I'm finally getting a chance to revisit this. So with the topology different now;
VPLS (OSPF) > Edgerouter lite > LAN
INTERNET > IPSEC to Edgerouter lite : and route all traffic through that tunnel for security.
I can pretty much figure out the WAN on eth2 and setting up the IPSEC tunnel. Would i treat the metroE as a wan with no firewall rules?
Additional questions is how to force traffice through the VPN tunnel instead of the wan , and I'm assuming the failover part will revert as soon as metroE kicks back in?
any help would be appreciated! thanks in advance.
admin@RT1-TSW-TKR:~$ show configuration firewall { all-ping enable broadcast-ping disable group { network-group PRIVATE_NETS { network 192.168.0.0/16 network 172.16.0.0/12 network 10.0.0.0/8 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify balance { rule 10 { action modify description "do NOT load balance lan to lan" destination { group { network-group PRIVATE_NETS } } modify { table main } } rule 30 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth1 } } modify { table main } } rule 40 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth2 } } modify { table main } } rule 100 { action modify modify { lb-group G } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 10.20.1.250/24 description Local duplex auto firewall { in { modify balance } } speed auto } ethernet eth1 { address dhcp description WAN duplex auto ip { ospf { cost 10 } } speed auto } ethernet eth2 { address 50.194.XXX.XXX/29 description "WAN 2" duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } loopback lo { } } load-balance { group G { interface eth1 { } interface eth2 { failover-only } } } protocols { ospf { area 0 { area-type { normal } network 172.21.0.0/16 network 10.20.1.0/24 } parameters { router-id 172.21.20.1 } passive-interface default passive-interface-exclude eth2 } static { route 0.0.0.0/0 { next-hop 50.194.228.64 { } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 10.20.1.0/24 { default-router 10.20.1.250 dns-server 10.99.1.202 dns-server 10.98.98.201 domain-name ad-gms.com lease 86400 start 10.20.1.38 { stop 10.20.1.243 } } } } dns { forwarding { cache-size 150 listen-on eth0 } } gui { https-port 443 } nat { rule 5002 { description "masquerade for WAN" outbound-interface eth1 type masquerade } rule 5004 { description "masquerade for WAN 2" outbound-interface eth2 type masquerade } } snmp { community XXXXX { } contact "GHOSTBUSTERS" } ssh { port 22 protocol-version v2 } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } domain-name gms.com host-name RT1-TSW-TKR login { user admin { authentication { encrypted-password **************** } level admin } } name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone America/New_York traffic-analysis { dpi enable export enable } } admin@RT1-TSW-TKR:~$