This is an old revision of the document!
clear vpn ipsec-peer <peername>
Check to make sure IPsec hardware offloading is enabled using show ubnt offload.
Use set system offload ipsec enable in the cli if not.
VPN > IPsec Site-to-SiteShow advanced optionsAutomatically open firewall and exclude from NAT+ Add PeerPeer > FQDN of remote router e.g. er-l.ubnt.comDescription > ipsecLocal IP > 0.0.0.0Encryption > AES-128Hash > SHA1DH Group > 14Pre-shared Secret > <secret>Local subnet > e.g. 10.0.0.0/24Remote subnet > e.g. 10.0.1.0/24Automatically open firewall and exclude from NAT option doesn't allow the ER LAN interface to be reachable through the VPN, this fixes that:Firewall/NAT > Firewall Policies > WAN_LOCAL > Actions > Edit Ruleset > Add New RuleBasic > Description > ipsecAdvanced > IPsec > Match inbound IPsec packetsSource > Address > Remote subnet e.g. 10.0.0.0/24Destination > Address > Local subnet e.g. 10.0.1.0/24Save
: TODO Change from pre-shared key to certificate-based authentication.generate vpn rsa-key configure set vpn rsa-keys local-key file /config/ipsec.d/rsa-keys/localhost.key set vpn rsa-keys rsa-key-name er-l rsa-key <er-l public key> delete vpn ipsec site-to-site peer er-l.ubnt.com authentication mode delete vpn ipsec site-to-site peer er-l.ubnt.com authentication pre-shared-secret set vpn ipsec site-to-site peer er-l.ubnt.com authentication mode rsa set vpn ipsec site-to-site peer er-l.ubnt.com authentication rsa-key-name er-l
set service dns forwarding listen-on eth0 (Possibly pppoe0 if using PPPoE)set service dns forwarding options server=/example.com/<remote subset>set service dns forwarding options server=/vpn.example.com/#TCP MSS clamping enabling on both routers to get HTTPS sites working through the VPN:Wizards > TCP MSS clampingEnableAllPPPoEMSS > 1382configure set firewall options mss-clamp interface-type all set firewall options mss-clamp mss 1382 commit save
TODO: