Quantcast
Channel: All EdgeRouter posts
Viewing all 60861 articles
Browse latest View live

Re: EdgeRouter Infinity IPv6 Problem

$
0
0

Having the same problem here, pair of Infinities and they are not getting their IPv6 addresses assigned on boot.  Causes some thrashing trying to debug BGP & OSPF until we realize the addresses aren't there.

 

We have three interfaces in use on these routers, oddly enough one of them does get its ipv6 address assigned on boot.  The other two do not.   In order to get everything back in working order we have to shell out and do an "ip addr add" to solve the missing configuration dependency, then remove/add the 'address' statement back to the interface.  Only then does OSPF & BGP behave.

 

 I'd be keen on working with you to get this solved.  Should I PM you the configuration from both routers?


Re: Routing Question PBR Related

$
0
0

Resetting the conntrack table didnt work.

 

sudo conntrack -F 

 

Any other ideas?

Re: edge router poe 5 reset loops?

$
0
0

Hi!

Yes, i tried the TFTP yesterday, and its the first time i use TFTP so i looked at a video on Youtube how to setup the TFTPd64.

 

I started to set an static IP on my laptops  ethernet network card to 192.168.1.10.

Attached the console cable and an ethernet cable from the same laptop to the ERPoE5s Console and ETH0.

 

Then i started TFTPd64 and followed the instruktions from youtube but when i was told to set  the IP for "Bind TFTP to this adsress" i choosed the  192.168.1.10. but when i cklicked OK i got the error 10049.

 

Se attached screenshots.

 

Do you know the error 10049?

Re: Setup Question (New to Ubiquiti)

$
0
0

Add IPSEC VPN tunnel between South Lime and Lagonda. Alternatively change VPN type to routed VPN and route everything via main office. Assuming the tunnels are over Internet routed VPN won't be effective, direct mesh tunnels will be better performance wise.

Re: Problem with Loadbalancing and henet IPv6 tunnel

$
0
0

You are right - I currently only have one tunnel so that will never be loadbalanced - but now I am thinking what if I setup a second tunnel using the public IP of the NAT'd interface could I then setup a load balancer across those two tunnels for IPv6 traffic?

 

 

Cannot assign /24 network in VLAN

$
0
0

If I try to create a VLAN /24 network I get an error: "Can not assign IPv4 network address as an IPv4 interface address".

 

Why is that?

 

EdgeRouter X v1.10.9

Re: Cannot assign /24 network in VLAN

$
0
0

Are you trying to assing a network address (eg.192.168.1.0/24) instead of an host address (192.168.1.1/24) to the interface ?

Cheers,

jonatha

Re: Setup Question (New to Ubiquiti)

$
0
0

Thanks for the response do have any links to creating a routable vpn? Is that down through the gui or cli?


Re: EdgeRouter X + google wifi

$
0
0

Google don't offer a mesh bridge mode unfortunately which is what you need in order to make them appear (semi) transparent on the network and allow you to use the ER-X effective. 

 

I had the same issue and ultimately got rid of the Google devices and went with another brand supporting mesh bridge mode.

 

If you do have the option to connect the Google WiFi devices back to the ER-X directly or via a switch with ethernet then they can be configured as bridge devices.

 

A pain I know. :/

Re: EdgeRouter X + google wifi

$
0
0

I need the mesh without wired backhaul but I am not married to google. Which brand did you use that plays well with ERX?

Re: EdgeRouter X + google wifi

$
0
0
I went with a few TP-Link Deco M9 units. They work well in bridge mesh mode. No issues with my ER-X or ER-6P.

I'd still recommend you do some Google action and research what other brands offer and whether they might be more appealing to you.

Re: Setup Question (New to Ubiquiti)

$
0
0

For some reason the IPsec tunnel will not come up.

Re: EdgeRouter X + google wifi

$
0
0

Do the TP-Link mesh modules in bridge/mesh config retain the ability to turn off individual devices and all that, or all that kind of responsibility falls onto ERX in this set up?

Re: EdgeRouter X + google wifi

$
0
0
The ability to blacklist a device based on MAC address is still available. All other features are lost in bridge most. That makes sense.

Personally I'd do device blacklisting on the ER-X, the benefit being you've all your config in one location. Otherwise you'll be using the rather crappy and slow TP-Link app more than you'd like.

Re: EdgeRouter X + google wifi

$
0
0

If you are looking for a mesh alternative, have a look at Amplifi, it can be run in router, or, bridge mode..


Re: EdgeRouter X + google wifi

Re: EdgeRouter Infinity - conntrack tuning

$
0
0

Well this topic has been cussed and discussed here and elsewhere, but I'll take another stab at it try and be helpful.  Some advice has been to avoid connection tracking (such as this post) while others have indicated they just set the limit to "millions" and didn't worry about it.

 

As background, the key to connection tracking limits starts with the hash table that is initialized when the linux kernel module is loaded (from the source code here):

int nf_conntrack_init_start(void)
{
	unsigned long nr_pages = totalram_pages();
	int max_factor = 8;
	int ret = -ENOMEM;
	int i;

	/* struct nf_ct_ext uses u8 to store offsets/size */
	BUILD_BUG_ON(total_extension_size() > 255u);

	seqcount_init(&nf_conntrack_generation);

	for (i = 0; i < CONNTRACK_LOCKS; i++)
		spin_lock_init(&nf_conntrack_locks[i]);

	if (!nf_conntrack_htable_size) {
		/* Idea from tcp.c: use 1/16384 of memory.
		 * On i386: 32MB machine has 512 buckets.
		 * >= 1GB machines have 16384 buckets.
		 * >= 4GB machines have 65536 buckets.
		 */
		nf_conntrack_htable_size
			= (((nr_pages << PAGE_SHIFT) / 16384)
			   / sizeof(struct hlist_head));
		if (nr_pages > (4 * (1024 * 1024 * 1024 / PAGE_SIZE)))
			nf_conntrack_htable_size = 65536;
		else if (nr_pages > (1024 * 1024 * 1024 / PAGE_SIZE))
			nf_conntrack_htable_size = 16384;
		if (nf_conntrack_htable_size < 32)
			nf_conntrack_htable_size = 32;

		/* Use a max. factor of four by default to get the same max as
		 * with the old struct list_heads. When a table size is given
		 * we use the old value of 8 to avoid reducing the max.
		 * entries. */
		max_factor = 4;
	}

	nf_conntrack_hash = nf_ct_alloc_hashtable(&nf_conntrack_htable_size, 1);
	if (!nf_conntrack_hash)
		return -ENOMEM;

	nf_conntrack_max = max_factor * nf_conntrack_htable_size;

Given that, I contend the MINIMUM conntrack hash table for the ER Infinity with 16GB of RAM should be 262144.  Anyway, it can be manually set with:

set system conntrack hash-size 262144
commit ; save

You'll be prompted to reboot because the setting can only be changed when the conntrack module is loaded.

 

Now, we've provided the hash table size, so the kernel should set a maxium of 2097152 for nf_conntrack_max using the max_factor of 8 (the max_factor = 4 is ONLY used IFF the system has to calculate the hash size).  However, it can be manually set with:

 

set system conntrack table-size 2097152
commit ; save

That change will take effect immediately -- no reboot required.  You may also set a lower limit so long as value is a "power of 2" and the kernel will accept it.

 

So, IMHO, that is where to begin.  If that is not sufficient, you will know it by log messages such as the following:

 

kernel: nf_conntrack: table full, dropping packet.

If that is your case, then first check your free memory available.  BGP routing tables and other things need RAM as well.  If you have plenty of RAM to spare, increase the hash-size, then reboot, then tweak the table-size (connection limit) if necessary.

 

A word about expect-table-size.  This table separately tracks connections that the kernel thinks are going to be opening soon or "expected".  This is used by things like FTP that have one channel for control and another for data.  If the kernel "sees" the control traffic referring to the protocol/port for the data channel, it can use that to expect and track the eventual data traffic.  These would require data channels to be unencrypted and (most likely) a helper module or rule to identify that control traffic.  IMHO the kernel conntrack helper modules are not very useful in most modern implementations and sometimes even harmful.

 

So, unless you KNOW you need the helper module for some specific traffic, I recommend disabling them:

 

set system conntrack modules ftp disable
set system conntrack modules gre disable
set system conntrack modules h323 disable
set system conntrack modules pptp disable
set system conntrack modules sip disable
set system conntrack modules tftp disable

Finally, the most difficult part to get "right" is tweaking connection tracking time outs for YOUR particular use case.  Therefore, that is left as an exercise for the reader.

 

Enjoy!

 

Re: Setup Question (New to Ubiquiti)

$
0
0

 

First, if you want to route everything through the main office (which will probably have a performance impact), I beleive you need this:

https://help.ubnt.com/hc/en-us/articles/115011377588

Then you should be able to add the static routes.

 

Regarding the "For some reason the IPsec tunnel will not come up", perhaps if you share your configuration and output of the vpn log and/or output of "sudo swanctl --log", etc. someone might have some insight. Configuration and logs should be sanitzied (see howto here).

Re: Throughput issues for GRE with IPSEC

Re: Losing IPv6 Connectivity on ER-X SFP

$
0
0

Sorry for the late reply, things were pretty crazy the last week and a half.

 

Here is the full config file after having a few things sanatized from it, such as usernames, passwords, and public addresses.

 

firewall {
all-ping enable
broadcast-ping disable
group {
address-group CorpNetAllowFromVlans {
description "Allow packets through to copnet from VLANS"
}
ipv6-network-group IPv6Netflix {
description "Known Netflix IPv6 Networks"
ipv6-network 2406:da00:ff00::/48
ipv6-network 2620:108:700f::/48
}
network-group v1DropTrafficNetworkGroup {
description "This is the network group that v1 is not allowed to communicate with."
network 10.0.0.0/23
network 192.168.22.0/24
network 192.168.33.0/24
network 192.168.40.0/24
network 192.168.50.0/24
network 192.168.77.0/24
}
network-group HomeNetBlockedNetworks {
description "This is the network group that HomeNet is not allowed to communicate with."
network 10.0.0.0/23
network 192.168.22.0/24
network 192.168.40.0/24
network 192.168.50.0/24
network 192.168.60.0/24
network 192.168.77.0/24
}
network-group v2NetBlockedNetworks {
description "These are the networks that v2 Vlan does not have access to"
network 10.0.0.0/23
network 192.168.22.0/24
network 192.168.33.0/24
network 192.168.40.0/24
network 192.168.60.0/24
network 192.168.77.0/24
}
network-group v3BlockedNetworks {
description "These are the networks that v3 Vlan does not have access to"
network 10.0.0.0/23
network 192.168.22.0/24
network 192.168.33.0/24
network 192.168.50.0/24
network 192.168.60.0/24
network 192.168.77.0/24
}
port-group 3CXRequiredPorts {
description "3CX Required Ports"
port 5000
port 5001
port 5060
port 5090
port 9000-10999
}
port-group PS4 {
description "Ports required by PS4 to connect to online services"
port 1935
port 3478
port 3479
port 3480
}
port-group RWAPorts {
description "Ports required by Remote Web Access"
port 80
port 443
}
port-group RouterPorts {
description "Router Ports to block from VLANs"
port 22
port 23
port 80
port 443
}
port-group UniFiPorts {
description "Ports required by UniFi"
port 8080
port 8443
port 3478
port 8880
port 8843
}
port-group XboxOnePorts {
description "Ports required by Xbox One to connect to online services"
port 3074
port 3544
port 4500
}
}
ipv6-name WANv6_IN {
default-action drop
description "WAN inbound traffic forwarded to LAN"
enable-default-log
rule 10 {
action accept
description "Allow established/related sessions"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
ipv6-name WANv6_LOCAL {
default-action drop
description "WAN inbound traffic to the router"
enable-default-log
rule 10 {
action accept
description "Allow established/related sessions"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow IPv6 icmp"
protocol ipv6-icmp
}
rule 40 {
action accept
description "allow dhcpv6"
destination {
port 546
}
protocol udp
source {
port 547
}
}
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action accept
description "Allow 3CX Traffic"
destination {
address 10.0.1.253
group {
port-group 3CXRequiredPorts
}
}
log disable
protocol tcp_udp
}
rule 30 {
action accept
description "RCS RDP 12.109.102.192"
destination {
address 192.168.40.25
port 3389
}
log disable
protocol tcp_udp
}
rule 40 {
action accept
description "Allow UniFi Traffic"
destination {
address 10.0.1.252
group {
port-group UniFiPorts
}
}
log disable
protocol tcp_udp
}
rule 50 {
action accept
description "R7101 XXXX"
destination {
address 10.0.0.10
port XXXX
}
log disable
protocol tcp_udp
}
rule 60 {
action accept
description "Allow RWA XXXX"
destination {
address 10.0.0.10
group {
port-group RWAPorts
}
}
log disable
protocol tcp_udp
}
rule 70 {
action accept
description "Allow Plex"
destination {
address 10.0.0.10
port 32400
}
log disable
protocol tcp
}
rule 80 {
action accept
description "Allow Backup Plex"
destination {
address 10.0.0.5
port 32401
}
log disable
protocol tcp
}
rule 90 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address X.XX.XX.XX/24
address X.XX.XX.XX/24
address XXXX:XXX:X000::2/64
description Internet
duplex auto
firewall {
in {
ipv6-name WANv6_IN
name WAN_IN
}
local {
ipv6-name WANv6_LOCAL
name WAN_LOCAL
}
}
poe {
output off
}
speed auto
}
ethernet eth1 {
description Local
duplex auto
speed auto
}
ethernet eth2 {
description Local
duplex auto
speed auto
}
ethernet eth3 {
description Local
duplex auto
speed auto
}
ethernet eth4 {
description Local
duplex auto
speed auto
}
ethernet eth5 {
duplex auto
speed auto
}
loopback lo {
}
switch switch0 {
address 10.0.0.1/23
address XXXX:XXX:X001:7::1/64
description CorpNet
mtu 1500
switch-port {
interface eth1 {
}
interface eth2 {
}
interface eth3 {
}
interface eth4 {
}
interface eth5 {
}
vlan-aware disable
}
vif 22 {
address 192.168.22.1/24
address XXX:XXX:XXXX:22::1/64
description "Customer Network"
}
vif 33 {
address 192.168.33.1/24
address XXXX:XXX:XXXX:33::1/64
description "Home Network"
}
vif 40 {
address 192.168.40.1/24
address XXXX:XXX:XXXX:40::1/64
description "RCS Network"
mtu 1500
}
vif 50 {
address 192.168.50.1/29
address XXXX:XXX:XXXX:50::1/64
description "CM Network"
mtu 1500
}
vif 60 {
address 192.168.60.1/29
address XXXX:XXXX:XXXX:60::1/64
description "CH Network"
mtu 1500
}
vif 77 {
address 192.168.77.1/24
address XXXX:XXX:XXXX:77::1/64
description "Windows Server Lab Network"
mtu 1500
}
}
}
protocols {
static {
route6 ::/0 {
next-hop XXXX:XXX:XXXX::1 {
}
}
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name CorpNet {
authoritative disable
subnet 10.0.0.0/23 {
default-router 10.0.0.1
dns-server 10.0.0.10
dns-server 1.1.1.1
lease 86400
start 10.0.1.1 {
stop 10.0.1.245
}
static-mapping APACPROServerRoomOffice {
ip-address X
mac-address X
}
static-mapping EdgeSwitch48Lite {
ip-address X
mac-address X
}
static-mapping MichaelXboxOneWifi {
ip-address X
mac-address X
}
static-mapping MichaelXboxOneWired {
ip-address X
mac-address X
}
static-mapping NAS {
ip-address X
mac-address X
}
static-mapping PS7520 {
ip-address X
mac-address X
}
static-mapping R7101-idrac {
ip-address X
mac-address X
}
static-mapping R7102 {
ip-address X
mac-address X
}
static-mapping SPA112 {
ip-address X
mac-address X
}
static-mapping StoffelPBX {
ip-address X
mac-address X
}
static-mapping StoffelUnifi {
ip-address X
mac-address X
}
static-mapping kms {
ip-address X
mac-address X
}
unifi-controller X
}
}
shared-network-name CustNet {
authoritative disable
subnet 192.168.22.0/24 {
default-router 192.168.22.1
dns-server 1.1.1.1
dns-server 1.0.0.1
lease 86400
start 192.168.22.15 {
stop 192.168.22.250
}
}
}
shared-network-name HNet {
authoritative disable
subnet 192.168.60.0/29 {
default-router 192.168.60.1
dns-server 1.1.1.1
dns-server 1.0.0.1
lease 86400
start 192.168.60.2 {
stop 192.168.60.6
}
}
}
shared-network-name HomeNet {
authoritative disable
subnet 192.168.33.0/24 {
default-router 192.168.33.1
dns-server 1.1.1.1
dns-server 1.0.0.1
lease 86400
start 192.168.33.25 {
stop 192.168.33.245
}
unifi-controller X
}
}
shared-network-name MNet {
authoritative disable
subnet 192.168.50.0/29 {
default-router 192.168.50.1
dns-server 1.1.1.1
dns-server 1.0.0.1
lease 86400
start 192.168.50.2 {
stop 192.168.50.6
}
}
}
shared-network-name RNetwork {
authoritative disable
subnet 192.168.40.0/24 {
default-router 192.168.40.1
dns-server 1.1.1.1
dns-server 1.0.0.1
lease 86400
start 192.168.40.25 {
stop 192.168.40.245
}
static-mapping B1 {
ip-address X
mac-address X
}
}
}
shared-network-name WindowsServerLab {
authoritative disable
subnet 192.168.77.0/24 {
default-router 192.168.77.1
dns-server 1.1.1.1
dns-server 1.0.0.1
lease 86400
start 192.168.77.25 {
stop 192.168.77.245
}
}
}
static-arp disable
use-dnsmasq disable
}
dns {
forwarding {
cache-size 150
listen-on LISTENONPORT
listen-on switch0
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 1 {
description "XP X Outside"
destination {
address X
port 11001
}
inbound-interface eth0
inside-address {
address X
port X
}
log disable
protocol tcp_udp
type destination
}
rule 2 {
description "X Inside"
destination {
address X
port X
}
inbound-interface switch0
inside-address {
address X
port X
}
log disable
protocol tcp_udp
type destination
}
rule 3 {
description "UniFi Controller Outside"
destination {
address X
group {
port-group UniFiPorts
}
}
inbound-interface eth0
inside-address {
address X
}
log disable
protocol tcp
type destination
}
rule 4 {
description "UniFi Controller Inside"
destination {
address X
group {
port-group UniFiPorts
}
}
inbound-interface switch0
inside-address {
address X
}
log disable
protocol tcp
type destination
}
rule 5 {
description "3CX Traffic Outside"
destination {
address X
group {
port-group 3CXRequiredPorts
}
}
inbound-interface eth0
inside-address {
address X
}
log disable
protocol tcp_udp
type destination
}
rule 6 {
description "Plex Traffic Outside"
destination {
address X
group {
}
port 32400
}
inbound-interface eth0
inside-address {
address X
port 32400
}
log disable
protocol tcp
type destination
}
rule 7 {
description "R7101 X Outside"
destination {
address X
port X
}
inbound-interface eth0
inside-address {
address X
port X
}
log disable
protocol tcp_udp
type destination
}
rule 8 {
description " X Outside"
destination {
address X
port 7001
}
inbound-interface eth0
inside-address {
address 10.0.0.10
port 3389
}
log disable
protocol tcp_udp
type destination
}
rule 9 {
description "Plex Backup Traffic Outside"
destination {
address X
group {
}
port 32401
}
inbound-interface eth0
inside-address {
address X
port 32400
}
log disable
protocol tcp
type destination
}
rule 10 {
description "3CX Traffic Inside"
destination {
address X
group {
port-group 3CXRequiredPorts
}
}
inbound-interface switch0
inside-address {
address X
}
log disable
protocol tcp_udp
type destination
}
rule 5000 {
description "Source Nat for R VLAN"
log disable
outbound-interface eth0
outside-address {
address X
}
source {
address 192.168.40.0/24
}
type source
}
rule 5001 {
description "CX Beyond1"
destination {
address X
group {
}
port X
}
log disable
outbound-interface switch0
outside-address {
}
protocol tcp_udp
source {
address X
}
type masquerade
}
rule 5002 {
description "CorpNet 3CX Traffic"
destination {
address X
group {
port-group 3CXRequiredPorts
}
}
log disable
outbound-interface switch0
outside-address {
}
protocol tcp_udp
source {
address 10.0.0.0/23
}
type masquerade
}
rule 5003 {
description "CorpNet UniFi Traffic"
destination {
address 10.0.1.252
group {
port-group UniFiPorts
}
}
log disable
outbound-interface switch0
outside-address {
}
protocol tcp_udp
source {
address 10.0.0.0/23
}
type masquerade
}
rule 5004 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
unms {
connection wss://XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
}
}
system {
gateway-address X.1
host-name ER-X-CAS
login {
user X1 {
authentication {
encrypted-password nope
}
level admin
}
}
name-server 1.1.1.1
name-server 1.0.0.1
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone America/New_York
}
traffic-control {
smart-queue CAS {
download {
ecn enable
flows 1024
fq-quantum 1514
limit 10240
rate 300mbit
}
upload {
ecn enable
flows 1024
fq-quantum 1514
limit 10240
rate 30mbit
}
wan-interface eth0
}
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:suspend@1:system@4:ubnt-pptp@1:ubnt-udapi-server@1:ubnt-unms@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v2.0.1.5174691.190312.1617 */

Viewing all 60861 articles
Browse latest View live