Morning,
I've got an L2TP remote access VPN setup. Works just fine, from reboot, until approximately 12 hours later, then I can no longer make any connections until I reboot the firewall, which will then work again, for about 12 more hours.
Obviously this isn't a reasonable solution for remote access. Config is below. Have I made a mistake?
Thanks!
firewall { all-ping enable broadcast-ping disable group { address-group L2TP_Addresses { address 192.168.18.10-192.168.18.15 } address-group OpenVPN_Exclusions { address 192.168.17.30-192.168.17.40 description "Addresses Excluded from VPN Routing" } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable modify SOURCE_ROUTE { rule 5 { action modify description L2TP_Access destination { group { address-group L2TP_Addresses } } modify { table main } } rule 10 { action modify description "Excluded from VPN" modify { table main } source { group { address-group OpenVPN_Exclusions } } } rule 20 { action modify modify { table 1 } source { address 192.168.17.0/24 } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" log disable state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action accept description "Allow L2TP" destination { port 500,1701,4500 } log disable protocol udp } rule 30 { action accept description "Allow ESP" log disable protocol esp } rule 40 { action drop description "Drop invalid state" log disable state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 192.168.17.1/24 description Local duplex auto firewall { in { modify SOURCE_ROUTE } } speed auto } ethernet eth1 { address dhcp description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth2 { address 192.168.2.1/24 description "Local 2" duplex auto speed auto } loopback lo { } openvpn vtun0 { config-file /config/auth/USSiliconValley.ovpn } } protocols { static { table 1 { interface-route 0.0.0.0/0 { next-hop-interface vtun0 { } } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name ***REDACTED*** { authoritative disable subnet 192.168.17.0/24 { default-router 192.168.17.1 dns-server ***REDACTED*** lease 86400 start 192.168.17.100 { stop 192.168.17.200 } unifi-controller ***REDACTED*** } } use-dnsmasq disable } dns { dynamic { interface eth1 { service afraid { host-name ***REDACTED*** login ***REDACTED*** password ***REDACTED*** protocol ***REDACTED*** server ***REDACTED*** } } } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { description "Excluded from PIA NAT" log disable outbound-interface eth1 type masquerade } rule 5001 { description "NAT to VPN" log disable outbound-interface vtun0 protocol all type masquerade } } ssh { port 22 protocol-version v2 } } system { domain-name ***REDACTED*** host-name ***REDACTED*** login { user ***REDACTED*** { authentication { encrypted-password ***REDACTED*** plaintext-password ***REDACTED*** } full-name "***REDACTED***" level admin } } name-server ***REDACTED*** ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipsec enable ipv4 { forwarding enable gre enable } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone America/Los_Angeles } vpn { ipsec { auto-firewall-nat-exclude disable ipsec-interfaces { interface eth1 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable } l2tp { remote-access { authentication { local-users { username ***REDACTED*** { password ***REDACTED*** } } mode local require mschap-v2 } client-ip-pool { start 192.168.18.10 stop 192.168.18.15 } dhcp-interface eth1 dns-servers { server-1 ***REDACTED*** } ipsec-settings { authentication { mode pre-shared-secret pre-shared-secret **************** } ike-lifetime 3600 } } } }