Can't ping to any device in LAN through VPN

Hello All
When I connect through VPN I cant ping to any device in the LAN network
tried change ARP on LAN to proxy-arp and nothing changed

/interface ethernet
set [ find default-name=ether10 ] arp=proxy-arp name=LAN
set [ find default-name=ether1 ] name=WAN1
set [ find default-name=ether2 ] name=WAN2
set [ find default-name=ether3 ] name=WAN3
set [ find default-name=ether4 ] name=WAN4

/ip pool
add name=dhcp_pool1 ranges=10.0.0.2-10.0.0.254

/ip dhcp-server
add address-pool=dhcp_pool1 authoritative=after-2sec-delay disabled=no \
    interface=LAN lease-time=1w name=dhcp1

/ppp profile
add dns-server=8.8.8.8,8.8.4.4 idle-timeout=1h local-address=10.0.0.1 name=\
    VPN_Profile remote-address=dhcp_pool1

/interface pptp-server server
set enabled=yes

/ip address
add address=192.168.0.2/24 interface=WAN1 network=192.168.0.0
add address=192.168.2.2/24 interface=WAN2 network=192.168.2.0
add address=192.168.3.2/24 interface=WAN3 network=192.168.3.0
add address=192.168.4.2/24 interface=WAN4 network=192.168.4.0
add address=10.0.0.1/16 interface=LAN network=10.0.0.0

/ip dhcp-server network
add address=10.0.0.0/16 dns-server=8.8.8.8,8.8.4.4 gateway=10.0.0.1

/ip firewall mangle
add action=accept chain=prerouting disabled=yes dst-address=\
    192.168.0.0-192.168.4.255 in-interface=LAN
add action=mark-connection chain=prerouting connection-mark=no-mark \
    dst-address-type=!local in-interface=LAN new-connection-mark=ISP1_conn \
    passthrough=yes per-connection-classifier=both-addresses-and-ports:4/0
add action=mark-connection chain=prerouting connection-mark=no-mark \
    dst-address-type=!local in-interface=LAN new-connection-mark=ISP2_conn \
    passthrough=yes per-connection-classifier=both-addresses-and-ports:4/1
add action=mark-connection chain=prerouting connection-mark=no-mark \
    dst-address-type=!local in-interface=LAN new-connection-mark=ISP3_conn \
    passthrough=yes per-connection-classifier=both-addresses-and-ports:4/2
add action=mark-connection chain=prerouting connection-mark=no-mark \
    dst-address-type=!local in-interface=LAN new-connection-mark=ISP4_conn \
    passthrough=yes per-connection-classifier=both-addresses-and-ports:4/3
add action=mark-routing chain=prerouting connection-mark=ISP1_conn \
    in-interface=LAN new-routing-mark=to_ISP1
add action=mark-routing chain=prerouting connection-mark=ISP2_conn \
    in-interface=LAN new-routing-mark=to_ISP2
add action=mark-routing chain=prerouting connection-mark=ISP3_conn \
    in-interface=LAN new-routing-mark=to_ISP3
add action=mark-routing chain=prerouting connection-mark=ISP4_conn \
    in-interface=LAN new-routing-mark=to_ISP4
add action=mark-connection chain=prerouting connection-state=new \
    in-interface=WAN1 new-connection-mark=ISP1_conn passthrough=no
add action=mark-connection chain=prerouting connection-state=new \
    in-interface=WAN2 new-connection-mark=ISP2_conn passthrough=no
add action=mark-connection chain=prerouting connection-state=new \
    in-interface=WAN3 new-connection-mark=ISP3_conn passthrough=no
add action=mark-connection chain=prerouting connection-state=new \
    in-interface=WAN4 new-connection-mark=ISP4_conn passthrough=no
add action=mark-routing chain=output connection-mark=ISP1_conn \
    new-routing-mark=to_ISP1 passthrough=no
add action=mark-routing chain=output connection-mark=ISP2_conn \
    new-routing-mark=to_ISP2 passthrough=no
add action=mark-routing chain=output connection-mark=ISP3_conn \
    new-routing-mark=to_ISP3 passthrough=no
add action=mark-routing chain=output connection-mark=ISP4_conn \
    new-routing-mark=to_ISP4 passthrough=no

/ip firewall nat
add action=masquerade chain=srcnat out-interface=WAN1
add action=masquerade chain=srcnat out-interface=WAN2
add action=masquerade chain=srcnat out-interface=WAN3
add action=masquerade chain=srcnat out-interface=WAN4

/ip route
add check-gateway=ping distance=1 gateway=192.168.0.1 routing-mark=to_ISP1
add check-gateway=ping distance=1 gateway=192.168.2.1 routing-mark=to_ISP2
add check-gateway=ping distance=1 gateway=192.168.3.1 routing-mark=to_ISP3
add check-gateway=ping distance=1 gateway=192.168.4.1 routing-mark=to_ISP4
add check-gateway=ping distance=1 gateway=192.168.0.1
add check-gateway=ping distance=2 gateway=192.168.2.1
add check-gateway=ping distance=3 gateway=192.168.3.1
add check-gateway=ping distance=4 gateway=192.168.4.1

/ppp secret
add local-address=10.0.0.1 name=eslam password=123123 profile=VPN_Profile \
    service=pptp

You won’t recieve IP from dhcp server. ROS can’t do such thing. What route do you have on pptp client to reach 10.0.0.0/16? And what IP addresses your LAN devices have?

I receive IP from DHCP server: 10.0.0.2
and about the route, I post all routes I have.

/ip route
add check-gateway=ping distance=1 gateway=192.168.0.1 routing-mark=to_ISP1
add check-gateway=ping distance=1 gateway=192.168.2.1 routing-mark=to_ISP2
add check-gateway=ping distance=1 gateway=192.168.3.1 routing-mark=to_ISP3
add check-gateway=ping distance=1 gateway=192.168.4.1 routing-mark=to_ISP4
add check-gateway=ping distance=1 gateway=192.168.0.1
add check-gateway=ping distance=2 gateway=192.168.2.1
add check-gateway=ping distance=3 gateway=192.168.3.1
add check-gateway=ping distance=4 gateway=192.168.4.1

LAN Adress: 10.0.0.0/16
try to ping 10.0.0.211 (DVR)

10.0.0.2 is IP from pool, but it’s not mean dhcp server gave that to you. You using ptp protocol. DHCP server not working that way on Router OS. Do you see an active lease in dhcp-server tab?

This is a routing table from you pptp server(Tik). And I need to see routing table in your device which connects to Tik.

Do you see an active lease in dhcp-server tab? No
This rote print on Tik

 #      DST-ADDRESS        PREF-SRC        GATEWAY            DISTANCE
 0 A S  0.0.0.0/0                          192.168.0.1               1
 1 A S  0.0.0.0/0                          192.168.2.1               1
 2 A S  0.0.0.0/0                          192.168.3.1               1
 3 A S  0.0.0.0/0                          192.168.4.1               1
 4 A S  0.0.0.0/0                          192.168.0.1               1
 5   S  0.0.0.0/0                          192.168.2.1               2
 6   S  0.0.0.0/0                          192.168.3.1               3
 7   S  0.0.0.0/0                          192.168.4.1               4
 8 ADC  10.0.0.0/16        10.0.0.1        LAN                       0
 9 ADC  192.168.0.0/24     192.168.0.2     WAN1                      0
10 ADC  192.168.2.0/24     192.168.2.2     WAN2                      0
11 ADC  192.168.3.0/24     192.168.3.2     WAN3                      0
12 ADC  192.168.4.0/24     192.168.4.2     WAN4                      0




and this route print from my PC using VPN


C:\Users\eslam>route print
===========================================================================
Interface List
 16...00 23 24 7e e2 7d ......Intel(R) Ethernet Connection I217-LM
 30...........................Mega
  9...00 ac 32 ff 06 3d ......VPN Client Adapter - VPN
  1...........................Software Loopback Interface 1
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0       172.16.0.1     172.16.0.110   4250
          0.0.0.0          0.0.0.0         On-link          10.0.0.2     26
         10.0.0.2  255.255.255.255         On-link          10.0.0.2    281
     41.49.42.38  255.255.255.255       172.16.0.1     172.16.0.110   4251
        127.0.0.0        255.0.0.0         On-link         127.0.0.1   4556
        127.0.0.1  255.255.255.255         On-link         127.0.0.1   4556
  127.255.255.255  255.255.255.255         On-link         127.0.0.1   4556
       172.16.0.0    255.255.252.0         On-link      172.16.0.110   4506
     172.16.0.110  255.255.255.255         On-link      172.16.0.110   4506
     172.16.3.255  255.255.255.255         On-link      172.16.0.110   4506
        224.0.0.0        240.0.0.0         On-link         127.0.0.1   4556
        224.0.0.0        240.0.0.0         On-link      172.16.0.110   4506
        224.0.0.0        240.0.0.0         On-link          10.0.0.2     26
  255.255.255.255  255.255.255.255         On-link         127.0.0.1   4556
  255.255.255.255  255.255.255.255         On-link      172.16.0.110   4506
  255.255.255.255  255.255.255.255         On-link          10.0.0.2    281
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    331 ::1/128                  On-link
 16    281 fe80::/64                On-link
 16    281 fe80::2889:aa16:c350:989d/128
                                    On-link
  1    331 ff00::/8                 On-link
 16    281 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None

Do traceroute from PC to 8.8.8.8.



C:\Users\eslam>tracert 8.8.8.8

Tracing route to google-public-dns-a.google.com [8.8.8.8]
over a maximum of 30 hops:

  1    37 ms    30 ms    32 ms  10.0.0.1
  2    29 ms    30 ms    29 ms  192.168.0.1
  3    84 ms     *       87 ms  10.45.5.65
  4   153 ms   129 ms    75 ms  10.36.13.65
  5    86 ms    90 ms    94 ms  10.37.89.249
  6    72 ms    96 ms   105 ms  10.36.11.14
  7    55 ms    54 ms    52 ms  10.37.87.158
  8    52 ms    56 ms    52 ms  10.37.32.170
  9    53 ms    54 ms    60 ms  host-163.121.219.170.tedata.net
 10    54 ms    89 ms    58 ms  10.37.32.173
 11    50 ms    51 ms    73 ms  10.37.87.145
 12    87 ms    73 ms    71 ms  10.37.85.101
 13   112 ms   102 ms    99 ms  72.14.205.68
 14   146 ms   118 ms   115 ms  108.170.252.225
 15     *      110 ms   168 ms  216.239.35.197
 16    80 ms    83 ms    80 ms  google-public-dns-a.google.com [8.8.8.8]

Trace complete.



C:\Users\eslam>tracert 8.8.8.8

Tracing route to google-public-dns-a.google.com [8.8.8.8]
over a maximum of 30 hops:

  1    37 ms    30 ms    32 ms  10.0.0.1
  2    29 ms    30 ms    29 ms  192.168.0.1
  3    84 ms     *       87 ms  10.45.5.65
  4   153 ms   129 ms    75 ms  10.36.13.65
  5    86 ms    90 ms    94 ms  10.37.89.249
  6    72 ms    96 ms   105 ms  10.36.11.14
  7    55 ms    54 ms    52 ms  10.37.87.158
  8    52 ms    56 ms    52 ms  10.37.32.170
  9    53 ms    54 ms    60 ms  host-163.121.219.170.tedata.net
 10    54 ms    89 ms    58 ms  10.37.32.173
 11    50 ms    51 ms    73 ms  10.37.87.145
 12    87 ms    73 ms    71 ms  10.37.85.101
 13   112 ms   102 ms    99 ms  72.14.205.68
 14   146 ms   118 ms   115 ms  108.170.252.225
 15     *      110 ms   168 ms  216.239.35.197
 16    80 ms    83 ms    80 ms  google-public-dns-a.google.com [8.8.8.8]

Trace complete.

Okay, seems you going through the tunnel. Look for firewall settings on 10.0.0.211 or Tik filter for forwarding. Try to ping another device in home LAN.

Try below:
VPNConfig.JPG

In LAN working
and from Tik working too..

Yes CZFan, I using it

I mean ping from vpn PC another LAN device. Aka 10.0.0.145 or whatever you have.

He done it
0.0.0.0 0.0.0.0 On-link 10.0.0.2 26

I cant ping from VPN to any device in LAN
but I can ping from VPN to routers (IN WANs) WAN1, WAN2,WAN3,WAN4 (192.168.0.1,192.168.2.1,192.168.3.1,192.168.4.1)

Can LAN device ping vpn PC? 10.0.0.2.

Your logic is more adapted for L2 VPN. And you have here L3 vpn with ppp base. You already have LAN on Tik with 10.0.0.0/16. Make in ppp profile local address 10.10.10.1 and remote from pool 10.10.10.2-10.10.10.255.

same problem… cant ping

Show traceroute from 10.10.10.2 to 10.0.0.211.



Tracing route to 10.0.0.211 over a maximum of 30 hops

  1    29 ms    29 ms    30 ms  10.0.0.1
  2     *        *        *     Request timed out.
  3     *        *        *     Request timed out.