Could be any number of things.  You should check the traffic counters in
`ipsec statusall` on the hub and the clients.  If you have firewall
rules check the counters in `iptables -v -L`.

The output of iptables -v -L on the Hub is:
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- ens192 any 192.168.2.0/24 192.168.1.0/24 policy match dir in pol ipsec reqid 376 proto esp 0 0 ACCEPT all -- any ens192 192.168.1.0/24 192.168.2.0/24 policy match dir out pol ipsec reqid 376 proto esp 0 0 ACCEPT all -- ens192 any 192.168.1.0/24 192.168.2.0/24 policy match dir in pol ipsec reqid 375 proto esp 0 0 ACCEPT all -- any ens192 192.168.2.0/24 192.168.1.0/24 policy match dir out pol ipsec reqid 375 proto esp

As I am running OpenWRT on both gateways, iptables -v -L has a long output. What are the relevant pieces here of iptables? At least I cannot see any 192.168 rules. I guess OpenWRT is not accepting the traffic.

Can I somehow simulate the traffic from the Hub? How can I send a ping into the tunnel, e.g. "ping -I 192.168.1.1 192.168.2.1"? Of course, 192.168 is not shown in the interface list of the Hub, but only the external IP address.

Best regards
Martin
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to