Quantcast
Viewing all articles
Browse latest Browse all 20028

ERL - (1.9.0): IPSec/L2TP server crashes after about 12 hours?

Morning,

I've got an L2TP remote access VPN setup. Works just fine, from reboot, until approximately 12 hours later, then I can no longer make any connections until I reboot the firewall, which will then work again, for about 12 more hours.

Obviously this isn't a reasonable solution for remote access. Config is below. Have I made a mistake?

Thanks!

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group L2TP_Addresses {
            address 192.168.18.10-192.168.18.15
        }
        address-group OpenVPN_Exclusions {
            address 192.168.17.30-192.168.17.40
            description "Addresses Excluded from VPN Routing"
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    modify SOURCE_ROUTE {
        rule 5 {
            action modify
            description L2TP_Access
            destination {
                group {
                    address-group L2TP_Addresses
                }
            }
            modify {
                table main
            }
        }
        rule 10 {
            action modify
            description "Excluded from VPN"
            modify {
                table main
            }
            source {
                group {
                    address-group OpenVPN_Exclusions
                }
            }
        }
        rule 20 {
            action modify
            modify {
                table 1
            }
            source {
                address 192.168.17.0/24
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            log disable
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description "Allow L2TP"
            destination {
                port 500,1701,4500
            }
            log disable
            protocol udp
        }
        rule 30 {
            action accept
            description "Allow ESP"
            log disable
            protocol esp
        }
        rule 40 {
            action drop
            description "Drop invalid state"
            log disable
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.17.1/24
        description Local
        duplex auto
        firewall {
            in {
                modify SOURCE_ROUTE
            }
        }
        speed auto
    }
    ethernet eth1 {
        address dhcp
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth2 {
        address 192.168.2.1/24
        description "Local 2"
        duplex auto
        speed auto
    }
    loopback lo {
    }
    openvpn vtun0 {
        config-file /config/auth/USSiliconValley.ovpn
    }
}
protocols {
    static {
        table 1 {
            interface-route 0.0.0.0/0 {
                next-hop-interface vtun0 {
                }
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name ***REDACTED*** {
            authoritative disable
            subnet 192.168.17.0/24 {
                default-router 192.168.17.1
                dns-server ***REDACTED***
                lease 86400
                start 192.168.17.100 {
                    stop 192.168.17.200
                }
                unifi-controller ***REDACTED***
            }
        }
        use-dnsmasq disable
    }
    dns {
        dynamic {
            interface eth1 {
                service afraid {
                    host-name ***REDACTED***
                    login ***REDACTED***
                    password ***REDACTED***
                    protocol ***REDACTED***
                    server ***REDACTED***
                }
            }
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description "Excluded from PIA NAT"
            log disable
            outbound-interface eth1
            type masquerade
        }
        rule 5001 {
            description "NAT to VPN"
            log disable
            outbound-interface vtun0
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    domain-name ***REDACTED***
    host-name ***REDACTED***
    login {
        user ***REDACTED*** {
            authentication {
                encrypted-password ***REDACTED***
                plaintext-password ***REDACTED***
            }
            full-name "***REDACTED***"
            level admin
        }
    }
    name-server ***REDACTED***
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec enable
        ipv4 {
            forwarding enable
            gre enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/Los_Angeles
}
vpn {
    ipsec {
        auto-firewall-nat-exclude disable
        ipsec-interfaces {
            interface eth1
        }
        nat-networks {
            allowed-network 0.0.0.0/0 {
            }
        }
        nat-traversal enable
    }
    l2tp {
        remote-access {
            authentication {
                local-users {
                    username ***REDACTED*** {
                        password ***REDACTED***
                    }
                }
                mode local
                require mschap-v2
            }
            client-ip-pool {
                start 192.168.18.10
                stop 192.168.18.15
            }
            dhcp-interface eth1
            dns-servers {
                server-1 ***REDACTED***
            }
            ipsec-settings {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret ****************
                }
                ike-lifetime 3600
            }
        }
    }
}

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles