First Post Marked as Spam - I need help with this!
Hello Fellow Nerds!
I have set up 2 sets of DNAT connections to attempt to allow remote desktop through both IP addresses while using Load Balancing on the EdgeRouter X. I cannot get Remote Desktop to work using both IP addresses only one will work at a time. I am using DynamicDNS which is why this is a problem (as it switches back and forth between the two WAN IP's)
I have correctly setup the Firewall Rules to allow this traffic (I believe).
Full disclosure I am very new to the Ubiquiti equipment and networking for that matter so I may be trying to do something that is impossible.
If this is impossible does anyone have any ideas of how I can set this up to work properly?
WAN 1 is Comcast
WAN 2 is a Local Fiber Company
firewall {
all-ping enable
broadcast-ping disable
group {
network-group PRIVATE_NETS {
network 192.168.0.0/16
network 172.16.0.0/12
network 10.0.0.0/8
}
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians disable
modify balance {
rule 10 {
action modify
description "do NOT load balance lan to lan"
destination {
group {
network-group PRIVATE_NETS
}
}
modify {
table main
}
}
rule 20 {
action modify
description "do NOT load balance destination public address"
destination {
group {
address-group ADDRv4_eth0
}
}
modify {
table main
}
}
rule 30 {
action modify
description "do NOT load balance destination public address"
destination {
group {
address-group ADDRv4_eth1
}
}
modify {
table main
}
}
rule 70 {
action modify
modify {
lb-group G
}
}
}
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action accept
description Server
destination {
port 6666
}
log disable
protocol tcp
}
rule 40 {
action accept
description Workstation2
destination {
port 5885
}
log disable
protocol tcp
}
rule 50 {
action accept
description Workstation1
destination {
port 3389
}
log disable
protocol tcp
}
rule 60 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address dhcp
description WAN
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth1 {
address dhcp
description "WAN 2"
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth2 {
duplex auto
speed auto
}
ethernet eth3 {
duplex auto
speed auto
}
ethernet eth4 {
duplex auto
speed auto
}
loopback lo {
}
switch switch0 {
address 192.168.1.1/24
description Local
firewall {
in {
modify balance
}
}
mtu 1500
switch-port {
interface eth2 {
}
interface eth3 {
}
interface eth4 {
}
vlan-aware disable
}
}
}
load-balance {
group G {
interface eth0 {
}
interface eth1 {
}
lb-local enable
lb-local-metric-change disable
}
}
port-forward {
auto-firewall disable
hairpin-nat disable
wan-interface eth0
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN {
authoritative enable
subnet 192.168.1.0/24 {
default-router 192.168.1.1
dns-server 192.168.1.1
lease 86400
start 192.168.1.38 {
stop 192.168.1.243
}
static-mapping Jesse {
ip-address 192.168.1.190
mac-address 94:de:80:a7:9c:0d
}
static-mapping VictoryServer {
ip-address 192.168.1.50
mac-address 34:17:eb:d8:98:89
}
}
}
static-arp disable
use-dnsmasq disable
}
dns {
forwarding {
cache-size 150
listen-on switch0
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 1 {
description ServerWAN1
destination {
group {
}
}
inbound-interface eth0
inside-address {
address 192.168.1.50
port 6666
}
log disable
protocol tcp
type destination
}
rule 5 {
description ServerWAN2
destination {
group {
}
}
inbound-interface eth1
inside-address {
address 192.168.1.50
port 6666
}
log disable
protocol tcp
type destination
}
rule 6 {
description WorkstationWAN1
destination {
group {
}
}
inbound-interface eth0
inside-address {
address 192.168.1.190
port 3389
}
log disable
protocol tcp
type destination
}
rule 7 {
description WorkstationWAN2
destination {
group {
}
}
inbound-interface eth1
inside-address {
address 192.168.1.190
port 3389
}
log disable
protocol tcp
type destination
}
rule 5000 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
rule 5002 {
description "masquerade for WAN 2"
outbound-interface eth1
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}