Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

OpenVPN Site-to-Site Can't ping LAN

$
0
0

Hi,

 

I'm using OpenVPN on two ERLite routers for a site to site connection. I can ping the remote router IP from either end, but can't ping the LAN devices.  This pinging is directly from the routers using ssh.


Router 1 (Remote Site):
eth0 wan (static ip) x.x.x.172/28
eth1 Target LAN (this is what i want to communicate with, this is also the only private subnet that cannot change) 10.10.10.1/16
eth2 private LAN 192.168.10.1/24
vtun0 OpenVPN Client/Server (this works fine) 10.11.0.1/16
vtun1 OpenVPN Site to Site 10.30.30.1/32

 

Router 2 (Local Site):
eth0 WAN1 static IP x.x.x.171/28
eth1 WAN2 dhcp failover (left unused for now)
eth2 Target LAN 10.15.15.1/16
vtun0 OpenVPN Client/Server (this works fine) 10.16.0.1/16
vtun1 OpenVPN Site to Site 10.30.30.2/32


UserName@RemoteRouter:~$ show openvpn status site-to-site
OpenVPN client status on vtun1 []

Remote CN Remote IP Tunnel IP TX byte RX byte Connected Since
--------------- --------------- --------------- ------- ------- ------------------------
None (PSK) x.x.x.171 10.30.30.2 511.3M 497.9M N/A



UserName@LocalRouter:~$ show openvpn status site-to-site
OpenVPN client status on vtun1 []

Remote CN Remote IP Tunnel IP TX byte RX byte Connected Since
--------------- --------------- --------------- ------- ------- ------------------------
None (PSK) x.x.x.172 10.30.30.1 15.3K 13.4K N/A

 

 

RemoteRouter Config:

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description Openvpn
            destination {
                port 1194
            }
            log disable
            protocol udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 22 {
            action accept
            description "Openvpn s2s"
            destination {
                port 1195
            }
            log disable
            protocol udp
            state {
                established enable
                invalid enable
                new enable
                related enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address x.x.x.172/28
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address 10.10.10.1/16
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        address 192.168.10.1/24
        description "Local 2"
        duplex auto
        speed auto
    }
    loopback lo {
    }
    openvpn vtun1 {
        local-address 10.30.30.1 {
            subnet-mask 255.0.0.0
        }
        local-port 1195
        mode site-to-site
        openvpn-option --comp-lzo
        openvpn-option --float
        openvpn-option "--ping 10"
        openvpn-option "--ping-restart 20"
        openvpn-option --ping-timer-rem
        openvpn-option --persist-tun
        openvpn-option --persist-key
        openvpn-option "--user nobody"
        openvpn-option "--group nogroup"
        remote-address 10.30.30.2
        remote-host x.x.x.171
        remote-port 1195
        shared-secret-key-file /config/auth/secret
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth1
    wan-interface eth0
}
protocols {
    static {
        interface-route 10.15.0.0/16 {
            next-hop-interface vtun1 {
                description test111
                distance 200
            }
        }
        route 10.15.0.0/16 {
            next-hop 10.30.30.2 {
                description test222
                distance 200
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN1 {
            authoritative disable
            subnet 10.10.0.0/16 {
                default-router 10.10.10.1
                dns-server 10.10.10.1
                dns-server 208.67.222.222
                lease 86400
                start 10.10.38.102 {
                    stop 10.10.243.51
                }
            }
        }
        shared-network-name LAN2 {
            authoritative disable
            subnet 192.168.10.0/24 {
                default-router 192.168.10.1
                dns-server 192.168.10.1
                lease 86400
                start 192.168.10.38 {
                    stop 192.168.10.243
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        dynamic {
            interface eth0 {
                service afraid {
                    host-name my.afraid.dns.com
                    login myusername
                    password mypassword
                    server freedns.afraid.org
                }
            }
        }
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth2
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    gateway-address x.x.x.161
    host-name RemoteRouter
    login {

    }
    name-server 208.67.222.222
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1131 */

LocalRouter Config:

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group PRIVATE_NETS {
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify balance {
        rule 10 {
            action modify
            description "do NOT load balance lan to lan"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            modify {
                table main
            }
        }
        rule 20 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth0
                }
            }
            modify {
                table main
            }
        }
        rule 30 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth1
                }
            }
            modify {
                table main
            }
        }
        rule 40 {
            action modify
            modify {
                lb-group G
            }
        }
    }
    name VPN {
        default-action accept
        description ""
        rule 1 {
            action accept
            description test
            destination {
                group {
                    address-group ADDRv4_eth2
                }
            }
            log disable
            protocol all
            source {
                group {
                    address-group ADDRv4_vtun1
                }
            }
            state {
                established enable
                invalid enable
                new enable
                related enable
            }
        }
        rule 2 {
            action accept
            destination {
                group {
                    address-group ADDRv4_vtun1
                }
            }
            log disable
            protocol all
            source {
                group {
                    address-group ADDRv4_eth2
                }
            }
            state {
                established enable
                invalid enable
                new enable
                related enable
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description openvpn
            destination {
                port 1194
            }
            log disable
            protocol udp
            source {
                group {
                }
            }
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 22 {
            action accept
            description "openvpn s2s"
            destination {
                port 1195
            }
            log disable
            protocol udp
            source {
                group {
                }
            }
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address x.x.x.171/28
        description "Internet - WAN"
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address dhcp
        description "Internet - WAN 2"
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth2 {
        address 10.15.15.1/16
        description Local
        duplex auto
        firewall {
            in {
                modify balance
            }
        }
        speed auto
    }
    loopback lo {
    }
    openvpn vtun1 {
        local-address 10.30.30.2 {
            subnet-mask 255.0.0.0
        }
        local-port 1195
        mode site-to-site
        openvpn-option --comp-lzo
        openvpn-option --float
        openvpn-option "--ping 10"
        openvpn-option "--ping-restart 20"
        openvpn-option --ping-timer-rem
        openvpn-option --persist-tun
        openvpn-option --persist-key
        openvpn-option "--user nobody"
        openvpn-option "--group nogroup"
        remote-address 10.30.30.1
        remote-host x.x.x.172
        remote-port 1195
        shared-secret-key-file /config/auth/secret
    }
}
load-balance {
    group G {
        interface eth0 {
        }
        interface eth1 {
            failover-only
        }
        lb-local enable
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth2
    wan-interface eth0
}
protocols {
    static {
        interface-route 10.10.0.0/16 {
            next-hop-interface vtun1 {
                description test111
                distance 200
            }
        }
        interface-route 10.15.0.0/16 {
            next-hop-interface eth2 {
                description "incoming physical test"
                disable
                distance 3
            }
            next-hop-interface vtun1 {
                description testiguess
                disable
                distance 200
            }
        }
        route 0.0.0.0/0 {
            next-hop 10.30.30.1 {
                description bleh
                disable
                distance 1
            }
            next-hop x.x.x.161 {
            }
        }
        route 10.10.0.0/16 {
            next-hop 10.10.10.1 {
                description "step 2"
                disable
                distance 100
            }
            next-hop 10.30.30.1 {
                description test222
                distance 200
            }
        }
        route 10.15.0.0/16 {
            next-hop 10.30.30.1 {
                description testiguess2
                disable
                distance 200
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative enable
            subnet 10.15.0.0/16 {
                default-router 10.15.15.1
                dns-server 10.15.15.1
                dns-server 208.67.222.222
                lease 86400
                start 10.15.38.102 {
                    stop 10.15.243.51
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth2
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
        rule 5002 {
            description "masquerade for WAN 2"
            outbound-interface eth1
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    host-name LocalRouter
    login {

    }
    name-server 208.67.222.222
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1131 */

 

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles