Hi,
I've just installed a new EdgeRouter and managed to get most of it working as I wanted. Unfortunately I've hit a brick wall with VPN and local network access.
The LAN is using 10.1.1.0/24
The VPN is using 10.1.3.0/24
So far I've tried the following:
- auto-firewall-nat-exclude enable
- auto-firewall-nat-exclude disable
- WAN_IN allow traffic from 10.1.3.0/24 to 10.1.1.0/24
- WAN_LOCAL allow traffic from 10.1.3.0/24 to 10.1.1.0/24
We're using dual wan with failover mode so I've applied the new 'lb-local disable' feature to the lb group, still nothing.
I've read that it may be related to route tables but that's where I get a bit lost.
My config is below, anyone have any ideas that could help solve this?
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable modify WAN_POLICY { rule 10 { action modify modify { lb-group WAN_FAILOVER } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action accept description "Allow VPN" destination { address 10.1.1.0/24 } ipsec { match-ipsec } log disable protocol all source { address 10.1.3.0/24 } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 30 { action accept description "Allow VPN" destination { address 10.1.1.0/24 } ipsec { match-ipsec } log disable protocol all source { address 10.1.3.0/24 } } rule 40 { action accept description "Allow L2TP" destination { port 500,1701,4500 } log enable protocol udp } rule 50 { action accept description "Allow ESP" log enable protocol esp } rule 60 { action accept description "Allow ICMP" log enable protocol icmp } rule 70 { action accept description "Allow SNMP" destination { port 161 } log enable protocol tcp_udp } } name WAN_VPN { default-action accept description "" } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto vif 10 { address xxx.xxx.xxx.xxx/24 description Fibre firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 } } ethernet eth1 { description eth1 duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto vif 10 { address xxx.xxx.xxx.xxx/24 description VDSL firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1500 pppoe 1 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server auto password deleted user-id deleted } } } ethernet eth2 { address 10.1.1.1/24 description eth2 duplex auto firewall { in { modify WAN_POLICY } } speed auto } ethernet eth3 { duplex auto speed auto } ethernet eth4 { duplex auto speed auto } ethernet eth5 { duplex auto speed auto } ethernet eth6 { duplex auto speed auto } ethernet eth7 { duplex auto speed auto } loopback lo { } } load-balance { group WAN_FAILOVER { interface eth0.10 { } interface pppoe1 { failover-only } lb-local disable } } protocols { static { } } service { dns { forwarding { cache-size 150 listen-on eth1 listen-on eth2 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" log disable outbound-interface eth0.10 protocol all type masquerade } rule 5011 { description "masquerade for WAN2" log disable outbound-interface pppoe1 protocol all type masquerade } } snmp { community deleted { authorization ro } contact listen-address xxx.xxx.xxx.xxx { port 161 } listen-address xxx.xxx.xxx.xxx { port 161 } location deleted trap-target xxx.xxx.xxx.xxx { } trap-target xxx.xxx.xxx.xxx { } } ssh { port 22 protocol-version v2 } } system { domain-name deleted gateway-address xxx.xxx.xxx.xxx host-name ubnt login { user deleted { authentication { encrypted-password deleted plaintext-password "" } full-name "deleted" level admin } user deleted { authentication { encrypted-password deleted plaintext-password "" } full-name "deleted" level admin } } name-server xxx.xxx.xxx.xxx name-server xxx.xxx.xxx.xxx ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } host xxx.xxx.xxx.xxx { facility all { level debug } } } time-zone Pacific/Auckland traffic-analysis { dpi enable export enable } } vpn { ipsec { auto-firewall-nat-exclude disable ipsec-interfaces { interface eth0 interface eth1 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable } l2tp { remote-access { authentication { local-users { username deleted { password deleted } } mode local } client-ip-pool { start 10.1.3.2 stop 10.1.3.4 } dns-servers { server-1 10.1.1.5 server-2 8.8.8.8 } ipsec-settings { authentication { mode pre-shared-secret pre-shared-secret deleted } ike-lifetime 3600 } outside-address 0.0.0.0 } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1139 */