            }
            ipsec {
                match-ipsec
            }
            log disable
            protocol all
            source {
                address 192.168.201.1-192.168.201.3
            }
        }
        rule 22 {
            action accept
            description "Allow IKE-UDP-500"
            destination {
                port 500
            }
            log disable
            protocol udp
        }
        rule 23 {
            action accept
            description "Allow ESP-50"
            log disable
            protocol esp
        }
        rule 24 {
            action accept
            description "Allow NAT-T-UDP-4500"
            destination {
                port 4500
            }
            log disable
            protocol udp
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description Numericable
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address dhcp
        description OVH
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth2 {
        address 192.168.101.1/24
        description "LAN"
        duplex auto
        firewall {
            in {
                modify SOURCE_ROUTE
            }
        }
        speed auto
        vif 1 {
            address 192.168.102.1/24
            description "VLAN A"
            disable
            mtu 1500
        }
        vif 10 {
            address 172.16.101.1/24
            description "VLAN L"
            firewall {
                in {
                    modify SOURCE_ROUTE
                }
            }
        }
    }
    ethernet eth3 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth4 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth5 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth6 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth7 {
        disable
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
protocols {
/snip...snip/
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative enable
            subnet 192.168.101.0/24 {
                default-router 192.168.101.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.101.100 {
                    stop 192.168.101.199
                }
                }
                unifi-controller 192.168.101.5
            }
        }
        shared-network-name LAN2 {
            authoritative disable
            subnet 172.16.101.0/24 {
                default-router 172.16.101.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 172.16.101.100 {
                    stop 172.16.101.130
                }
            }
        }
    }
    dns {
        dynamic {
            interface eth0 {
                service dyndns {
                    /snip...snip/                }
                web dyndns
            }
        }
        forwarding {
            cache-size 150
            listen-on eth2
            listen-on eth2.10
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description "Exclude IPsec from local to remote from NAT"
            destination {
                address 192.168.201.0/24
            }
            exclude
            log disable
            outbound-interface eth0
            protocol all
            source {
                address 192.168.101.0/24
            }
            type masquerade
        }
        rule 5001 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
        rule 5002 {
            description "masquerade for WAN 2"
            outbound-interface eth1
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    host-name EdgeRouterPro8
    login {/snip...snip/
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Europe/Paris
}
vpn {
    ipsec {
        auto-firewall-nat-exclude enable
        esp-group FOO0 {
            compression disable
            lifetime 3600
            mode tunnel
            pfs enable
            proposal 1 {
                encryption aes128
                hash sha1
            }
        }
        ike-group FOO0 {
            ikev2-reauth no
            key-exchange ikev1
            lifetime 28800
            proposal 1 {
                dh-group 14
                encryption aes128
                hash sha1
            }
        }
        ipsec-interfaces {
            interface eth0
        }
        nat-networks {
            allowed-network 0.0.0.0/0 {
            }
        }
        nat-traversal enable
        site-to-site {
            peer 2.2.2.2 {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret testing123
                }
                connection-type initiate
                description MaisonLV
                ike-group FOO0
                ikev2-reauth inherit
                local-address 1.1.1.1
                tunnel 1 {
                    allow-nat-networks disable
                    allow-public-networks disable
                    esp-group FOO0
                    local {
                        prefix 192.168.101.0/24
                    }
                    remote {
                        prefix 192.168.201.0/24
                    }
                }
            }
        }
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1104 */

 

And the other side:

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 1 {
            action accept
            description "Allow established/related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 2 {
            action drop
            description "Drop invalid state"
            log disable
            protocol all
            state {
                established disable
                invalid enable
                new disable
                related disable
            }
        }
        rule 3 {
            action accept
            description "Allow VPN traffic from xxx"
            destination {
                address 192.168.201.1-192.168.201.3
            }
            ipsec {
                match-ipsec
            }
            log disable
            protocol all
            source {
                address 192.168.101.0/24
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 1 {
            action accept
            description "Allow established / related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 2 {
            action drop
            description "Drop invalid state"
            log disable
            protocol all
            state {
                established disable
                invalid enable
                new disable
                related disable
            }
        }
        rule 3 {
            action accept
            description "Allow VPN traffic from xxx to the router"
            destination {
                address 192.168.201.1
            }
            ipsec {
                match-ipsec
            }
            log disable
            protocol all
            source {
                address 192.168.101.0/24
            }
        }
        rule 4 {
            action accept
            description "Allow IKE6UDP500"
            destination {
                port 500
            }
            log disable
            protocol udp
        }
        rule 5 {
            action accept
            description "Allow ESP-50"
            log disable
            protocol esp
        }
        rule 6 {
            action accept
            description "Allow NAT-T-UDP-4500"
            log disable
            protocol udp
            source {
                port 4500
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description "Internet LV"
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth2 {
        address 192.168.201.1/24
        description LAN
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative disable
            subnet 192.168.201.0/24 {
                default-router 192.168.201.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.201.2 {
                    stop 192.168.201.3
                }
            }
        }
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth0
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description "Exclude IPsec from local to remote from NAT"
            destination {
                address 192.168.101.0/24
            }
            exclude
            log disable
            outbound-interface eth0
            protocol all
            source {
                address 192.168.201.0/24
            }
            type masquerade
        }
        rule 5001 {
            description "masquerade for WAN"
            log disable
            outbound-interface eth0
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name EdgeRouterLite
    login {
	/snip...snip/
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec enable
        ipv4 {
            forwarding enable
        }
        ipv6 {
            forwarding disable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}
vpn {
    ipsec {
        auto-firewall-nat-exclude enable
        esp-group FOO0 {
            compression disable
            lifetime 3600
            mode tunnel
            pfs enable
            proposal 1 {
                encryption aes128
                hash sha1
            }
        }
        ike-group FOO0 {
            ikev2-reauth no
            key-exchange ikev1
            lifetime 28800
            proposal 1 {
                dh-group 14
                encryption aes128
                hash sha1
            }
        }
        ipsec-interfaces {
            interface eth0
        }
        nat-networks {
            allowed-network 0.0.0.0/0 {
            }
        }
        nat-traversal enable
        site-to-site {
            peer 1.1.1.1 {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret testing123
                }
                connection-type initiate
                description MaisonBoyceau
                ike-group FOO0
                ikev2-reauth inherit
                local-address 2.2.2.2
                tunnel 1 {
                    allow-nat-networks disable
                    allow-public-networks disable
                    esp-group FOO0
                    local {
                        prefix 192.168.201.0/24
                    }
                    remote {
                        prefix 192.168.101.0/24
                    }
                }
            }
        }
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1057 */

Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>