furyflash777 opened a new issue, #7668:
URL: https://github.com/apache/cloudstack/issues/7668
<!--
Verify first that your issue/request is not already reported on GitHub.
Also test if the latest release and main branch are affected too.
Always add information AFTER of these HTML comments, but no need to delete
the comments.
-->
##### ISSUE TYPE
<!-- Pick one below and delete the rest -->
* Bug Report
##### COMPONENT NAME
<!--
Categorize the issue, e.g. API, VR, VPN, UI, etc.
-->
~~~
VPN
~~~
##### CLOUDSTACK VERSION
<!--
New line separated list of affected versions, commit ID for issues on main
branch.
-->
~~~
4.18.0.0
~~~
##### CONFIGURATION
<!--
Information about the configuration if relevant, e.g. basic network,
advanced networking, etc. N/A otherwise
-->
##### OS / ENVIRONMENT
<!--
Information about the environment if relevant, N/A otherwise
-->
XCP-NG 8.2.1
##### SUMMARY
<!-- Explain the problem/feature briefly -->
Site2Site IPSEC VPN isn't send traffic between VPC and VMware Edge Gateway.
IPSEC connection established successfully
from External Site I can ping internal VPC router ip and alias ip. VM behind
VPC is not reachable .
form VPC Site I can't ping anything on the External Site. Internet resources
are working.
ACL rules for inernal network "allow all".
i see icmp request on the eth1 (public) vpc router interface, but no reply.
11:46:00.655692 eth1 In IP 10.21.52.11 > 10.21.92.41: ICMP echo request,
id 3, seq 1100, length 40
Site2Site VPN between 2 VPC is working well with the same configuration.
##### STEPS TO REPRODUCE
<!--
For bugs, show exactly how to reproduce the problem, using a minimal
test-case. Use Screenshots if accurate.
For new features, show how the feature would be used.
-->
<!-- Paste example playbooks or commands between quotes below -->
~~~
Create Site2Site VPN between VPC and VMware Edge GW. Configure ACL and Edge
Gateway Firewall.
Try to ping resources.
Configuration example
IKE policy
aes256-sha256;modp4096
IKE lifetime (second)
28800
IKE version
ikev2
ESP policy
aes256-sha256
ESP lifetime (second)
3600
Dead peer detection
true
Split connections
true
Force UDP encapsulation of ESP packets
false
~~~
<!-- You can also paste gist.github.com links for larger files -->
##### EXPECTED RESULTS
<!-- What did you expect to happen when running the steps above? -->
~~~
Traffic goes between resources in VPN.
~~~
##### ACTUAL RESULTS
<!-- What actually happened? -->
<!-- Paste verbatim command output between quotes below -->
~~~
Resources are not available in VPN.
~~~
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: [email protected]
For queries about this service, please contact Infrastructure at:
[email protected]