Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

How do I enable VPN Passthrough in Edge OS

$
0
0

I'm not able to establish a VPN PPTP connection from any host in the network. When I bypass the EdgeRouter everything works fine. I also tried with an old Netgear Firewall and it worked as well.

I have read many post about this issue, so far I have tried disabling the firewall, adding rules for the GRE protocol but nothing has worked. 

 

Here is the router config. Any ideas about what I am missing?

 

firewall {                                                                      
    all-ping enable                                                             
    broadcast-ping disable                                                      
    ipv6-receive-redirects disable                                              
    ipv6-src-route disable                                                      
    ip-src-route disable                                                        
    log-martians enable                                                         
    name WAN_IN {                                                               
        default-action accept                                                   
        description "WAN to internal"                                           
        rule 10 {                                                               
            action accept                                                       
            description "Allow established/related"                             
            state {                                                             
                established enable                                              
                related enable                                                  
            }                                                                   
        }                                                                       
        rule 30 {                                                               
            action drop                                                         
            description "Drop invalid state"                                    
            state {                                                             
                invalid enable                                                  
            }
        }                                                                       
    }                                                                           
    name WAN_LOCAL {                                                            
        default-action drop                                                     
        description "WAN to router"                                             
        rule 10 {                                                               
            action accept                                                       
            description "Allow established/related"                             
            state {                                                             
                established enable                                              
                related enable                                                  
            }                                                                   
        }                                                                       
        rule 20 {                                                               
            action accept                                                       
            description "Allow GRE"                                             
            log disable                                                         
            protocol gre                                                        
            state {                                                             
                established disable                                             
                invalid disable                                                 
                new enable                                                      
                related disable
            }
        }
        rule 30 {
            action accept
            description "Allow ICMP"
            log disable
            protocol icmp
        }
        rule 40 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    bridge br0 {
        address 10.200.100.1/24
        description "Local Bridge"
        promiscuous enable
        vif 2 {
            address 192.168.0.1/24
            description "Guest Internet Access"
        }
    }
    ethernet eth0 {
        address dhcp
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        poe {
            output off
        }
        speed auto
    }
    ethernet eth1 {
        bridge-group {
            bridge br0
        }
        description "Local Bridge"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth2 {
        description "Local Bridge"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth3 {
        description "Local Bridge"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth4 {
        description "Local Bridge"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        bridge-group {
            bridge br0
        }
        description "Local Bridge"
        switch-port {
            interface eth2 {
            }
            interface eth3 {
            }
            interface eth4 {
            }
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface br0
    rule 1 {
        description "SoftEther VPN"
        forward-to {
            address 10.200.100.200
            port 443
        }
        original-port 443
        protocol tcp_udp
    }
    rule 2 {
        description PBX
        forward-to {
            address 10.200.100.50
            port 5060-5061
        }
        original-port 5060-5061
        protocol tcp_udp
    }
    rule 3 {
        description PBX
        forward-to {
            address 10.200.100.50
            port 10000-20000
        }
        original-port 10000-20000
        protocol udp
    }
    wan-interface eth0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN_BR {
            authoritative enable
            subnet 10.200.100.0/24 {
                default-router 10.200.100.1
                dns-server 10.200.100.1
                lease 86400
                start 10.200.100.38 {
                    stop 10.200.100.243
                }
            }
        }
    }
    dns {
        forwarding {
            cache-size 150
            listen-on br0
        }
    }
    gui {
        https-port 443
    }
    nat {
        rule 5001 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name ubnt
    login {
        user admin {
            authentication {
                encrypted-password ****************
            }
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}

Viewing all articles
Browse latest Browse all 20028

Trending Articles