Quantcast
Viewing all articles
Browse latest Browse all 60861

Re: Strange ipsec routing issue

here config is

  firewall {
all-ping enable
broadcast-ping disable
group {
network-group CAIHONG {
description ""
network 10.100.1.0/24
network 10.101.1.0/24
network 10.102.1.0/24
}
network-group PRIVATE_NETS {
network 192.168.3.0/24
}
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians disable
modify balance {
rule 10 {
action modify
description "do NOT load balance lan to lan"
destination {
group {
network-group PRIVATE_NETS
}
}
modify {
table main
}
}
rule 20 {
action modify
description "do NOT load balance destination public address"
destination {
group {
address-group ADDRv4_eth0
}
}
modify {
table main
}
}
rule 30 {
action modify
description "do NOT load balance destination public address"
destination {
group {
address-group ADDRv4_eth1
}
}
modify {
table main
}
}
rule 70 {
action modify
modify {
lb-group G
}
}
}
name WAN_IN {
default-action drop
description "WAN to internal"
enable-default-log
rule 10 {
action accept
description "Allow established/related"
log disable
protocol all
state {
established enable
invalid disable
new disable
related enable
}
}
rule 30 {
action drop
description "Drop invalid state"
log enable
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
enable-default-log
rule 10 {
action accept
description "Allow established/related"
log disable
protocol all
state {
established enable
invalid disable
new disable
related enable
}
}
rule 30 {
action drop
description "Drop invalid state"
log disable
state {
invalid enable
}
}
}
name tunnel {
default-action accept
description ""
enable-default-log
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address 8.8.8.8/28
description TEL
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
out {
}
}
speed auto
}
ethernet eth1 {
address 4.4.4.4/27
description UNI
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth2 {
address 192.168.2.1/24
duplex auto
speed auto
}
ethernet eth3 {
}
ethernet eth4 {
duplex auto
speed auto
}
loopback lo {
}
vti vti0 {
address 172.16.0.2/30
firewall {
in {
name tunnel
}
local {
name tunnel
}
out {
name tunnel
}
}
mtu 1436
}
}
load-balance {
group G {
interface eth0 {
}
interface eth1 {
}
}
}
protocols {
static {
route 0.0.0.0/0 {
next-hop 8.8.8.7 {
}
next-hop 4.4.4.3 {
disable
}
}
route 10.100.1.0/24 {
next-hop 172.16.0.1 {
}
}
route 10.101.1.0/24 {
next-hop 172.16.0.1 {
}
}
route 10.102.1.0/24 {
next-hop 172.16.0.1 {
}
}
route 9.9.9.9/27 {
next-hop 8.8.8.7 {
distance 1
}
}
}
}
service {
dhcp-server {
shared-network-name LAN {
subnet 192.168.2.0/24 {
default-router 192.168.2.1
dns-server 192.168.2.1
start 192.168.2.100 {
stop 192.168.2.200
}
}
}
}
dns {
forwarding {
cache-size 1500
listen-on eth2
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 5001 {
description "exclude ipsec out"
exclude
log disable
outbound-interface vti0
protocol all
type masquerade
}
rule 5002 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
rule 5003 {
description "masquerade for WAN 2"
outbound-interface eth1
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
conntrack {
expect-table-size 4096
hash-size 4096
table-size 32768
tcp {
half-open-connections 512
loose enable
max-retrans 3
}
}
host-name ubnt
login {
user ubnt {
authentication {
encrypted-password ""
plaintext-password ""
}
full-name ""
level admin
}
}
name-server 114.114.114.114
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
offload {
hwnat enable
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone UTC
traffic-analysis {
dpi enable
export enable
}
}
vpn {
ipsec {
auto-firewall-nat-exclude enable
esp-group FOO0 {
compression disable
lifetime 86400
mode tunnel
pfs dh-group2
proposal 1 {
encryption 3des
hash md5
}
}
ike-group FOO0 {
ikev2-reauth no
key-exchange ikev1
lifetime 28800
proposal 1 {
dh-group 2
encryption 3des
hash md5
}
}
nat-networks {
allowed-network 0.0.0.0/0 {
}
}
nat-traversal disable
site-to-site {
peer 9.9.9.9 {
authentication {
mode pre-shared-secret
pre-shared-secret *****
}
connection-type respond
description caihong
ike-group FOO0
ikev2-reauth inherit
local-address 8.8.8.8
vti {
bind vti0
esp-group FOO0
}
}
}
}
}


Viewing all articles
Browse latest Browse all 60861

Trending Articles