Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

Re: Edgerouter pro DPI not showing as much detail after 1.9.0

$
0
0

EdgeRouter DPI.jpg

 

So this is what I see now, not counting servers where I see things like SMB, DNS, NCS, LDAP, ect.  There used to be a lot more information.  Hell, in a lot of cases I could see what website people were on.  Facebook, Youtube, and lots of others.

 

Here is my config (scrubbed of course) in case that helps

 

 

 

 

firewall {

    all-ping enable

    broadcast-ping disable

    ipv6-receive-redirects disable

    ipv6-src-route disable

    ip-src-route disable

    log-martians enable

    name Guest_WiFi {

        default-action accept

        description "VLAN 666"

        rule 1 {

            action drop

            description "Isolate Guest VLAN"

            destination {

                address 10.0.1.0/24

            }

            log disable

            protocol all

        }

        rule 2 {

            action drop

            description "Isolate Guest VLAN"

            destination {

                address 10.0.2.0/24

            }

            log disable

            protocol all

        }

        rule 3 {

            action drop

            description "Isolate Guest VLAN"

            destination {

                address 192.168.1.0/24

            }

            log disable

            protocol all

        }

        rule 4 {

            action drop

            description "Isolate Guest VLAN"

            destination {

                address 66.66.66.0/24

            }

            log disable

            protocol all

        }

    }

    name WAN_IN {

        default-action drop

        description "WAN to internal"

        rule 10 {

            action accept

            description "Allow established/related"

            state {

                established enable

                related enable

            }

        }

        rule 20 {

            action accept

            description "Allow **********"

            log disable

            protocol udp

            source {

                port **********

            }

        }

        rule 30 {

            action drop

            application {

                category Bypass-Proxies-and-Tunnels

            }

            description "Block Bypass Tunnels"

            log disable

            protocol all

            state {

                established enable

                invalid enable

                new enable

                related enable

            }

        }

        rule 40 {

            action drop

            application {

                category P2P

            }

            description "Block P2P"

            log disable

            p2p {

                all

            }

            protocol all

        }

        rule 50 {

            action accept

            description "Allow L2TP"

            destination {

                port 500,1701,4500

            }

            ipsec {

                match-ipsec

            }

            log disable

            protocol udp

        }

        rule 60 {

            action accept

            description "Allow L2TP"

            ipsec {

                match-ipsec

            }

            log disable

            protocol esp

        }

        rule 70 {

            action accept

            description "Allow SIP"

            destination {

                port 5000-5500

            }

            log disable

            protocol udp

        }

        rule 80 {

            action drop

            description "Block SSH"

            destination {

                port 22

            }

            log disable

            protocol udp

        }

        rule 90 {

            action drop

            description "Block RDP"

            destination {

                port 3389

            }

            log disable

            protocol udp

        }

        rule 100 {

            action drop

            application {

                category TopSites-Adult

            }

            description "Block Topsites_Porn"

            log disable

            protocol all

        }

        rule 110 {

            action drop

            description "Block SQL Management"

            destination {

                port 1433

            }

            log disable

            protocol udp

        }

        rule 120 {

            action drop

            description "Drop invalid state"

            state {

                invalid enable

            }

        }

    }

    name WAN_LOCAL {

        default-action drop

        description "WAN to router"

        rule 1 {

            action accept

            description "Allow established/related"

            state {

                established enable

                related enable

            }

        }

        rule 2 {

            action accept

            description "Allow “**********"

            destination {

                port **********

            }

            log disable

            protocol udp

        }

        rule 3 {

            action accept

            description "Allow PPTP"

            destination {

                port 1723

            }

            log disable

            protocol tcp

        }

        rule 4 {

            action accept

            description "Allow PPTP"

            log disable

            protocol gre

        }

        rule 5 {

            action accept

            description "Allow L2TP"

            destination {

                port 500,1701,4500

            }

            ipsec {

                match-ipsec

            }

            log disable

            protocol udp

        }

        rule 6 {

            action accept

            description "Allow ESP"

            ipsec {

                match-ipsec

            }

            log disable

            protocol esp

        }

        rule 7 {

            action drop

            description "Drop invalid state"

            state {

                invalid enable

            }

        }

        rule 8 {

            action accept

            description "Allow UDP Syslog"

            destination {

                port 514

            }

            log disable

            protocol udp

        }

    }

    receive-redirects disable

    send-redirects enable

    source-validation disable

    syn-cookies enable

}

interfaces {

    ethernet eth0 {

        address **********

        description "WAN In (Level 3)"

        duplex full

        firewall {

            in {

                name WAN_IN

            }

            local {

                name WAN_LOCAL

            }

        }

        speed 100

    }

    ethernet eth1 {

        address 10.0.1.1/24

        description "LAN VW_Local"

        duplex auto

        speed auto

        vif 25 {

            address 10.0.2.1/24

            description "VoIP VLAN"

            mtu 1500

        }

        vif 50 {

            address 10.0.4.1/24

            description "Production VLAN"

        }

        vif 666 {

            address 10.0.3.1/24

            description "Guest WiFi"

            firewall {

                local {

                    name Guest_WiFi

                }

            }

            mtu 1500

        }

    }

    ethernet eth2 {

        address 192.168.1.1/24

        description "LAN VW_Sec"

        duplex auto

        speed auto

    }

    ethernet eth3 {

        duplex auto

        speed auto

    }

    ethernet eth4 {

        address 10.1.0.1/16

        description PrimaryLAN

        duplex auto

        speed auto

        vif 25 {

            address 10.2.0.1/16

            description VoiceVLAN

            mtu 1500

        }

        vif 666 {

            address 10.3.0.1/16

            description GuestVLAN

            mtu 1500

        }

    }

    ethernet eth5 {

        address 192.168.0.1/24

        description Service

        duplex auto

        speed auto

    }

    ethernet eth6 {

        duplex auto

        speed auto

    }

    ethernet eth7 {

        disable

        duplex auto

        speed auto

    }

    loopback lo {

    }

}

port-forward {

    auto-firewall enable

    hairpin-nat disable

    rule 1 {

        description "**********"

        forward-to {

            address **********

        }

        original-port 1194

        protocol udp

    }

    rule 2 {

        description "**********"

        forward-to {

            address **********

        }

        original-port 50070

        protocol tcp

    }

    wan-interface eth0

}

protocols {

    static {

        route *************** {

            next-hop 10.0.1.17 {

                description "OpenVPN Server"

                distance 10

            }

        }

    }

}

service {

    dhcp-server {

        disabled false

        hostfile-update disable

        shared-network-name LAN1 {

            authoritative disable

            subnet 10.0.1.0/24 {

                default-router 10.0.1.1

                dns-server 10.0.1.2

                dns-server 10.0.1.3

                lease 86400

                start 10.0.1.68 {

                    stop 10.0.1.200

                }

            }

        }

        shared-network-name LAN2 {

            authoritative disable

            subnet 192.168.1.0/24 {

                default-router 192.168.1.1

                dns-server 192.168.1.1

                lease 86400

                start 192.168.1.101 {

                    stop 192.168.1.240

                }

            }

        }

        shared-network-name PrimaryLan {

            authoritative disable

            subnet 10.1.0.0/16 {

                default-router 10.1.0.1

                dns-server 10.1.1.2

                dns-server 10.1.1.3

                lease 86400

                start 10.1.26.1 {

                    stop 10.1.254.254

                }

            }

        }

        shared-network-name VLAN25 {

            authoritative disable

            subnet 10.0.2.0/24 {

                default-router 10.0.2.1

                dns-server 10.0.1.2

                lease 86400

                start 10.0.2.110 {

                    stop 10.0.2.199

                }

            }

        }

        shared-network-name VLAN666 {

            authoritative disable

            subnet 10.0.3.0/24 {

                default-router 10.0.3.1

                dns-server 8.8.8.8

                dns-server 8.8.4.4

                lease 86400

                start 10.0.3.50 {

                    stop 10.0.3.200

                }

            }

        }

        use-dnsmasq disable

    }

    dns {

        forwarding {

            cache-size 150

            listen-on eth1

            listen-on eth2

        }

    }

    gui {

        http-port 80

        https-port 443

        older-ciphers enable

    }

    nat {

        rule 5010 {

            description "masquerade for WAN"

            outbound-interface eth0

            type masquerade

        }

    }

    ssh {

        port 22

        protocol-version v2

    }

}

system {

    conntrack {

        expect-table-size 2048

        hash-size 32768

        modules {

            sip {

                disable

            }

        }

        table-size 262144

    }

    gateway-address *************

    host-name **********

    login {

        user ************ {

            authentication {

                encrypted-password *********************************************************.

                plaintext-password ""

            }

            level admin

        }

    }

    name-server 4.2.2.1

    ntp {

        server 0.ubnt.pool.ntp.org {

        }

        server 1.ubnt.pool.ntp.org {

        }

        server 2.ubnt.pool.ntp.org {

        }

        server 3.ubnt.pool.ntp.org {

        }

    }

    syslog {

        global {

            facility all {

                level notice

            }

            facility auth {

                level notice

            }

            facility protocols {

                level notice

            }

            facility security {

                level notice

            }

        }

        host 10.0.1.25 {

            facility all {

                level notice

            }

        }

    }

    time-zone UTC

    traffic-analysis {

        dpi enable

        export enable

    }

}

vpn {

    ipsec {

        auto-firewall-nat-exclude enable

        ipsec-interfaces {

            interface eth0

        }

        nat-networks {

            allowed-network 0.0.0.0/0 {

            }

        }

        nat-traversal enable

    }

    l2tp {

        remote-access {

            authentication {

                mode radius

                radius-server 10.0.1.29 {

                    key Secret

                }

            }

            client-ip-pool {

                start 10.0.1.230

                stop 10.0.1.239

            }

            ipsec-settings {

                authentication {

                    mode pre-shared-secret

                    pre-shared-secret *******************************

                }

                ike-lifetime 3600

            }

            local-ip 10.0.1.1

            outside-address **********

        }

    }

    pptp {

        remote-access {

            authentication {

                local-users {

                    username *************** {

                        password ***************

                    }

                    username *************** {

                        password ***************

                    }

                    username *************** {

                        password ***************

                    }

                                      

                }

                mode local

            }

            client-ip-pool {

                start 10.0.1.240

                stop 10.0.1.249

            }

            dns-servers {

                server-1 10.0.1.2

                server-2 8.8.8.8

            }

            mtu 1492

            outside-address **************        }

    }

}

 

 

/* Warning: Do not remove the following line. */

/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */

/* Release version: v1.9.0.4901118.160804.1139 */

 


Viewing all articles
Browse latest Browse all 60861

Trending Articles