I have recently purchased a RB750Gr3 to replace my aging RB750G and am having trouble setting up a pure ipsec road warrior XAUTH PSK configuration. I achieve phase 2 (This does not work with any RC version so I rolled back to 6.37.3) and can see the ipsec debug log attempting to pass traffic but I CANNOT PING either direction through the tunnel.
My setup is a pretty simple natted gateway with default configuration, local dhcp pool 192.168.88.0/24. Ipsec has its own seperate pool to pull from, 192.168.99.0/24. The only firewall rule addition is accepting port 500,4500 on the input chain. ipsec mode-cfg is set up to split include 192.168.88.0/24.
Do I need to add a srcnat rule to accept destination traffic to my ipsec pool? I have read conflicting advice on this and whether natting happens before the tunnel or after. Do I need to clear connections somehow after creating this nat rule?
Do I need to add a firewall rule to allow forward traffic from my ipsec pool to my dhcp subnet or is the 500,4500 rule enough?
Should my ipsec peer configuration have NAT-T enabled since I am natted?
What else could be stopping me from being able to ping through the tunnel?
Yes you need to accept traffic that is going to be encapsulated before NAT rule and yes if connection was already established before rule was created it need to be cleared.
If you have strict forward policies that can block this traffic then yes you need to add accept rules in forward chain.
If you have strict forward policies that can block this traffic then yes you need to add accept rules in forward chain.
I have the default forward rules so I think this may be my problem. Should this new accept rule accept all forwards from the sa-local address, the sa-remote address, or my ipsec pool? If its the remote address I am not sure how I would know that beforehand.
In forward you must accept from your pool to whatever network you want to allow access. SA-local and SA remote addresses do not appear in forward chain.
Thanks for your help here. There were some necessary additions. Hopefully this helps someone.
Default firewall config uses fastrack forwarding. Fasttrack bypasses ipsec policies causing ipsec not to work! The solution is a raw nat rule to force ipsec past fasttrack rule into normal forward rule.