Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

Site-to-Site VPN with FritzBox: Can ping remote devices but no other traffic comes through

$
0
0

Hey there,

 

I'm running out of ideas what could cause this problem...

 

Site A:

AVM FritzBox, Firmware 06.51

Local Network: 10.10.0.0/24

 

Site B:

ERLite, Firmware 1.9

Local Network: 192.168.110.0/24 (en1)

VLANs (en1.120, en1.130, en1.140, en1.190)

 

The VPN tunnel is up and I can ping the gateways and devices in both directions. However, when trying to access the web interfaces of a device no traffic goes through.

 

FritzBox VPN Config:

 

 

{
                enabled = yes;
                conn_type = conntype_lan;
                name = "XXXX";
                always_renew = yes;
                reject_not_encrypted = no;
                dont_filter_netbios = yes;
                localip = 0.0.0.0;
                local_virtualip = 0.0.0.0;
                remoteip = 0.0.0.0;
                remote_virtualip = 0.0.0.0;
                remotehostname = "XXXX";
				keepalive_ip = 0.0.0.0;
                localid {
                        fqdn = "XXXX";
                }
                remoteid {
                        fqdn = "XXXX";
                }
                mode = phase1_mode_idp;
                phase1ss = "all/all/all";
                keytype = connkeytype_pre_shared;
                key = "XXXX";
                cert_do_server_auth = no;
                use_nat_t = yes;
                use_xauth = no;
                use_cfgmode = no;
                phase2localid {
                        ipnet {
                                ipaddr = 10.10.0.0;
                                mask = 255.255.255.0;
                        }
                }
                phase2remoteid {
                        ipnet {
                                ipaddr = 192.168.110.0;
                                mask = 255.255.255.0;
                        }
                }
                phase2ss = "esp-all-all/ah-none/comp-all/pfs";
                accesslist = "permit ip any 192.168.110.0 255.255.255.0",
							 "permit ip any 192.168.120.0 255.255.255.0",
							 "permit ip any 192.168.130.0 255.255.255.0",
							 "permit ip any 192.168.140.0 255.255.255.0",
							 "permit ip any 192.168.190.0 255.255.255.0";
        }
        ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500", 
                            "udp 0.0.0.0:4500 0.0.0.0:4500";

 

ERL VPN Config:

 

 

auto-update 60
 auto-firewall-nat-exclude enable
 disable-uniqreqids
 esp-group FOO0 {
     proposal 1 {
         encryption aes256
         hash sha1
     }
 }
 ike-group FOO0 {
     lifetime 28800
     proposal 1 {
         dh-group 2
         encryption aes256
         hash sha1
     }
 }
 ipsec-interfaces {
     interface eth0
 }
 nat-networks {
     allowed-network 0.0.0.0/0 {
     }
 }
 nat-traversal enable
 site-to-site {
     peer XXXX {
         authentication {
             id @XXXX
             mode pre-shared-secret
             pre-shared-secret XXXX
             remote-id @XXXX
         }
         connection-type initiate
         ike-group FOO0
         local-address XXXX
         tunnel 1 {
             allow-nat-networks disable
             allow-public-networks disable
             esp-group FOO0
             local {
                 prefix 192.168.110.0/24
             }
             protocol all
             remote {
                 prefix 10.10.0.0/24
             }
         }
         tunnel 2 {
             esp-group FOO0
             local {
                 prefix 192.168.120.0/24
             }
             remote {
                 prefix 10.10.0.0/24
             }
         }
         tunnel 3 {
             esp-group FOO0
             local {
                 prefix 192.168.130.0/24
             }
             remote {
                 prefix 10.10.0.0/24
             }
         }
         tunnel 4 {
             esp-group FOO0
             local {
                 prefix 192.168.140.0/24
             }
             remote {
                 prefix 10.10.0.0/24
             }
         }
         tunnel 5 {
             esp-group FOO0
             local {
                 prefix 192.168.190.0/24
             }
             remote {
                 prefix 10.10.0.0/24
             }
         }
     }
 }

 

ERL Firewall:

 

 

all-ping enable
 broadcast-ping disable
 group {
     address-group ROUTER_ADDRESSES {
         address 192.168.120.1
         address 192.168.130.1
         address 192.168.140.1
         address 192.168.190.1
         address 192.168.110.1
         description "Router Group"
     }
     network-group SITE2SITE_NETS {
         description "Remote Group"
         network 10.10.0.0/24
     }
     network-group VLAN_NETS {
         description "VLAN Group"
         network 192.168.120.0/24
         network 192.168.130.0/24
         network 192.168.140.0/24
         network 192.168.190.0/24
         network 192.168.110.0/24
     }
 }
 ipv6-receive-redirects disable
 ipv6-src-route disable
 ip-src-route disable
 log-martians enable
 name WAN_IN {
     default-action drop
     description "Internet > LAN"
     enable-default-log
     rule 10 {
         action accept
         description "Allow Established"
         log disable
         protocol all
         state {
             established enable
             invalid disable
             new disable
             related enable
         }
     }
     rule 30 {
         action drop
         description "Drop invalid"
         log disable
         protocol all
         state {
             established disable
             invalid enable
             new disable
             related disable
         }
     }
 }
 name WAN_LOCAL {
     default-action drop
     description "Internet > Gateway"
     enable-default-log
     rule 10 {
         action accept
         description "Accept related"
         log disable
         protocol all
         state {
             established enable
             invalid disable
             new disable
             related enable
         }
     }
     rule 30 {
         action drop
         description "Drop invalid"
         log disable
         protocol all
         state {
             established disable
             invalid enable
             new disable
             related disable
         }
     }
     rule 31 {
         action accept
         description "Allow VPN"
         destination {
             group {
                 network-group VLAN_NETS
             }
         }
         ipsec {
             match-ipsec
         }
         log enable
         protocol all
         source {
             group {
                 network-group SITE2SITE_NETS
             }
         }
         state {
             established enable
             invalid disable
             new enable
             related enable
         }
     }
 }
 receive-redirects disable
 send-redirects enable
 source-validation disable
 syn-cookies enable

 

show vpn ipsec sa:

 

 

peer-XXXX-tunnel-1: #1, ESTABLISHED, IKEv1, 5f24492c15402673:5a6214b49027bd90
  local  'XXXX' @ REMOTE_WANIP
  remote 'XXXX' @ LOCAL_WANIP
  AES_CBC-256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
  established 2203s ago, reauth in 25936s
  peer-XXXX-tunnel-3: #3, INSTALLED, TUNNEL, ESP:AES_CBC-256/HMAC_SHA1_96/MODP_1024
    installed 1468 ago, rekeying in 1219s, expires in 2133s
    in  cfe5449e,    380 bytes,     5 packets,  1465s ago
    out 88a726d6,    252 bytes,     3 packets,  1465s ago
    local  192.168.130.0/24
    remote 10.10.0.0/24
  peer-XXXX-tunnel-1: #1, INSTALLED, TUNNEL, ESP:AES_CBC-256/HMAC_SHA1_96/MODP_1024
    installed 1456 ago, rekeying in 1155s, expires in 2144s
    in  c0b4956a,    424 bytes,     7 packets,  1122s ago
    out 50fa9f1b,   5772 bytes,     6 packets,  1122s ago
    local  192.168.110.0/24
    remote 10.10.0.0/24

 

Any ideas?

Thanks!


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>