root@mainofficerouter:~ # ping -t 3 100.64.22.2PING 100.64.22.2 (100.64.22.2): 56 data bytesping: sendto: Network is down
root@mainofficerouter:~ # cat /usr/local/etc/ipsec.conf# This file is automatically generated. Do not editconfig setup uniqueids = yesconn con1 aggressive = no fragmentation = yes keyexchange = ikev2 mobike = yes reauth = yes rekey = yes forceencaps = no installpolicy = no type = tunnel left = 80.153.119.52 right = custwar02.edvnet.biz rightallowany = yes leftid = userfqdn:site2siteHQBN@cust-bonn.de ikelifetime = 28800s lifetime = 3600s ike = aes256-sha512-modp2048! leftauth = pubkey rightauth = pubkey leftcert = /usr/local/etc/ipsec.d/certs/cert-1.crt leftsendcert = always rightca = "/C=DE/ST=NRW/L=Bonn/O=cust XXXXXX GmbH/OU=cust XCA/CN=custVpnCA/emailAddress=edv@cust-bonn.de/" rightid = userfqdn:site2sitehowa@cust-bonn.de reqid = 1 rightsubnet = 0.0.0.0/0 leftsubnet = 0.0.0.0/0 esp = aes256-sha512-modp2048! auto = addconn con2 aggressive = no fragmentation = yes keyexchange = ikev2 mobike = yes reauth = yes rekey = yes forceencaps = no installpolicy = no type = tunnel left = 80.153.119.52 right = custror02.edvnet.biz rightallowany = yes leftid = userfqdn:site2siteHQBN@cust-bonn.de ikelifetime = 28800s lifetime = 3600s ike = aes256-sha512-modp2048! leftauth = pubkey rightauth = pubkey leftcert = /usr/local/etc/ipsec.d/certs/cert-2.crt leftsendcert = always rightca = "/C=DE/ST=NRW/L=Bonn/O=cust XXXXXX GmbH/OU=cust XCA/CN=custVpnCA/emailAddress=edv@cust-bonn.de/" rightid = userfqdn:site2sitehoro@cust-bonn.de reqid = 2 rightsubnet = 0.0.0.0/0 leftsubnet = 0.0.0.0/0 esp = aes256-sha512-modp2048! auto = addinclude ipsec.opnsense.d/*.conf
Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[NET] <8> received packet: from 79.XXX.XXX.190[500] to 80.XXX.XXX.52[500] (464 bytes)Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <8> parsed IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <8> 79.XXX.XXX.190 is initiating an IKE_SAJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <8> selected proposal: IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <8> sending cert request for "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, OU=Customer XCA, CN=CustomerRootCA, E=edv@custdomain.de"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <8> sending cert request for "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, OU=Customer XCA, CN=CustomerVpnCA, E=edv@custdomain.de"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <8> sending cert request for "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, OU=Customer XCA, CN=CustomerMgmtCA, E=edv@custdomain.de"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <8> generating IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[NET] <8> sending packet: from 80.XXX.XXX.52[500] to 79.XXX.XXX.190[500] (537 bytes)Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[NET] <8> received packet: from 79.XXX.XXX.190[4500] to 80.XXX.XXX.52[4500] (1236 bytes)Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <8> parsed IKE_AUTH request 1 [ EF(1/3) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <8> received fragment #1 of 3, waiting for complete IKE messageJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[NET] <8> received packet: from 79.XXX.XXX.190[4500] to 80.XXX.XXX.52[4500] (1236 bytes)Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <8> parsed IKE_AUTH request 1 [ EF(2/3) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <8> received fragment #2 of 3, waiting for complete IKE messageJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[NET] <8> received packet: from 79.XXX.XXX.190[4500] to 80.XXX.XXX.52[4500] (548 bytes)Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <8> parsed IKE_AUTH request 1 [ EF(3/3) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <8> received fragment #3 of 3, reassembled fragmented IKE message (2832 bytes)Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <8> parsed IKE_AUTH request 1 [ IDi CERT CERTREQ IDr AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(ADD_6_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <8> received cert request for "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, OU=Customer XCA, CN=CustomerVpnCA, E=edv@custdomain.de"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <8> received end entity cert "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, E=site2sitehoro@custdomain.de, CN=Customer_HORO"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <8> looking for peer configs matching 80.XXX.XXX.52[site2siteHQBN@custdomain.de]...79.XXX.XXX.190[site2sitehoro@custdomain.de]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> selected peer config 'con2'Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> using certificate "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, E=site2sitehoro@custdomain.de, CN=Customer_HORO"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> using trusted intermediate ca certificate "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, OU=Customer XCA, CN=CustomerVpnCA, E=edv@custdomain.de"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> checking certificate status of "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, E=site2sitehoro@custdomain.de, CN=Customer_HORO"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> certificate status is not availableJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> using trusted ca certificate "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, OU=Customer XCA, CN=CustomerRootCA, E=edv@custdomain.de"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> checking certificate status of "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, OU=Customer XCA, CN=CustomerVpnCA, E=edv@custdomain.de"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> certificate status is not availableJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> reached self-signed root ca with a path length of 1Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|8> authentication of 'site2sitehoro@custdomain.de' with RSA_EMSA_PKCS1_SHA2_256 successfulJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|8> received ESP_TFC_PADDING_NOT_SUPPORTED, not using ESPv3 TFC paddingJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|8> peer supports MOBIKEJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|8> authentication of 'site2siteHQBN@custdomain.de' (myself) with RSA_EMSA_PKCS1_SHA2_256 successfulJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|7> schedule delete of duplicate IKE_SA for peer 'site2sitehoro@custdomain.de' due to uniqueness policy and suspected reauthenticationJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|8> IKE_SA con2[8] established between 80.XXX.XXX.52[site2siteHQBN@custdomain.de]...79.XXX.XXX.190[site2sitehoro@custdomain.de]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|8> scheduling reauthentication in 28070sJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|8> maximum IKE_SA lifetime 28610sJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|8> sending end entity cert "C=DE, ST=NRW, L=Bonn, O=Customer GmbH, E=site2siteHQBN@custdomain.de, CN=Customer_HQBN"Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[CFG] <con2|8> selected proposal: ESP:AES_CBC_256/HMAC_SHA2_512_256/NO_EXT_SEQJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|8> CHILD_SA con2{14} established with SPIs c4725931_i c15fe5c5_o and TS 0.0.0.0/0 === 0.0.0.0/0Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <con2|8> generating IKE_AUTH response 1 [ IDr CERT AUTH N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_4_ADDR) N(ADD_6_ADDR) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <con2|8> splitting IKE message (2720 bytes) into 3 fragmentsJan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <con2|8> generating IKE_AUTH response 1 [ EF(1/3) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <con2|8> generating IKE_AUTH response 1 [ EF(2/3) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <con2|8> generating IKE_AUTH response 1 [ EF(3/3) ]Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[NET] <con2|8> sending packet: from 80.XXX.XXX.52[4500] to 79.XXX.XXX.190[4500] (1236 bytes)Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[NET] <con2|8> sending packet: from 80.XXX.XXX.52[4500] to 79.XXX.XXX.190[4500] (1236 bytes)Jan 15 14:11:30 mainofficerouter.custdomain.de charon[31072]: 15[NET] <con2|8> sending packet: from 80.XXX.XXX.52[4500] to 79.XXX.XXX.190[4500] (420 bytes)Jan 15 14:11:40 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|7> deleting IKE_SA con2[7] between 80.XXX.XXX.52[site2siteHQBN@custdomain.de]...79.XXX.XXX.190[site2sitehoro@custdomain.de]Jan 15 14:11:40 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|7> sending DELETE for IKE_SA con2[7]Jan 15 14:11:40 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <con2|7> generating INFORMATIONAL request 0 [ D ]Jan 15 14:11:40 mainofficerouter.custdomain.de charon[31072]: 15[NET] <con2|7> sending packet: from 80.XXX.XXX.52[4500] to 79.XXX.XXX.190[4500] (96 bytes)Jan 15 14:11:40 mainofficerouter.custdomain.de charon[31072]: 15[NET] <con2|7> received packet: from 79.XXX.XXX.190[4500] to 80.XXX.XXX.52[4500] (96 bytes)Jan 15 14:11:40 mainofficerouter.custdomain.de charon[31072]: 15[ENC] <con2|7> parsed INFORMATIONAL response 0 [ ]Jan 15 14:11:40 mainofficerouter.custdomain.de charon[31072]: 15[IKE] <con2|7> IKE_SA deleted
root@pmainofficerouter:~ # ifconfig ipsec1ipsec1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1400 tunnel inet 80.XXX.XXX.52 --> 91.XXX.XXX.162 inet6 fe80::42a6:b7ff:fe3c:f8cd%ipsec1 prefixlen 64 scopeid 0x14 inet 100.64.21.1 --> 100.64.21.2 netmask 0xfffffffc groups: ipsec reqid: 1 nd6 options=23<PERFORMNUD,ACCEPT_RTADV,AUTO_LINKLOCAL>root@pmainofficerouter:~ # ifconfig ipsec2ipsec2: flags=8011<UP,POINTOPOINT,MULTICAST> metric 0 mtu 1400 inet 100.64.22.1 --> 100.64.22.2 netmask 0xfffffffc inet6 fe80::42a6:b7ff:fe3c:f8cd%ipsec2 prefixlen 64 tentative scopeid 0x15 groups: ipsec reqid: 2 nd6 options=23<PERFORMNUD,ACCEPT_RTADV,AUTO_LINKLOCAL>
root@mainofficerouter:~ # date ; netstat -rn | grep ipsecSat Jan 15 14:28:45 CET 202210.0.1.0/24 100.64.21.2 UGS ipsec110.0.2.0/24 100.64.21.2 UGS ipsec110.0.5.0/24 100.64.21.2 UGS ipsec110.1.12.0/24 100.64.22.2 UGS ipsec210.1.21.0/24 100.64.21.2 UGS ipsec110.1.21.253 100.64.21.2 UGHS ipsec110.1.22.0/24 100.64.22.2 UGS ipsec210.1.22.2 100.64.22.2 UGHS ipsec210.1.62.0/24 100.64.22.2 UGS ipsec2100.64.21.2 ipsec1 UHS ipsec1100.64.22.2 ipsec2 UHS ipsec2fe80::%ipsec1/64 link#20 U ipsec1fe80::42a6:b7ff:fe3c:f8cd%ipsec1 link#20 UHS lo0fe80::%ipsec2/64 link#21 U ipsec2fe80::42a6:b7ff:fe3c:f8cd%ipsec2 link#21 UHS lo0
root@homeoffice2router:~ # date ; netstat -rn | grep ipsecSat Jan 15 14:29:55 CET 202210.0.1.0/24 100.64.22.1 UGS ipsec110.0.2.0/24 100.64.22.1 UGS ipsec110.1.1.0/24 100.64.22.1 UGS ipsec110.1.2.0/24 100.64.22.1 UGS ipsec110.1.2.2 100.64.22.1 UGHS ipsec110.1.4.0/24 100.64.22.1 UGS ipsec1100.64.22.1 ipsec1 UHS ipsec1fe80::%ipsec1/64 link#18 U ipsec1fe80::de58:bcff:fee0:38ca%ipsec1 link#18 UHS lo0
root@homeoffice2router:~ # route -n show 10.1.1.18 route to: 10.1.2.2destination: 10.1.2.2 gateway: 100.64.22.1 fib: 0 interface: ipsec1 flags: <UP,GATEWAY,HOST,DONE,STATIC> recvpipe sendpipe ssthresh rtt,msec mtu weight expire 0 0 0 0 1400 1 0
root@mainofficerouter:~ # route -n show 10.1.22.111 route to: 10.1.22.111destination: 10.1.22.0 mask: 255.255.255.0 gateway: 100.64.22.2 fib: 0 interface: ipsec2 flags: <UP,GATEWAY,DONE,STATIC> recvpipe sendpipe ssthresh rtt,msec mtu weight expire 0 0 0 0 1400 1 0
C:\WINDOWS\system32>ipconfigWindows-IP-KonfigurationEthernet-Adapter Ethernet: Verbindungsspezifisches DNS-Suffix: intra.customdomain.de IPv6-Adresse. . . . . . . . . . . : XXXX.XX:XXXX:XXXX::2000 IPv6-Adresse. . . . . . . . . . . : XXXX.XX:XXXX:XXXX:8821:11ff:6c2a:716 Verbindungslokale IPv6-Adresse . : fe80::8821:11ff:6c2a:716%7 IPv4-Adresse . . . . . . . . . . : 10.1.22.111 Subnetzmaske . . . . . . . . . . : 255.255.255.0 Standardgateway . . . . . . . . . : fe80::de58:bcff:fee0:38cb%7 10.1.22.1C:\WINDOWS\system32>tracert -d 10.1.2.2Routenverfolgung zu 10.1.2.2 über maximal 30 Hops 1 2 ms 1 ms 9 ms 10.1.22.1 2 * * * Zeitüberschreitung der Anforderung. 3 ^CC:\WINDOWS\system32>
root@10.1.2.2:~# traceroute -n 10.1.22.111traceroute to 10.1.22.111 (10.1.22.111), 30 hops max, 60 byte packets 1 10.1.2.1 0.177 ms 0.161 ms 0.139 ms 2 * * * 3 * * * 4 * * * 5 * * * 6 * * * 7 *^C
root@mainofficerouter:~ # ping -t 3 100.64.21.2PING 100.64.21.2 (100.64.21.2): 56 data bytes64 bytes from 100.64.21.2: icmp_seq=0 ttl=64 time=34.851 ms64 bytes from 100.64.21.2: icmp_seq=1 ttl=64 time=35.068 ms64 bytes from 100.64.21.2: icmp_seq=2 ttl=64 time=35.031 ms--- 100.64.21.2 ping statistics ---4 packets transmitted, 3 packets received, 25.0% packet lossround-trip min/avg/max/stddev = 34.851/34.983/35.068/0.095 msroot@mainofficerouter:~ # ping -t 3 100.64.22.2PING 100.64.22.2 (100.64.22.2): 56 data bytesping: sendto: Network is downping: sendto: Network is downping: sendto: Network is down--- 100.64.22.2 ping statistics ---3 packets transmitted, 0 packets received, 100.0% packet loss
Why do you tick "Dynamic Gateway"? This is only needed for respond-only.
You really should start at the beginning:On both sites "default", not respond or start, only use IPs instead of names, use PSK instead of certs.If this work activate one by another.
root@mainofficerouter:~ # netstat -rnRouting tablesInternet:Destination Gateway Flags Netif Expiredefault 62.156.244.25 UGS pppoe18.8.8.8 62.156.244.25 UGHS pppoe19.9.9.9 192.168.2.1 UGHS igb310.0.1.0/24 100.64.21.2 UGS ipsec110.0.2.0/24 100.64.21.2 UGS ipsec110.0.5.0/24 100.64.21.2 UGS ipsec110.1.1.0/24 link#3 U igb010.1.1.1 link#3 UHS lo010.1.2.0/24 link#12 U lagg0_vl10.1.2.1 link#12 UHS lo010.1.3.0/24 link#13 U lagg0_vl10.1.3.1 link#13 UHS lo010.1.4.0/24 link#14 U lagg0_vl10.1.4.1 link#14 UHS lo010.1.6.0/24 link#15 U lagg0_vl10.1.6.1 link#15 UHS lo010.1.12.0/24 100.64.22.2 UGS ipsec210.1.21.0/24 100.64.21.2 UGS ipsec110.1.21.253 100.64.21.2 UGHS ipsec110.1.22.0/24 100.64.22.2 UGS ipsec210.1.22.2 100.64.22.2 UGHS ipsec210.1.62.0/24 100.64.22.2 UGS ipsec262.156.244.25 link#20 UH pppoe180.153.119.52 link#20 UHS lo0100.64.11.0/24 100.64.11.2 UGS ovpns1100.64.11.1 link#18 UHS lo0100.64.11.2 link#18 UH ovpns1100.64.21.1 link#21 UHS lo0100.64.21.2 ipsec1 UHS ipsec1100.64.22.1 link#19 UHS lo0100.64.22.2 ipsec2 UHS ipsec2127.0.0.1 link#8 UH lo0192.168.2.0/24 link#6 U igb3192.168.2.1 3c:ec:ef:89:35:87 UHS igb3192.168.2.201 link#6 UHS lo0217.237.149.205 62.156.244.25 UGHS pppoe1217.237.151.51 62.156.244.25 UGHS pppoe1Internet6:Destination Gateway Flags Netif Expiredefault fe80::200:ff:fe00:0%pppoe1 UG pppoe1::1 link#8 UH lo02003:a:77f:f6bc::/64 link#20 U pppoe12003:a:77f:f6bc:42a6:b7ff:fe3c:f8cd link#20 UHS lo0fe80::%ixl1/64 link#2 U ixl1fe80::42a6:b7ff:fe3c:f8cd%ixl1 link#2 UHS lo0fe80::%igb0/64 link#3 U igb0fe80::3eec:efff:fe89:3584%igb0 link#3 UHS lo0fe80::%igb2/64 link#5 U igb2fe80::3eec:efff:fe89:3586%igb2 link#5 UHS lo0fe80::%igb3/64 link#6 U igb3fe80::3eec:efff:fe89:3587%igb3 link#6 UHS lo0fe80::%lo0/64 link#8 U lo0fe80::1%lo0 link#8 UHS lo0fe80::%lagg0/64 link#11 U lagg0fe80::42a6:b7ff:fe3c:f8cc%lagg0 link#11 UHS lo0fe80::%lagg0_vlan1120/64 link#12 U lagg0_vlfe80::42a6:b7ff:fe3c:f8cc%lagg0_vlan1120 link#12 UHS lo0fe80::%lagg0_vlan1130/64 link#13 U lagg0_vlfe80::42a6:b7ff:fe3c:f8cc%lagg0_vlan1130 link#13 UHS lo0fe80::%lagg0_vlan1140/64 link#14 U lagg0_vlfe80::42a6:b7ff:fe3c:f8cc%lagg0_vlan1140 link#14 UHS lo0fe80::%lagg0_vlan1160/64 link#15 U lagg0_vlfe80::42a6:b7ff:fe3c:f8cc%lagg0_vlan1160 link#15 UHS lo0fe80::%igb2_vlan7/64 link#16 U igb2_vlafe80::3eec:efff:fe89:3586%igb2_vlan7 link#16 UHS lo0fe80::%ixl1_vlan7/64 link#17 U ixl1_vlafe80::42a6:b7ff:fe3c:f8cd%ixl1_vlan7 link#17 UHS lo0fe80::42a6:b7ff:fe3c:f8cd%ovpns1 link#18 UHS lo0fe80::%ipsec2/64 link#19 U ipsec2fe80::42a6:b7ff:fe3c:f8cd%ipsec2 link#19 UHS lo0fe80::%pppoe1/64 link#20 U pppoe1fe80::3eec:efff:fe89:3584%pppoe1 link#20 UHS lo0fe80::42a6:b7ff:fe3c:f8cd%pppoe1 link#20 UHS lo0fe80::%ipsec1/64 link#21 U ipsec1fe80::42a6:b7ff:fe3c:f8cd%ipsec1 link#21 UHS lo0
root@homeoffice2router:~ # netstat -rnRouting tablesInternet:Destination Gateway Flags Netif Expiredefault 62.155.241.177 UGS pppoe08.8.8.8 62.155.241.177 UGHS pppoe010.1.1.0/24 100.64.22.1 UGS ipsec110.1.2.0/24 100.64.22.1 UGS ipsec110.1.2.2 100.64.22.1 UGHS ipsec110.1.12.0/24 link#2 U igb110.1.12.1 link#2 UHS lo010.1.22.0/24 link#12 U igb1_vla10.1.22.1 link#12 UHS lo010.1.32.0/24 link#13 U igb1_vla10.1.32.1 link#13 UHS lo010.1.62.0/24 link#14 U igb1_vla10.1.62.1 link#14 UHS lo062.155.241.177 link#17 UH pppoe079.207.107.190 link#17 UHS lo0100.64.12.0/24 100.64.12.2 UGS ovpns1100.64.12.1 link#16 UHS lo0100.64.12.2 link#16 UH ovpns1100.64.22.1 ipsec1 UHS ipsec1100.64.22.2 link#18 UHS lo0127.0.0.1 link#8 UH lo0217.237.150.115 62.155.241.177 UGHS pppoe0217.237.151.205 62.155.241.177 UGHS pppoe0Internet6:Destination Gateway Flags Netif Expiredefault fe80::231:46ff:fe06:6f83%pppoe0 UG pppoe0::1 link#8 UH lo02001:4860:4860::8888 fe80::231:46ff:fe06:6f83%pppoe0 UGHS pppoe02003:e2:af2f:3801::/64 link#2 U igb12003:e2:af2f:3801:de58:bcff:fee0:38cb link#2 UHS lo02003:e2:af2f:3802::/64 link#12 U igb1_vla2003:e2:af2f:3802:de58:bcff:fee0:38cb link#12 UHS lo02003:e2:af2f:3803::/64 link#13 U igb1_vla2003:e2:af2f:3803:de58:bcff:fee0:38cb link#13 UHS lo02003:e2:af2f:3806::/64 link#14 U igb1_vla2003:e2:af2f:3806:de58:bcff:fee0:38cb link#14 UHS lo02003:e2:afff:2f85::/64 link#17 U pppoe02003:e2:afff:2f85:de58:bcff:fee0:38ca link#17 UHS lo0fe80::%igb1/64 link#2 U igb1fe80::de58:bcff:fee0:38cb%igb1 link#2 UHS lo0fe80::%igb5/64 link#6 U igb5fe80::de58:bcff:fee0:38cf%igb5 link#6 UHS lo0fe80::%lo0/64 link#8 U lo0fe80::1%lo0 link#8 UHS lo0fe80::%lagg0/64 link#11 U lagg0fe80::de58:bcff:fee0:38cc%lagg0 link#11 UHS lo0fe80::%igb1_vlan1122/64 link#12 U igb1_vlafe80::de58:bcff:fee0:38cb%igb1_vlan1122 link#12 UHS lo0fe80::%igb1_vlan1132/64 link#13 U igb1_vlafe80::de58:bcff:fee0:38cb%igb1_vlan1132 link#13 UHS lo0fe80::%igb1_vlan1162/64 link#14 U igb1_vlafe80::de58:bcff:fee0:38cb%igb1_vlan1162 link#14 UHS lo0fe80::%igb5_vlan7/64 link#15 U igb5_vlafe80::de58:bcff:fee0:38cf%igb5_vlan7 link#15 UHS lo0fe80::de58:bcff:fee0:38ca%ovpns1 link#16 UHS lo0fe80::%pppoe0/64 link#17 U pppoe0fe80::de58:bcff:fee0:38ca%pppoe0 link#17 UHS lo0fe80::de58:bcff:fee0:38cb%pppoe0 link#17 UHS lo0fe80::%ipsec1/64 link#18 U ipsec1fe80::de58:bcff:fee0:38ca%ipsec1 link#18 UHS lo0
###ifconfigipsec1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1400 tunnel inet 80.153.119.52 --> 91.5.102.162 inet6 fe80::42a6:b7ff:fe3c:f8cd%ipsec1 prefixlen 64 scopeid 0x15 inet 100.64.21.1 --> 100.64.21.2 netmask 0xfffffffc groups: ipsec reqid: 1 nd6 options=23<PERFORMNUD,ACCEPT_RTADV,AUTO_LINKLOCAL>ipsec2: flags=8011<UP,POINTOPOINT,MULTICAST> metric 0 mtu 1400 inet 100.64.22.1 --> 100.64.22.2 netmask 0xfffffffc inet6 fe80::42a6:b7ff:fe3c:f8cd%ipsec2 prefixlen 64 tentative scopeid 0x13 groups: ipsec reqid: 2 nd6 options=23<PERFORMNUD,ACCEPT_RTADV,AUTO_LINKLOCAL>### Ping Homeoffice 1root@mainofficerouter:~ # ping 100.64.21.2PING 100.64.21.2 (100.64.21.2): 56 data bytes64 bytes from 100.64.21.2: icmp_seq=0 ttl=64 time=40.066 ms64 bytes from 100.64.21.2: icmp_seq=1 ttl=64 time=40.157 ms^C--- 100.64.21.2 ping statistics ---2 packets transmitted, 2 packets received, 0.0% packet lossround-trip min/avg/max/stddev = 40.066/40.112/40.157/0.046 ms### Ping Homeoffice 2root@mainofficerouter:~ # ping 100.64.22.2PING 100.64.22.2 (100.64.22.2): 56 data bytesping: sendto: Network is downping: sendto: Network is downping: sendto: Network is down^C--- 100.64.22.2 ping statistics ---3 packets transmitted, 0 packets received, 100.0% packet loss