Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

Re: Routing issue with new circuit

$
0
0
firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group PBX {
            address 46.31.87.108
            description "PBX Servers"
        }
        network-group Pulborough {
            network 192.168.13.0/24
        }
        network-group Southwater {
            network 192.168.14.0/24
            network 192.168.101.0/24
        }
        port-group IMAP {
            description "IMAP port"
            port 143
        }
        port-group OpenVPN {
            description "OpenVPN server port"
            port 1194
        }
        port-group SSH {
            port 22
        }
        port-group VOIP {
            description "VOIP ports"
            port 5060
            port 35300
        }
        port-group https {
            description "HTTPS ports"
            port 443
        }
        port-group smtp {
            description "SMTP port"
            port 2525
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to Internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description "Allow ICMP"
            log disable
            protocol icmp
        }
        rule 30 {
            action accept
            description "ssh to laptop"
            destination {
                group {
                    port-group SSH
                }
            }
            log disable
            protocol tcp
        }
        rule 40 {
            action accept
            description "Allow VOIP"
            destination {
                group {
                    port-group VOIP
                }
            }
            source {
                group {
                    address-group PBX
                }
            }
        }
        rule 50 {
            action accept
            description "IMAP to aserver"
            destination {
                address 192.168.14.1
                group {
                    port-group IMAP
                }
            }
            log disable
            protocol tcp
            source {
                group {
                    port-group IMAP
                }
            }
        }
        rule 60 {
            action accept
            description "OpenVPN connection"
            destination {
                address 192.168.14.2
                group {
                    port-group OpenVPN
                }
            }
            log disable
            protocol tcp_udp
            source {
                group {
                    port-group OpenVPN
                }
            }
        }
        rule 100 {
            action drop
            description "Drop invalid state"
            state {
                invalid disable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to Router traffic"
        rule 10 {
            action accept
            description "Allow established/related"
            log disable
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop Invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "Allow ICMP"
            log disable
            protocol icmp
        }
        rule 40 {
            action accept
            description "Allow SSH"
            destination {
                port 22
            }
            limit {
                burst 1
                rate 10/minute
            }
            log disable
            protocol tcp
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        description "House Internet"
        duplex auto
        speed auto
        vif 200 {
            address 10.0.1.1/24
            description "House network"
        }
    }
    ethernet eth1 {
        description LAN
        duplex auto
        speed auto
        vif 1 {
            address 192.168.14.254/24
            description "Default LAN"
        }
        vif 101 {
            address 192.168.101.254/24
            description "101 Network"
        }
    }
    ethernet eth2 {
        duplex auto
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    ethernet eth6 {
        duplex auto
        speed auto
    }
    ethernet eth7 {
        address 88.127.232.10/30
        description "Internet - 88.127.214.0/28 range"
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    loopback lo {
    }
    pseudo-ethernet peth0 {
        address 88.127.214.1/28
        address 88.127.214.2/28
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        link eth7
    }
}
protocols {
    ospf {
        area 0.0.0.0 {
            network 10.0.0.0/30
            network 192.168.14.0/24
            network 192.168.101.0/24
        }
        parameters {
            abr-type cisco
            router-id 192.168.14.254
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN1 {
            authoritative enable
            subnet 192.168.14.0/24 {
                default-router 192.168.14.254
                dns-server 192.168.14.254
                lease 86400
                ntp-server 192.168.14.254
                start 192.168.14.21 {
                    stop 192.168.14.200
                }
                time-server 192.168.14.254
            }
        }
        shared-network-name VLAN101 {
            authoritative disable
            subnet 192.168.101.0/24 {
                default-router 192.168.101.254
                dns-server 192.168.101.254
                lease 600
                ntp-server 192.168.101.254
                start 192.168.101.21 {
                    stop 192.168.101.200
                }
                time-server 192.168.101.254
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth1.1
            listen-on eth1.101
            name-server 8.8.8.8
            name-server 8.8.4.4
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    mdns {
        reflector
    }
    nat {
        rule 10 {
            description "PBX SIP"
            destination {
                address 88.127.214.3
                port 5060
            }
            inbound-interface eth0
            inside-address {
                address 192.168.101.1
                port 5060
            }
            protocol tcp_udp
            type destination
        }
        rule 11 {
            description "PBX RTP"
            destination {
                address 88.127.214.3
                port 35300
            }
            inbound-interface eth0
            inside-address {
                address 192.168.101.1
                port 35300
            }
            protocol tcp_udp
            type destination
        }
        rule 5010 {
            description "Masquerade for WAN"
            outbound-interface eth7
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
    upnp {
        listen-on eth1.1 {
            outbound-interface eth7
        }
        listen-on eth1.101 {
            outbound-interface eth7
        }
    }
}
system {
    conntrack {
        modules {
            sip {
                disable
            }
        }
    }
    gateway-address 87.127.232.9
    host-name Southwater-192-168-14-254
    login {
        banner {
            pre-login "\n*********************************\nThis is the SOUTHWATER router\n\nUnauthorised access is prohibited\n*********************************\n\n"
        }
        user admin {
            authentication {
                encrypted-password ****************
                plaintext-password ****************
            }
            level admin
        }
    }
    name-server 192.168.1.254
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec enable
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Europe/London
    traffic-analysis {
        dpi enable
        export enable
    }
}
[edit]

My setup as it stands.


Viewing all articles
Browse latest Browse all 60861

Trending Articles