I am try to setup a site to site vpn in our lab. I had it working last week and all the sudden I couldn't get it connected. So I reset it back to factor and set it up from scratch and I still have nothing.
Any thoughts on the config? It was very easy to setup the first time. I am able to ping both WAN interfaces from the opposite router.
Router 1
interfaces { ethernet eth0 { address 192.168.0.1/24 duplex auto speed auto } ethernet eth1 { address 10.1.50.52/24 duplex auto speed auto } ethernet eth2 { duplex auto speed auto } loopback lo { } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth0 wan-interface eth1 } service { dhcp-server { disabled false hostfile-update disable shared-network-name Local { authoritative disable subnet 192.168.0.0/24 { default-router 192.168.0.1 dns-server 192.168.0.1 lease 86400 start 192.168.0.100 { stop 192.168.0.200 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth0 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { description Outbound log disable outbound-interface eth1 type masquerade } } ssh { port 22 protocol-version v2 } } system { gateway-address 10.1.50.1 host-name ubnt login { user ubnt { authentication { encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66. } level admin } } name-server 8.8.8.8 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } vpn { ipsec { auto-firewall-nat-exclude enable esp-group FOO0 { compression disable lifetime 3600 mode tunnel pfs enable proposal 1 { encryption aes128 hash sha1 } } ike-group FOO0 { ikev2-reauth no key-exchange ikev1 lifetime 28800 proposal 1 { dh-group 14 encryption aes128 hash sha1 } } site-to-site { peer 10.1.50.51 { authentication { mode pre-shared-secret pre-shared-secret 1234 } connection-type initiate description "Peer 2" ike-group FOO0 ikev2-reauth inherit local-address any tunnel 1 { allow-nat-networks disable allow-public-networks disable esp-group FOO0 local { prefix 192.168.0.0/24 } remote { prefix 192.168.1.0/24 } } } } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */
Router 2
interfaces { ethernet eth0 { address 192.168.1.1/24 duplex auto speed auto } ethernet eth1 { address 10.1.50.51/24 duplex auto speed auto } ethernet eth2 { duplex auto speed auto } loopback lo { } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth0 wan-interface eth1 } service { dhcp-server { disabled false hostfile-update disable shared-network-name Local { authoritative disable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.100 { stop 192.168.1.200 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth0 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { description Outbound log disable outbound-interface eth1 type masquerade } } ssh { port 22 protocol-version v2 } } system { gateway-address 10.1.50.1 host-name ubnt login { user ubnt { authentication { encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66. } level admin } } name-server 8.8.8.8 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } vpn { ipsec { auto-firewall-nat-exclude enable esp-group FOO0 { compression disable lifetime 3600 mode tunnel pfs enable proposal 1 { encryption aes128 hash sha1 } } ike-group FOO0 { ikev2-reauth no key-exchange ikev1 lifetime 28800 proposal 1 { dh-group 14 encryption aes128 hash sha1 } } site-to-site { peer 10.1.50.52 { authentication { mode pre-shared-secret pre-shared-secret 1234 } connection-type initiate description "Peer 1" ike-group FOO0 ikev2-reauth inherit local-address any tunnel 1 { allow-nat-networks disable allow-public-networks disable esp-group FOO0 local { prefix 192.168.1.0/24 } remote { prefix 192.168.0.0/24 } } } } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */