Quantcast
Viewing all articles
Browse latest Browse all 20028

IPSEC Site-to-Site with Multi-WAN failover - LAN cannot traverse VPN tunnel

I just deployed an ERL to a customer site with Multi-WAN failover, and it's been working great.  I used the Wizard to setup, checking eth1 as failover-only.  After we confirmed internet was working I added the VPN tunnel to the vendor hosted data center.  Now I can ping from the router to the data center server, and the data center server can ping my router LAN interface.  But the server cannot get into the LAN workstations, and the workstations cannot ping the data center server.  I have a feeling it is due to the modify balance firewall, but I'm not sure.

 

me@customer# show
 firewall {
     all-ping enable
     broadcast-ping disable
     group {
         address-group MyRemoteSupport {
             address 63.238.xxx.xxx
             address 63.142.xxx.xxx
             description ""
         }
         network-group PRIVATE_NETS {
             network 192.168.0.0/16
             network 172.16.0.0/12
             network 10.0.0.0/8
         }
     }
     ipv6-receive-redirects disable
     ipv6-src-route disable
     ip-src-route disable
     log-martians disable
     modify balance {
         rule 10 {
             action modify
             description "do NOT load balance lan to lan"
             destination {
                 group {
                     network-group PRIVATE_NETS
                 }
             }
             modify {
                 table main
             }
         }
         rule 20 {
             action modify
             description "do NOT load balance destination public address"
             destination {
                 group {
                     address-group ADDRv4_eth0
                 }
             }
             modify {
                 table main
             }
         }
         rule 30 {
             action modify
             description "do NOT load balance destination public address"
             destination {
                 group {
                     address-group ADDRv4_eth1
                 }
             }
             modify {
                 table main
             }
         }
         rule 100 {
             action modify
             modify {
                 lb-group G
             }
         }
     }
     name WAN_IN {
         default-action drop
         description "WAN to internal"
         rule 10 {
             action accept
             description "Allow established/related"
             state {
                 established enable
                 related enable
             }
         }
         rule 20 {
             action drop
             description "Drop invalid state"
             state {
                 invalid enable
             }
         }
         rule 21 {
             action accept
             description "allow vpn"
             destination {
                 address 10.5.202.0/24
             }
             ipsec {
                 match-ipsec
             }
             log disable
             protocol all
             source {
                 address 172.16.0.22
             }
             state {
                 established enable
                 invalid disable
                 new enable
                 related enable
             }
         }
     }
     name WAN_LOCAL {
         default-action drop
         description "WAN to router"
         rule 10 {
             action accept
             description "Allow established/related"
             state {
                 established enable
                 related enable
             }
         }
         rule 20 {
             action accept
             description "allow ping"
             log disable
             protocol icmp
             state {
                 established disable
                 invalid disable
                 new enable
                 related disable
             }
         }
         rule 30 {
             action accept
             description "allow MyRemoteSupport"
             destination {
                 port 22,443
             }
             log disable
             protocol tcp
             source {
                 group {
                     address-group MyRemoteSupport
                 }
             }
             state {
                 established disable
                 invalid disable
                 new enable
                 related disable
             }
         }
         rule 40 {
             action drop
             description "Drop invalid state"
             state {
                 invalid enable
             }
         }
         rule 41 {
             action accept
             description "allow vpn hbs"
             destination {
                 address 10.5.202.0/24
             }
             ipsec {
                 match-ipsec
             }
             log disable
             protocol all
             source {
                 address 172.16.0.22
             }
             state {
                 established enable
                 invalid disable
                 new enable
                 related enable
             }
         }
         rule 42 {
             action accept
             description "allow vpn ike udp 500"
             destination {
                 port 500
             }
             log disable
             protocol udp
         }
         rule 43 {
             action accept
             description "allow vpn nat-t udp 4500"
             destination {
                 port 4500
             }
             log disable
             protocol udp
         }
         rule 44 {
             action accept
             description "allow vpn esp"
             log disable
             protocol esp
         }
     }
     receive-redirects disable
     send-redirects enable
     source-validation disable
     syn-cookies enable
 }
 interfaces {
     ethernet eth0 {
         address 216.74.xxx.xxx/28
         description "WAN ISP1"
         duplex auto
         firewall {
             in {
                 name WAN_IN
             }
             local {
                 name WAN_LOCAL
             }
         }
         speed auto
     }
     ethernet eth1 {
         address 216.106.xxx.xxx/30
         description "WAN ISP2"
         duplex auto
         firewall {
             in {
                 name WAN_IN
             }
             local {
                 name WAN_LOCAL
             }
         }
         speed auto
     }
     ethernet eth2 {
         address 10.5.202.1/24
         description LAN
         duplex auto
         firewall {
             in {
                 modify balance
             }
         }
         speed auto
     }
     loopback lo {
     }
 }
 load-balance {
     group G {
         interface eth0 {
         }
         interface eth1 {
             failover-only
         }
     }
 }
 protocols {
     static {
         route 0.0.0.0/0 {
             next-hop 216.74.212.14 {
                 description "ISP1 Wireless"
             }
             next-hop 216.106.66.25 {
                 description "ISP2 DSL"
             }
         }
     }
 }
 service {
     dhcp-server {
         disabled false
         hostfile-update disable
         shared-network-name LAN {
             authoritative enable
             subnet 10.5.202.0/24 {
                 default-router 10.5.202.1
                 dns-server 208.67.222.222
                 dns-server 208.67.220.220
                 lease 86400
                 start 10.5.202.38 {
                     stop 10.5.202.243
                 }
                 static-mapping BRWACD1B84EB519 {
                     ip-address 10.5.202.103
                     mac-address ac:d1:b8:4e:b5:19
                 }
             }
         }
     }
     dns {
         forwarding {
             cache-size 150
             listen-on eth2
         }
     }
     gui {
         https-port 443
     }
     nat {
         rule 5000 {
             description "vpn-nat exclude"
             destination {
                 address 172.16.0.22
             }
             exclude
             log disable
             outbound-interface eth0
             protocol all
             source {
                 address 10.5.202.0/24
             }
             type masquerade
         }
         rule 5001 {
             description "masquerade for WAN ISP1"
             log disable
             outbound-interface eth0
             protocol all
             type masquerade
         }
         rule 5002 {
             description "masquerade for WAN ISP2"
             log disable
             outbound-interface eth1
             protocol all
             type masquerade
         }
     }
     ssh {
         port 22
         protocol-version v2
     }
 }
 system {
     conntrack {
         expect-table-size 4096
         hash-size 4096
         table-size 32768
         tcp {
             half-open-connections 512
             loose enable
             max-retrans 3
         }
     }
     host-name CPElamonte
     login {
         user me {
             authentication {
                 encrypted-password $6$BJqkSTgtu3$/ApMIMtGujaqntmOj4f
             }
             level admin
         }
     }
     name-server 8.8.8.8
     name-server 208.67.222.222
     ntp {
         server 0.ubnt.pool.ntp.org {
         }
         server 1.ubnt.pool.ntp.org {
         }
         server 2.ubnt.pool.ntp.org {
         }
         server 3.ubnt.pool.ntp.org {
         }
     }
     offload {
         hwnat disable
         ipsec enable
         ipv4 {
             forwarding enable
             gre enable
             pppoe enable
             vlan enable
         }
     }
     syslog {
         global {
             facility all {
                 level notice
             }
             facility protocols {
                 level debug
             }
         }
     }
     time-zone America/Chicago
     traffic-analysis {
         dpi enable
         export enable
     }
 }
 vpn {
     ipsec {
         auto-firewall-nat-exclude enable
         esp-group FOO0 {
             compression disable
             lifetime 3600
             mode tunnel
             pfs enable
             proposal 1 {
                 encryption 3des
                 hash sha1
             }
         }
         ike-group FOO0 {
             lifetime 28800
             proposal 1 {
                 dh-group 2
                 encryption 3des
                 hash sha1
             }
         }
         ipsec-interfaces {
             interface eth0
         }
         site-to-site {
             peer 66.xxx.xxx.98 {
                 authentication {
                     mode pre-shared-secret
                     pre-shared-secret hbssystems
                 }
                 connection-type initiate
                 description "to VENDOR cloud"
                 ike-group FOO0
                 local-address 216.xxx.xxx.2
                 tunnel 1 {
                     allow-nat-networks disable
                     allow-public-networks disable
                     esp-group FOO0
                     local {
                         prefix 10.5.202.0/24
                     }
                     remote {
                         prefix 172.16.0.22/32
                     }
                 }
             }
         }
     }
 }

Viewing all articles
Browse latest Browse all 20028

Trending Articles