Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

Inter LAN communication with ER-X-SFP

$
0
0

Hi to all

I'm facing a strange problem regarding lan traffic. My setup is as follows:
lan0 - 192.168.182.0/26 (switch0)
lan1 - 192.168.182.64/26 (switch0.10)
lan2 - 192.168.182.128/26 (switch0.20)

 

Computers on lan1 can talk to computers on lan2 and vice versa. But communication between lan0 to lan1 (both directions) and lan0 to lan2 (both directions) is not possible.


How can I get it to work? Do I need an additional firewall rule?

 

Please see below my config:

firewall {
    all-ping enable
    broadcast-ping disable
    group {
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth3 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth4 {
        description Local
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        address 192.168.182.1/26
        description Local
        firewall {
            in {
            }
        }
        mtu 1500
        switch-port {
            interface eth1 {
                vlan {
                    vid 10
                    vid 20
                }
            }
            interface eth2 {
                vlan {
                    vid 10
                    vid 20
                }
            }
            interface eth3 {
                vlan {
                    vid 10
                    vid 20
                }
            }
            interface eth4 {
                vlan {
                    vid 10
                    vid 20
                }
            }
            vlan-aware enable
        }
        vif 10 {
            address 192.168.182.65/26
            mtu 1500
        }
        vif 20 {
            address 192.168.182.129/26
            mtu 1500
        }
    }
}
protocols {
    static {
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name lan0 {
            authoritative enable
            subnet 192.168.182.0/26 {
                default-router 192.168.182.1
                dns-server 192.168.182.1
                lease 86400
                start 192.168.182.30 {
                    stop 192.168.182.62
                }
                static-mapping cisco-01 {
                    ip-address 192.168.182.5
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping cp1525n {
                    ip-address 192.168.182.7
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping gs105e {
                    ip-address 192.168.182.8
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping nas {
                    ip-address 192.168.182.4
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping qlproxy {
                    ip-address 192.168.182.2
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping qlproxyP {
                    ip-address 192.168.182.15
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping radio {
                    ip-address 192.168.182.6
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping router {
                    ip-address 192.168.182.1
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping uap {
                    ip-address 192.168.182.3
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping vbox {
                    ip-address 192.168.182.9
                    mac-address xx:xx:xx:xx:xx:xx
                }
            }
        }
        shared-network-name lan1 {
            authoritative enable
            subnet 192.168.182.64/26 {
                default-router 192.168.182.65
                dns-server 192.168.182.65
                lease 86400
                start 192.168.182.80 {
                    stop 192.168.182.126
                }
            }
        }
        shared-network-name lan2 {
            authoritative enable
            subnet 192.168.182.128/26 {
                default-router 192.168.182.129
                dns-server 192.168.182.129
                lease 86400
                start 192.168.182.130 {
                    stop 192.168.182.149
                }
            }
        }
        use-dnsmasq enable
    }
    dns {
        forwarding {
            cache-size 400
            listen-on switch0
            listen-on switch0.10
            listen-on switch0.20
            options dhcp-boot=grubnetx64.efi,boothost,nas
            options dhcp-option=252,http://qlproxy.hika1/proxy.pac
            options cname=wpad.hika1,qlproxy.hika1
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    domain-name hika1
    host-name ubnt
    login {
        user admin {
            authentication {
                encrypted-password $6$BW13xixJ/Rd4$h79zitl0WkYz4Tvdr6rN81Kv6iHoRELdCzXeDisHrY4ug0Mylg/M8VNg1gV3g7czJ7jNqtBj9Le9UAgUpS9Md0
                plaintext-password ""
            }
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat enable
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Europe/Zurich
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1131 */

Thanks for your help.

 

Best regards,
chgruem


Viewing all articles
Browse latest Browse all 60861

Trending Articles