Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

External SSH access with Load-balance

$
0
0

Hello.

 

I´m trying configure the load-balance in my home to implement in others companies(this product is wonderfull Smiley Very Happy). So, in the test I have 2 ISP (pppoe0 and eth2), one with pppoe and static IP. To my test, I will manager all the configuration outside the companies, so is very important to me can connect to both ISP router. Smiley LOL

 

 Without activate the load-balance, I can connect to EdgeRouter in both external IP, but after activate de load-balance I can't connect to static internet IP, but I can connect to the pppoe address Mad2.  I tryed connect to SSH and web GUI. 

 

below is the code

 

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    modify LB {
        rule 10 {
            action modify
            destination {
                port 80,443
            }
            modify {
                lb-group WAN01
            }
            protocol tcp
        }
        rule 20 {
            action modify
            modify {
                lb-group WAN02
            }
        }
    }
    name WAN_IN {
        default-action drop
        rule 1 {
            action accept
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        rule 1 {
            action accept
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            state {
                invalid enable
            }
        }
        rule 98 {
            action accept
            destination {
                port 443
            }
            protocol tcp
        }
        rule 99 {
            action accept
            destination {
                port 2222
            }
            protocol tcp
        }
    }
    name default {
        default-action drop
        rule 1 {
            action accept
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            state {
                invalid enable
            }
        }
    }
    options {
        mss-clamp {
            interface-type pppoe
            mss 1412
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.1.1/24
        duplex auto
        firewall {
            in {
                modify LB
            }
        }
        speed auto
    }
    ethernet eth1 {
        duplex auto
        pppoe 0 {
            default-route auto
            firewall {
                in {
                    name WAN_IN
                }
                local {
                    name WAN_LOCAL
                }
            }
            mtu 1492
            name-server none
            password password@isp
            user-id user@isp
        }
        speed auto
    }
    ethernet eth2 {
        address 192.168.88.30/24
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        mtu 1500
    }
}
load-balance {
    group WAN01 {
        interface eth2 {
            failover-only
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 208.67.222.222
                    }
                }
            }
        }
        interface pppoe0 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 208.67.222.222
                    }
                }
            }
        }
    }
    group WAN02 {
        interface eth2 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 208.67.222.222
                    }
                }
            }
        }
        interface pppoe0 {
            failover-only
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 208.67.222.222
                    }
                }
            }
        }
    }
}
protocols {
    static {
        route 0.0.0.0/0 {
            next-hop 192.168.88.1 {
                distance 1
            }
        }
    }
}
service {
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            outbound-interface pppoe0
            type masquerade
        }
        rule 5001 {
            outbound-interface eth2
            type masquerade
        }
    }
    ssh {
        port 2222
        protocol-version v2
    }
}
system {
    host-name ubnt
    login {
        user ubnt {
            authentication {
                encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66.
            }
            level admin
        }
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1057 */

 

 


Viewing all articles
Browse latest Browse all 60861

Trending Articles