Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

ERX Wifi vlan routed to VPN connection

$
0
0

Looking for a bit of assistance on this as I am struggling to get the routing to work.

 

I have a ERX-SFP with a few different networks. One network is configured into eth1 for DMZ/IOT devices, while the rest are configured in Switch0. The default network is switch0 10.20.255.1/24 with 3 different vlans created. One for production network(vlan 66), one for guest wifi(vlan 200) and the other I just created for the wifi VPN(vlan 94).

 

Basically what I am trying to do is forward all traffic on the wifi_VPN group over the wireless. I am able to get the tunnel up, I am seeing the NAT masquerade get hits but it doesn't seem to get any traffic to go over the tunnel. If I had to guess it has to do with the route.

 

here is the configuration I did for the VPN. I think my problem is the set interfaces but I am not sure.

 

set interfaces openvpn vtun0 config-file /config/auth/my_expressvpn_australia_-_brisbane_udp.ovpn
set interfaces openvpn vtun0 description 'ExpressVPN'

set service nat rule 5000 description ExpressVPN
set service nat rule 5000 log disable
set service nat rule 5000 outbound-interface vtun0
set service nat rule 5000 source address 10.94.66.0/24
set service nat rule 5000 type masquerade

set service nat rule 5001 description default
set service nat rule 5001 log disable
set service nat rule 5001 outbound-interface eth0
set service nat rule 5001 source address 10.94.66.0/24
set service nat rule 5001 type masquerade


set protocols static table 1 interface-route 0.0.0.0/0 next-hop-interface vtun0

set firewall modify express_vpn_route rule 10 description 'ExpressVPN'
set firewall modify express_vpn_route rule 10 source address 10.94.66.0/24
set firewall modify express_vpn_route rule 10 modify table 1

set interfaces vti 94 firewall in modify modify express_vpn_route 
(also tried as set interfaces switch switch0 firewall in modify express_vpn_route with no luck)

 

Below is my config minus what you see above. I have reverted to a prior config to make sure anything I did incorrect is not there.

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name DMZ_Local {
        default-action drop
        description ""
        rule 1 {
            action accept
            description "Allow DHCP"
            destination {
                port 67
            }
            log disable
            protocol udp
        }
        rule 2 {
            action accept
            description "Allow DNS"
            destination {
                port 53
            }
            log disable
            protocol udp
        }
    }
    name Guest_Local {
        default-action drop
        description ""
        rule 1 {
            action accept
            description "Allow DHCP"
            destination {
                port 67
            }
            log disable
            protocol udp
        }
        rule 2 {
            action accept
            description "Allow DNS"
            destination {
                port 53
            }
            log disable
            protocol udp
        }
    }
    name PROD_IN {
        default-action drop
        description ""
    }
    name PROD_OUT {
        default-action drop
        description ""
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address 192.168.1.1/24
        description DMZ_IOT
        duplex auto
        firewall {
            in {
            }
            local {
                name DMZ_Local
            }
        }
        poe {
            output off
        }
        speed auto
    }
    ethernet eth2 {
        description Local
        duplex auto
        poe {
            output 24v
        }
        speed auto
    }
    ethernet eth3 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth4 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        address 10.20.255.1/24
        description Local
        mtu 1500
        switch-port {
            interface eth2 {
            }
            interface eth3 {
            }
            interface eth4 {
            }
            vlan-aware disable
        }
        vif 66 {
            address 10.66.94.1/24
            description Prod_Home
            mtu 1500
        }
        vif 200 {
            address 172.16.200.1/24
            description Guest_Wifi
            firewall {
                local {
                    name Guest_Local
                }
            }
            mtu 1500
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name Guest_Wifi {
            authoritative disable
            subnet 172.16.200.0/24 {
                default-router 172.16.200.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 172.16.200.100 {
                    stop 172.16.200.120
                }
            }
        }
        shared-network-name LAN1 {
            authoritative enable
            subnet 192.168.1.0/24 {
                default-router 192.168.1.1
                dns-server 192.168.1.1
                lease 86400
                start 192.168.1.38 {
                    stop 192.168.1.243
                }
            }
        }
        shared-network-name LAN2 {
            authoritative enable
            subnet 10.20.255.0/24 {
                default-router 10.20.255.1
                dns-server 10.20.255.1
                lease 86400
                start 10.20.255.38 {
                    stop 10.20.255.243
                }
                unifi-controller 10.66.94.252
            }
        }
        shared-network-name Prod_Home {
            authoritative disable
            subnet 10.66.94.0/24 {
                default-router 10.66.94.1
                dns-server 10.66.94.252
                lease 86400
                start 10.66.94.10 {
                    stop 10.66.94.200
                }
                unifi-controller 10.66.94.252
            }
        }
        shared-network-name VPN_Wifi {
            authoritative disable
            subnet 10.94.66.0/24 {
                default-router 10.94.66.1
                dns-server 1.1.1.1
                dns-server 1.0.0.1
                lease 86400
                start 10.94.66.100 {
                    stop 10.94.66.120
                }
            }
        }
        static-arp disable
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on switch0
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}

Viewing all articles
Browse latest Browse all 60861

Trending Articles