I've hit a road block when it comes to allowing users to connect while on the road to the main office. For them, I've decided on L2TP and IPSec for broad compatibility. I have the configuration to the point where users can connect, but currently, no traffic flows to the internal IP addresses of the home office network (192.168.103.0/24). I can connect to the router using the l2tp-server address (192.168.210.1) so I know traffic can flow over the tunnel, but my clients don't know how to reach the internal IP addresses. I feel like I'm missing a critical step, but I've been searching and can't find it.
Any help you can offer would be greatly appreciated.
Here's the relevant code I used to establish the L2TP/IPSec connection capability.
Code: Select all
/ip ipsec proposal
add enc-algorithms=3des name=l2tp pfs-group=none
/ip pool
add name=vpn-pool ranges=192.168.210.10-192.168.210.100
/ppp profile
add change-tcp-mss=yes dns-server=192.168.210.1 local-address=192.168.210.1 name=l2tp remote-address=vpn-pool use-encryption=yes
/interface l2tp-server server
set default-profile=l2tp enabled=yes
/ip firewall filter
add chain=input port=1701,500,4500 protocol=udp
add chain=input protocol=ipsec-esp
/ip firewall nat
add chain=srcnat dst-address=192.168.210.0/24 src-address=192.168.103.0/24
/ip ipsec peer
add comment=L2TP exchange-mode=main-l2tp generate-policy=port-override nat-traversal=no
/lcd interface pages
set 0 interfaces=wlan1
/ppp secret
add name=dperdue profile=l2tp