Hi
I have a RUTX50 i want to make a IPsec tunnel between and a PaloAlto FW.
It is an aggresive VPN tunnel.
Running firmware RUTX_R_00.07.04
The tunnel comes up but not traffic is allowed through. I have tried what is mentioned here:
But that haven't helped.
RUTX network: 10.64.0.0/24
Remote network: 192.168.15.0/24
[email protected]:~# ipsec statusall
Status of IKE charon daemon (strongSwan 5.9.2, Linux 5.4.229, armv7l):
uptime: 12 minutes, since Mar 21 13:41:16 2023
worker threads: 11 of 16 idle, 5/0/0/0 working, job queue: 0/0/0/0, scheduled: 2
loaded plugins: charon aes des sha2 sha1 md4 md5 random nonce x509 revocation constraints pubkey pkcs1 pkcs8 pgp pem openssl gmp xcbc hmac kernel-netlink socket-default stroke vici updown eap-identity eap-mschapv2 xauth-generic
Listening IP addresses:
10.64.0.1
fda2:c3a9:5724::1
10.xxxxxxxxx
Connections:
AdvHost-AdvHost_c: %any...5.xxxxxxx IKEv2
AdvHost-AdvHost_c: local: [10.64.0.1] uses pre-shared key authentication
AdvHost-AdvHost_c: remote: [192.168.15.1] uses pre-shared key authentication
AdvHost-AdvHost_c: child: 10.64.0.0/24 === 192.168.15.0/24 192.168.40.0/24 TUNNEL
Security Associations (1 up, 0 connecting):
AdvHost-AdvHost_c[1]: ESTABLISHED 12 minutes ago, 10.xxxxxxx[10.64.0.1]...5.xxxxxx[192.168.15.1]
AdvHost-AdvHost_c[1]: IKEv2 SPIs: cb8cf8d7f59f0db9_i* 7e4c5d43acb25af5_r, pre-shared key reauthentication in 7 hours
AdvHost-AdvHost_c[1]: IKE proposal: AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_384
AdvHost-AdvHost_c{1}: INSTALLED, TUNNEL, reqid 1, ESP SPIs: cb018cff_i 806fb729_o
AdvHost-AdvHost_c{1}: AES_CBC_256/HMAC_SHA2_256_128, 0 bytes_i, 9344 bytes_o (156 pkts, 0s ago), rekeying in 34 minutes
AdvHost-AdvHost_c{1}: 10.64.0.0/24 === 192.168.15.0/24
[email protected]:~# iptables -t nat -n -L | grep policy | grep ipsec
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 policy match dir out pol ipsec
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 policy match dir out pol ipsec /* !fw3: Exclude-IPsec-from-NAT */
Does anyone have an idea on how to get this up and running?
I have tried to reset the device and create the VPN tunnel again fro scratch.
My guess is it something to do with FW on the Box that is not functionally properly. Have tried in multiple ways to have "local" and "remote" FW on and off under advanced but doesn't seem to fix the issue.