Router: CCR1036-12G-4S
---
Hi,
We have a remote site with four VLANs configured such as;
- Management VLAN - 172.22.20.0/24
- VLAN 1 - 172.22.21.0/24
- VLAN 2 - 172.22.22.0/24
- VLAN 3 - 172.22.23.0/24
Inter-VLAN routing is enabled and we restrict back VLAN traffic using the built-in firewall. Locally, we can connect to the Management VLAN and can ping the local VLAN gateways and also any devices which are allowed to pass-through the firewall.
Now, on the local network we have a subnet 192.168.150.0/24 and this is connected via IPSec VPN to the remote Management VLAN 172.22.20.0/24. This allows local admins to access and administer the remote network. The problem is when we connect over VPN Inter-VLAN routing is no longer functional and we can't ping/access any of the VLAN gateways. It doesn't seem to be a firewall problem as you would still expect to get a response from the VLAN gateways and there are allow rules permitting traffic from the local network.
As a workaround we have configured multiple phase twos on the VPN whereby we have a phase two per subnet. This is sub-optimal from a security perspective as we're now connecting our local network directly to each remote VLAN, which is bypassing the security policy. Ideally, we want to be able connect into the management network and route traffic as normal to the other VLANs, respecting the firewall rules accordingly.
Does anybody know a way to achieve this?
Thanks,
t04s