Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

Re: Edgerouter pro IPSEC failover from metroE

$
0
0

I'm finally getting a chance to revisit this. So with the topology different now; 

 

VPLS (OSPF) > Edgerouter lite > LAN

 

INTERNET > IPSEC to Edgerouter lite : and route all traffic through that tunnel for security.

 

I can pretty much figure out the WAN on eth2 and setting up the IPSEC tunnel.  Would i treat the metroE as a wan with no firewall rules? 

 

Additional questions is how to force traffice through the VPN tunnel instead of the wan , and I'm assuming the failover part will revert as soon as metroE kicks back in?

 

any help would be appreciated! thanks in advance.

 

 

admin@RT1-TSW-TKR:~$ show configuration
firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group PRIVATE_NETS {
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify balance {
        rule 10 {
            action modify
            description "do NOT load balance lan to lan"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            modify {
                table main
            }
        }
        rule 30 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth1
                }
            }
            modify {
                table main
            }
        }
        rule 40 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth2
                }
            }
            modify {
                table main
            }
        }
        rule 100 {
            action modify
            modify {
                lb-group G
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 10.20.1.250/24
        description Local
        duplex auto
        firewall {
            in {
                modify balance
            }
        }
        speed auto
    }
    ethernet eth1 {
        address dhcp
        description WAN
        duplex auto
        ip {
            ospf {
                cost 10
            }
        }
        speed auto
    }
    ethernet eth2 {
        address 50.194.XXX.XXX/29
        description "WAN 2"
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    loopback lo {
    }
}
load-balance {
    group G {
        interface eth1 {
        }
        interface eth2 {
            failover-only
        }
    }
}
protocols {
    ospf {
        area 0 {
            area-type {
                normal
            }
            network 172.21.0.0/16
            network 10.20.1.0/24
        }
        parameters {
            router-id 172.21.20.1
        }
        passive-interface default
        passive-interface-exclude eth2
    }
    static {
        route 0.0.0.0/0 {
            next-hop 50.194.228.64 {
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative enable
            subnet 10.20.1.0/24 {
                default-router 10.20.1.250
                dns-server 10.99.1.202
                dns-server 10.98.98.201
                domain-name ad-gms.com
                lease 86400
                start 10.20.1.38 {
                    stop 10.20.1.243
                }
            }
        }
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth0
        }
    }
    gui {
        https-port 443
    }
    nat {
        rule 5002 {
            description "masquerade for WAN"
            outbound-interface eth1
            type masquerade
        }
        rule 5004 {
            description "masquerade for WAN 2"
            outbound-interface eth2
            type masquerade
        }
    }
    snmp {
        community XXXXX {
        }
        contact "GHOSTBUSTERS"
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    domain-name gms.com
    host-name RT1-TSW-TKR
    login {
        user admin {
            authentication {
                encrypted-password ****************
            }
            level admin
        }
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/New_York
    traffic-analysis {
        dpi enable
        export enable
    }
}
admin@RT1-TSW-TKR:~$ 

 


Viewing all articles
Browse latest Browse all 60861

Trending Articles