New Member
Posts: 11
Registered: ‎12-20-2016

IPSEC Tunnel Issues

Hi There 

 

I have set up  some  tunnels for  testing:

 

IPSEC  from  Static  to  Static  IP address tunnel comes  up. I can  ping  from ERLite to  remote server  and  access remote server  Web  page eetc Ok  but  from the  remote  end  I cannot  ping or  see the  WebGUI of the ErLite

 

I  cannot  get  the  IPSEC tunnel to  connect to the  remote site which uses  dynamic IP address at  all

 

Can  some one   review  my setup and  see what I am  doing wrong ?

 

SEE  CONFIG  BELOW:

admin@arc:~$ show configuration
firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 4 {
            action accept
            description "allow vpn traffic from ARC sites"
            ipsec {
                match-ipsec
            }
            log enable
            protocol all
            source {
                address 172.22.56.0/24
            }
        }
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        mac 00:04:ed:cb:1d:2f
        speed auto
    }
    ethernet eth1 {
        address 172.22.66.254/24
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        address 172.22.16.254/24
        description "Local 2"
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth2
    wan-interface eth0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name KAB1 {
            authoritative disable
            subnet 172.22.66.0/24 {
                default-router 172.22.66.254
                dns-server 8.8.8.8
                lease 86400
                start 172.22.66.1 {
                    stop 172.22.66.5
                }
            }
        }
        shared-network-name LAN2 {
            authoritative disable
            disable
            subnet 172.22.16.0/24 {
                default-router 172.22.16.254
                dns-server 192.231.203.132
                dns-server 192.231.203.3
                lease 86400
                start 172.22.16.1 {
                    stop 172.22.16.5
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth2
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
    ubnt-discover {
        disable
    }
}
system {
    host-name arc.NBN
    login {
        user admin {
            authentication {
                encrypted-password ****************
            }
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Australia/Adelaide
}
vpn {
    ipsec {
        auto-firewall-nat-exclude enable
        esp-group FOO0 {
            proposal 1 {
                encryption 3des
                hash md5
            }
        }
        esp-group FOO1 {
            proposal 1 {
                encryption 3des
                hash md5
            }
        }
        ike-group FOO0 {
            proposal 1 {
                dh-group 2
                encryption 3des
                hash md5
            }
        }
        ike-group FOO1 {
            proposal 1 {
                dh-group 2
                encryption 3des
                hash md5
            }
        }
        site-to-site {
            peer 150.101.24.7 {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret ****************
                }
                connection-type initiate
                description BRI56
                ike-group FOO0
                local-address any
                tunnel 1 {
                    esp-group FOO0
                    local {
                        prefix 172.22.66.0/24
                    }
                    remote {
                        prefix 172.22.56.0/24
                    }
                }
            }
            peer midician.no-ip.biz {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret ****************
                }
                connection-type initiate
                description "MT Home"
                ike-group FOO1
                local-address 0.0.0.0
                tunnel 1 {
                    esp-group FOO1
                    local {
                        prefix 172.22.66.0/24
                    }
                    remote {
                        prefix 10.49.151.0/24
                    }
                }
            }
        }
    }
}
admin@arc:~$ show configuration
firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 4 {
            action accept
            description "allow vpn traffic from ARC sites"
            ipsec {
                match-ipsec
            }
            log enable
            protocol all
            source {
                address 172.22.56.0/24
            }
        }
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        mac 00:04:ed:cb:1d:2f
        speed auto
    }
    ethernet eth1 {
        address 172.22.66.254/24
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        address 172.22.16.254/24
        description "Local 2"
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth2
    wan-interface eth0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name KAB1 {
            authoritative disable
            subnet 172.22.66.0/24 {
                default-router 172.22.66.254
                dns-server 8.8.8.8
                lease 86400
                start 172.22.66.1 {
                    stop 172.22.66.5
                }
            }
        }
        shared-network-name LAN2 {
            authoritative disable
            disable
            subnet 172.22.16.0/24 {
                default-router 172.22.16.254
                dns-server 192.231.203.132
                dns-server 192.231.203.3
                lease 86400
                start 172.22.16.1 {
                    stop 172.22.16.5
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth2
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
    ubnt-discover {
        disable
    }
}
system {
    host-name arc.NBN
    login {
        user admin {
            authentication {
                encrypted-password ****************
            }
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Australia/Adelaide
}
vpn {
    ipsec {
        auto-firewall-nat-exclude enable
        esp-group FOO0 {
            proposal 1 {
                encryption 3des
                hash md5
            }
        }
        esp-group FOO1 {
            proposal 1 {
                encryption 3des
                hash md5
            }
        }
        ike-group FOO0 {
            proposal 1 {
                dh-group 2
                encryption 3des
                hash md5
            }
        }
        ike-group FOO1 {
            proposal 1 {
                dh-group 2
                encryption 3des
                hash md5
            }
        }
        site-to-site {
            peer 150.101.24.7 {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret ****************
                }
                connection-type initiate
                description BRI56
                ike-group FOO0
                local-address any
                tunnel 1 {
                    esp-group FOO0
                    local {
                        prefix 172.22.66.0/24
                    }
                    remote {
                        prefix 172.22.56.0/24
                    }
                }
            }
            peer midician.no-ip.biz {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret ****************
                }
                connection-type initiate
                description "MT Home"
                ike-group FOO1
                local-address 0.0.0.0
                tunnel 1 {
                    esp-group FOO1
                    local {
                        prefix 172.22.66.0/24
                    }
                    remote {
                        prefix 10.49.151.0/24
                    }
                }
            }
        }
    }
}