Quantcast
Viewing all articles
Browse latest Browse all 60861

Disabled interfaces enables itself after some time

Hi,

 

If i disable a port - let's say eth1 in the GUI - it seems that it enables itself after some time. It's still greyed out in the dashboard but i can see packets flowing in the TX/RX collumn. Is this a known issue? 

 

I've also read about switch groups but there aren't any.

 

Is there a known solution for this?

 

 

My config: (er-pro)

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group Block-IP {
            address 155.133.82.1-155.133.82.254
            address 94.156.153.25
            address 118.143.2.126
            address 118.193.179.177
            address 189.73.168.227
            address 193.198.117.152
            address 199.168.184.156
            address 83.244.112.194
            address 209.124.97.165
            description "IPs to block"
        }
        port-group ALLto.0.7 {
            description Steam
            port 27000-27015
        }
        port-group All2Server {
            description VPN,mail,mailmail
            port 47
            port 25
            port 110
            port 143
            port 2525
        }
        port-group TCP2Server {
            description web,VPN,VPN,SSL
            port 80
            port 1723
            port 1701
            port 443
        }
        port-group TCPto.0.7 {
            description ts3,ts3,steam
            port 10011
            port 30033
            port 27020
        }
        port-group UDP2Server {
            description vp1
            port 500
        }
        port-group UDPto.0.7 {
            description ts3,steam
            port 9987
            port 1200
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN2_Local {
        default-action drop
        description ""
        rule 10 {
            action accept
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 20 {
            action drop
            log disable
            protocol all
            state {
                established disable
                invalid enable
                new disable
                related disable
            }
        }
    }
    name WAN2_in {
        default-action drop
        description ""
        rule 1 {
            action drop
            log disable
            protocol all
            state {
                established disable
                invalid disable
                new enable
                related disable
            }
        }
        rule 2 {
            action accept
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 1 {
            action drop
            description BlockIP
            log disable
            protocol all
            source {
                group {
                    address-group Block-IP
                }
            }
        }
        rule 2 {
            action accept
            description All2Server
            destination {
                address 192.168.0.3
                group {
                    port-group All2Server
                }
            }
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 3 {
            action accept
            description TCP2Server
            destination {
                address 192.168.0.3
                group {
                    port-group TCP2Server
                }
            }
            log disable
            protocol tcp
            source {
                group {
                }
            }
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 4 {
            action accept
            description UDP2Server
            destination {
                address 192.168.0.3
                group {
                    port-group UDP2Server
                }
            }
            log disable
            protocol udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 5 {
            action accept
            description ALLto.0.7
            destination {
                address 192.168.0.7
                group {
                    port-group ALLto.0.7
                }
            }
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 6 {
            action accept
            description TCPto.0.7
            destination {
                address 192.168.0.7
                group {
                    port-group TCPto.0.7
                }
            }
            log disable
            protocol tcp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 7 {
            action accept
            description UDPto.0.7
            destination {
                address 192.168.0.7
                group {
                    port-group UDPto.0.7
                }
            }
            log disable
            protocol udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 8 {
            action drop
            log disable
            protocol all
            state {
                invalid enable
            }
        }
        rule 9 {
            action accept
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description UPC
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        disable
        duplex auto
        firewall {
            in {
                name WAN2_in
            }
            local {
                name WAN2_Local
            }
        }
        speed auto
    }
    ethernet eth2 {
        duplex auto
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        address dhcp
        duplex auto
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    ethernet eth6 {
        address 192.168.0.1/24
        description FiberLink
        duplex auto
        speed auto
    }
    ethernet eth7 {
        address 192.168.1.1/24
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
protocols {
    static {
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative disable
            subnet 192.168.0.0/24 {
                default-router 192.168.0.1
                dns-server 192.168.0.1
                lease 86400
                start 192.168.0.100 {
                    stop 192.168.0.200
                }
                static-mapping NAS {
                    ip-address 192.168.0.32
                    mac-address 78:54:2E:23:14:07
                }
                static-mapping Phil-PC {
                    ip-address 192.168.0.104
                    mac-address 14:da:e9:0e:7d:eb
                }
                static-mapping SERVER {
                    ip-address 192.168.0.7
                    mac-address D0:50:99:4B:77:7C
                }
                static-mapping ServerMonitor {
                    ip-address 192.168.0.3
                    mac-address 14:cc:20:05:d6:51
                }
                static-mapping Switch {
                    ip-address 192.168.0.2
                    mac-address 10:fe:ED:28:A6:B4
                }
                static-mapping ubntWLAN {
                    ip-address 192.168.0.4
                    mac-address dc:9f:db:01:8f:f6
                }
            }
        }
        shared-network-name LAN2 {
            authoritative disable
            subnet 192.168.1.0/24 {
                default-router 192.168.1.1
                dns-server 192.168.1.1
                lease 86400
                start 192.168.1.2 {
                    stop 192.168.1.30
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        dynamic {
            interface eth0 {
                service dyndns {
                    host-name
                    login
                    password 
                    server dynupdate.no-ip.com
                }
                web dyndns
            }
            interface eth6 {
                service dyndns {
                    host-name 
                    login
                    password
                    server dynupdate.no-ip.com
                }
                web dyndns
            }
        }
        forwarding {
            cache-size 150
            listen-on eth6
            listen-on eth7
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 1 {
            description TCP2Server
            destination {
                group {
                    port-group TCP2Server
                }
            }
            inbound-interface eth0
            inside-address {
                address 192.168.0.3
            }
            log disable
            protocol tcp
            source {
                group {
                }
            }
            type destination
        }
        rule 2 {
            description UDP2Server
            destination {
                group {
                    port-group UDP2Server
                }
            }
            inbound-interface eth0
            inside-address {
                address 192.168.0.3
            }
            log disable
            protocol udp
            type destination
        }
        rule 3 {
            description All2Server
            destination {
                group {
                    port-group All2Server
                }
            }
            inbound-interface eth0
            inside-address {
                address 192.168.0.3
            }
            log disable
            protocol all
            type destination
        }
        rule 4 {
            description ALLto.0.7
            destination {
                group {
                    port-group ALLto.0.7
                }
            }
            inbound-interface eth0
            inside-address {
                address 192.168.0.7
            }
            log disable
            protocol all
            type destination
        }
        rule 5 {
            description TCPto.0.7
            destination {
                group {
                    port-group TCPto.0.7
                }
            }
            inbound-interface eth0
            inside-address {
                address 192.168.0.7
            }
            log disable
            protocol tcp
            type destination
        }
        rule 6 {
            description UDPto.0.7
            destination {
                group {
                    port-group UDPto.0.7
                }
            }
            inbound-interface eth0
            inside-address {
                address 192.168.0.7
            }
            log disable
            protocol udp
            type destination
        }
        rule 5010 {
            log disable
            outbound-interface eth0
            protocol all
            type masquerade
        }
        rule 5011 {
            disable
            log disable
            outbound-interface eth1
            protocol all
            source {
            }
            type masquerade
        }
        rule 5012 {
            destination {
                address 192.168.10.0/24
            }
            disable
            log disable
            outbound-interface pptpc1
            outside-address {
            }
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    host-name Router
    login {
        user r00t {
            authentication {
                encrypted-password 
                plaintext-password ""
            }
            full-name "Philipp Jeschofnik"
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    package {
        repository wheezy {
            components "main contrib non-free"
            distribution wheezy
            password ""
            url http://http.us.debian.org/debian
            username ""
        }
        repository wheezy-security {
            components main
            distribution wheezy/updates
            password ""
            url http://security.debian.org
            username ""
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Europe/Vienna
    traffic-analysis {
        dpi disable
        export disable
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1139 */

Viewing all articles
Browse latest Browse all 60861

Trending Articles