Hello.
I´m trying configure the load-balance in my home to implement in others companies(this product is wonderfull ). So, in the test I have 2 ISP (pppoe0 and eth2), one with pppoe and static IP. To my test, I will manager all the configuration outside the companies, so is very important to me can connect to both ISP router.
Without activate the load-balance, I can connect to EdgeRouter in both external IP, but after activate de load-balance I can't connect to static internet IP, but I can connect to the pppoe address . I tryed connect to SSH and web GUI.
below is the code
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable modify LB { rule 10 { action modify destination { port 80,443 } modify { lb-group WAN01 } protocol tcp } rule 20 { action modify modify { lb-group WAN02 } } } name WAN_IN { default-action drop rule 1 { action accept state { established enable related enable } } rule 2 { action drop state { invalid enable } } } name WAN_LOCAL { default-action drop rule 1 { action accept state { established enable related enable } } rule 2 { action drop state { invalid enable } } rule 98 { action accept destination { port 443 } protocol tcp } rule 99 { action accept destination { port 2222 } protocol tcp } } name default { default-action drop rule 1 { action accept state { established enable related enable } } rule 2 { action drop state { invalid enable } } } options { mss-clamp { interface-type pppoe mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 192.168.1.1/24 duplex auto firewall { in { modify LB } } speed auto } ethernet eth1 { duplex auto pppoe 0 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server none password password@isp user-id user@isp } speed auto } ethernet eth2 { address 192.168.88.30/24 duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth3 { duplex auto speed auto } ethernet eth4 { duplex auto speed auto } loopback lo { } switch switch0 { mtu 1500 } } load-balance { group WAN01 { interface eth2 { failover-only route-test { initial-delay 60 interval 10 type { ping { target 208.67.222.222 } } } } interface pppoe0 { route-test { initial-delay 60 interval 10 type { ping { target 208.67.222.222 } } } } } group WAN02 { interface eth2 { route-test { initial-delay 60 interval 10 type { ping { target 208.67.222.222 } } } } interface pppoe0 { failover-only route-test { initial-delay 60 interval 10 type { ping { target 208.67.222.222 } } } } } } protocols { static { route 0.0.0.0/0 { next-hop 192.168.88.1 { distance 1 } } } } service { gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { outbound-interface pppoe0 type masquerade } rule 5001 { outbound-interface eth2 type masquerade } } ssh { port 2222 protocol-version v2 } } system { host-name ubnt login { user ubnt { authentication { encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66. } level admin } } name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.5.4884695.160608.1057 */