ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    EdgeRouter 4: setting up L2TP server

    IT Discussion
    edgerouter 4 l2tp vpn
    3
    13
    1.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • FATeknollogeeF
      FATeknollogee @JaredBusch
      last edited by

      @JaredBusch Thx for that heads up! Will try searching, maybe I'll get lucky!

      1 Reply Last reply Reply Quote 0
      • JaredBuschJ
        JaredBusch
        last edited by

        When I was debugging this, I found that it was not getting a valid cipher or something I believe.

        1 Reply Last reply Reply Quote 0
        • FATeknollogeeF
          FATeknollogee
          last edited by

          I just might have to put in some "fake" S2S config & move on?

          1 Reply Last reply Reply Quote 0
          • FATeknollogeeF
            FATeknollogee
            last edited by

            It's strange that UBNT's docs/guides say nothing about this being an issue?

            1 Reply Last reply Reply Quote 0
            • JaredBuschJ
              JaredBusch
              last edited by JaredBusch

              https://www.mangolassi.it/topic/16505/edgerouter-l2tp-vpn-does-not-work-with-updated-systems

              https://community.ui.com/questions/L2TP-unusable-on-Fedora/d91fb0a7-0507-4c6d-be7f-259d2df8edc4

              1 Reply Last reply Reply Quote 0
              • FATeknollogeeF
                FATeknollogee
                last edited by

                There as to be a line in the S2S config that "triggers" the VPN service ON?

                1 Reply Last reply Reply Quote 0
                • FATeknollogeeF
                  FATeknollogee
                  last edited by FATeknollogee

                  Figured out the issue:

                  Even though I copied/paste from here: https://help.ubnt.com/hc/en-us/articles/204950294-EdgeRouter-L2TP-IPsec-VPN-Server

                  Looks like rule 30 did not copy correctly & I end up with the check mark - State "Invalid".

                  Once, I unchecked "Invalid", VPN connects fine.

                  Tomorrow, I'll wipe out the config & re-copy the rules, just to make sure I didn't mess up.

                  DeepinScreenshot_select-area_20200217214852.png

                  1 Reply Last reply Reply Quote 3
                  • FATeknollogeeF
                    FATeknollogee
                    last edited by

                    I reset the ER4 to factory default & started from scratch.

                    Copy/paste (from UBNT site) of rule 30, does indeed set the "Invalid" check mark on the Advanced tab of Rule 30

                    DashrenderD 1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @FATeknollogee
                      last edited by

                      @FATeknollogee said in EdgeRouter 4: setting up L2TP server:

                      I reset the ER4 to factory default & started from scratch.

                      Copy/paste (from UBNT site) of rule 30, does indeed set the "Invalid" check mark on the Advanced tab of Rule 30

                      can you post the whole config?
                      or is it already above?

                      FATeknollogeeF 1 Reply Last reply Reply Quote 0
                      • FATeknollogeeF
                        FATeknollogee @Dashrender
                        last edited by

                        @Dashrender

                        firewall {
                            all-ping enable
                            broadcast-ping disable
                            group {
                                address-group trusted_IPs {
                                    address 1.2.3.4
                                    address 5.6.7.8
                                    address 9.10.11.12
                                    description "for remote GUI access"
                                }
                            }
                            ipv6-name WANv6_IN {
                                default-action drop
                                description "WAN inbound traffic forwarded to LAN"
                                enable-default-log
                                rule 10 {
                                    action accept
                                    description "Allow established/related sessions"
                                    state {
                                        established enable
                                        related enable
                                    }
                                }
                                rule 20 {
                                    action drop
                                    description "Drop invalid state"
                                    state {
                                        invalid enable
                                    }
                                }
                            }
                            ipv6-name WANv6_LOCAL {
                                default-action drop
                                description "WAN inbound traffic to the router"
                                enable-default-log
                                rule 10 {
                                    action accept
                                    description "Allow established/related sessions"
                                    state {
                                        established enable
                                        related enable
                                    }
                                }
                                rule 20 {
                                    action drop
                                    description "Drop invalid state"
                                    state {
                                        invalid enable
                                    }
                                }
                                rule 30 {
                                    action accept
                                    description "Allow IPv6 icmp"
                                    protocol ipv6-icmp
                                }
                                rule 40 {
                                    action accept
                                    description "allow dhcpv6"
                                    destination {
                                        port 546
                                    }
                                    protocol udp
                                    source {
                                        port 547
                                    }
                                }
                            }
                            ipv6-receive-redirects disable
                            ipv6-src-route disable
                            ip-src-route disable
                            log-martians enable
                            name WAN_IN {
                                default-action drop
                                description "WAN to internal"
                                rule 10 {
                                    action accept
                                    description "Allow established/related"
                                    state {
                                        established enable
                                        related enable
                                    }
                                }
                                rule 20 {
                                    action drop
                                    description "Drop invalid state"
                                    state {
                                        invalid enable
                                    }
                                }
                            }
                            name WAN_LOCAL {
                                default-action drop
                                description "WAN to router"
                                rule 10 {
                                    action accept
                                    description "remote GUI"
                                    destination {
                                        port 443
                                    }
                                    log disable
                                    protocol tcp
                                    source {
                                        group {
                                            address-group trusted_IPs
                                        }
                                    }
                                }
                                rule 20 {
                                    action accept
                                    description "Allow established/related"
                                    state {
                                        established enable
                                        related enable
                                    }
                                }
                                rule 30 {
                                    action accept
                                    description ike
                                    destination {
                                        port 500
                                    }
                                    log disable
                                    protocol udp
                                    state {
                                        invalid enable
                                    }
                                }
                                rule 40 {
                                    action accept
                                    description esp
                                    log disable
                                    protocol esp
                                }
                                rule 50 {
                                    action accept
                                    description nat-t
                                    destination {
                                        port 4500
                                    }
                                    log disable
                                    protocol udp
                                }
                                rule 60 {
                                    action accept
                                    description l2tp
                                    destination {
                                        port 1701
                                    }
                                    ipsec {
                                        match-ipsec
                                    }
                                    log disable
                                    protocol udp
                                }
                            }
                            receive-redirects disable
                            send-redirects enable
                            source-validation disable
                            syn-cookies enable
                        }
                        interfaces {
                            ethernet eth0 {
                                address 10.10.10.10/30
                                description Internet
                                duplex auto
                                firewall {
                                    in {
                                        ipv6-name WANv6_IN
                                        name WAN_IN
                                    }
                                    local {
                                        ipv6-name WANv6_LOCAL
                                        name WAN_LOCAL
                                    }
                                }
                                speed auto
                            }
                            ethernet eth1 {
                                address 10.15.20.254/24
                                description "LAN 1"
                                duplex auto
                                speed auto
                            }
                            ethernet eth2 {
                                address 192.168.2.254/24
                                description "LAN 2"
                                duplex auto
                                speed auto
                            }
                            ethernet eth3 {
                                duplex auto
                                speed auto
                            }
                            loopback lo {
                            }
                        }
                        port-forward {
                            auto-firewall enable
                            hairpin-nat disable
                            wan-interface eth0
                        }
                        service {
                            dhcp-server {
                                disabled false
                                hostfile-update disable
                                shared-network-name LAN2 {
                                    authoritative enable
                                    subnet 192.168.2.0/24 {
                                        default-router 192.168.2.254
                                        dns-server 192.168.2.254
                                        lease 86400
                                        start 192.168.2.38 {
                                            stop 192.168.2.43
                                        }
                                    }
                                }
                                static-arp disable
                                use-dnsmasq disable
                            }
                            dns {
                                forwarding {
                                    cache-size 10000
                                    listen-on eth1
                                    listen-on eth2
                                    name-server 1.1.1.1
                                    name-server 9.9.9.9
                                }
                            }
                            gui {
                                http-port 80
                                https-port 443
                                older-ciphers enable
                            }
                            nat {
                                rule 5010 {
                                    description "masquerade for WAN"
                                    outbound-interface eth0
                                    type masquerade
                                }
                            }
                            ssh {
                                port 22
                                protocol-version v2
                            }
                            unms {
                                connection wss://
                            }
                        }
                        system {
                            domain-name ubnt
                            gateway-address 10.10.10.1
                            host-name ER4
                            login {
                                user ubnt {
                                    authentication {
                                        encrypted-password ubnt
                                    }
                                    level admin
                                }
                            }
                            name-server 1.1.1.1
                            name-server 9.9.9.9
                            ntp {
                                server 0.ubnt.pool.ntp.org {
                                }
                                server 1.ubnt.pool.ntp.org {
                                }
                                server 2.ubnt.pool.ntp.org {
                                }
                                server 3.ubnt.pool.ntp.org {
                                }
                            }
                            offload {
                                hwnat disable
                                ipsec disable
                            }
                            syslog {
                                global {
                                    facility all {
                                        level notice
                                    }
                                    facility protocols {
                                        level debug
                                    }
                                }
                            }
                            time-zone UTC
                        }
                        vpn {
                            ipsec {
                                allow-access-to-local-interface disable
                                auto-firewall-nat-exclude disable
                                ipsec-interfaces {
                                    interface eth0
                                }
                            }
                            l2tp {
                                remote-access {
                                    authentication {
                                        local-users {
                                            username hello {
                                                password 1234
                                            }
                                        }
                                        mode local
                                    }
                                    client-ip-pool {
                                        start 192.168.100.100
                                        stop 192.168.100.110
                                    }
                                    dns-servers {
                                        server-1 1.1.1.1
                                        server-2 9.9.9.9
                                    }
                                    idle 1800
                                    ipsec-settings {
                                        authentication {
                                            mode pre-shared-secret
                                            pre-shared-secret 1234
                                        }
                                        ike-lifetime 3600
                                        lifetime 3600
                                    }
                                    mtu 1492
                                    outside-address 10.10.10.10
                                }
                            }
                        }
                        
                        1 Reply Last reply Reply Quote 0
                        • 1 / 1
                        • First post
                          Last post