Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

Re: Update to 1.9 broke my l2tp/ipsec

$
0
0

Thanks for the tip.. Indeed, I was seeing that the incoming packets were basically following the default route out back to the internet (took quite a while to troubleshoot, but adding a raw iptables rule with trace action let me see that the packets were being sent out to eth0

 

iptables -t raw -I  PREROUTING -p icmp -j TRACE

(you can find the traces in /var/log/messages).. and you can delete the trace with this rule:

 

iptables -t raw -D PREROUTING -p icmp -j TRACE

(in my case, I was tracing only ICMP packets to make my life easier)

 

Regardless.. is there any chance of getting this solved in a maintenance release? 

 

Also, I have 6 routing tables as I have different load-balance groups (a general LB group, one which is client-ip-sticky for https and a third one which is active/stand-by for SIP traffic). I basically run 3 times the probes over the same WAN interfaces.. is there an alternative to this?

 

Im my case, this is the output of your command:

 

root@router:/var/log# /usr/sbin/ubnt-add-connected.pl
Connected routes found = 7
Route tables found = 6
Adding routes to table 201
Adding routes to table 202
Adding routes to table 203
Adding routes to table 204
Adding routes to table 205
Adding routes to table 206

load-balance member [Sticky-LB-eth1]
  status = active
  route table 206
    default via 192.168.100.1 dev eth1
    blackhole default  metric 256
    10.255.255.0 dev l2tp0  scope link
    127.0.0.0/8 dev lo  scope link
    190.111.238.0/24 dev eth0  scope link
    192.168.1.0/24 dev switch0  scope link
    192.168.2.10 dev l2tp0  scope link
    192.168.100.0/24 dev eth1  scope link
    192.168.129.0/24 dev eth2.1000  scope link

load-balance member [SIP-eth1]
  status = failover
  route table 204
    default via 192.168.100.1 dev eth1
    blackhole default  metric 256
    10.255.255.0 dev l2tp0  scope link
    127.0.0.0/8 dev lo  scope link
    190.111.238.0/24 dev eth0  scope link
    192.168.1.0/24 dev switch0  scope link
    192.168.2.10 dev l2tp0  scope link
    192.168.100.0/24 dev eth1  scope link
    192.168.129.0/24 dev eth2.1000  scope link

load-balance member [G-eth1]
  status = active
  route table 202
    default via 192.168.100.1 dev eth1
    blackhole default  metric 256
    10.255.255.0 dev l2tp0  scope link
    127.0.0.0/8 dev lo  scope link
    190.111.238.0/24 dev eth0  scope link
    192.168.1.0/24 dev switch0  scope link
    192.168.2.10 dev l2tp0  scope link
    192.168.100.0/24 dev eth1  scope link
    192.168.129.0/24 dev eth2.1000  scope link

load-balance member [SIP-eth0]
  status = active
  route table 203
    default via 190.111.238.1 dev eth0
    blackhole default  metric 256
    10.255.255.0 dev l2tp0  scope link
    127.0.0.0/8 dev lo  scope link
    190.111.238.0/24 dev eth0  scope link
    192.168.1.0/24 dev switch0  scope link
    192.168.2.10 dev l2tp0  scope link
    192.168.100.0/24 dev eth1  scope link
    192.168.129.0/24 dev eth2.1000  scope link

load-balance member [Sticky-LB-eth0]
  status = active
  route table 205
    default via 190.111.238.1 dev eth0
    blackhole default  metric 256
    10.255.255.0 dev l2tp0  scope link
    127.0.0.0/8 dev lo  scope link
    190.111.238.0/24 dev eth0  scope link
    192.168.1.0/24 dev switch0  scope link
    192.168.2.10 dev l2tp0  scope link
    192.168.100.0/24 dev eth1  scope link
    192.168.129.0/24 dev eth2.1000  scope link

load-balance member [G-eth0]
  status = active
  route table 201
    default via 190.111.238.1 dev eth0
    blackhole default  metric 256
    10.255.255.0 dev l2tp0  scope link
    127.0.0.0/8 dev lo  scope link
    190.111.238.0/24 dev eth0  scope link
    192.168.1.0/24 dev switch0  scope link
    192.168.2.10 dev l2tp0  scope link
    192.168.100.0/24 dev eth1  scope link
    192.168.129.0/24 dev eth2.1000  scope link

 

 

 

And I have some static routes defined in the base routing table so that I can reach some devices behind other routers. In this case, would I have to manually create the static routes on the 3 eth0 routing tables? 201, 203 and 205? can we know which one of the three routing tables is taken? would there be a cleaner way to get the l2tp/ipsec tunnel to just terminate its packets on the main routing table instead? (so that I could use dynamic routing protocols instead of static for example?)

 

Thanks!


Viewing all articles
Browse latest Browse all 60861

Trending Articles