Any ideas? Not sure where to start...running latest version 1.9.0. Configuration below.
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name LAN_OUT { default-action accept description "" rule 1 { action drop description "VPN Limit" destination { address !192.168.1.40 } log disable protocol all source { address 192.168.1.200-192.168.1.205 } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 1 { action accept description "Allow established/related" state { established enable related enable } } rule 2 { action accept description "Allow L2TP" destination { port 500,1701,4500 } log disable protocol udp } rule 3 { action accept description "Allow ESP" log disable protocol esp } rule 4 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { description Local duplex auto speed auto } ethernet eth2 { description Local duplex auto speed auto } ethernet eth3 { description Local duplex auto speed auto } ethernet eth4 { description Local duplex auto poe { output pthru } speed auto } loopback lo { } switch switch0 { address 192.168.1.1/24 description Local firewall { out { name LAN_OUT } } mtu 1500 switch-port { interface eth1 { } interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } } } service { dhcp-server { disabled false hostfile-update enable shared-network-name LAN { authoritative disable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.38 { stop 192.168.1.199 } static-mapping DESKTOP-KS88DRH { ip-address 192.168.1.44 mac-address c8:1f:66:aa:0b:6c } } } use-dnsmasq disable } dns { dynamic { interface eth0 { service dyndns { host-name *********** login ********* password **************** server dynupdate.no-ip.com } web dyndns } } forwarding { cache-size 150 listen-on switch0 name-server 8.8.8.8 system } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } ssh { port 22 protocol-version v2 } } system { host-name ubnt login { user ubnt { authentication { encrypted-password **************** } level admin } } name-server 8.8.8.8 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone America/Los_Angeles } traffic-control { } vpn { ipsec { auto-firewall-nat-exclude disable ipsec-interfaces { interface eth0 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable } l2tp { remote-access { authentication { local-users { username ****** { password **************** } } mode local } client-ip-pool { start 192.168.1.200 stop 192.168.1.205 } dhcp-interface eth0 ipsec-settings { authentication { mode pre-shared-secret pre-shared-secret **************** } ike-lifetime 3600 } mtu 1492 } } }