Hey everyone,
(Doing this from my iPhone on cellular) I connect to my L2TP VPN fine. I get an appropriate IP from the designated IP pool. When I launch any app to connect to internal systems, the app can't seem to find the internal host/system.
I connect to my home network via wifi, and can connect via my iPhone apps to these systems.
My gut says its a firewall setting but not sure which one might be blocking me from manuevering around the internal network.
ETH1 = WAN,
ETH0 = LAN:
firewall {
all-ping enable
broadcast-ping disable
ipv6-name IPV6WAN_IN {
default-action drop
description "IPV6WAN to Internal"
rule 10 {
action accept
description "Allow established/related"
log disable
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow ICMPV6"
protocol ipv6-icmp
}
}
ipv6-name IPV6WAN_LOCAL {
default-action drop
description "IPV6WAN to Router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow ICMPv6"
icmpv6 {
}
protocol ipv6-icmp
}
rule 40 {
action accept
description "Allow DHCPv6"
destination {
port 546
}
protocol udp
source {
port 547
}
}
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians disable
name LAN_IN {
default-action accept
rule 1 {
action drop
description "Drop Invalid State"
log disable
state {
invalid enable
}
}
}
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action accept
description "Allow ICMP"
log disable
protocol icmp
}
rule 30 {
action accept
description "Allow L2TP"
destination {
port 500,1701,4500
}
log disable
protocol udp
}
rule 40 {
action accept
description "Allow ESP"
log disable
protocol esp
}
rule 50 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address 192.168.1.1/24
description Local
dhcp-options {
default-route update
default-route-distance 210
name-server no-update
}
duplex auto
firewall {
in {
name LAN_IN
}
}
speed auto
}
ethernet eth1 {
address dhcp
description Internet
dhcp-options {
default-route update
default-route-distance 210
name-server update
}
dhcpv6-pd {
pd 0 {
interface eth0 {
host-address ::1
prefix-id :1
service slaac
}
prefix-length /60
}
rapid-commit enable
}
duplex auto
firewall {
in {
ipv6-name IPV6WAN_IN
name WAN_IN
}
local {
ipv6-name IPV6WAN_LOCAL
name WAN_LOCAL
}
}
speed auto
}
ethernet eth2 {
address 192.168.2.1/24
description "Local 2"
disable
duplex auto
speed auto
}
loopback lo {
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN1 {
authoritative enable
subnet 192.168.1.0/24 {
default-router 192.168.1.1
dns-server 192.168.1.1
lease 86400
start 192.168.1.21 {
stop 192.168.1.240
}
use-dnsmasq disable
}
dns {
forwarding {
cache-size 150
listen-on eth0
options listen-address=192.168.1.1
}
}
gui {
http-port 80
https-port 443
older-ciphers disable
}
nat {
rule 5010 {
outbound-interface eth1
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
host-name ubnt
login {
user ubnt {
authentication {
encrypted-password ****************
plaintext-password ****************
}
full-name ""
level admin
}
}
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
offload {
hwnat disable
ipsec disable
ipv4 {
forwarding enable
}
ipv6 {
forwarding enable
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone America/New_York
traffic-analysis {
dpi disable
export disable
}
}
vpn {
ipsec {
auto-firewall-nat-exclude disable
ipsec-interfaces {
interface eth1
}
nat-networks {
allowed-network 0.0.0.0/0 {
}
}
nat-traversal enable
}
l2tp {
remote-access {
authentication {
local-users {
username rschmidt3 {
password ****************
}
}
mode local
}
client-ip-pool {
start 192.168.1.10
stop 192.168.1.12
}
dhcp-interface eth1
dns-servers {
server-1 75.75.75.75
server-2 75.75.76.76
}
}
ipsec-settings {
authentication {
mode pre-shared-secret
pre-shared-secret ****************
}
ike-lifetime 3600
}
}
}
}