Quantcast
Viewing all articles
Browse latest Browse all 20028

Help with IPSec VPN Setup

Can someone look at my config file and see why I can't connect to my VPN?  I'm trying to use my MacBook and iPhone to connect to my home network.

 

eth1 is my primary LAN.  I have an AT&T MicroCell connected to eth2 that should be wide open (I hope anyhow).  Seems since I connected it directly to eth2 and took it off my primary LAN I'm getting better connections with it.

 

I really just want my VPN to access my primary network (10.0.1.0/24), but I put the 0.0.0.0/0 option last trying to get it to work.  No go.

 

Not sure if I have a firewall rule that is preventing it.

 

Also, can someone verify that my DMZ (eth2) is isolated and can't connect to my primary LAN (eth1) with the firewalls/settings I have?

 

Thanks!!

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group CAM {
            address 10.0.1.80-10.0.1.82
            description Cameras
        }
        address-group GUEST {
            address 10.0.3.0/24
            description "Guest VLAN"
        }
        address-group LAN {
            address 10.0.1.0/24
            description LAN
        }
        address-group MANAGEMENT {
            address 10.0.5.0/24
            description "Management VLAN"
        }
        address-group TV {
            address 10.0.2.0/24
            description "TV VLAN"
        }
        network-group DMZ {
            description DMZ
            network 10.0.4.0/24
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name DMZ_In {
        default-action accept
        description ""
        rule 1 {
            action drop
            description LAN
            destination {
                address 10.0.1.0/24
            }
            log disable
            protocol all
        }
        rule 2 {
            action drop
            description TV
            destination {
                address 10.0.2.0/24
            }
            log disable
            protocol all
        }
        rule 3 {
            action drop
            description Guest
            destination {
                address 10.0.3.0/24
            }
            log disable
            protocol all
        }
        rule 4 {
            action drop
            description Management
            destination {
                address 10.0.5.0/24
            }
            log disable
            protocol all
        }
    }
    name DMZ_Local {
        default-action accept
        description ""
        rule 1 {
            action accept
            description DNS
            destination {
                port 53
            }
            log disable
            protocol udp
        }
    }
    name Guest_In {
        default-action accept
        description "Guest Access"
        rule 10 {
            action drop
            description LAN
            destination {
                address 10.0.1.0/24
            }
            log disable
            protocol all
        }
        rule 20 {
            action drop
            description TV
            destination {
                address 10.0.2.0/24
            }
            log disable
            protocol all
        }
        rule 30 {
            action drop
            description DMZ
            destination {
                address 10.0.4.0/24
            }
            log disable
            protocol all
        }
        rule 40 {
            action drop
            description Management
            destination {
                address 10.0.5.0/24
            }
            log disable
            protocol all
        }
    }
    name Guest_Local {
        default-action accept
        description "Local Guest"
        rule 1 {
            action accept
            description DNS
            destination {
                port 53
            }
            log disable
            protocol udp
        }
    }
    name InterVLAN1 {
        default-action accept
        description "Primary LAN"
        rule 20 {
            action drop
            description "VLAN2 Drop"
            destination {
                address 10.0.2.0/24
                group {
                }
            }
            log disable
            protocol all
            source {
                address 10.0.2.0/24
            }
        }
        rule 30 {
            action drop
            description "VLAN3 Drop"
            destination {
                address 10.0.3.0/24
                group {
                }
            }
            log disable
            protocol all
            source {
                address 10.0.3.0/24
            }
        }
        rule 40 {
            action drop
            description "VLAN4 Drop"
            destination {
                address 10.0.4.0/24
                group {
                }
            }
            log disable
            protocol all
            source {
                address 10.0.4.0/24
            }
        }
        rule 41 {
            action accept
            description "VPN Accept"
            destination {
                address 10.0.0.10-10.0.0.20
            }
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
    }
    name TV_In {
        default-action accept
        description ""
        rule 1 {
            action drop
            description LAN
            destination {
                address 10.0.1.0/24
            }
            log disable
            protocol all
        }
        rule 2 {
            action drop
            description Guest
            destination {
                address 10.0.3.0/24
            }
            log disable
            protocol all
        }
        rule 3 {
            action drop
            description DMZ
            destination {
                address 10.0.4.0/24
            }
            log disable
            protocol all
        }
        rule 4 {
            action drop
            description Management
            destination {
                address 10.0.5.0/24
            }
            log disable
            protocol all
        }
    }
    name TV_Local {
        default-action accept
        description ""
        rule 1 {
            action accept
            description DNS
            destination {
                port 53
            }
            log disable
            protocol udp
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 1 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 4 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description "Allow L2TP for Remote VPN Server"
            destination {
                port 500,1701
            }
            log disable
            protocol udp
        }
        rule 30 {
            action accept
            description "Allow ESP for Remote VPN Server"
            log disable
            protocol 50
        }
        rule 40 {
            action accept
            description "Allow NAT Traversal for Remote VPN Server"
            destination {
                port 4500
            }
            log disable
            protocol udp
        }
        rule 50 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description "Xfinity Internet"
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address 10.0.1.1/24
        description "Nix Intranet"
        duplex auto
        firewall {
            in {
            }
            local {
                name InterVLAN1
            }
            out {
            }
        }
        speed auto
        vif 2 {
            address 10.0.2.1/24
            description "TV Internet Access"
            firewall {
                in {
                    name TV_In
                }
                local {
                    name TV_Local
                }
            }
        }
        vif 3 {
            address 10.0.3.1/24
            description "Guest Internet Access"
            firewall {
                in {
                    name Guest_In
                }
                local {
                    name Guest_Local
                }
            }
        }
    }
    ethernet eth2 {
        address 10.0.4.1/24
        description DMZ
        duplex auto
        firewall {
            in {
                name DMZ_In
            }
            local {
                name DMZ_Local
            }
        }
        mtu 1492
        speed auto
    }
    ethernet eth3 {
        address dhcp
        description "Backup Access"
        duplex auto
        speed auto
    }
    ethernet eth4 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth5 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth6 {
        disable
        duplex auto
        speed auto
    }
    ethernet eth7 {
        disable
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth1
    lan-interface eth2
    rule 1 {
        description "Luca Bedroom Camera"
        forward-to {
            address 10.0.1.80
            port sanitized
        }
        original-port sanitized
        protocol tcp
    }
    rule 2 {
        description "Luca Playroom Camera"
        forward-to {
            address 10.0.1.81
            port sanitized
        }
        original-port sanitized
        protocol tcp
    }
    rule 3 {
        description "Bentley Camera"
        forward-to {
            address 10.0.1.82
            port sanitized
        }
        original-port sanitized
        protocol tcp
    }
    rule 4 {
        description "MicroCell 123 UDP"
        forward-to {
            address 10.0.4.2
            port 123
        }
        original-port 123
        protocol udp
    }
    rule 5 {
        description "MicroCell 4500 UDP"
        forward-to {
            address 10.0.4.2
            port 4500
        }
        original-port 4500
        protocol udp
    }
    rule 6 {
        description "MicroCell 500 UDP"
        forward-to {
            address 10.0.4.2
            port 500
        }
        original-port 500
        protocol udp
    }
    rule 7 {
        description "MicroCell 443 TCP"
        forward-to {
            address 10.0.4.2
            port 443
        }
        original-port 443
        protocol tcp
    }
    wan-interface eth0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name DMZ {
            authoritative disable
            subnet 10.0.4.0/24 {
                default-router 10.0.4.1
                dns-server 75.75.75.75
                dns-server 8.8.8.8
                lease 31536000
                static-mapping PHONE-MICROCELL {
                    ip-address 10.0.4.2
                    mac-address sanitized
                }
            }
        }
        shared-network-name Guest {
            authoritative disable
            subnet 10.0.3.0/24 {
                default-router 10.0.3.1
                dns-server 75.75.75.75
                dns-server 8.8.8.8
                lease 86400
                start 10.0.3.100 {
                    stop 10.0.3.150
                }
            }
        }
        shared-network-name LAN1 {
            authoritative disable
            subnet 10.0.1.0/24 {
                default-router 10.0.1.1
                dns-server 10.0.1.1
                lease 432000
                start 10.0.1.140 {
                    stop 10.0.1.255
                }
                numerous static MAP’s removed for space
                }
                unifi-controller 10.0.1.100
            }
        }
        shared-network-name TV {
            authoritative disable
            subnet 10.0.2.0/24 {
                default-router 10.0.2.1
                dns-server 75.75.75.75
                dns-server 8.8.8.8
                lease 31536000
                static-mapping TV-EXERCISEROOM {
                    ip-address 10.0.2.5
                    mac-address sanitized
                }
                static-mapping TV-LIVINGROOM {
                    ip-address 10.0.2.2
                    mac-address sanitized
                }
                static-mapping TV-LIVINGROOMDVD {
                    ip-address 10.0.2.3
                    mac-address sanitized
                }
                static-mapping TV-MASTERBEDROOM {
                    ip-address 10.0.2.4
                    mac-address sanitized
                }
                static-mapping TV-PLAYROOM {
                    ip-address 10.0.2.6
                    mac-address sanitized
                }
            }
        }
    }
    dns {
        dynamic {
            interface eth0 {
                service dyndns {
                    host-name name.domainname.com
                    login sanitized
                    password sanitized
                }
                web dyndns
            }
        }
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth1.2
            listen-on eth1.3
            listen-on eth2
            options listen-address=10.0.1.1
            system
        }
    }
    gui {
        http-port sanitized
        https-port sanitized
        older-ciphers enable
    }
    nat {
        rule 1 {
            description Cameras
            inbound-interface eth0
            inside-address {
                address 10.0.1.80-10.0.1.82
                port sanitized
            }
            log disable
            protocol tcp
            type destination
        }
        rule 2 {
            description MicroCell
            inbound-interface eth0
            inside-address {
                address 10.0.4.2
            }
            log disable
            protocol all
            type destination
        }
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    upnp {
        listen-on eth1 {
            outbound-interface eth0
        }
        listen-on eth1.2 {
            outbound-interface eth0
        }
    }
}
system {
    domain-name sanitized
    host-name router
    login {
        user sanitized {
            authentication {
                encrypted-password sanitized
            }
            full-name ""
            level admin
        }
    }
    name-server 75.75.75.75
    name-server 8.8.8.8
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec enable
        ipv4 {
            forwarding enable
            gre enable
            pppoe enable
            vlan enable
        }
        ipv6 {
            forwarding enable
            pppoe disable
            vlan enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/New_York
    traffic-analysis {
        dpi enable
        export enable
    }
}
vpn {
    ipsec {
        auto-firewall-nat-exclude disable
        ipsec-interfaces {
            interface eth0
        }
        nat-networks {
            allowed-network 0.0.0.0/0 {
            }
        }
        nat-traversal enable
    }
    l2tp {
        remote-access {
            authentication {
                local-users {
                    username sanitized {
                        password sanitized
                    }
                }
                mode local
            }
            client-ip-pool {
                start 10.0.0.10
                stop 10.0.0.20
            }
            dns-servers {
                server-1 10.0.1.1
            }
            ipsec-settings {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret sanitized
                }
                ike-lifetime 3600
            }
            mtu 1500
            outside-address sanitized.45
            outside-nexthop sanitized.1
        }
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1104 */

Viewing all articles
Browse latest Browse all 20028

Trending Articles