Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

Re: Edgerouter ER-6P configuration problem

$
0
0

At the moment i have WAN2 mostly disabled. Only yesterday it was enabled. Do you still want me to completly remove it from both groups?

 

Since i assume you want that i will edit the load balancing groups and remove WAN2 from both of them. I will remove the weights from both groups and see what happens then.

 

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group kantoor {
            address 192.168.199.70
            address 192.168.199.71
            address 192.168.199.72
            address 192.168.199.73
            address 192.168.199.74
            address 192.168.199.75
            address 192.168.199.76
            description "Kantoor gedeelte"
        }
        address-group servers {
            address 192.168.199.1-192.168.199.69
            address 192.168.199.200-192.168.199.253
            description Servers
        }
        network-group PRIVATE_NETS {
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify balance {
        rule 10 {
            action modify
            description "do NOT load balance lan to lan"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            modify {
                table main
            }
        }
        rule 20 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth0
                }
            }
            modify {
                table main
            }
        }
        rule 30 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth1
                }
            }
            modify {
                table main
            }
        }
        rule 40 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth2
                }
            }
            modify {
                table main
            }
        }
        rule 89 {
            action modify
            modify {
                lb-group LB_servers
            }
            source {
                group {
                    address-group servers
                }
            }
        }
        rule 90 {
            action modify
            modify {
                lb-group HTTPS
            }
            source {
                group {
                    address-group kantoor
                }
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 89.255.xx.xx/30
        description Xenosite
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        poe {
            output off
        }
        speed auto
    }
    ethernet eth1 {
        address 192.168.200.200/24
        description T-Mobile
        disable
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        poe {
            output off
        }
        speed auto
    }
    ethernet eth2 {
        address 192.168.178.253/24
        description Termaar
        disable
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        poe {
            output off
        }
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        address 192.168.199.254/24
        description "Intern netwerk"
        duplex auto
        firewall {
            in {
                modify balance
            }
        }
        poe {
            output off
        }
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
load-balance {
    group HTTPS {
        interface eth0 {
            failover-only
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
        interface eth1 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
        lb-local enable
        lb-local-metric-change disable
        sticky {
            dest-addr enable
            source-addr enable
        }
    }
    group LB_servers {
        interface eth0 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
        interface eth1 {
            failover-only
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
        lb-local enable
        lb-local-metric-change disable
        sticky {
            dest-addr enable
            source-addr enable
        }
    }
}
protocols {
    static {
        route 0.0.0.0/0 {
            next-hop 89.255.xx.xx {
            }
            next-hop 192.168.178.1 {
            }
            next-hop 192.168.200.254 {
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative enable
            subnet 192.168.199.0/24 {
                default-router 192.168.199.254
                dns-server 192.168.199.4
                dns-server 8.8.8.8
                lease 3600
                start 192.168.199.100 {
                    stop 192.168.199.199
                }
            }
        }
        static-arp disable
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth4
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
        rule 5002 {
            description "masquerade for WAN 2"
            outbound-interface eth1
            type masquerade
        }
        rule 5004 {
            description "masquerade for WAN 3"
            outbound-interface eth2
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
    unms {
        disable
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    host-name ubnt
    login {
        user admin {
            authentication {
                encrypted-password xxx
            }
            level admin
        }
    }
    name-server 8.8.8.8
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec enable
        ipv4 {
            forwarding enable
            gre enable
            pppoe enable
            vlan enable
        }
        ipv6 {
            forwarding enable
            pppoe enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Europe/Amsterdam
    traffic-analysis {
        dpi enable
        export enable
    }
}

Changed the config as requested. I am assuming this is correct as i only edited the load balancing of both groups. Both WAN1 and 2 are currently disabled and tomorrow morning i will enable WAN1 to see what happens. If that works i will actually test it with WAN2 instead of 1 to see if that line is stable but that is just for a day to check the stability of the connection. After the test i will put it back as it is above now.


Viewing all articles
Browse latest Browse all 60861

Trending Articles