Route not being injected in site-to-site vpn

Comments

11 comments

  • Avatar
    Firewalla

    In your site-to-site VPN configuration, which one is the "client" that connects to the "server"? 

    What is the relationship of 172.16.1.0 network, it is not showing on your LAN network, so unlikely firewalla on the other side to know/notice that network.

     

    0
    Comment actions Permalink
  • Avatar
    Galied Nanhekhan

    From traditional vpn, the Firewalla advertises all its interfaces, so it is then strange that the static route is is not distributed via vpn toward the peer. In this case, site A is the server and site B is the client. Site B doesn't receive the static route. Placing manual a static route on site B doesn't work. What do you suggest?

    0
    Comment actions Permalink
  • Avatar
    Firewalla

    Is the 172.16.1.0 a network connecting to firewalla directly?

    0
    Comment actions Permalink
  • Avatar
    Galied Nanhekhan

    I just logged in the Purple and I created a static route toward 172.16.1.0/24 = Logged via SSH console.

    0
    Comment actions Permalink
  • Avatar
    Galied Nanhekhan

    As a test, when changing the vpn client on side B, and and using the option 'VPN' for Internet, all Internet traffic goes from site B to side A. So it was interesting to see that traffic for 172.16.1.0/24 also went to the first hop of WireGuard and then it suddenly stopped. I tested this via a local system on site B. Maybe useful information?

    0
    Comment actions Permalink
  • Avatar
    Galied Nanhekhan

    Amazing! Now I can ping the 172.16.1.0/24 via a local system in site B. It took some time.

    Then I also removed the static route from site B which was pointing to the WireGuard next-hop toward site A. So this also worked.

    When using direct Internet connection, then the 172.16.1.0/24 is not reachable from site B.

    0
    Comment actions Permalink
  • Avatar
    Galied Nanhekhan

    Firewalla support desk, can you please investigate?

    0
    Comment actions Permalink
  • Avatar
    Firewalla Team

    @Galied Nanhekhan, yeah. That's expected. Purple knows Gold's local networks but is not aware that 172.16.1.0/24 is also on side A (Gold). Non-side A LAN subnets will be marked as an external resource. When you access it, the flow will be treated as internet traffic. You need to set the 'Internet' option to VPN. 

    0
    Comment actions Permalink
  • Avatar
    Galied Nanhekhan

    Thanks for your reply.

    Setting up the internet option is no solution since local Internet break-out will not work anymore. I don't want to reroute Internet traffic.

    Can you confirm that static routes are not redistributed over vpn? Is there any plans in the future to make redistribution work?

    Right now I really have a showstopper with my Firewalla for accessing remote networks.

    0
    Comment actions Permalink
  • Avatar
    Galied Nanhekhan

    Support desk,

    Can you please react on this message??? If it is not possible, then at least confirm so that I know that Firewall is having a routing issue!

    0
    Comment actions Permalink
  • Avatar
    Firewalla

    @Galied, let me create a ticket for you. Easier to ask the question there, since they may need your configuration

    0
    Comment actions Permalink

Please sign in to leave a comment.