Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Problems with traffic in VPN tunnel

    Scheduled Pinned Locked Moved IPsec
    4 Posts 2 Posters 578 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      Juan Carlos Gtz
      last edited by

      We have a LAN HQ in Mexico, connected by VPN with Italy and with another LAN “Mexico 2”.
      The parameters of the VPNS are correct and in fact, the tunnels are open and operating well. We see “Active” status in both of them.
      alt text

      However, we only have traffic between LAN HQ and Italy through the VPN, that is: any LAN node in Italy can see the others in HQ and vice versa. For example, using ping or logging into.

      Also, the VPN between HQ and Mexico 2 is active and up, but the devices in its segments do not reach the others. That is: if from the network 192.168.15.0 a ping is sent to a computer like 192.168.16.20 in the other side of the VPN, there is no traffic in any direction.

      The pings with the LAN of Italy (192.168.0.0/24) do work without problem.

      How could we solve this case? What futher information can I send in order to diagnose?

      Regards
      JCGA.

      K 1 Reply Last reply Reply Quote 0
      • K
        Konstanti @Juan Carlos Gtz
        last edited by Konstanti

        @Juan-Carlos-Gtz
        Hey
        Check the rules on the interface IPSEC Mex 2 . It is possible that they block traffic (by default, all traffic is blocked).At a minimum, an allow all rule (Pass protocol any, src host any, dst host any) is needed.
        Or show the rules

        1. IPSEC MEX 2
        2. LAN HQ MEX
          If there are problems with the access from the network LAN MEX2 to the network LAN HQ MEX, the still show rules
        3. LAN MEX 2
        4. IPSEC HQ MEX
        1 Reply Last reply Reply Quote 0
        • J
          Juan Carlos Gtz
          last edited by

          Hello and thanks for your help.

          Rules are: rules

          As you can see, they are very basic jus for doing tests, and they allow traffic in LAN, WAN and IPsec interfaces.

          What changes shoud we do in order to verify if traffis is passind between HQ and MEX2 ?

          Thanks in advance,

          Juan Gutierrez.

          K 1 Reply Last reply Reply Quote 0
          • K
            Konstanti @Juan Carlos Gtz
            last edited by Konstanti

            @Juan-Carlos-Gtz
            Hey
            You're only allowed TCP on the interface IPSEC Mex 2. Other protocols are prohibited. In order to use ping you need to enable ICMP.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.