Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

No LAN access for VPN

$
0
0

Hi,

 

I've just installed a new EdgeRouter and managed to get most of it working as I wanted. Unfortunately I've hit a brick wall with VPN and local network access.

 

The LAN is using 10.1.1.0/24

The VPN is using 10.1.3.0/24

 

So far I've tried the following:

  • auto-firewall-nat-exclude enable
  • auto-firewall-nat-exclude disable
  • WAN_IN allow traffic from 10.1.3.0/24 to 10.1.1.0/24
  • WAN_LOCAL allow traffic from 10.1.3.0/24 to 10.1.1.0/24

We're using dual wan with failover mode so I've applied the new 'lb-local disable' feature to the lb group, still nothing.

 

I've read that it may be related to route tables but that's where I get a bit lost.

 

My config is below, anyone have any ideas that could help solve this?

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    modify WAN_POLICY {
        rule 10 {
            action modify
            modify {
                lb-group WAN_FAILOVER
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description "Allow VPN"
            destination {
                address 10.1.1.0/24
            }
            ipsec {
                match-ipsec
            }
            log disable
            protocol all
            source {
                address 10.1.3.0/24
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "Allow VPN"
            destination {
                address 10.1.1.0/24
            }
            ipsec {
                match-ipsec
            }
            log disable
            protocol all
            source {
                address 10.1.3.0/24
            }
        }
        rule 40 {
            action accept
            description "Allow L2TP"
            destination {
                port 500,1701,4500
            }
            log enable
            protocol udp
        }
        rule 50 {
            action accept
            description "Allow ESP"
            log enable
            protocol esp
        }
        rule 60 {
            action accept
            description "Allow ICMP"
            log enable
            protocol icmp
        }
        rule 70 {
            action accept
            description "Allow SNMP"
            destination {
                port 161
            }
            log enable
            protocol tcp_udp
        }
    }
    name WAN_VPN {
        default-action accept
        description ""
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
        vif 10 {
            address xxx.xxx.xxx.xxx/24
            description Fibre
            firewall {
                in {
                    name WAN_IN
                }
                local {
                    name WAN_LOCAL
                }
            }
            mtu 1492
        }
    }
    ethernet eth1 {
        description eth1
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
        vif 10 {
            address xxx.xxx.xxx.xxx/24
            description VDSL
            firewall {
                in {
                    name WAN_IN
                }
                local {
                    name WAN_LOCAL
                }
            }
            mtu 1500
            pppoe 1 {
                default-route auto
                firewall {
                    in {
                        name WAN_IN
                    }
                    local {
                        name WAN_LOCAL
                    }
                }
                mtu 1492
                name-server auto
                password deleted
                user-id deleted
            }
        }
    }
    ethernet eth2 {
        address 10.1.1.1/24
        description eth2
        duplex auto
        firewall {
            in {
                modify WAN_POLICY
            }
        }
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    ethernet eth6 {
        duplex auto
        speed auto
    }
    ethernet eth7 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
load-balance {
    group WAN_FAILOVER {
        interface eth0.10 {
        }
        interface pppoe1 {
            failover-only
        }
        lb-local disable
    }
}
protocols {
    static {
    }
}
service {
    dns {
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth2
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            log disable
            outbound-interface eth0.10
            protocol all
            type masquerade
        }
        rule 5011 {
            description "masquerade for WAN2"
            log disable
            outbound-interface pppoe1
            protocol all
            type masquerade
        }
    }
    snmp {
        community deleted {
            authorization ro
        }
        contact 
        listen-address xxx.xxx.xxx.xxx {
            port 161
        }
        listen-address xxx.xxx.xxx.xxx {
            port 161
        }
        location deleted
        trap-target xxx.xxx.xxx.xxx {
        }
        trap-target xxx.xxx.xxx.xxx {
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    domain-name deleted
    gateway-address xxx.xxx.xxx.xxx
    host-name ubnt
    login {
        user deleted {
            authentication {
                encrypted-password deleted
                plaintext-password ""
            }
            full-name "deleted"
            level admin
        }
        user deleted {
            authentication {
                encrypted-password deleted
                plaintext-password ""
            }
            full-name "deleted"
            level admin
        }
    }
    name-server xxx.xxx.xxx.xxx
    name-server xxx.xxx.xxx.xxx
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
        host xxx.xxx.xxx.xxx {
            facility all {
                level debug
            }
        }
    }
    time-zone Pacific/Auckland
    traffic-analysis {
        dpi enable
        export enable
    }
}
vpn {
    ipsec {
        auto-firewall-nat-exclude disable
        ipsec-interfaces {
            interface eth0
            interface eth1
        }
        nat-networks {
            allowed-network 0.0.0.0/0 {
            }
        }
        nat-traversal enable
    }
    l2tp {
        remote-access {
            authentication {
                local-users {
                    username deleted {
                        password deleted
                    }
                }
                mode local
            }
            client-ip-pool {
                start 10.1.3.2
                stop 10.1.3.4
            }
            dns-servers {
                server-1 10.1.1.5
                server-2 8.8.8.8
            }
            ipsec-settings {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret deleted
                }
                ike-lifetime 3600
            }
            outside-address 0.0.0.0
        }
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1139 */

Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>