Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

L2TP VPN remote access - Unable to send/receive broadcast traffic (I think)

$
0
0

Hello,

 

I have an IPSEC L2TP remote-access vpn configured on my ERL. What I am trying to accomplish is to use Steam's Home Streaming capabilities to remotely run games over the VPN connection. Unfortunately, the remote access machine nor the machine on the local network will detect eachother in Steam. The remote-access machine also is unable to auto discover any devices on the network, but can manually browse to them by local IP. They are able to ping directly to eachother, and I am able to reach any network resources on the LAN 10.69.69.0/24 network. Based on the fact that my laptop shows as having a 10.69.69.240/32 address, and the previous symptoms. It seems that it is routing the traffic between them, and thus not transporting broadcast traffic.

Here is my ERL config ; IPconfig of the VPN interface on my laptop ; laptop's "route print" 

 

 firewall {
     all-ping enable
     broadcast-ping disable
     ipv6-name LAN-IN {
         default-action drop
         description "Traffic into LAN interface"
         rule 10 {
             action accept
             description "icmpv6 allowed"
             protocol icmpv6
         }
     }
     ipv6-name WAN6-IN {
         default-action drop
         description "WAN inbound to LAN"
         rule 10 {
             action accept
             description "Allow established/related sessions"
             state {
                 established enable
                 related enable
             }
         }
         rule 20 {
             action drop
             description "Drop invalid state"
             state {
                 invalid enable
             }
         }
         rule 30 {
             action accept
             description "Allow ipv6 icmp"
             protocol ipv6-icmp
         }
     }
     ipv6-name WAN6_LOCAL {
         default-action drop
         description "WAN inbound to router"
         enable-default-log
         rule 10 {
             action accept
             description "Allow established/related sessions"
             state {
                 established enable
                 related enable
             }
         }
         rule 20 {
             action drop
             description "Drop invalid state"
             state {
                 invalid enable
             }
         }
         rule 30 {
             action accept
             description "Allow ipv6 icmp"
             protocol ipv6-icmp
         }
         rule 40 {
             action accept
             description "Allow dhcpv6"
             destination {
                 port 546
             }
             protocol udp
             source {
                 port 547
             }
         }
     }
     ipv6-receive-redirects disable
     ipv6-src-route disable
     ip-src-route disable
     log-martians enable
     name WAN_IN {
         default-action drop
         description "Inbound WAN to (W)LAN"
         rule 1 {
             action accept
             description Bittorrent
             destination {
                 port 43794
             }
             log disable
             protocol tcp_udp
         }
         rule 2 {
             action accept
             log disable
             protocol all
             source {
                 address 10.69.1.7
             }
         }
         rule 3 {
             action accept
             description TSPK
             destination {
                 port 9987
             }
             log disable
             protocol udp
             source {
             }
         }
         rule 4 {
             action accept
             description TSPKTCP
             destination {
                 port 10011,30033
             }
             log disable
             protocol tcp
         }
         rule 5 {
             action drop
             log disable
             protocol all
             source {
                 address 10.69.1.0/27
             }
         }
         rule 6 {
             action accept
             description "Allow Established/Related"
             log disable
             protocol all
             state {
                 established enable
                 invalid disable
                 new disable
                 related enable
             }
         }
         rule 7 {
             action drop
             description "Drop Invalid"
             log disable
             protocol all
             state {
                 established disable
                 invalid enable
                 new disable
                 related disable
             }
         }
     }
     name WAN_LOCAL {
         default-action drop
         description "Inbound WAN to Local Router"
         rule 1 {
             action accept
             description "Allow Established/Related"
             log disable
             protocol all
             state {
                 established enable
                 invalid disable
                 new disable
                 related enable
             }
         }
         rule 2 {
             action accept
             description "ssh access"
             destination {
                 port 2222
             }
             log disable
             protocol tcp_udp
         }
         rule 3 {
             action accept
             description "Allow l2tp"
             destination {
                 port 500,1701,4500
             }
             log disable
             protocol udp
         }
         rule 6 {
             action drop
             description "Drop Invalid"
             log disable
             protocol all
             state {
                 established disable
                 invalid enable
                 new disable
                 related disable
             }
         }
         rule 7 {
             action accept
             description "Allow ESP"
             log disable
             protocol esp
         }
         rule 8 {
             action accept
             description "allow icmp"
             log disable
             protocol icmp
         }
     }
     name WLAN_LAN {
         default-action drop
         description ""
         rule 1 {
             action accept
             log disable
             protocol all
             state {
                 established enable
                 invalid disable
                 new disable
                 related disable
             }
         }
         rule 2 {
             action accept
             destination {
                 address 10.69.1.7
             }
             log disable
             protocol all
             source {
                 address 10.69.69.0/24
                 group {
                 }
             }
         }
         rule 3 {
             action drop
             log disable
             protocol all
             state {
                 established disable
                 invalid enable
                 new disable
                 related disable
             }
         }
     }
     receive-redirects disable
     send-redirects enable
     source-validation disable
     syn-cookies enable
 }
 interfaces {
     ethernet eth0 {
         address 10.69.69.1/24
         description LAN
         duplex auto
         speed auto
     }
     ethernet eth1 {
         address dhcp
         description WAN
         dhcpv6-pd {
             pd 0 {
                 interface eth0 {
                     service slaac
                 }
                 prefix-length 64
             }
             rapid-commit enable
         }
         duplex auto
         firewall {
             in {
                 ipv6-name WAN6-IN
                 name WAN_IN
             }
             local {
                 ipv6-name WAN6_LOCAL
                 name WAN_LOCAL
             }
         }
         speed auto
     }
     ethernet eth2 {
         address 10.69.1.1/27
         description Wifi
         duplex auto
         speed auto
     }
     loopback lo {
     }
 }
 port-forward {
     auto-firewall disable
     hairpin-nat enable
     lan-interface eth0
     rule 1 {
         description BT
         forward-to {
             address 10.69.69.55
         }
         original-port 43794
         protocol tcp_udp
     }
     rule 2 {
         description TSPK
         forward-to {
             address 10.69.69.72
             port 9987
         }
         original-port 9987
         protocol udp
     }
     rule 3 {
         description TSPK
         forward-to {
             address 10.69.69.72
             port 10011
         }
         original-port 10011
         protocol tcp
     }
     rule 4 {
         description TSPK
         forward-to {
             address 10.69.69.72
             port 30033
         }
         original-port 30033
         protocol tcp
     }
     wan-interface eth1
 }
 protocols {
     static {
     }
 }
 service {
     dhcp-server {
         disabled false
         hostfile-update disable
         shared-network-name WLAN {
             authoritative disable
             subnet 10.69.1.0/27 {
                 default-router 10.69.1.1
                 dns-server 10.69.69.1
                 lease 86400
                 start 10.69.1.12 {
                     stop 10.69.1.31
                 }
                 static-mapping EPSON36EE98 {
                     ip-address 10.69.1.7
                     mac-address 44:d2:44:36:ee:98
                 }
             }
         }
         shared-network-name lan {
             authoritative disable
             subnet 10.69.69.0/24 {
                 default-router 10.69.69.1
                 dns-server 10.69.69.1
                 domain-name asgard
                 lease 86400
                 start 10.69.69.100 {
                     stop 10.69.69.200
                 }
                 static-mapping Ansible {
                     ip-address 10.69.69.66
                     mac-address 66:62:65:37:61:38
                 }
                 static-mapping Bunnycam {
                     ip-address 10.69.69.7
                     mac-address ec:1f:72:96:2f:9e
                 }
                 static-mapping DNShole {
                     ip-address 10.69.69.69
                     mac-address 32:65:66:37:36:38
                 }
                 static-mapping HTCCam {
                     ip-address 10.69.69.5
                     mac-address 1c:b0:94:90:03:69
                 }
                 static-mapping MCserver {
                     ip-address 10.69.69.91
                     mac-address 00:0c:29:fd:d7:c9
                 }
                 static-mapping Mimir {
                     ip-address 10.69.69.112
                     mac-address 32:34:65:62:37:35
                 }
                 static-mapping Observium {
                     ip-address 10.69.69.71
                     mac-address 62:61:37:30:64:30
                 }
                 static-mapping TS3Server {
                     ip-address 10.69.69.72
                     mac-address 36:65:31:30:33:39
                 }
                 static-mapping VALHALLA {
                     ip-address 10.69.69.55
                     mac-address 74:d4:35:97:32:4d
                 }
                 static-mapping Winserver {
                     ip-address 10.69.69.60
                     mac-address 00:21:cc:63:af:8d
                 }
                 static-mapping cLeaf1 {
                     ip-address 10.69.69.31
                     mac-address 00:0c:29:d3:c3:b7
                 }
                 static-mapping cLeaf2 {
                     ip-address 10.69.69.32
                     mac-address 00:0c:29:dd:6b:e6
                 }
                 static-mapping cLeaf3 {
                     ip-address 10.69.69.33
                     mac-address 00:0c:29:a4:45:a1
                 }
                 static-mapping cLeaf4 {
                     ip-address 10.69.69.34
                     mac-address 00:0c:29:fc:50:0c
                 }
                 static-mapping cLeaf5 {
                     ip-address 10.69.69.35
                     mac-address 00:0c:29:4d:12:3f
                 }
                 static-mapping cLeaf6 {
                     ip-address 10.69.69.36
                     mac-address 00:0c:29:68:14:f7
                 }
                 static-mapping cSpine1 {
                     ip-address 10.69.69.41
                     mac-address 00:0c:29:fb:f0:5d
                 }
                 static-mapping cSpine2 {
                     ip-address 10.69.69.42
                     mac-address 00:0c:29:ee:a2:e7
                 }
                 static-mapping cumulus {
                     ip-address 10.69.69.43
                     mac-address 00:0c:29:5a:04:cc
                 }
                 static-mapping simulationone {
                     ip-address 10.69.69.222
                     mac-address 50:e5:49:52:3a:41
                 }
             }
         }
     }
     dns {
         forwarding {
             cache-size 2048
             listen-on eth0
             listen-on lo
             listen-on eth2
             listen-on l2tp0
             name-server 8.8.8.8
             name-server 2001:4860:4860::8888
             name-server 2001:4860:4860::8844
             name-server 8.8.4.4
             options expand-hosts
             options bogus-priv
             options localise-queries
             system
         }
     }
     gui {
         https-port 443
     }
     nat {
         rule 5000 {
             description Natout
             log disable
             outbound-interface eth1
             protocol all
             type masquerade
         }
     }
     snmp {
         community asgard {
             authorization ro
         }
         listen-address 10.69.69.1 {
             port 161
         }
     }
     ssh {
         port 2222
         protocol-version v2
     }
     upnp {
         listen-on eth0 {
             outbound-interface eth1
         }
     }
 }
 system {
     host-name ODIN
     login {
         user Simz {
             authentication {
                 encrypted-password $6$a40mMQYybEnm$s5HG1MiYnXBNh3D1cfk2ya6RvDniG7bFoUTtq9R2112Vo4k0I1Xj5Fs2F1LGXkRzd6FG/MdmEdz94ICudkYme1
                 plaintext-password ""
             }
             full-name Simz
             level operator
         }
         user iorm {
             authentication {
                 encrypted-password $6$i49gHHhX$vWMYh/yIP66fJDMN2MXaw2amlgibCzSjc.vDnmtWDtFqQOTA.GTeAem0I8hQAssevv1N/gEX3e8yXpODVj5Bi1
                 plaintext-password ""
             }
             full-name ******
             level admin
         }
     }
     name-server 8.8.8.8
     name-server 2001:4860:4860::8888
     ntp {
         server 0.ubnt.pool.ntp.org {
         }
         server 1.ubnt.pool.ntp.org {
         }
         server 2.ubnt.pool.ntp.org {
         }
         server 3.ubnt.pool.ntp.org {
         }
     }
     offload {
         ipsec enable
         ipv4 {
             forwarding enable
         }
         ipv6 {
             forwarding enable
         }
     }
     package {
         repository wheezy {
             components "main contrib non-free"
             distribution wheezy
             password ""
             url http://http.us.debian.org/debian
             username ""
         }
         repository wheezy-security {
             components main
             distribution wheezy/updates
             password ""
             url http://security.debian.org
             username ""
         }
     }
     syslog {
         global {
             facility all {
                 level notice
             }
             facility protocols {
                 level debug
             }
         }
     }
     time-zone America/Menominee
     traffic-analysis {
         dpi enable
         export enable
     }
 }
 vpn {
     ipsec {
         auto-firewall-nat-exclude enable
         ipsec-interfaces {
             interface eth1
         }
         nat-networks {
             allowed-network 0.0.0.0/0 {
             }
             allowed-network 10.69.69.0/24 {
             }
         }
         nat-traversal enable
     }
     l2tp {
         remote-access {
             authentication {
                 local-users {
                     username iorm {
                         password ******
                     }
                 }
                 mode local
             }
             client-ip-pool {
                 start 10.69.69.240
                 stop 10.69.69.252
             }
             dhcp-interface eth1
             dns-servers {
                 server-1 10.69.69.1
             }
             ipsec-settings {
                 authentication {
                     mode pre-shared-secret
                     pre-shared-secret ********
                 }
                 ike-lifetime 3600
             }
             local-ip 10.69.69.253
             mtu 1492
         }
     }
 }
[edit]

 

PPP adapter Homenet:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Homenet
   Physical Address. . . . . . . . . :
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 10.69.69.240(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.255
   Default Gateway . . . . . . . . . : 0.0.0.0
   DNS Servers . . . . . . . . . . . : 10.69.69.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      172.16.33.1    172.16.33.148   4250
          0.0.0.0          0.0.0.0         On-link      10.69.69.240     26
     10.69.69.240  255.255.255.255         On-link      10.69.69.240    281
        127.0.0.0        255.0.0.0         On-link         127.0.0.1   4531
        127.0.0.1  255.255.255.255         On-link         127.0.0.1   4531
  127.255.255.255  255.255.255.255         On-link         127.0.0.1   4531
      172.16.33.0    255.255.255.0         On-link     172.16.33.148   4506
    172.16.33.148  255.255.255.255         On-link     172.16.33.148   4506
    172.16.33.255  255.255.255.255         On-link     172.16.33.148   4506
    173.174.37.41  255.255.255.255      172.16.33.1    172.16.33.148   4251
        224.0.0.0        240.0.0.0         On-link         127.0.0.1   4531
        224.0.0.0        240.0.0.0         On-link     172.16.33.148   4506
        224.0.0.0        240.0.0.0         On-link      10.69.69.240     26
  255.255.255.255  255.255.255.255         On-link         127.0.0.1   4531
  255.255.255.255  255.255.255.255         On-link     172.16.33.148   4506
  255.255.255.255  255.255.255.255         On-link      10.69.69.240    281
===========================================================================

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>