Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

Re: How to Replace config.boot file with new modified version on EdgeRouter PoE v1.9.0

$
0
0

Hi dpurgert,

 

Here is the config.boot file that I would like to apply to the ERPE. The file is a modified version - and there could be some issues that I haven't taken in consideration when modifying it.

 

/* MY ISP 152.115.XXX.XX on eth0 */
/* LAN IP 192.168.1.1 on eth1 */
/* DMZ IP 192.168.2.1 on eth2 */
/* Server physical addr. 192.168.2.40 - Running VirtualBox */
/* WebServer access VirtualBox IP 192.168.2.45 */
/* GUI not accessable from WAN */

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name DMZ-to-LAN {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
    }
    name DMZ-to-LOCAL {
        default-action drop
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            log enable
            state {
                invalid enable
            }
        }
        rule 600 {
            action accept
            description "Allow DNS querries"
            destination {
                port 53
            }
            protocol tcp_udp
            state {
                new enable
            }
        }
    }
    name DMZ-to-WAN {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
		new enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
    }
    name LAN-to-DMZ {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
		new enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
    }
    name LAN-to-LOCAL {
        default-action drop
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            log enable
            state {
                invalid enable
            }
        }
        rule 200 {
            action accept
            description "Allow HTTPS GUI"
            destination {
                port 443
            }
            log enable
            protocol tcp
            state {
                new enable
            }
        }
        rule 600 {
            action accept
            description "Allow DNS querries"
            destination {
                port 53
            }
            protocol tcp_udp
            state {
                new enable
            }
        }
        rule 800 {
            action accept
            description "SSH management"
            destination {
                port 22
            }
            protocol tcp
            state {
                new enable
            }
        }
    }
    name LAN-to-WAN {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
		new enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
    }
    name LOCAL-to-DMZ {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
    }
    name LOCAL-to-LAN {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
    }
    name LOCAL-to-WAN {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
		new enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
    }
    name WAN-to-DMZ {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
        rule 100 {
            action accept
            description "HTTP access"
			destination {
				address 192.168.2.45
				port 80
			}
			log enable
            protocol tcp
            state {
                new enable
            }
        }
        rule 200 {
            action accept
            description "HTTPS access"
			destination {
				address 192.168.2.40
				port 443
			}
			log enable
            protocol tcp
            state {
                new enable
            }
        }
		rule 800 { 
			action drop 
			description "Limit inbound SSH connections" 
			destination { 
				port ssh 
			} 
			protocol tcp 
			recent { 
				count 3
				time 30 
			} 
			state { 
				new enable 
			} 
		}
		rule 801 {
			action accept
			description "SSH access"
			destination {
				address 192.168.2.40
				port 22
			}
			log enable
			protocol tcp
			state {
				new enable
			}
        }
    }
    name WAN-to-LAN {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
    }
    name WAN-to-LOCAL {
        default-action drop
        enable-default-log
        rule 1 {
            action accept
            description "Established/related connections"
            protocol all
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "State invalid"
            state {
                invalid enable
            }
        }
    }
name GuestVLAN100 {
        default-action accept
        description ""
        rule 1 {
            action accept
            description "Apple TV"
            destination {
                address 192.168.1.38
            }
            log disable
            protocol all
            source {
                mac-address xx:18:xx:86:xx:7a
            }
        }
        rule 2 {
            action drop
            destination {
                address 192.168.0.0/16
            }
            log disable
            protocol all
            source {
                address 192.168.100.0/24
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 152.115.XXX.XX/24
        description WAN
        duplex auto
	poe {
            output off
        }
        speed auto
	}
    ethernet eth1 {
        address 192.168.1.1/24
        description LAN
        duplex auto
	poe {
            output off
        }
        speed auto
	vif 100 {
            address 192.168.100.1/24
            description "Guest/IoT VLAN"
	firewall {
                out {
                    name GuestVLAN100
                }
            }
    	}
    ethernet eth2 {
        address 192.168.2.1/24
        description DMZ
        duplex auto
	poe {
            output off
        }
        speed auto
	}
    ethernet eth3 {
        description "Local Free 3"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth4 {
        description "Local Free 4"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        address dhcp
        description "Local 2"
        mtu 1500
        switch-port {
            interface eth3 {
            }
            interface eth4 {
            }
            vlan-aware disable
        }
    }
}

service {
    dhcp-server {
        disabled false
        hostfile-update disable
	shared-network-name GuestVLAN100 {
            authoritative disable
            subnet 192.168.100.0/24 {
                default-router 192.168.100.1
                dns-server 8.8.8.8
                dns-server 8.8.4.4
                lease 86400
                start 192.168.100.50 {
                    stop 192.168.100.200
                }
            }
        }
        shared-network-name DMZ_DHCP {
            authoritative disable
            subnet 192.168.2.0/24 {
                default-router 192.168.2.1
                dns-server 192.168.2.1
                lease 86400
                start 192.168.2.100 {
                    stop 192.168.2.254
                }
                static-mapping Server {
                    ip-address 192.168.2.40
                    mac-address xx:1F:xx:B8:xx:28
                }
			static-mapping VM-04 {
                    ip-address 192.168.2.45
                    mac-address xx:00:xx:01:xx:74
                }
            }
        }
        shared-network-name LAN_DHCP {
            authoritative disable
            subnet 192.168.1.0/24 {
                default-router 192.168.1.1
                dns-server 192.168.1.1
                lease 86400
                start 192.168.1.100 {
                    stop 192.168.1.254
                }
                static-mapping ALNY {
                    ip-address 192.168.1.38
                    mac-address xx:5c:xx:76:xx:d2
                }
         		unifi-controller 192.168.1.38
        }
    }
    dns {
        forwarding {
            cache-size 200
            listen-on eth1
            listen-on eth2
	    listen-on switch0
        }
    }
    gui {
        https-port 443
        listen-address 192.168.1.1
    }
    nat {
        rule 200 {
            description "Web access to DMZ"
            destination {
                port 314
            }
            inbound-interface eth+
            inside-address {
                address 152.115.XXX.XX
                port 443
            }
            log enable
            protocol tcp
            type destination
        }
        rule 600 {
            description "SSH access to DMZ"
            destination {
                port 1337
            }
            inbound-interface eth+
            inside-address {
                address 152.115.XXX.XX
                port 22
            }
            log enable
            protocol tcp
            type destination
        }
        rule 5000 {
            description "WAN masquerade"
            log disable
            outbound-interface eth0
            protocol all
            type masquerade
        }
		rule 5011 {
			description "Masquerade hairpin eth1"
			destination {
			       address 152.115.XXX.XX/24
        		}
			log disable
			outbound-interface eth1
			protocol tcp
			source {
			       address 152.115.XXX.XX/24
         		}
			type masquerade
		}
	}
	ssh {
        disable-password-authentication
	   port 22
        protocol-version v2
 	   }
	}
    }
system {
    gateway-address 152.115.89.1
    host-name ubnt
    login {
        user ubnt {
            authentication {
                encrypted-password *********
                plaintext-password ""
            }
            full-name ""
            level admin
        }
    }
    name-server 83.136.89.6
    name-server 83.136.89.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
/* === package {
        repository wheezy {
            components "main contrib non-free"
            distribution squeeze
            password ""
            url http://mirror.one.com/debian/
            username ""
        }
        repository wheezy-security {
            components main
            distribution wheezy/updates
            password ""
            url http://security.debian.org
            username ""
        }
    } === */
syslog {
       global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Europe/Copenhagen
}
zone-policy {
    zone DMZ {
        default-action reject
        from LAN {
            firewall {
                name LAN-to-DMZ
            }
        }
        from LOCAL {
            firewall {
                name LOCAL-to-DMZ
            }
        }
        from WAN {
            firewall {
                name WAN-to-DMZ
            }
        }
        interface eth2
    }
    zone LAN {
        default-action drop
        from DMZ {
            firewall {
                name DMZ-to-LAN
            }
        }
        from LOCAL {
            firewall {
                name LOCAL-to-LAN
            }
        }
        from WAN {
            firewall {
                name WAN-to-LAN
            }
        }
        interface eth1
    }
    zone LOCAL {
        default-action reject
        from DMZ {
            firewall {
                name DMZ-to-LOCAL
            }
        }
        from LAN {
            firewall {
                name LAN-to-LOCAL
            }
        }
        from WAN {
            firewall {
                name WAN-to-LOCAL
            }
        }
        local-zone
    }
    zone WAN {
        default-action reject
        from DMZ {
            firewall {
                name DMZ-to-WAN
            }
        }
        from LAN {
            firewall {
                name LAN-to-WAN
            }
        }
        from LOCAL {
            firewall {
                name LOCAL-to-WAN
            }
        }
        interface eth0
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1131 */


Viewing all articles
Browse latest Browse all 60861

Trending Articles