Traffic not routing through IPsec Tunnel

New to PL… and having issues. I’ve established an IPsec tunnel between my PL and FortiGate. Tunnel is up, however I cannot pass traffic through the tunnel. This tells me it’s either a routing or firewall policy/ACL based issue.

On the FGT side I’ve run a PCAP on the tunnel interface and I’m seeing no traffic hit the tunnel, despite being on the PL side trying to access my server.

FGT has all the requisite policies to allow the traffic. I see bytes on the firewall policy after trying to send packets through the tunnel, so I know the FGT is routing the traffic to/through the tunnel.

PL has the default “allow all”… even added granular policies from local to remote and remote to local defining the same subnets from my P2 proposals.

What am I missing? I’m not seeing anything logged on the PL side in the event logs(enabled event logging on both outbound and inbound firewall policies).

hi…
By default… Peplink route the ip range to the ipsec tunnel… Have you try, at the peplink, do a ping? from the peplink to the PA device?

1 Like

Have you tried changing the IPSec type to Route-based? Then you can use outbound policy rules to send whatever traffic you want across the tunnel.

1 Like

Tried pinging from client devices behind the peplink to multiple devices behind the FortiGate. Nothing is hitting the FortiGate side.

Yes, I’ve tried changing to route based and added an outbound policy for source network to destination network, encforced / IPsec tunnel. IPsec tunnel still up showing a green box and 10.100.1.0/24 ↔ 10.10.0.0/16.

No traffic is passing through the tunnel.

but…
Have you try direct from the PA device going direct to the peplink device?
Not from the pc connected at the PA or at the Peplink.

Peplink > Dashboard > System > Ping ?

1 Like

Yes. I have tried both directions, pinging from the FortiGate to Peplink and the reverse.

Please…
Just check at the Peplink… don´t share the result of the command here…

AT dashboard > System ; enable cli
at the cli
type: support ip-route-show

Check the ip routes of the device.

1 Like

Getting somewhere. I only see my untagged, tagged, and cellular/default route. No routes for the remote subnet or any routes referencing my IPsec tunnel.

And I don’t see how to create static routes for specific interfaces. I’m used to a lot more control over traffic routing.

You don’t need to create it… just add it, from the option menu at ipsec window.

sample… other side is Teltonika

and don’t need to add it a lan router window.

and don’t need to add it at " Outbound Policy".

I did it just like that, however no Local or Remote ID’s as I have static IP’s on both ends and I’m using IP address of the remote gateway. I get that the P2 proposals matching *should allow routing to the VPN interface, it just doesn’t appear that’s happening.

Tunnel is up according to both sides, no traffic.

Deleted and rebuilt both sides of the IPsec tunnel, again tunnel establishes but no traffic.

Next up, I created inbound and outbound firewall policies as suggested by a PepLink Solutions Engineer. Didn’t fix it.

Switched to Route-Based and added an outbound policy enforcing all traffic through the VPN as suggested by another PepLink engineer. Still no change.

Regardless of IPsec type, I can get the tunnel up according to both ends(FortiGate and PepLink).

FortiGate side I can run CLI command and verify that I have a static route to the subnet on the PepLink side referencing the remote subnet and tunnel interface with correct remote gateway. All looks good. From a device on the FortiGate subnet, when I ping/attempt to access a device on the PepLink end, I see traffic going out the firewall policy. I can also confirm via packet capture on the FortiGate that traffic is routing to the tunnel. Outbound pings from my laptop are showing up in the PCAP for the tunnel interface. No traffic initiated from the PepLink or devices behind it show up in the FortiGate’s PCAP.

quite weird… I never had to create a firewall rule at peplink device to allow ipsec traffic flow.

I’m debating changing my P1/P2 SA’s… but at the same time since the tunnel is negotiating, I can’t imagine that would have much effect other than just burning more troubleshooting time. My FortiGate would allow the tunnel to establish if the SA’s were the issue.

I’ve got an open ticket with support, so I think I’ll just leave it to them now.