Thank you for the link, I looked at it, I have already the route on the server to the network behind client. In my situation, the server doesn’t see even incoming packets sent from the client side.
But now, it has been decided to change VPN type from ovpn to ipsec. The connection is established, but traffic doesn’t passthrought over tunnel. Here’s my config.
ip address print (Network for vpn is 10.200.11.16/28 - ether3-Voice)
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK INTERFACE
0 172.31.2.73/30 172.31.2.72 gre-tunnel_Master
1 172.31.3.73/30 172.31.3.72 gre-tunnel_Slave
2 192.168.1.4/24 192.168.1.0 ether2-LAN
3 1.1.1.163/28 1.1.1.160 ether1-gateway
4 192.168.5.1/24 192.168.5.0 ether10_Block
5 10.200.11.17/28 10.200.11.16 ether3-Voice
6 D 172.31.0.149/24 172.31.0.0 City
7 D 192.168.100.1/32 192.168.100.13 <ovpn-malychenkon>
ip route print
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 1.1.1.161 1
2 ADC 10.200.11.16/28 10.200.11.17 ether3-Voice 0
3 S 172.16.0.70/31 172.31.2.74 10
4 S 172.16.0.70/31 172.31.3.74 20
5 A S 172.16.0.70/31 172.31.0.129 30
6 ADC 172.31.0.0/24 172.31.0.149 City 0
7 S 172.31.0.0/26 172.31.2.74 10
8 S 172.31.0.0/26 172.31.3.74 20
9 A S 172.31.0.0/26 172.31.0.129 30
10 A S 172.31.0.53/32 City 1
11 A S 172.31.0.54/32 gre-tunnel_Slave 1
12 A S 172.31.0.55/32 gre-tunnel_Master 1
13 ADC 172.31.2.72/30 172.31.2.73 gre-tunnel_Master 0
14 ADC 172.31.3.72/30 172.31.3.73 gre-tunnel_Slave 0
15 A S 192.168.0.0/24 192.168.1.3 1
16 ADC 192.168.1.0/24 192.168.1.4 ether2-LAN 0
17 DS 192.168.1.0/24 <ovpn-malychenkon> 1
18 ADC 192.168.5.0/24 192.168.5.1 ether10_Block 0
19 ADC 192.168.100.13/32 192.168.100.1 <ovpn-malychenkon> 0
20 ADC 1.1.1.160/28 1.1.1.163 ether1-gateway 0
ip ipsec peer print (my peer is 3)
Flags: X - disabled, D - dynamic, R - responder
0 address=3.3.36.254/32 auth-method=rsa-key key=Local remote-key=Key_ASR generate-policy=no policy-template-group=default exchange-mode=main
send-initial-contact=yes nat-traversal=yes proposal-check=obey hash-algorithm=md5 enc-algorithm=aes-256 dh-group=modp1024 lifetime=1d dpd-interval=2m
dpd-maximum-failures=5
1 address=3.3.37.254/32 auth-method=rsa-key key=Local remote-key=City_Slave generate-policy=no policy-template-group=default exchange-mode=main
send-initial-contact=yes nat-traversal=yes proposal-check=obey hash-algorithm=md5 enc-algorithm=aes-256 dh-group=modp1024 lifetime=1d dpd-interval=2m
dpd-maximum-failures=5
2 X address=3.3.37.123/32 local-address=4.4.4.220 auth-method=pre-shared-key secret="(Rbtdcrjt@Jnltktybt#Htfkbpfwbb$Ytantghjlernjd)"
generate-policy=no policy-template-group=default exchange-mode=main send-initial-contact=yes nat-traversal=yes proposal-check=obey hash-algorithm=md5
enc-algorithm=aes-256 dh-group=modp1024 lifetime=1d dpd-interval=2m dpd-maximum-failures=5
3 ;;; Unsafe configuration, suggestion to use certificates
address=2.2.2.2/32 local-address=1.1.1.163 auth-method=pre-shared-key secret="XXX" generate-policy=no
policy-template-group=default exchange-mode=aggressive send-initial-contact=yes nat-traversal=no my-id=user-fqdn:KRMG-PBX proposal-check=obey
hash-algorithm=sha1 enc-algorithm=3des dh-group=modp1024 lifetime=1d dpd-interval=2m dpd-maximum-failures=5
ip ipsec policy> print(my policy is 4)
Flags: T - template, X - disabled, D - dynamic, I - invalid, A - active, * - default
0 T * group=default src-address=::/0 dst-address=::/0 protocol=all proposal=default template=yes
1 src-address=1.1.1.163/32 src-port=any dst-address=3.3.36.254/32 dst-port=any protocol=gre action=encrypt level=require ipsec-protocols=esp
tunnel=no proposal=default ph2-count=0
2 src-address=1.1.1.163/32 src-port=any dst-address=3.3.37.254/32 dst-port=any protocol=gre action=encrypt level=require ipsec-protocols=esp
tunnel=no proposal=default ph2-count=0
3 XI src-address=172.31.4.28/32 src-port=any dst-address=172.31.0.0/26 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes
sa-src-address=4.4.4.220 sa-dst-address=3.3.37.123 proposal=ASA ph2-count=0
4 A src-address=10.200.11.16/28 src-port=any dst-address=10.200.0.0/22 dst-port=any protocol=all action=encrypt level=require ipsec-protocols=esp tunnel=yes
sa-src-address=1.1.1.163 sa-dst-address=2.2.2.2 proposal=main_office ph2-count=1
ip ipsec> proposal print
name="main_office" auth-algorithms=sha1 enc-algorithms=3des lifetime=30m pfs-group=none
ip firewall> nat print (my rules are 0 and 28)
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=accept src-address=10.200.11.16/28 dst-address=10.200.0.0/22 log=no log-prefix=""
1 X ;;; default configuration
chain=srcnat action=masquerade out-interface=ether1-gateway log=no log-prefix=""
2 ;;; City_Master Ipsec over GRE
chain=srcnat action=masquerade to-addresses=0.0.0.0 dst-address=172.31.0.0/26 out-interface=gre-tunnel_Master log=no log-prefix=""
3 ;;; City_Slave Ipsec over GRE
chain=srcnat action=masquerade to-addresses=0.0.0.0 dst-address=172.31.0.0/26 out-interface=gre-tunnel_Slave log=no log-prefix=""
4 ;;; City OpenVpn
chain=srcnat action=masquerade to-addresses=0.0.0.0 dst-address=172.31.0.0/26 out-interface=Kiev log=no log-prefix=""
5 X chain=srcnat action=src-nat to-addresses=172.31.4.28 dst-address=172.31.0.0/26 log=no log-prefix=""
chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=80 protocol=tcp dst-address=1.1.1.163 in-interface=ether1-gateway dst-port=80
log=no log-prefix=""
7 ;;; ND 13337
chain=dstnat action=dst-nat to-addresses=192.168.1.2 to-ports=13337 protocol=tcp dst-address=1.1.1.163 dst-port=13337 log=no log-prefix=""
8 ;;; ND 8050
chain=dstnat action=dst-nat to-addresses=192.168.1.2 to-ports=8050 protocol=tcp dst-address=1.1.1.163 dst-port=8050 log=no log-prefix=""
9 X ;;; RDP SQL
chain=dstnat action=dst-nat to-addresses=192.168.1.101 to-ports=3389 protocol=tcp dst-address=1.1.1.163 dst-port=8899 log=no log-prefix=""
10 X ;;; RDP Main
chain=dstnat action=dst-nat to-addresses=192.168.1.1 to-ports=3389 protocol=tcp dst-address=1.1.1.163 dst-port=2009 log=no log-prefix=""
11 X ;;; ND RDP
chain=dstnat action=dst-nat to-addresses=192.168.1.2 to-ports=3389 protocol=tcp dst-address=1.1.1.163 dst-port=1247 log=no log-prefix=""
12 ;;; 5060
chain=dstnat action=dst-nat to-addresses=10.200.11.18 to-ports=5060 protocol=udp src-address=5.5.5.54 dst-address=1.1.1.163 dst-port=5060
log=no log-prefix=""
13 ;;; 17000-20999
chain=dstnat action=dst-nat to-addresses=10.200.11.18 to-ports=17000-20999 protocol=udp src-address=5.5.5.54 dst-address=1.1.1.163 src-port=""
dst-port=17000-20999 log=no log-prefix=""
14 ;;; ND 443
chain=dstnat action=dst-nat to-addresses=192.168.1.2 to-ports=443 protocol=tcp dst-address=1.1.1.163 dst-port=443 log=no log-prefix=""
15 ;;; ND 8891
chain=dstnat action=dst-nat to-addresses=192.168.1.2 to-ports=8891 protocol=tcp dst-address=1.1.1.163 dst-port=8891 log=no log-prefix=""
16 ;;; ND 11965
chain=dstnat action=dst-nat to-addresses=192.168.1.2 to-ports=11965 protocol=tcp dst-address=1.1.1.163 dst-port=11965 log=no log-prefix=""
17 ;;; pochta_110
chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=110 protocol=tcp dst-address=1.1.1.163 dst-port=110 log=no log-prefix=""
18 ;;; pochta_25
chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=25 protocol=tcp dst-address=1.1.1.163 dst-port=25 log=no log-prefix=""
19 ;;; pochta_2525
chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=25 protocol=tcp dst-address=1.1.1.163 dst-port=2525 log=no log-prefix=""
20 ;;; pochta_2517
chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=25 protocol=tcp dst-address=1.1.1.163 dst-port=2517 log=no log-prefix=""
21 X ;;; 7777
chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=7777 protocol=tcp dst-address=1.1.1.163 dst-port=7777 log=no log-prefix=""
22 ;;; Kolya Oracl
chain=dstnat action=dst-nat to-addresses=192.168.1.20 to-ports=1521 protocol=tcp dst-address=1.1.1.163 dst-port=1219 log=no log-prefix=""
23 X ;;; MagTux
chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=55555 protocol=tcp dst-address=1.1.1.163 dst-port=55555 log=no log-prefix=""
24 ;;; CISCO ASA 5505
chain=dstnat action=dst-nat to-addresses=192.168.1.31 to-ports=22 protocol=tcp dst-address=1.1.1.163 dst-port=10022 log=no log-prefix=""
25 chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=8291 protocol=tcp dst-address=1.1.1.163 dst-port=11122 log=no log-prefix=""
26 chain=srcnat action=masquerade src-address=192.168.1.0/24 out-interface=ether1-gateway log=no log-prefix=""
27 chain=srcnat action=masquerade src-address=192.168.5.0/24 out-interface=ether1-gateway log=no log-prefix=""
28 chain=srcnat action=masquerade src-address=10.200.11.16/28 dst-address=!10.200.0.0/22 out-interface=ether1-gateway log=no log-prefix=""
29 ;;; Medok RDP
chain=dstnat action=dst-nat to-addresses=192.168.5.7 to-ports=3389 protocol=tcp dst-address=1.1.1.163 dst-port=2302 log=no log-prefix=""
30 ;;; Medok Local RDP
chain=dstnat action=dst-nat to-addresses=192.168.5.7 to-ports=3389 protocol=tcp src-address=192.168.1.0/24 dst-address=1.1.1.163 dst-port=2302
log=no log-prefix=""
31 ;;; Medok Local acsses RDP
chain=srcnat action=src-nat to-addresses=1.1.1.163 protocol=tcp src-address=192.168.1.0/24 dst-address=192.168.5.7 dst-port=2302 log=no
log-prefix=""
ip firewall> filter print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; RDP Local
chain=forward action=accept connection-state=established protocol=tcp dst-address-list=Local src-port=3389 log=yes log-prefix=""
1 ;;; Router 1_104
chain=forward action=drop src-address-list=block_list dst-address-list=Local log=no log-prefix=""
2 ;;; RDP
chain=forward action=accept protocol=tcp src-address-list=!Local dst-address-list=RDP dst-port=3389 log=no log-prefix=""
3 X ;;; Block Black List
chain=forward action=drop src-mac-address=8C:89:A5:7C:AA:F2 log=no log-prefix=""
4 X ;;; Block Youtube
chain=forward action=drop layer7-protocol=Block YouTube src-address-list=block_list log=no log-prefix=""
5 X ;;; Block Anonymizer
chain=forward action=reject reject-with=tcp-reset layer7-protocol=anonymizer protocol=tcp src-address-list=block_list log=no log-prefix=""
6 X ;;; Block Video
chain=forward action=reject reject-with=tcp-reset layer7-protocol=video protocol=tcp src-address-list=block_list log=no log-prefix=""
7 X ;;; Block Social
chain=forward action=reject reject-with=tcp-reset layer7-protocol=social protocol=tcp src-address-list=block_list log=no log-prefix=""
8 X chain=forward action=drop src-mac-address=64:89:9A:89:CA:4C log=no log-prefix=""
9 X chain=forward action=drop src-mac-address=A0:91:69:AB:4D:BE log=no log-prefix=""
10 X ;;; Kobka-PC
chain=forward action=accept src-address=0.0.0.0 dst-address=192.168.1.0/24 src-mac-address=10:BF:48:71:AC:B7 log=no log-prefix=""
11 X ;;; drop spammer
chain=forward action=drop protocol=tcp src-address-list=spammer dst-port=25 log=no log-prefix=""
12 X ;;; Find who is spammer
chain=forward action=add-src-to-address-list connection-limit=30,32 protocol=tcp src-address-list=spammer address-list=spammer address-list-timeout=1d
dst-port=25 limit=50,5 log=no log-prefix=""
13 chain=forward action=accept src-address=192.168.100.0/24 dst-address=192.168.1.0/24 dst-address-list=RDP log=no log-prefix=""
14 chain=forward action=accept src-address=192.168.1.0/24 dst-address=192.168.100.0/24 log=no log-prefix=""
15 X chain=forward action=accept src-address=185.35.145.228 dst-address=192.168.1.5 log=no log-prefix=""
16 chain=forward action=accept protocol=tcp dst-address=192.168.1.2 dst-port=13337,8050,443,8891,11965 log=no log-prefix=""
17 ;;; Kolya Oracl
chain=forward action=accept protocol=tcp dst-address=192.168.1.20 dst-port=1521 log=no log-prefix=""
18 X ;;; MagTux
chain=forward action=accept protocol=tcp dst-address=192.168.1.5 dst-port=55555 log=no log-prefix=""
19 chain=forward action=accept protocol=tcp dst-address=192.168.1.7 dst-port=25,80,110,2525,2517 log=no log-prefix=""
20 chain=forward action=accept src-address=192.168.1.0/24 dst-address=192.168.1.0/24 in-interface=ether2-LAN out-interface=ether2-LAN log=no log-prefix=""
21 ;;;
chain=forward action=accept in-interface-list=MY_NET log=no log-prefix=""
22 ;;;
chain=forward action=accept connection-state=established,related in-interface=ether1-gateway out-interface-list=MY_NET log=no log-prefix=""
23 chain=forward action=accept dst-address=172.31.0.0/26 log=no log-prefix=""
24 chain=forward action=accept connection-state=established src-address=172.31.0.0/26 log=no log-prefix=""
25 chain=forward action=accept protocol=tcp dst-address=192.168.1.31 src-address-list=Dnepr in-interface=ether1-gateway dst-port=22 log=no log-prefix=""
26 chain=forward action=accept protocol=tcp dst-address=192.168.1.5 dst-port=8291 log=no log-prefix=""
27 ;;; UkrTel Phones
chain=input action=accept protocol=udp src-address=5.5.5.54 dst-address=1.1.1.163 src-port="" dst-port=5060 log=no log-prefix=""
28 ;;; UkrTel Phones
chain=input action=accept protocol=udp src-address=5.5.5.54 dst-address=1.1.1.163 dst-port=17000-20999 log=no log-prefix=""
29 ;;; OUT 5060
chain=output action=accept protocol=udp dst-address=5.5.5.54 out-interface=ether1-gateway dst-port=5060 log=no log-prefix=""
30 ;;; OUT 17000-20999
chain=output action=accept protocol=udp dst-address=5.5.5.54 out-interface=ether1-gateway dst-port=17000-20999 log=no log-prefix=""
31 chain=forward action=drop log=no log-prefix=""
32 chain=input action=accept protocol=udp in-interface-list=MY_NET dst-port=53 log=no log-prefix=""
33 chain=input action=accept connection-state=established protocol=udp in-interface=ether1-gateway src-port=53 log=no log-prefix=""
34 chain=input action=accept protocol=udp src-address-list=Ukrnafta_Radius_NTP in-interface=!ether1-gateway src-port=123,1645,1646 log=no log-prefix=""
35 chain=input action=accept protocol=udp src-address-list=VPN_Peers in-interface=ether1-gateway dst-port=500,4500 log=no log-prefix=""
36 chain=input action=accept src-address=6.6.6.227 dst-address=1.1.1.163 log=no log-prefix=""
37 ;;; OpenVPN
chain=input action=accept protocol=tcp in-interface=ether1-gateway dst-port=1195 log=no log-prefix=""
38 chain=input action=accept protocol=icmp log=no log-prefix=""
39 chain=input action=accept protocol=gre src-address-list=VPN_Peers in-interface=ether1-gateway log=no log-prefix=""
40 chain=input action=accept protocol=ipencap src-address-list=VPN_Peers in-interface=ether1-gateway log=no log-prefix=""
41 chain=input action=accept protocol=ipsec-esp src-address-list=VPN_Peers in-interface=ether1-gateway log=no log-prefix=""
42 chain=input action=accept protocol=tcp src-address-list=Ukrnafta in-interface=!ether1-gateway dst-port=22,8291 log=no log-prefix=""
43 chain=input action=accept connection-state=established protocol=tcp src-address-list=VPN_Peers in-interface=ether1-gateway src-port=1194 log=no
log-prefix=""
44 chain=input action=accept protocol=tcp src-port=1198 log=no log-prefix=""
45 chain=input action=drop log=no log-prefix=""
ip ipsec> installed-sa print
Flags: H - hw-aead, A - AH, E - ESP
0 E spi=0x955899C src-address=2.2.2.2 dst-address=1.1.1.163 state=mature auth-algorithm=sha1 enc-algorithm=3des enc-key-size=192
auth-key="bf5d9ea5f101a40cb4827d15e85e0e975d9b1f0b" enc-key="801ddcbe357fea2b07a199fe3e54fb421884ca86a88523da" add-lifetime=24m/30m replay=128
1 E spi=0x702FB965 src-address=1.1.1.163 dst-address=2.2.2.2 state=mature auth-algorithm=sha1 enc-algorithm=3des enc-key-size=192
auth-key="5709225fa2431e12571f79bd933cbff8acd3de48" enc-key="0875a68387acea46290f87b41ed66b3ca9a4927164dd3b93" add-lifetime=24m/30m replay=128
ping interface=ether3-Voice 10.200.0.15
SEQ HOST SIZE TTL TIME STATUS
0 packet rejected
1 packet rejected
2 packet rejected
sent=3 received=0 packet-loss=100%