all-ping enable broadcast-ping disable group { address-group router_ip { address 192.168.1.1 address 192.168.2.1 description "" } network-group PRIVATE_NETS { network 192.168.1.0/24 network 192.168.2.0/24 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify balance { rule 10 { action modify description "do NOT load balance lan to lan" destination { group { network-group PRIVATE_NETS } } modify { table main } } rule 20 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_pppoe0 } } modify { table main } } rule 30 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_pppoe1 } } modify { table main } } rule 40 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_pppoe2 } } modify { table main } } rule 50 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_pppoe3 } } modify { table main } } rule 70 { action modify modify { lb-group G } } } name WAN_IN { default-action accept description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action accept description VPN destination { address 192.168.1.0/24 } log disable protocol all source { address 192.168.2.0/24 } } rule 30 { action drop description "Drop invalid state" log disable protocol all state { invalid enable } } } name WAN_LOCAL { default-action accept description "WAN to router" rule 10 { action accept description "Allow established/related" log disable p2p { all } protocol all state { established enable invalid enable new enable related enable } } rule 20 { action accept description VPN destination { address 192.168.1.0/24 } log disable protocol all source { address 192.168.2.0/24 } } rule 30 { action accept description IKE destination { port 500 } log disable protocol udp } rule 40 { action accept description L2TP destination { port 1701 } log disable protocol udp } rule 50 { action accept description ESP log disable protocol 50 } rule 60 { action accept description Nat-t destination { port 4500 } log disable protocol udp } rule 70 { action drop description "Drop invalid state" log disable protocol all state { invalid enable } } } name vlan_IN { default-action accept description "" rule 1 { action accept destination { group { address-group router_ip } } log disable protocol all } rule 2 { action accept log disable protocol all source { address 192.168.2.13/32 } } rule 3 { action drop destination { group { network-group PRIVATE_NETS } } log disable protocol all } } options { mss-clamp { mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { description WAN duplex auto poe { output off } speed auto vif 500 { address dhcp description "TM UNIFI" mtu 1500 pppoe 0 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server auto password abc1234567890pp user-id blazer@unifi } } } ethernet eth1 { description "WAN 2" duplex auto poe { output off } speed auto vif 500 { address dhcp description "TM UNIFI" mtu 1500 pppoe 1 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server auto password abc1234567890pp user-id blazer@unifi } } } ethernet eth2 { description "WAN 3" duplex auto poe { output off } speed auto vif 624 { address dhcp description OHANA mtu 1500 pppoe 2 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server auto password abc1234567890pp user-id blazer@unifi } } } ethernet eth3 { description "WAN 4" duplex auto poe { output off } speed auto vif 624 { address dhcp description OHANA mtu 1500 pppoe 3 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server auto password abc1234567890pp user-id blazer@unifi } } } ethernet eth4 { address 192.168.2.1/24 description LAN4 duplex auto firewall { in { name vlan_IN } } poe { output off } speed auto } loopback lo { } switch switch0 { address dhcp description Local firewall { in { modify balance } } mtu 1500 } } load-balance { group G { interface pppoe0 { } interface pppoe1 { } interface pppoe2 { } interface pppoe3 { } lb-local enable } } port-forward { auto-firewall enable hairpin-nat disable lan-interface eth4 wan-interface pppoe0 } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.2 { stop 192.168.1.243 } } } shared-network-name LAN2 { authoritative disable subnet 192.168.2.0/24 { default-router 192.168.2.1 dns-server 192.168.2.1 dns-server 8.8.8.8 lease 86400 start 192.168.2.2 { stop 192.168.2.254 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on switch0 listen-on pppoe0 listen-on pppoe1 listen-on pppoe2 listen-on pppoe3 listen-on eth4 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { description VPN destination { address 192.168.1.0/24 } exclude log disable outbound-interface pppoe0 protocol all source { address 192.168.2.0/24 } type masquerade } rule 5001 { description "masquerade for WAN" outbound-interface pppoe0 type masquerade } rule 5002 { description "masquerade for WAN 2" outbound-interface pppoe1 type masquerade } rule 5003 { description "masquerade for WAN 3" outbound-interface pppoe2 type masquerade } rule 5004 { description "masquerade for WAN 4" outbound-interface pppoe3 type masquerade } } ssh { port 22 protocol-version v2 } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } host-name ubnt login { user ubnt { authentication { encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66. } level admin } } ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipv4 { forwarding enable pppoe enable } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC traffic-analysis { dpi disable export enable } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */
this is my config. is there somethings wrong with load balancing?