Tunnel is up on both ends. Routers can ping each other. The workstation behind the routers can also ping the far router. I can't ping a far workstation on either side from either the router or the workstation.
Router A -> Can ping Router #2, but not workstation #2
-Workstation #1 (behind Router A) -> Can ping Router B but not workstation #2
Router B -> Can ping router A, but not workstation #1
-Workstation #2 -> Can ping Router A but not workstation #1
Router A config:
firewall {
all-ping enable
broadcast-ping disable
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
invalid disable
new disable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
established disable
invalid enable
new disable
related disable
}
}
rule 30 {
action accept
description "VPN Traffic"
destination {
address 192.168.50.0/24
}
ipsec {
match-ipsec
}
source {
address 192.168.51.0/24
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
invalid disable
new disable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
established disable
invalid enable
new disable
related disable
}
}
rule 30 {
action accept
description "VPN Traffic"
destination {
address 192.168.50.1
}
ipsec {
match-ipsec
}
source {
address 192.168.51.0/24
}
}
rule 40 {
action accept
description IKE-UDP-500
destination {
port 500
}
protocol udp
}
rule 50 {
action accept
description ESP-50
protocol esp
}
rule 60 {
action accept
description NAT-T-UDP-4500
destination {
port 4500
}
protocol udp
}
rule 70 {
action accept
description "Manage Router"
destination {
port 22,443
}
protocol tcp
source {
address 10.10.10.0/24
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address 10.10.10.30/24
description Internet
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth1 {
address 192.168.50.1/24
description Local
duplex auto
speed auto
}
ethernet eth2 {
description "Local 2"
disable
duplex auto
speed auto
}
loopback lo {
}
}
protocols {
static {
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN {
authoritative disable
subnet 192.168.50.0/24 {
default-router 192.168.50.1
dns-server 8.8.8.8
dns-server 8.8.4.4
lease 86400
start 192.168.50.100 {
stop 192.168.50.200
}
}
}
}
dns {
forwarding {
cache-size 150
listen-on eth1
listen-on eth2
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 5001 {
description "VPN Traffic"
destination {
address 192.168.51.0/24
}
exclude
log disable
outbound-interface eth0
protocol all
source {
address 192.168.50.0/24
}
type masquerade
}
rule 5002 {
description "masquerade for WAN"
log disable
outbound-interface eth0
protocol all
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
gateway-address 10.10.10.1
host-name ubnt
login {
user admin {
authentication {
encrypted-password $6$AtmoGUlogc9cdi49$9AwWKRoeXxMEuy0vLfYeMtWqTHGbojjBbGFcYOD1P0/t7Zu1Bt1gZARSNqjnrt/JL7DPyTgEcKP2NuwsHq91a0
}
level admin
}
}
name-server 8.8.8.8
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone UTC
}
vpn {
ipsec {
auto-firewall-nat-exclude enable
esp-group FOO0 {
compression disable
lifetime 3600
mode tunnel
pfs enable
proposal 1 {
encryption aes128
hash sha1
}
}
ike-group FOO0 {
ikev2-reauth no
key-exchange ikev1
lifetime 28800
proposal 1 {
dh-group 14
encryption aes128
hash sha1
}
}
ipsec-interfaces {
interface eth0
}
nat-networks {
allowed-network 0.0.0.0/0 {
}
}
nat-traversal enable
site-to-site {
peer 10.10.10.31 {
authentication {
mode pre-shared-secret
pre-shared-secret IamVPN2008
}
connection-type initiate
default-esp-group FOO0
ike-group FOO0
ikev2-reauth inherit
local-address 10.10.10.30
tunnel 1 {
allow-nat-networks disable
allow-public-networks disable
esp-group FOO0
local {
prefix 192.168.50.0/24
}
remote {
prefix 192.168.51.0/24
}
}
}
}
}
}
Router B config:
firewall {
all-ping enable
broadcast-ping disable
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name WAN_IN {
default-action drop
description "WAN to LAN"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
invalid disable
new disable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
established disable
invalid enable
new disable
related disable
}
}
rule 30 {
action accept
description "VPN Traffic"
destination {
address 192.168.51.0/24
}
ipsec {
match-ipsec
}
source {
address 192.168.50.0/24
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
invalid disable
new disable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
established disable
invalid enable
new disable
related disable
}
}
rule 30 {
action accept
description "VPN Traffic"
destination {
address 192.168.51.1
}
ipsec {
match-ipsec
}
source {
address 192.168.50.0/24
}
}
rule 40 {
action accept
description IKE-UDP-500
destination {
port 500
}
protocol udp
}
rule 50 {
action accept
description ESP-50
protocol esp
}
rule 60 {
action accept
description NAT-T-UDP-500
destination {
port 500
}
protocol udp
}
rule 70 {
action accept
description "Manage Router"
destination {
port 443,22
}
protocol tcp
source {
address 10.10.10.0/24
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address 10.10.10.31/24
description Internet
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth1 {
address 192.168.51.1/24
description Local
duplex auto
speed auto
}
ethernet eth2 {
disable
duplex auto
speed auto
}
ethernet eth3 {
disable
duplex auto
speed auto
}
ethernet eth4 {
disable
duplex auto
speed auto
}
ethernet eth5 {
disable
duplex auto
speed auto
}
ethernet eth6 {
disable
duplex auto
speed auto
}
ethernet eth7 {
disable
duplex auto
speed auto
}
loopback lo {
}
}
protocols {
static {
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN {
authoritative disable
subnet 192.168.51.0/24 {
default-router 192.168.51.1
dns-server 8.8.8.8
dns-server 8.8.4.4
lease 86400
start 192.168.51.100 {
stop 192.168.51.200
}
}
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 5001 {
description VPN
destination {
address 192.168.50.0/24
}
exclude
log disable
outbound-interface eth0
protocol all
source {
address 192.168.51.0/24
}
type masquerade
}
rule 5002 {
description "masquerade for WAN"
log disable
outbound-interface eth0
protocol all
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
gateway-address 10.10.10.1
host-name ubnt
login {
user admin {
authentication {
encrypted-password $6$slPmo9YrrlG1zLp$g4ixcwfr5i0gN4JpgqDBoUUAsVr0gACwOgZtVBMdMEXkzEpsrGWomVUoqMEaFF8fuo0r5DDMd4Nzg8QNeXaK7/
plaintext-password ""
}
level admin
}
user ubnt {
authentication {
encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66.
}
level admin
}
}
name-server 8.8.8.8
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone UTC
}
vpn {
ipsec {
auto-firewall-nat-exclude enable
esp-group FOO0 {
compression disable
lifetime 3600
mode tunnel
pfs enable
proposal 1 {
encryption aes128
hash sha1
}
}
ike-group FOO0 {
ikev2-reauth no
key-exchange ikev1
lifetime 28800
proposal 1 {
dh-group 14
encryption aes128
hash sha1
}
}
ipsec-interfaces {
interface eth0
}
nat-networks {
allowed-network 0.0.0.0/0 {
}
}
nat-traversal enable
site-to-site {
peer 10.10.10.30 {
authentication {
mode pre-shared-secret
pre-shared-secret IamVPN2008
}
connection-type initiate
default-esp-group FOO0
ike-group FOO0
ikev2-reauth inherit
local-address 10.10.10.31
tunnel 1 {
allow-nat-networks disable
allow-public-networks disable
esp-group FOO0
local {
prefix 192.168.51.0/24
}
remote {
prefix 192.168.50.0/24
}
}
}
}
}
}
/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1104 */