IPSec routing rules

Hello,
I have a main server Teltonika, and Teltonika A and Teltonika B are connected to it via IPSec tunnels.

From the server Teltonika, I can see both Teltonika A and Teltonika B.
However, I need to make it so that Teltonika A can see Teltonika B, and Teltonika B can see Teltonika A.
Is that possible?

Hello,

Thank you for your inquiry. Your request is currently under review and analysis.

In brief, this setup should be possible to configure by adding static routes on both RUTs like the following:

  • Route A: to LAN IP (or subnet) of Teltonika B via IPsec server as gateway
  • Route B: to LAN IP (or subnet) of Teltonika A via IPsec server as gateway

Once the evaluation and testing are complete, I will get back to you with further details or guidelines.

Thank you for your patience in the meantime.

Best regards,

Hello,

I have already tried routing and it doesn’t work.
So could you help me more?
I hope it works out somehow.

Thank you

Hello,

Could you please provide a simple topology diagram including the IP addresses of the hosts and an indication of how the devices should communicate? This would be very helpful and greatly appreciated for understanding your setup.

In addition, if possible, please include screenshots showing where the routes were added or any other related configurations that you’ve already tried. Thank you.

Best regards,

Hello,

I am sending a simple topology including IP addressing.
My goal is for the Controller with IP address 192.168.212.100 to see directly on the network the Controller with IP address 192.168.45.100.

Is it understandable like this?

Thank you for help

From the RUTM08 device I have access to both 192.168.45.100 and 192.168.212.100

However, I need 192.168.212.100 to have access to 192.168.45.100

routing rule set to RUT956 (192.168.212.1)

routing rule set to RUT955 (192.168.45.1)

Good day, can’t you think of something I’m doing wrong with the routing? I really need to get it working, but I still don’t know how it should work. Thank you

Hello @Jakub,

Thank you for your update and for providing the setup, topology, and your current configurations. Eventually, I’ll try reproducing an identical IPsec setup with routing on my side and will update you here after testing and findings on how the routing configuration should look to align with your scenario.

In the meantime, thank you for your patience and understanding.

Best regards,

Hello,

In your specific case, this setup for accessing each spoke’s LAN network can be achieved without adding static routes. Apologies for any earlier confusion on this point. However, please note that the required IPsec configuration will differ from the example described on our wiki page (this one).


I have replicated a similar setup on my end, and as a result, the IPsec spokes’ (clients) LAN networks were successfully able to communicate with each other.

To achieve your desired scenario, please carefully follow the guidelines shown in the screenshots below:

1. On the IPsec hub/server (RUTM08), create two IPsec instances according to the configuration settings shown in the screenshots:

1st (RUT_1) IPsec instance settings


2nd (RUT_2) IPsec instance settings


P.S. ensure Proposal configuration settings match on both instances.


2. Configure the IPsec settings on the first spoke (RUT956) as per the provided screenshots:

1st spokes' IPsec settings


P.S. ensure proposal configuration settings match on both phases.


3. Configure the IPsec settings on the second spoke (RUT955) as per the provided screenshots:

2nd spokes' IPsec settings


P.S. ensure proposal configuration settings match on both phases.


This configuration doesn’t require adding static routes, however, it is a bit more complex, but at the end, both IPsec spoke’s LAN networks should be able to communicate with each other.

I hope this setup works for you, and if you need assistance or face any difficulties with configurations, feel free to share/reach out here.

Best regards,

This topic was automatically closed after 60 days. New replies are no longer allowed.