I’ve configured an IPSec VPN to go between an RB450 and a 3rd-party router. When the tunnel is brought up, the routerboard stops communicating with anything outside of the VPN.
General config synopsis:
-
- ether1 has a static IP of 10.0.1.1/32 and serves DHCP on the 10.0.1.0/24 subnet.
- ether5 has a static IP given to it by our ISP’s DHCP reservation. For the sake of this thread, we’ll pretend the IP address is 5.5.5.5
- the 3rd-party router has a private NATed subnet behind it of 192.168.24.0/24
When the tunnel was down, I could connect to the RB450 using the external IP address from my home machine (not within the VPN at all). From within the VPN there was no connectivity (because the tunnel was down).
Having brought the tunnel up, I can now connect to the RB450 using the internal 10.0.1.1 IP address, over the VPN, but now I can’t contact the external 5.5.5.5 IP address from my computer at home. No ping replies, no SSH access.
If I SSH in through the VPN, I can reboot the router.
Letting a ping run on 5.5.5.5 and a simultaneous ping run on 10.0.1.1, I notice the router come online on 5.5.5.5 first, and then after four or five replies I notice 5.5.5.5 stops responding and 10.0.1.1 starts responding, indicating that the VPN has been re-established.
What’s even more interesting is that with the VPN up, I’m able to connect to the SSH administration console on the RB450 to issue commands, but when I’m on the console and ping addresses on the 192.168.24.0/24 subnet (including the IP address of the machine I’m using to connect to the RB450 via 10.0.1.1) I get no ping replies.
So, why would the RB450 stop communicating with the world outside of its VPN tunnel? And why would I be able to connect to the administration console but not be able to ping the very machine that is connected?
I’m guessing the answers have something to do with routing, so here’s my routing table (pretending that the external IP address of the rb450 is 5.5.5.5):
[admin@rb450] > ip route print detail
Flags: X - disabled, A - active, D - dynamic,
C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
0 ADS dst-address=0.0.0.0/0 gateway=5.5.5.254 interface=ether5
gateway-state=reachable distance=0 scope=30 target-scope=10
## Gateway is given to the RB450 by the ISP's DHCP
1 ADC dst-address=10.0.1.0/24 pref-src=10.0.1.1 interface=ether1 distance=0
scope=200
2 ADC dst-address=10.0.2.0/24 pref-src=10.0.2.1 interface=ether2 distance=0
scope=200
3 ADC dst-address=10.0.3.0/24 pref-src=10.0.3.1 interface=ether3 distance=0
scope=200
4 ADC dst-address=10.0.4.0/24 pref-src=10.0.4.1 interface=ether4 distance=0
scope=200
5 A S dst-address=192.168.24.0/24 gateway=ether5 interface=ether5
gateway-state=reachable distance=10
6 ADC dst-address=5.5.5.0/23 pref-src=5.5.5.5 interface=ether5
distance=0 scope=10
## The external IP address given to the RB450 by the ISP, 5.5.5.5, has a 23-bit subnet mask