Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

VPN IPSec Site to Site + Load Balance

$
0
0

Hello all , im new here but i have some questions about EdgeRouter Pro 

 

we trying to configure a load balancing + PPPoE interfaces + VPN IpSec Site to Site,

we have almost all configured but we have some troubles with the VPN 

 

the situation is the next one:  we have 2 interfaces conected via ethernet with PPPoE 
Eth4 and Eth5;

we have one LAN at Eth0 with 192.168100.0/24;

we have a VPN IpSec Site to Site with one cisco RV042;

The remote network is 192.168.1.0/24

 

at the last try we could establish VPN site to site and we can do ping from 192.168.1.252(Private Cisco RV042 ip) to 192.168.100.1(Private EdgeRouter IP) but we couldn't reach the lan network 192.168.100.200(PC ip address)

looking into the logs we could see the traffic comes back from lan but EdgeRouter send this traffic to internet

 

the question is ¿How we can do this traffic how came from VPN gets back to VPN??

 

here is my las configuration, i hope could help us

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group PEERS_VPN {
            address xxx.xxx.xxx.xxx
            description "PEERs from VPNs"
        }
        network-group LAN_VPN {
            description "Remote LAN Networks from VPNs"
            network 192.168.1.0/24
        }
        network-group PRIVATE_NETS {
            network 192.168.100.0/24
        }
        port-group MGMT_PORTS {
            description "Ports to manage Router"
            port 22
            port XXXXXX
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify balance {
        rule 8 {
            action modify
            description "Do NOT load balance remote PEER VPNs"
            destination {
                group {
                    address-group PEERS_VPN
                }
            }
            modify {
                table main
            }
        }
        rule 9 {
            action accept
            description "Do NOT load balance remote LAN VPNs"
            destination {
                group {
                    network-group LAN_VPN
                }
            }
            ipsec {
                match-ipsec
            }
            log enable
            protocol all
            source {
                group {
                    network-group PRIVATE_NETS
                }
            }
        }
        rule 10 {
            action modify
            description "do NOT load balance lan to lan"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            modify {
                table main
            }
        }
        rule 60 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_pppoe4
                }
            }
            modify {
                table main
            }
        }
        rule 70 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_pppoe5
                }
            }
            modify {
                table main
            }
        }
        rule 100 {
            action modify
            modify {
                lb-group G
            }
        }
    }
    name TO_LAN_IPV4 {
        default-action drop
        description "Traffic thru Router from WAN to LAN"
        rule 10 {
            action accept
            description "Allow IPSEC Traffic"
            log enable
            protocol all
            source {
                group {
                    address-group PEERS_VPN
                }
            }
        }
        rule 20 {
            action accept
            description "To LAN VPNs from LAN"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            log enable
            protocol all
            source {
                group {
                    network-group LAN_VPN
                }
            }
        }
        rule 30 {
            action accept
            description "Allow established and related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 40 {
            action drop
            description "Default Rule"
            log enable
            protocol all
        }
    }
    name TO_ROUTER_IPV4 {
        default-action drop
        description "Traffic to router from WAN"
        rule 10 {
            action accept
            description "Allow ISAKMP Traffic"
            destination {
                port 500
            }
            log enable
            protocol tcp_udp
        }
        rule 20 {
            action accept
            description "Allow IPSEC Traffic"
            log enable
            protocol all
            source {
                group {
                    address-group PEERS_VPN
                }
            }
        }
        rule 30 {
            action accept
            description "Allow LAN VPNs to local LAN"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            log disable
            protocol all
            source {
                group {
                    network-group LAN_VPN
                }
            }
        }
        rule 40 {
            action accept
            description "Ports to manage Router"
            destination {
                group {
                    port-group MGMT_PORTS
                }
            }
            log disable
            protocol tcp
        }
        rule 50 {
            action accept
            description "Allow all esp traffic"
            log disable
            protocol esp
        }
        rule 60 {
            action accept
            description "Allow established and related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 70 {
            action accept
            description "Allow ICMP from anywhere"
            log disable
            protocol icmp
        }
        rule 80 {
            action drop
            description "Drop Rule"
            log enable
            protocol all
        }
    }
    options {
        mss-clamp {
            mss 1412
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.100.1/24
        description Local
        duplex auto
        firewall {
            in {
                modify balance
            }
            out {
                name TO_ROUTER_IPV4
            }
        }
        speed auto
    }
    ethernet eth1 {
        duplex auto
        speed auto
    }
    ethernet eth2 {
        duplex auto
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        description WAN
        duplex auto
        pppoe 4 {
            default-route auto
            firewall {
                in {
                    name TO_LAN_IPV4
                }
                local {
                    name TO_ROUTER_IPV4
                }
            }
            mtu 1492
            name-server auto
            password xxxxxxxxxxxxx
            user-id xxxxxxxxxxxxxx
        }
        speed auto
    }
    ethernet eth5 {
        description "WAN 2"
        duplex auto
        pppoe 5 {
            default-route auto
            firewall {
                in {
                    name TO_LAN_IPV4
                }
                local {
                    name TO_ROUTER_IPV4
                }
            }
            mtu 1492
            name-server auto
            password xxxxxxxxxx
            user-id xxxxxxxxxxx
        }
        speed auto
    }
    ethernet eth6 {
        duplex auto
        speed auto
    }
    ethernet eth7 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
load-balance {
    group G {
        interface pppoe4 {
        }
        interface pppoe5 {
        }
        lb-local enable
    }
}
protocols {
    static {
        table 1 {
            description Test
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative enable
            subnet 192.168.100.0/24 {
                default-router 192.168.100.1
                dns-server 192.168.100.1
                lease 86400
                start 192.168.100.100 {
                    stop 192.168.100.199
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth0
        }
    }
    gui {
        http-port 80
        https-port 65534
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description "Exclude VPN peers from NAT to WAN"
            destination {
                group {
                    address-group PEERS_VPN
                }
            }
            exclude
            log enable
            outbound-interface pppoe4
            protocol all
            type masquerade
        }
        rule 5001 {
            description "Exclude VPN LANs from NAT to WAN"
            destination {
                group {
                    network-group LAN_VPN
                }
            }
            exclude
            log enable
            outbound-interface pppoe4
            protocol all
            type masquerade
        }
        rule 5002 {
            description "Exclude VPN peers from NAT to WAN2"
            destination {
                group {
                    address-group PEERS_VPN
                }
            }
            exclude
            log enable
            outbound-interface pppoe5
            protocol all
            type masquerade
        }
        rule 5003 {
            description "Exclude VPN LANs from NAT to WAN2"
            destination {
                group {
                    network-group LAN_VPN
                }
            }
            exclude
            log enable
            outbound-interface pppoe5
            protocol all
            type masquerade
        }
        rule 5004 {
            description "masquerade for WAN"
            outbound-interface pppoe4
            type masquerade
        }
        rule 5005 {
            description "masquerade for WAN 2"
            outbound-interface pppoe5
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
    telnet {
        port 6589
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    host-name ubnt
    login {
        user xxxxxxx {
            authentication {
                encrypted-password xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
            }
            level admin
        }
    }
    ntp {
        server 0.north-america.pool.ntp.org {
        }
        server 1.north-america.pool.ntp.org {
        }
        server 2.north-america.pool.ntp.org {
        }
        server 3.north-america.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec enable
        ipv4 {
            forwarding enable
            pppoe enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Mexico/General
    traffic-analysis {
        dpi enable
        export enable
    }
}
vpn {
    ipsec {
        auto-firewall-nat-exclude disable
        esp-group XXXXXXX {
            compression disable
            lifetime 3600
            mode tunnel
            pfs dh-group1
            proposal 1 {
                encryption 3des
                hash sha1
            }
        }
        esp-group XXXXXX {
            compression disable
            lifetime 86400
            mode tunnel
            pfs dh-group5
            proposal 1 {
                encryption aes256
                hash sha1
            }
        }
        ike-group XXXXXX {
            dead-peer-detection {
                action hold
                interval 30
                timeout 30
            }
            ikev2-reauth no
            key-exchange ikev1
            lifetime 28800
            proposal 1 {
                dh-group 2
                encryption 3des
                hash sha1
            }
        }
        ike-group XXXX {
            dead-peer-detection {
                action hold
                interval 30
                timeout 30
            }
            ikev2-reauth no
            key-exchange ikev1
            lifetime 86400
            proposal 1 {
                dh-group 5
                encryption aes256
                hash sha1
            }
        }
        ipsec-interfaces {
            interface pppoe4
        }
        site-to-site {
            peer xxx.xxx.xxx.xxx {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret xxxxxxxxxxx
                }
                connection-type initiate
                description TEST_VPN
                force-encapsulation disable
                ike-group XXXXXXXXXX
                ikev2-reauth inherit
                local-address XXX.XXX.XXX.XXX
                tunnel 1 {
                    allow-nat-networks disable
                    allow-public-networks disable
                    esp-group XXXXXXXXXX
                    local {
                        prefix 192.168.100.0/24
                    }
                    remote {
                        prefix 192.168.1.0/24
                    }
                }
            }
        }
    }
}

 

tnx for your comments

 

regards  

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>