Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

One Way IPSec VPN Traffic with WAN Failover

$
0
0

I've been trying to get this IPSec VPN setup successfully for a while now, but it just got moved up on the priority list. Here is what I have:

 

Main Office

EdgeRouterPoE - Firmware v1.9.0

WAN1 - Cable Internet - Shown in configs as 68.123.123.210 (not real IP)

WAN2 - DSL set as Failover

Local Network 192.168.25.0/24

 

 

Remote Office

EdgeRouterPoE - Firmware v1.9.0

WAN1 - Cable Internet - DHCP with DynDNS host - shown in configs as remote-office.dyndns.org (not real)

Local Network 192.168.15.0/24

 

After reading through many posts and adjusting settings, I've gotten to the point where from the Main Office, I can access devices at the remote office, but not the other way around (which is ultimatly what we need). 

 

Here are the configs:

 

Edits made for security: 

Public IPs Changed throughout the configs

Dyndns hostname changed

 

Main Office Config:

mossytech@ubnt:~$ show configuration
firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group PRIVATE_NETS {
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
        port-group VIPRE-PORTS {
            description ""
            port 8123
            port 18082
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify balance {
        rule 10 {
            action modify
            description "do NOT load balance lan to lan"
:
firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group PRIVATE_NETS {
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
        port-group VIPRE-PORTS {
            description ""
            port 8123
            port 18082
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify balance {
        rule 10 {
            action modify
            description "do NOT load balance lan to lan"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            modify {
                table main
            }
        }
        rule 20 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth0
                }
            }
            modify {
                table main
            }
        }
        rule 30 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_pppoe1
                }
            }
            modify {
                table main
            }
        }
        rule 70 {
            action modify
            modify {
                lb-group G
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description Screenconnect
            destination {
                address 192.168.25.201
                port 8040-8041
            }
            log disable
            protocol tcp_udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 30 {
            action accept
            description VIPRE
            destination {
                address 192.168.25.20
                group {
                    port-group VIPRE-PORTS
                }
            }
            log disable
            protocol tcp_udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 40 {
            action accept
            description "PPTP VPN"
            destination {
                address 192.168.25.1
                port 1723
            }
            log disable
            protocol tcp_udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 50 {
            action accept
            description "Alan RDP Allow"
            log disable
            protocol tcp
            source {
                address 71.123.123.139
                port 3389
            }
        }
        rule 60 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action accept
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    options {
        mss-clamp {
            mss 1412
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 68.123.123.210/29
        address 68.123.123.212/29
        description WAN
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        poe {
            output off
        }
        speed auto
    }
    ethernet eth1 {
        description "WAN 2"
        duplex auto
        poe {
            output off
        }
        pppoe 1 {
            default-route auto
            firewall {
                in {
                    name WAN_IN
                }
                local {
                    name WAN_LOCAL
                }
            }
            mtu 1492
            name-server auto
            password ****************
            user-id mossytechllc@qwest.net
        }
        speed auto
    }
    ethernet eth2 {
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth3 {
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth4 {
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        address 192.168.25.5/24
        description Local
        firewall {
            in {
                modify balance
            }
        }
        mtu 1500
        switch-port {
            interface eth2 {
            }
            interface eth3 {
            }
            interface eth4 {
            }
            vlan-aware disable
        }
        vif 20 {
            address 10.0.1.1/24
            description "PUBLIC WiFi"
            mtu 1500
        }
    }
}
load-balance {
    group G {
        interface eth0 {
        }
        interface pppoe1 {
            failover-only
        }
        transition-script /usr/sbin/ubnt-add-connected.pl
    }
}

protocols {
    static {
        route 0.0.0.0/0 {
            next-hop 68.123.123.209 {
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name PUBLIC-WIFI {
            authoritative disable
            subnet 10.0.1.0/24 {
                default-router 10.0.1.1
                dns-server 8.8.8.8
                dns-server 208.67.222.222
                lease 86400
                start 10.0.1.5 {
                    stop 10.0.1.250
                }
                unifi-controller 166.78.113.96
            }
        }
    }
    dns {
        forwarding {
            cache-size 150
            listen-on switch0
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 1 {
            description Screenconnect
            destination {
                address 68.123.123.210
                port 8040-8041
            }
            inbound-interface eth0
            inside-address {
                address 192.168.25.201
                port 8040-8041
            }
            log disable
            protocol tcp_udp
            type destination
        }
        rule 2 {
            description VIPRE
            destination {
                address 68.123.123.212
                group {
                    port-group VIPRE-PORTS
                }
            }
            inbound-interface eth0
            inside-address {
                address 192.168.25.20
            }
            log disable
            protocol all
            type destination
        }
        rule 3 {
            description "PPTP VPN"
            destination {
                address 68.123.123.210
                port 1723
            }
            inbound-interface eth0
            inside-address {
                address 192.168.25.1
                port 1723
            }
            log disable
            protocol tcp_udp
            type destination
        }
        rule 5000 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
        rule 5002 {
            description "masquerade for WAN 2"
            outbound-interface pppoe1
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    host-name ubnt
    login {
        user mossytech {
            authentication {
                encrypted-password ****************
            }
            level admin
        }
    }
    name-server 208.67.222.222
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipv4 {
            forwarding enable
            pppoe enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/Los_Angeles
    traffic-analysis {
        dpi enable
        export enable
    }
}
traffic-control {
    smart-queue VoIP {
        download {
            ecn enable
            flows 1024
            fq-quantum 1514
            limit 10240
            rate 60mbit
        }
        upload {
            ecn enable
            flows 1024
            fq-quantum 1514
            limit 10240
            rate 4mbit
        }
        wan-interface eth0
    }
    smart-queue VoIP-pppoe {
        download {
            ecn enable
            flows 1024
            fq-quantum 1514
            limit 10240
            rate 10mbit
        }
        upload {
            ecn enable
            flows 1024
            fq-quantum 1514
            limit 10240
            rate 1mbit
        }
        wan-interface eth1
    }
}
vpn {
    ipsec {
        auto-firewall-nat-exclude enable
        esp-group FOO0 {
            proposal 1 {
                encryption aes128
                hash sha1
            }
        }
        ike-group FOO0 {
            proposal 1 {
                dh-group 14
                encryption aes128
                hash sha1
            }
        }
        site-to-site {
            peer remote-office.dyndns.org {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret ****************
                }
                connection-type initiate
                description MT
                ike-group FOO0
                local-address 68.123.123.210
                tunnel 1 {
                    esp-group FOO0
                    local {
                        prefix 192.168.25.0/24
                    }
                    remote {
                        prefix 192.168.15.0/24
                    }
                }
            }
        }
    }
}

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>