Optus (Sagemcom) router config example for forwarding IPsec VPN traffic

This article illustrates how to set up Optus router to forward UDP 500, UDP 4500, ESP and AH to the VPN gateway. This is required when setting up IPsec VPN gateway (e.g. EdgeRouter) behind NAT device (e.g. Optus router).

Prerequisites, pitfalls and other nodes:

  • Requires a static IP on VPN gateway (EdgeRouter) WAN interface (by setting DHCP static lease on Optus/Sagemcom router or a static IP). In this example, we assume it is 192.168.0.2
    • If you’re trying to set up a DHCP static lease (“reserved address” on Optus router), the IP address needs to be in the DHCP pool. (Optus router is a little bit different to others)
  • ESP and AH don’t really have a “port” number, but specify 0 on the Optus modem because it won’t allow us to add the forwarding with an empty “port” field. (I consider this as a UI bug)
  • Your IPsec VPN implementation may not require all of these forwardings. For example, UDP 4500 may not required if you’re not using NAT traversal. However, setting up all of these allows you to maximise the chance setting up IPsec VPN successfully. You can remove unused forwarding rules afterwards.
  • Do NOT use the “DMZ” function on the Optus router. Otherwise non-IPsec TCP sessions will get reset frequently. You will notice it when you SSH to another host on the Internet.

UDP 500

External host: (empty)
Internal host: 192.168.0.2
Protocol: UDP
External port: 500
Internal port: 500

UDP 4500

External host: (empty)
Internal host: 192.168.0.2
Protocol: UDP
External port: 4500
Internal port: 4500

ESP

External host: (empty)
Internal host: 192.168.0.2
Protocol: ESP
External port: 0
Internal port: 0

AH

External host: (empty)
Internal host: 192.168.0.2
Protocol: AH
External port: 0
Internal port: 0

Leave a Reply

Your email address will not be published. Required fields are marked *