Hi,
I have followed UBNT-Jamie tutorial for creating the IPSec VPN from by ER-X running 1.9.0 but I can't seem to connect from any of my devices. Any pointers in problems with my config / advise on how to debug would be appreciated?
My devices report that server didn't respond. Looking at the stats for the firewall rules, I see two additional bytes hit the 'Allow IKE for VPN server' rule but nothing else.
My config is below
firewall { all-ping enable broadcast-ping disable ipv6-name WANv6_IN { default-action drop description "WAN inbound traffic forwarded to LAN" enable-default-log rule 10 { action accept description "Allow established/related sessions" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 201 { action accept description "icmpv6 destination-unreachable" icmpv6 { type destination-unreachable } protocol ipv6-icmp } rule 202 { action accept description "icmpv6 packet-too-big" icmpv6 { type packet-too-big } protocol ipv6-icmp } rule 203 { action accept description "icmpv6 time-exceeded" icmpv6 { type time-exceeded } protocol ipv6-icmp } rule 204 { action accept description "icmpv6 parameter-problem" icmpv6 { type parameter-problem } protocol ipv6-icmp } rule 205 { action accept description "icmpv6 echo-request" icmpv6 { type echo-request } protocol ipv6-icmp } } ipv6-name WANv6_LOCAL { default-action drop description "WAN inbound traffic to the router" enable-default-log rule 10 { action accept description "Allow established/related sessions" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 30 { action accept description "Allow IPv6 icmp" protocol ipv6-icmp } rule 40 { action accept description "allow dhcpv6" destination { port 546 } protocol udp source { port 547 } } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action accept description "Allow IKE for Remote VPN Server" destination { port 500 } log enable protocol udp } rule 22 { action accept description "Allow L2TP for Remote VPN Server" destination { port 1701 } log enable protocol udp } rule 23 { action accept description "Allow ESP for Remote VPN Server" log enable protocol 50 } rule 24 { action accept description "Allow NAT-T for Remote VPN Server" destination { port 4500 } log enable protocol udp source { } } } options { mss-clamp { mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { description WAN duplex auto pppoe 0 { default-route auto dhcpv6-pd { pd 0 { interface switch0 { host-address ::1 prefix-id :0 service slaac } prefix-length /64 } rapid-commit enable } firewall { in { ipv6-name WANv6_IN name WAN_IN } local { ipv6-name WANv6_LOCAL name WAN_LOCAL } } ipv6 { address { autoconf } dup-addr-detect-transmits 1 enable { } } mtu 1492 name-server auto password xxxx user-id xxxx } speed auto } ethernet eth1 { description Local duplex auto speed auto } ethernet eth2 { duplex auto poe { output off } speed auto } ethernet eth3 { description Local duplex auto speed auto } ethernet eth4 { description WLAN duplex auto poe { output 24v } speed auto } ethernet eth5 { description TV duplex auto speed auto } loopback lo { } switch switch0 { address 10.0.0.1/24 description LAN mtu 1500 switch-port { interface eth1 { } interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } } } protocols { static { interface-route6 ::/0 { next-hop-interface pppoe0 { } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 10.0.0.0/24 { default-router 10.0.0.1 dns-server 10.0.0.1 lease 86400 start 10.0.0.38 { stop 10.0.0.200 } } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on switch0 } } gui { ca-file /config/auth/ca-cert.pem cert-file /config/auth/cert.pem http-port 80 https-port 443 older-ciphers disable } nat { rule 5010 { description "masquerade for WAN" outbound-interface pppoe0 type masquerade } } ssh { disable-password-authentication port 22 protocol-version v2 } upnp { listen-on switch0 { outbound-interface pppoe0 } } } system { domain-name xxx.yyy host-name ubnt login { user myuser { authentication { encrypted-password $6$E9CFaCH5yhRnt47$jwmYDQYGXSx8bgGN8m2fL7VUrW6.mDP3pdVT2.We1x.m7C8dXqqkR.VEibQhwiCjAP2.r2wcZAB.QTTdi9GcH } level admin } } name-server 217.169.20.20 name-server 217.169.20.21 name-server 2001:8b0::2020 name-server 2001:8b0::2021 ntp { server 0.uk.pool.ntp.org { } server 1.uk.pool.ntp.org { } server 2.uk.pool.ntp.org { } server 3.uk.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Europe/London traffic-analysis { dpi enable export enable signature-update { update-hour 2 } } } vpn { ipsec { auto-firewall-nat-exclude disable ipsec-interfaces { interface eth0 } nat-networks { allowed-network 10.0.0.0/8 { } allowed-network 172.16.0.0/12 { } allowed-network 192.168.0.0/16 { } } nat-traversal enable } l2tp { remote-access { authentication { local-users { username myVPNuser { password myVPNpassword } } mode local } client-ip-pool { start 10.0.0.201 stop 10.0.0.220 } dns-servers { server-1 8.8.8.8 server-2 8.8.4.4 } ipsec-settings { authentication { mode pre-shared-secret pre-shared-secret myVPNpresharedKey } ike-lifetime 3600 } outside-address MY.WAN.IPv4 outside-nexthop MY.WAN.IPv4 } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */