This is an old revision of the document!
Check to make sure IPsec hardware offloading is enabled using show ubnt offload.
Use set system offload ipsec enable in the cli if not.
VPN > IPsec Site-to-SiteShow advanced optionsAutomatically open firewall and exclude from NAT+ Add PeerPeer > FQDN of remote router e.g. er-l.ubnt.comDescription > ipsecLocal IP > 0.0.0.0Encryption > AES-128Hash > SHA1DH Group > 14Pre-shared Secret > <secret>Local subnet > e.g. 192.168.1.0/24Remote subnet > e.g. 172.16.1.0/24Automatically open firewall and exclude from NAT option doesn't allow the ER LAN interface to be reachable through the VPN, this fixes that:Firewall/NAT > Firewall Policies > WAN_LOCAL > Actions > Edit Ruleset > Add New RuleBasic > Description > ipsecAdvanced > IPsec > Match inbound IPsec packetsSource > Address > Remote subnet e.g. 10.0.0.0/24Destination > Address > Local subnet e.g. 10.0.1.0/24Save
: TODO Change from pre-shared key to certificate-based authentication.generate vpn rsa-key configure set vpn rsa-keys local-key file /config/ipsec.d/rsa-keys/localhost.key set vpn rsa-keys rsa-key-name er-l rsa-key <er-l public key> delete vpn ipsec site-to-site peer er-l.ubnt.com authentication mode delete vpn ipsec site-to-site peer er-l.ubnt.com authentication pre-shared-secret set vpn ipsec site-to-site peer er-l.ubnt.com authentication mode rsa set vpn ipsec site-to-site peer er-l.ubnt.com authentication rsa-key-name er-l
TCP MSS clamping enabling to get HTTPS sites working through the VPN:Wizards > TCP MSS clampingEnableAllPPPoEMSS > 1382configure set firewall options mss-clamp interface-type all set firewall options mss-clamp mss 1382 commit save
TODO: