I have been banging my head against the desk for a while trying to solve a problem.
I have a Mikrotik CRS125.
I have configured certificates and OVPN. I am able to log in without an issue.
I have 2 subnets:
192.168.99.0/24 - internal network
192.168.81.0/24 - vpn network
I am able to log into the OVPN and obtain a 192.168.81.0 IP address.
I have a firewall rule that states:
action=accept chain=input dst-address=192.168.99.0/24 src-address=192.168.81.0/24
I am able to access the internet from a client connected to the VPN without issue via the VPN, this is verified by tracert. DNS lookups to internet addresses work fine.
So, onto what isn’t working, I am unable to access devices on the 192.168.99.0/24 network. i am assuming it is something to do with routing within the router.
Tracert on the openvpn client device gives the following:
C:>tracert 192.168.99.5
Tracing route to 192.168.99.5 over a maximum of 30 hops
1 127 ms 56 ms 54 ms 192.168.81.1
2 * * * Request timed out.
3 * * * Request timed out.
Within >IP>Route I have the following:
11 ADC 192.168.81.100/32 192.168.81.1 0
12 ADC 192.168.99.0/24 192.168.99.1 ether1-OfficeLAN 0
This does not seem correct as the address space for 192.168.81.0 is actually 192.168.81.0/24
Does anyone have any suggestions what the issue is?
I have done quite alot of reading and it would appear I have an issue with my firewall rules or routes and I don’t really know how to resolve this.
I have read that some people add a bridge, some people add a mangle rule, some people just do basic config and it works fine.
A few notes: Proxy is currently disabled, hotspot is currently disabled, network comprises OfficeLAN, GuestLAN, OVPN, WAN1 and WAN2, failover between the 2 WANs works fine.
I am sure the issue is related to the WAN failover.
A further test has proven that the firewall rules to allow access to the printers from the guest network is not functioning either.
Therefore all the traffic for each subnet is routing outwards. I am not sure whether there is a mangle rule or a routing rule required.
Does anyone have any suggestions on what rule should be applied?
The end goal is to have the following:
2 Seperate Physical WAN connections with the ability to failover if internet connectivity is not available. Simple next hop failover is not sufficient.
1 Office Network (192.168.99.0/24)
1 Guest Network (192.168.150.0/24)
OpenVPN Remote Access
Guest Network shall only be able to access the printers on Office Network
Future: Hotspot on Guest Network
Future: Internet Proxy
Thanks CTSsean,
I have read up on the difference between input and forward, anything that is performed internal to the router (ie between subnets) is now on a forward rule.
I have tidied up all of the rules to remove any duplicates and simplified the masquerade rules as you mentioned.
I am still being prevented access across between 192.168.81.0 and 192.168.99.0, I will check that 192.168.150.0 can access the 2 printers tomorrow however I am fairly certain that they will not be accessible.
Do you know of a better guide for setting up a failover between WAN connections?
I do have additional modems connected to ether23 and ether24 which provide internet access, therefore just performing a ping test to the next hop does not give me confirmation if there is internet connectivity on that link, the ping test would just tell me that a modem is down.