1

Till today, this website showed me some answers that solve the problem. But it seems I couldn't find the correct answer to this problem.

I have a project for a VPN network for remote service purposes, the network will not be used constantly. I developed C# software for windows clients to set Built-In Windows clients to connect to the company's on-premise server.

The server runs Ubuntu 20.04LTS and I set up Strongswan VPN has 2 clients on it.

Client A and Client B can connect L2TP server without any hassle. Any I can ping to Server from both Clients. When I try to connect with both A and B clients, the server just allows a single device to connect and I can ping the server just a single Client.

What I need pinging from Client A to Client B. I felt can't set ufw firewall or iptables, but not sure where to follow.

Configuration below:

/etc/ipsec.secrets

192.168.0.17 %any : PSK "xpasswordx"

/etc/ppp/chap-secrets

userclientA * xpassx 192.168.30.10
userclientB * xpassx 192.168.30.11

/etc/ipsec.conf

config setup
conn L2TP-PSK-noNAT
        dpdaction=clear
        authby=secret
        auto=add
        keyingtries=3
        ikelifetime=8h
        keylife=1h
        keyexchange = ikev1
        ike=aes256-aes192-aes128-sha384-sha256-sha1-modp2048-modp1536-modp1024!
        type=transport
        left=192.168.0.17
        leftprotoport=17/1701
        right=%any
        rightprotoport=17/%any

/etc/xl2tpd/xl2tpd.conf

    [global]
    ipsec saref = yes
    saref refinfo = 30
    ;debug avp = yes
    ;debug network = yes
    ;debug state = yes
    ;debug tunnel = yes
    [lns default]
    ip range = 192.168.30.2-192.168.30.254
    local ip = 192.168.30.1
    refuse pap = yes
    require authentication = yes
    ;ppp debug = yes
    pppoptfile = /etc/ppp/options.xl2tpd
    length bit = yes

/etc/ppp/options.xl2tpd
    
    logfd 2
    logfile /var/log/xl2tpns.log
    refuse-mschap-v2
    refuse-mschap
    ms-dns 8.8.8.8
    ms-dns 8.8.4.4
    asyncmap 0
    auth
    crtscts
    idle 1800
    mtu 1200
    mru 1200
    lock
    hide-password
    local
    #debug
    name l2tpd
    proxyarp
    lcp-echo-interval 30
    lcp-echo-failure 4

iptables -L

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     udp  --  anywhere             anywhere             policy match dir in pol ipsec udp dpt:l2f

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination 

/etc/sysctl.conf

net.ipv4.ip_forward = 1
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.rp_filter = 0
net.ipv4.conf.default.accept_source_route = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv4.icmp_ignore_bogus_error_responses = 1

0 Answers0