Probabilmente sarebbe meglio ti girassi la config corrente
del mikrotik, ma non so se farlo qui è indicato.
In ogni caso :
da Casa A ad Ufficio 1 ci sono due VPN tirate su e funzionanti
una per la rete 192.168.3.0 e una per la 172.20.14.0 tutte e due unique.
Ora io mi sarei aspettato che aggiungendo una rotta del tipo
ip route add 10.7.226.181/32 gateway 10.97.4.172 (Draytek in ufficio 1) il Mikrotik
sapesse instradare il pacchetto attraverso il tunnel, ma forse do per scontato un sacco di cose.
I Draytek facevano cosi, bastava dirgli che all'altro capo di un tunnel c'era un network x.x.x.0/24 e loro
automaticamente aggiungono la route alla tabella di routing e, di conseguenza, i pacchetti venivano instradati attraverso la VPN e dall'altra parte tornavano indietro; probabilmente istruiscono anche il proprio firewall.
questo è il Filter del firewall sul Mikrotik
- Codice: Seleziona tutto
[admin@MikroTik] > ip/firewall/filter print
Flags: X - disabled, I - invalid; D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 ;;; Video network
chain=forward action=accept src-address=192.168.3.0/24 dst-address=172.20.14.0/24 log=no log-prefix=""
2 ;;; Video network
chain=forward action=accept src-address=172.20.14.0/24 dst-address=192.168.3.0/24 log=no log-prefix=""
3 ;;; Winbox Remote
chain=input action=accept protocol=tcp dst-port=xxxx log=no log-prefix=""
4 ;;; http router
chain=input action=accept protocol=tcp dst-port=yyyy log=no log-prefix=""
5 ;;; ssh
chain=input action=accept protocol=tcp dst-port=wwww log=no log-prefix=""
6 ;;; defconf: accept established,related,untracked
chain=input action=accept connection-state=established,related,untracked
7 ;;; defconf: drop invalid
chain=input action=drop connection-state=invalid
8 ;;; defconf: accept ICMP
chain=input action=accept protocol=icmp
9 ;;; defconf: accept to local loopback (for CAPsMAN)
chain=input action=accept dst-address=127.0.0.1
10 ;;; defconf: drop all not coming from LAN
chain=input action=drop in-interface-list=!LAN
11 ;;; defconf: accept in ipsec policy
chain=forward action=accept log=no log-prefix="" ipsec-policy=in,ipsec
12 ;;; defconf: accept out ipsec policy
chain=forward action=accept ipsec-policy=out,ipsec
13 ;;; defconf: fasttrack
chain=forward action=fasttrack-connection hw-offload=yes connection-state=established,related
14 ;;; defconf: accept established,related, untracked
chain=forward action=accept connection-state=established,related,untracked
15 ;;; defconf: drop invalid
chain=forward action=drop connection-state=invalid
e questo è il nat
- Codice: Seleziona tutto
[admin@MikroTik] > ip/firewall/nat print
Flags: X - disabled, I - invalid; D - dynamic
0 ;;; Vpn SAI
chain=srcnat action=accept src-address=192.168.3.0/24 dst-address=10.97.4.128/26 log=no log-prefix=""
1 ;;; IAX
chain=srcnat action=masquerade src-address=192.168.3.0/24 dst-address=192.168.3.17 log=no log-prefix=""
2 ;;; IAX
chain=dstnat action=dst-nat to-addresses=192.168.3.17 to-ports=xxxx protocol=udp dst-address-list=public_ip dst-port=xxxx log=no log-prefix=""
3 ;;; ssh to mikro
chain=srcnat action=masquerade src-address=192.168.3.0/24 dst-address=192.168.3.1 log=no log-prefix=""
4 ;;; ssh to mikro
chain=dstnat action=dst-nat to-addresses=192.168.3.1 to-ports=xxxx protocol=tcp dst-address-list=public_ip dst-port=xxxx log=no log-prefix=""
5 ;;; Grafici Camino
chain=srcnat action=masquerade src-address=192.168.3.0/24 dst-address=192.168.3.100 log=no log-prefix=""
6 ;;; Grafici Camino
chain=dstnat action=dst-nat to-addresses=192.168.3.100 to-ports=xxxx protocol=tcp dst-address-list=public_ip dst-port=xxxx log=no log-prefix=""
7 ;;; Arnie
chain=srcnat action=masquerade src-address=192.168.3.0/24 dst-address=192.168.3.50 log=no log-prefix=""
8 ;;; Arnie
chain=dstnat action=dst-nat to-addresses=192.168.3.50 to-ports=xxxx protocol=tcp dst-address-list=public_ip dst-port=xxxx log=no log-prefix=""
9 ;;; Video
chain=srcnat action=masquerade src-address=192.168.3.0/24 dst-address=192.168.3.101 log=no log-prefix=""
10 ;;; Video
chain=dstnat action=dst-nat to-addresses=192.168.3.101 to-ports=xxxx protocol=tcp dst-address-list=public_ip dst-port=xxxx log=no log-prefix=""
11 ;;; OpenVPN
chain=srcnat action=masquerade to-addresses=192.168.3.17 src-address=192.168.3.0/24 dst-address=192.168.3.17 log=no log-prefix=""
12 ;;; OpenVPN
chain=dstnat action=dst-nat to-addresses=192.168.3.17 to-ports=xxxx protocol=udp dst-address-list=public_ip dst-port=xxxx log=no log-prefix=""
13 ;;; PiGarden
chain=srcnat action=masquerade src-address=192.168.3.0/24 dst-address=192.168.3.18 log=no log-prefix=""
14 ;;; PiGarden
chain=dstnat action=dst-nat to-addresses=192.168.3.18 to-ports=xxxx protocol=tcp dst-address-list=public_ip dst-port=xxxx log=no log-prefix=""
15 ;;; Camino
chain=srcnat action=masquerade src-address=192.168.3.0/24 dst-address=192.168.3.100 log=no log-prefix=""
16 ;;; Camino
chain=dstnat action=dst-nat to-addresses=192.168.3.100 to-ports=xxxx protocol=tcp dst-address-list=public_ip dst-port=xxxx log=no log-prefix=""
17 ;;; defconf: masquerade
chain=srcnat action=masquerade log=no log-prefix="" ipsec-policy=out,none
Ho letto il link che mi hai girato e, se ho capito bene, dovrebbe essere sufficente
aggiungere
- Codice: Seleziona tutto
/ip route add 10.7.226.181/32 gateway 10.97.4.172
- Codice: Seleziona tutto
/ip firewall nat add chain=srcnat action=accept place-before=0 src-address=192.168.3.0/24 dst-address=10.7.226.181/32
l'ultimo inserendolo davanti a tutta la catena nat.
Naturalmente ho provato ma non funge....
Dall'altra rete (172.20.14.0) ovviamente non è necessario ....
O sbaglio?
Grazie mille!!!!