I've been trying to get this IPSec VPN setup successfully for a while now, but it just got moved up on the priority list. Here is what I have:
Main Office
EdgeRouterPoE - Firmware v1.9.0
WAN1 - Cable Internet - Shown in configs as 68.123.123.210 (not real IP)
WAN2 - DSL set as Failover
Local Network 192.168.25.0/24
Remote Office
EdgeRouterPoE - Firmware v1.9.0
WAN1 - Cable Internet - DHCP with DynDNS host - shown in configs as remote-office.dyndns.org (not real)
Local Network 192.168.15.0/24
After reading through many posts and adjusting settings, I've gotten to the point where from the Main Office, I can access devices at the remote office, but not the other way around (which is ultimatly what we need).
Here are the configs:
Edits made for security:
Public IPs Changed throughout the configs
Dyndns hostname changed
Main Office Config:
mossytech@ubnt:~$ show configuration firewall { all-ping enable broadcast-ping disable group { network-group PRIVATE_NETS { network 192.168.0.0/16 network 172.16.0.0/12 network 10.0.0.0/8 } port-group VIPRE-PORTS { description "" port 8123 port 18082 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify balance { rule 10 { action modify description "do NOT load balance lan to lan" : firewall { all-ping enable broadcast-ping disable group { network-group PRIVATE_NETS { network 192.168.0.0/16 network 172.16.0.0/12 network 10.0.0.0/8 } port-group VIPRE-PORTS { description "" port 8123 port 18082 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify balance { rule 10 { action modify description "do NOT load balance lan to lan" destination { group { network-group PRIVATE_NETS } } modify { table main } } rule 20 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth0 } } modify { table main } } rule 30 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_pppoe1 } } modify { table main } } rule 70 { action modify modify { lb-group G } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action accept description Screenconnect destination { address 192.168.25.201 port 8040-8041 } log disable protocol tcp_udp state { established enable invalid disable new enable related enable } } rule 30 { action accept description VIPRE destination { address 192.168.25.20 group { port-group VIPRE-PORTS } } log disable protocol tcp_udp state { established enable invalid disable new enable related enable } } rule 40 { action accept description "PPTP VPN" destination { address 192.168.25.1 port 1723 } log disable protocol tcp_udp state { established enable invalid disable new enable related enable } } rule 50 { action accept description "Alan RDP Allow" log disable protocol tcp source { address 71.123.123.139 port 3389 } } rule 60 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action accept description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } options { mss-clamp { mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 68.123.123.210/29 address 68.123.123.212/29 description WAN duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } poe { output off } speed auto } ethernet eth1 { description "WAN 2" duplex auto poe { output off } pppoe 1 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server auto password **************** user-id mossytechllc@qwest.net } speed auto } ethernet eth2 { duplex auto poe { output off } speed auto } ethernet eth3 { duplex auto poe { output off } speed auto } ethernet eth4 { duplex auto poe { output off } speed auto } loopback lo { } switch switch0 { address 192.168.25.5/24 description Local firewall { in { modify balance } } mtu 1500 switch-port { interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } vif 20 { address 10.0.1.1/24 description "PUBLIC WiFi" mtu 1500 } } } load-balance { group G { interface eth0 { } interface pppoe1 { failover-only } transition-script /usr/sbin/ubnt-add-connected.pl } } protocols { static { route 0.0.0.0/0 { next-hop 68.123.123.209 { } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name PUBLIC-WIFI { authoritative disable subnet 10.0.1.0/24 { default-router 10.0.1.1 dns-server 8.8.8.8 dns-server 208.67.222.222 lease 86400 start 10.0.1.5 { stop 10.0.1.250 } unifi-controller 166.78.113.96 } } } dns { forwarding { cache-size 150 listen-on switch0 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 1 { description Screenconnect destination { address 68.123.123.210 port 8040-8041 } inbound-interface eth0 inside-address { address 192.168.25.201 port 8040-8041 } log disable protocol tcp_udp type destination } rule 2 { description VIPRE destination { address 68.123.123.212 group { port-group VIPRE-PORTS } } inbound-interface eth0 inside-address { address 192.168.25.20 } log disable protocol all type destination } rule 3 { description "PPTP VPN" destination { address 68.123.123.210 port 1723 } inbound-interface eth0 inside-address { address 192.168.25.1 port 1723 } log disable protocol tcp_udp type destination } rule 5000 { description "masquerade for WAN" outbound-interface eth0 type masquerade } rule 5002 { description "masquerade for WAN 2" outbound-interface pppoe1 type masquerade } } ssh { port 22 protocol-version v2 } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } host-name ubnt login { user mossytech { authentication { encrypted-password **************** } level admin } } name-server 208.67.222.222 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipv4 { forwarding enable pppoe enable } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone America/Los_Angeles traffic-analysis { dpi enable export enable } } traffic-control { smart-queue VoIP { download { ecn enable flows 1024 fq-quantum 1514 limit 10240 rate 60mbit } upload { ecn enable flows 1024 fq-quantum 1514 limit 10240 rate 4mbit } wan-interface eth0 } smart-queue VoIP-pppoe { download { ecn enable flows 1024 fq-quantum 1514 limit 10240 rate 10mbit } upload { ecn enable flows 1024 fq-quantum 1514 limit 10240 rate 1mbit } wan-interface eth1 } } vpn { ipsec { auto-firewall-nat-exclude enable esp-group FOO0 { proposal 1 { encryption aes128 hash sha1 } } ike-group FOO0 { proposal 1 { dh-group 14 encryption aes128 hash sha1 } } site-to-site { peer remote-office.dyndns.org { authentication { mode pre-shared-secret pre-shared-secret **************** } connection-type initiate description MT ike-group FOO0 local-address 68.123.123.210 tunnel 1 { esp-group FOO0 local { prefix 192.168.25.0/24 } remote { prefix 192.168.15.0/24 } } } } } }