Tunnel is up on both ends. Routers can ping each other. The workstation behind the routers can also ping the far router. I can't ping a far workstation on either side from either the router or the workstation.
Router A -> Can ping Router #2, but not workstation #2
-Workstation #1 (behind Router A) -> Can ping Router B but not workstation #2
Router B -> Can ping router A, but not workstation #1
-Workstation #2 -> Can ping Router A but not workstation #1
Router A config:
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable invalid disable new disable related enable } } rule 20 { action drop description "Drop invalid state" state { established disable invalid enable new disable related disable } } rule 30 { action accept description "VPN Traffic" destination { address 192.168.50.0/24 } ipsec { match-ipsec } source { address 192.168.51.0/24 } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable invalid disable new disable related enable } } rule 20 { action drop description "Drop invalid state" state { established disable invalid enable new disable related disable } } rule 30 { action accept description "VPN Traffic" destination { address 192.168.50.1 } ipsec { match-ipsec } source { address 192.168.51.0/24 } } rule 40 { action accept description IKE-UDP-500 destination { port 500 } protocol udp } rule 50 { action accept description ESP-50 protocol esp } rule 60 { action accept description NAT-T-UDP-4500 destination { port 4500 } protocol udp } rule 70 { action accept description "Manage Router" destination { port 22,443 } protocol tcp source { address 10.10.10.0/24 } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 10.10.10.30/24 description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { address 192.168.50.1/24 description Local duplex auto speed auto } ethernet eth2 { description "Local 2" disable duplex auto speed auto } loopback lo { } } protocols { static { } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative disable subnet 192.168.50.0/24 { default-router 192.168.50.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.50.100 { stop 192.168.50.200 } } } } dns { forwarding { cache-size 150 listen-on eth1 listen-on eth2 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5001 { description "VPN Traffic" destination { address 192.168.51.0/24 } exclude log disable outbound-interface eth0 protocol all source { address 192.168.50.0/24 } type masquerade } rule 5002 { description "masquerade for WAN" log disable outbound-interface eth0 protocol all type masquerade } } ssh { port 22 protocol-version v2 } } system { gateway-address 10.10.10.1 host-name ubnt login { user admin { authentication { encrypted-password $6$AtmoGUlogc9cdi49$9AwWKRoeXxMEuy0vLfYeMtWqTHGbojjBbGFcYOD1P0/t7Zu1Bt1gZARSNqjnrt/JL7DPyTgEcKP2NuwsHq91a0 } level admin } } name-server 8.8.8.8 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } vpn { ipsec { auto-firewall-nat-exclude enable esp-group FOO0 { compression disable lifetime 3600 mode tunnel pfs enable proposal 1 { encryption aes128 hash sha1 } } ike-group FOO0 { ikev2-reauth no key-exchange ikev1 lifetime 28800 proposal 1 { dh-group 14 encryption aes128 hash sha1 } } ipsec-interfaces { interface eth0 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable site-to-site { peer 10.10.10.31 { authentication { mode pre-shared-secret pre-shared-secret IamVPN2008 } connection-type initiate default-esp-group FOO0 ike-group FOO0 ikev2-reauth inherit local-address 10.10.10.30 tunnel 1 { allow-nat-networks disable allow-public-networks disable esp-group FOO0 local { prefix 192.168.50.0/24 } remote { prefix 192.168.51.0/24 } } } } } }
Router B config:
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to LAN" rule 10 { action accept description "Allow established/related" state { established enable invalid disable new disable related enable } } rule 20 { action drop description "Drop invalid state" state { established disable invalid enable new disable related disable } } rule 30 { action accept description "VPN Traffic" destination { address 192.168.51.0/24 } ipsec { match-ipsec } source { address 192.168.50.0/24 } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable invalid disable new disable related enable } } rule 20 { action drop description "Drop invalid state" state { established disable invalid enable new disable related disable } } rule 30 { action accept description "VPN Traffic" destination { address 192.168.51.1 } ipsec { match-ipsec } source { address 192.168.50.0/24 } } rule 40 { action accept description IKE-UDP-500 destination { port 500 } protocol udp } rule 50 { action accept description ESP-50 protocol esp } rule 60 { action accept description NAT-T-UDP-500 destination { port 500 } protocol udp } rule 70 { action accept description "Manage Router" destination { port 443,22 } protocol tcp source { address 10.10.10.0/24 } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 10.10.10.31/24 description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { address 192.168.51.1/24 description Local duplex auto speed auto } ethernet eth2 { disable duplex auto speed auto } ethernet eth3 { disable duplex auto speed auto } ethernet eth4 { disable duplex auto speed auto } ethernet eth5 { disable duplex auto speed auto } ethernet eth6 { disable duplex auto speed auto } ethernet eth7 { disable duplex auto speed auto } loopback lo { } } protocols { static { } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative disable subnet 192.168.51.0/24 { default-router 192.168.51.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 192.168.51.100 { stop 192.168.51.200 } } } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5001 { description VPN destination { address 192.168.50.0/24 } exclude log disable outbound-interface eth0 protocol all source { address 192.168.51.0/24 } type masquerade } rule 5002 { description "masquerade for WAN" log disable outbound-interface eth0 protocol all type masquerade } } ssh { port 22 protocol-version v2 } } system { gateway-address 10.10.10.1 host-name ubnt login { user admin { authentication { encrypted-password $6$slPmo9YrrlG1zLp$g4ixcwfr5i0gN4JpgqDBoUUAsVr0gACwOgZtVBMdMEXkzEpsrGWomVUoqMEaFF8fuo0r5DDMd4Nzg8QNeXaK7/ plaintext-password "" } level admin } user ubnt { authentication { encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66. } level admin } } name-server 8.8.8.8 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } vpn { ipsec { auto-firewall-nat-exclude enable esp-group FOO0 { compression disable lifetime 3600 mode tunnel pfs enable proposal 1 { encryption aes128 hash sha1 } } ike-group FOO0 { ikev2-reauth no key-exchange ikev1 lifetime 28800 proposal 1 { dh-group 14 encryption aes128 hash sha1 } } ipsec-interfaces { interface eth0 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable site-to-site { peer 10.10.10.30 { authentication { mode pre-shared-secret pre-shared-secret IamVPN2008 } connection-type initiate default-esp-group FOO0 ike-group FOO0 ikev2-reauth inherit local-address 10.10.10.31 tunnel 1 { allow-nat-networks disable allow-public-networks disable esp-group FOO0 local { prefix 192.168.51.0/24 } remote { prefix 192.168.50.0/24 } } } } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.5.4884695.160608.1104 */