Hi,
I'm using OpenVPN on two ERLite routers for a site to site connection. I can ping the remote router IP from either end, but can't ping the LAN devices. This pinging is directly from the routers using ssh.
Router 1 (Remote Site):
eth0 wan (static ip) x.x.x.172/28
eth1 Target LAN (this is what i want to communicate with, this is also the only private subnet that cannot change) 10.10.10.1/16
eth2 private LAN 192.168.10.1/24
vtun0 OpenVPN Client/Server (this works fine) 10.11.0.1/16
vtun1 OpenVPN Site to Site 10.30.30.1/32
Router 2 (Local Site):
eth0 WAN1 static IP x.x.x.171/28
eth1 WAN2 dhcp failover (left unused for now)
eth2 Target LAN 10.15.15.1/16
vtun0 OpenVPN Client/Server (this works fine) 10.16.0.1/16
vtun1 OpenVPN Site to Site 10.30.30.2/32
UserName@RemoteRouter:~$ show openvpn status site-to-site
OpenVPN client status on vtun1 []
Remote CN Remote IP Tunnel IP TX byte RX byte Connected Since
--------------- --------------- --------------- ------- ------- ------------------------
None (PSK) x.x.x.171 10.30.30.2 511.3M 497.9M N/A
UserName@LocalRouter:~$ show openvpn status site-to-site
OpenVPN client status on vtun1 []
Remote CN Remote IP Tunnel IP TX byte RX byte Connected Since
--------------- --------------- --------------- ------- ------- ------------------------
None (PSK) x.x.x.172 10.30.30.1 15.3K 13.4K N/A
RemoteRouter Config:
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action accept description Openvpn destination { port 1194 } log disable protocol udp state { established enable invalid disable new enable related enable } } rule 22 { action accept description "Openvpn s2s" destination { port 1195 } log disable protocol udp state { established enable invalid enable new enable related enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address x.x.x.172/28 description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { address 10.10.10.1/16 description Local duplex auto speed auto } ethernet eth2 { address 192.168.10.1/24 description "Local 2" duplex auto speed auto } loopback lo { } openvpn vtun1 { local-address 10.30.30.1 { subnet-mask 255.0.0.0 } local-port 1195 mode site-to-site openvpn-option --comp-lzo openvpn-option --float openvpn-option "--ping 10" openvpn-option "--ping-restart 20" openvpn-option --ping-timer-rem openvpn-option --persist-tun openvpn-option --persist-key openvpn-option "--user nobody" openvpn-option "--group nogroup" remote-address 10.30.30.2 remote-host x.x.x.171 remote-port 1195 shared-secret-key-file /config/auth/secret } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth1 wan-interface eth0 } protocols { static { interface-route 10.15.0.0/16 { next-hop-interface vtun1 { description test111 distance 200 } } route 10.15.0.0/16 { next-hop 10.30.30.2 { description test222 distance 200 } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN1 { authoritative disable subnet 10.10.0.0/16 { default-router 10.10.10.1 dns-server 10.10.10.1 dns-server 208.67.222.222 lease 86400 start 10.10.38.102 { stop 10.10.243.51 } } } shared-network-name LAN2 { authoritative disable subnet 192.168.10.0/24 { default-router 192.168.10.1 dns-server 192.168.10.1 lease 86400 start 192.168.10.38 { stop 192.168.10.243 } } } use-dnsmasq disable } dns { dynamic { interface eth0 { service afraid { host-name my.afraid.dns.com login myusername password mypassword server freedns.afraid.org } } } forwarding { cache-size 150 listen-on eth1 listen-on eth2 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } ssh { port 22 protocol-version v2 } } system { gateway-address x.x.x.161 host-name RemoteRouter login { } name-server 208.67.222.222 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */
LocalRouter Config:
firewall { all-ping enable broadcast-ping disable group { network-group PRIVATE_NETS { network 192.168.0.0/16 network 172.16.0.0/12 network 10.0.0.0/8 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify balance { rule 10 { action modify description "do NOT load balance lan to lan" destination { group { network-group PRIVATE_NETS } } modify { table main } } rule 20 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth0 } } modify { table main } } rule 30 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth1 } } modify { table main } } rule 40 { action modify modify { lb-group G } } } name VPN { default-action accept description "" rule 1 { action accept description test destination { group { address-group ADDRv4_eth2 } } log disable protocol all source { group { address-group ADDRv4_vtun1 } } state { established enable invalid enable new enable related enable } } rule 2 { action accept destination { group { address-group ADDRv4_vtun1 } } log disable protocol all source { group { address-group ADDRv4_eth2 } } state { established enable invalid enable new enable related enable } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action accept description openvpn destination { port 1194 } log disable protocol udp source { group { } } state { established enable invalid disable new enable related enable } } rule 22 { action accept description "openvpn s2s" destination { port 1195 } log disable protocol udp source { group { } } state { established enable invalid disable new enable related enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address x.x.x.171/28 description "Internet - WAN" duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { address dhcp description "Internet - WAN 2" duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth2 { address 10.15.15.1/16 description Local duplex auto firewall { in { modify balance } } speed auto } loopback lo { } openvpn vtun1 { local-address 10.30.30.2 { subnet-mask 255.0.0.0 } local-port 1195 mode site-to-site openvpn-option --comp-lzo openvpn-option --float openvpn-option "--ping 10" openvpn-option "--ping-restart 20" openvpn-option --ping-timer-rem openvpn-option --persist-tun openvpn-option --persist-key openvpn-option "--user nobody" openvpn-option "--group nogroup" remote-address 10.30.30.1 remote-host x.x.x.172 remote-port 1195 shared-secret-key-file /config/auth/secret } } load-balance { group G { interface eth0 { } interface eth1 { failover-only } lb-local enable } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth2 wan-interface eth0 } protocols { static { interface-route 10.10.0.0/16 { next-hop-interface vtun1 { description test111 distance 200 } } interface-route 10.15.0.0/16 { next-hop-interface eth2 { description "incoming physical test" disable distance 3 } next-hop-interface vtun1 { description testiguess disable distance 200 } } route 0.0.0.0/0 { next-hop 10.30.30.1 { description bleh disable distance 1 } next-hop x.x.x.161 { } } route 10.10.0.0/16 { next-hop 10.10.10.1 { description "step 2" disable distance 100 } next-hop 10.30.30.1 { description test222 distance 200 } } route 10.15.0.0/16 { next-hop 10.30.30.1 { description testiguess2 disable distance 200 } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 10.15.0.0/16 { default-router 10.15.15.1 dns-server 10.15.15.1 dns-server 208.67.222.222 lease 86400 start 10.15.38.102 { stop 10.15.243.51 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth2 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { description "masquerade for WAN" outbound-interface eth0 type masquerade } rule 5002 { description "masquerade for WAN 2" outbound-interface eth1 type masquerade } } ssh { port 22 protocol-version v2 } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } host-name LocalRouter login { } name-server 208.67.222.222 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */