At the moment i have WAN2 mostly disabled. Only yesterday it was enabled. Do you still want me to completly remove it from both groups?
Since i assume you want that i will edit the load balancing groups and remove WAN2 from both of them. I will remove the weights from both groups and see what happens then.
firewall { all-ping enable broadcast-ping disable group { address-group kantoor { address 192.168.199.70 address 192.168.199.71 address 192.168.199.72 address 192.168.199.73 address 192.168.199.74 address 192.168.199.75 address 192.168.199.76 description "Kantoor gedeelte" } address-group servers { address 192.168.199.1-192.168.199.69 address 192.168.199.200-192.168.199.253 description Servers } network-group PRIVATE_NETS { network 192.168.0.0/16 network 172.16.0.0/12 network 10.0.0.0/8 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify balance { rule 10 { action modify description "do NOT load balance lan to lan" destination { group { network-group PRIVATE_NETS } } modify { table main } } rule 20 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth0 } } modify { table main } } rule 30 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth1 } } modify { table main } } rule 40 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth2 } } modify { table main } } rule 89 { action modify modify { lb-group LB_servers } source { group { address-group servers } } } rule 90 { action modify modify { lb-group HTTPS } source { group { address-group kantoor } } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 89.255.xx.xx/30 description Xenosite duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } poe { output off } speed auto } ethernet eth1 { address 192.168.200.200/24 description T-Mobile disable duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } poe { output off } speed auto } ethernet eth2 { address 192.168.178.253/24 description Termaar disable duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } poe { output off } speed auto } ethernet eth3 { duplex auto speed auto } ethernet eth4 { address 192.168.199.254/24 description "Intern netwerk" duplex auto firewall { in { modify balance } } poe { output off } speed auto } ethernet eth5 { duplex auto speed auto } loopback lo { } } load-balance { group HTTPS { interface eth0 { failover-only route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } interface eth1 { route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } lb-local enable lb-local-metric-change disable sticky { dest-addr enable source-addr enable } } group LB_servers { interface eth0 { route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } interface eth1 { failover-only route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } lb-local enable lb-local-metric-change disable sticky { dest-addr enable source-addr enable } } } protocols { static { route 0.0.0.0/0 { next-hop 89.255.xx.xx { } next-hop 192.168.178.1 { } next-hop 192.168.200.254 { } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 192.168.199.0/24 { default-router 192.168.199.254 dns-server 192.168.199.4 dns-server 8.8.8.8 lease 3600 start 192.168.199.100 { stop 192.168.199.199 } } } static-arp disable use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth4 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { description "masquerade for WAN" outbound-interface eth0 type masquerade } rule 5002 { description "masquerade for WAN 2" outbound-interface eth1 type masquerade } rule 5004 { description "masquerade for WAN 3" outbound-interface eth2 type masquerade } } ssh { port 22 protocol-version v2 } unms { disable } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } host-name ubnt login { user admin { authentication { encrypted-password xxx } level admin } } name-server 8.8.8.8 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipsec enable ipv4 { forwarding enable gre enable pppoe enable vlan enable } ipv6 { forwarding enable pppoe enable } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Europe/Amsterdam traffic-analysis { dpi enable export enable } }
Changed the config as requested. I am assuming this is correct as i only edited the load balancing of both groups. Both WAN1 and 2 are currently disabled and tomorrow morning i will enable WAN1 to see what happens. If that works i will actually test it with WAN2 instead of 1 to see if that line is stable but that is just for a day to check the stability of the connection. After the test i will put it back as it is above now.