Hi,
If i disable a port - let's say eth1 in the GUI - it seems that it enables itself after some time. It's still greyed out in the dashboard but i can see packets flowing in the TX/RX collumn. Is this a known issue?
I've also read about switch groups but there aren't any.
Is there a known solution for this?
My config: (er-pro)
firewall { all-ping enable broadcast-ping disable group { address-group Block-IP { address 155.133.82.1-155.133.82.254 address 94.156.153.25 address 118.143.2.126 address 118.193.179.177 address 189.73.168.227 address 193.198.117.152 address 199.168.184.156 address 83.244.112.194 address 209.124.97.165 description "IPs to block" } port-group ALLto.0.7 { description Steam port 27000-27015 } port-group All2Server { description VPN,mail,mailmail port 47 port 25 port 110 port 143 port 2525 } port-group TCP2Server { description web,VPN,VPN,SSL port 80 port 1723 port 1701 port 443 } port-group TCPto.0.7 { description ts3,ts3,steam port 10011 port 30033 port 27020 } port-group UDP2Server { description vp1 port 500 } port-group UDPto.0.7 { description ts3,steam port 9987 port 1200 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN2_Local { default-action drop description "" rule 10 { action accept log disable protocol all state { established enable invalid disable new disable related enable } } rule 20 { action drop log disable protocol all state { established disable invalid enable new disable related disable } } } name WAN2_in { default-action drop description "" rule 1 { action drop log disable protocol all state { established disable invalid disable new enable related disable } } rule 2 { action accept log disable protocol all state { established enable invalid disable new disable related enable } } } name WAN_IN { default-action drop description "WAN to internal" rule 1 { action drop description BlockIP log disable protocol all source { group { address-group Block-IP } } } rule 2 { action accept description All2Server destination { address 192.168.0.3 group { port-group All2Server } } log disable protocol all state { established enable invalid disable new enable related enable } } rule 3 { action accept description TCP2Server destination { address 192.168.0.3 group { port-group TCP2Server } } log disable protocol tcp source { group { } } state { established enable invalid disable new enable related enable } } rule 4 { action accept description UDP2Server destination { address 192.168.0.3 group { port-group UDP2Server } } log disable protocol udp state { established enable invalid disable new enable related enable } } rule 5 { action accept description ALLto.0.7 destination { address 192.168.0.7 group { port-group ALLto.0.7 } } log disable protocol all state { established enable invalid disable new enable related enable } } rule 6 { action accept description TCPto.0.7 destination { address 192.168.0.7 group { port-group TCPto.0.7 } } log disable protocol tcp state { established enable invalid disable new enable related enable } } rule 7 { action accept description UDPto.0.7 destination { address 192.168.0.7 group { port-group UDPto.0.7 } } log disable protocol udp state { established enable invalid disable new enable related enable } } rule 8 { action drop log disable protocol all state { invalid enable } } rule 9 { action accept log disable protocol all state { established enable invalid disable new disable related enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept state { established enable related enable } } rule 20 { action drop state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description UPC duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { disable duplex auto firewall { in { name WAN2_in } local { name WAN2_Local } } speed auto } ethernet eth2 { duplex auto speed auto } ethernet eth3 { duplex auto speed auto } ethernet eth4 { address dhcp duplex auto speed auto } ethernet eth5 { duplex auto speed auto } ethernet eth6 { address 192.168.0.1/24 description FiberLink duplex auto speed auto } ethernet eth7 { address 192.168.1.1/24 duplex auto speed auto } loopback lo { } } protocols { static { } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative disable subnet 192.168.0.0/24 { default-router 192.168.0.1 dns-server 192.168.0.1 lease 86400 start 192.168.0.100 { stop 192.168.0.200 } static-mapping NAS { ip-address 192.168.0.32 mac-address 78:54:2E:23:14:07 } static-mapping Phil-PC { ip-address 192.168.0.104 mac-address 14:da:e9:0e:7d:eb } static-mapping SERVER { ip-address 192.168.0.7 mac-address D0:50:99:4B:77:7C } static-mapping ServerMonitor { ip-address 192.168.0.3 mac-address 14:cc:20:05:d6:51 } static-mapping Switch { ip-address 192.168.0.2 mac-address 10:fe:ED:28:A6:B4 } static-mapping ubntWLAN { ip-address 192.168.0.4 mac-address dc:9f:db:01:8f:f6 } } } shared-network-name LAN2 { authoritative disable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.2 { stop 192.168.1.30 } } } use-dnsmasq disable } dns { dynamic { interface eth0 { service dyndns { host-name login password server dynupdate.no-ip.com } web dyndns } interface eth6 { service dyndns { host-name login password server dynupdate.no-ip.com } web dyndns } } forwarding { cache-size 150 listen-on eth6 listen-on eth7 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 1 { description TCP2Server destination { group { port-group TCP2Server } } inbound-interface eth0 inside-address { address 192.168.0.3 } log disable protocol tcp source { group { } } type destination } rule 2 { description UDP2Server destination { group { port-group UDP2Server } } inbound-interface eth0 inside-address { address 192.168.0.3 } log disable protocol udp type destination } rule 3 { description All2Server destination { group { port-group All2Server } } inbound-interface eth0 inside-address { address 192.168.0.3 } log disable protocol all type destination } rule 4 { description ALLto.0.7 destination { group { port-group ALLto.0.7 } } inbound-interface eth0 inside-address { address 192.168.0.7 } log disable protocol all type destination } rule 5 { description TCPto.0.7 destination { group { port-group TCPto.0.7 } } inbound-interface eth0 inside-address { address 192.168.0.7 } log disable protocol tcp type destination } rule 6 { description UDPto.0.7 destination { group { port-group UDPto.0.7 } } inbound-interface eth0 inside-address { address 192.168.0.7 } log disable protocol udp type destination } rule 5010 { log disable outbound-interface eth0 protocol all type masquerade } rule 5011 { disable log disable outbound-interface eth1 protocol all source { } type masquerade } rule 5012 { destination { address 192.168.10.0/24 } disable log disable outbound-interface pptpc1 outside-address { } protocol all type masquerade } } ssh { port 22 protocol-version v2 } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } host-name Router login { user r00t { authentication { encrypted-password plaintext-password "" } full-name "Philipp Jeschofnik" level admin } } ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } package { repository wheezy { components "main contrib non-free" distribution wheezy password "" url http://http.us.debian.org/debian username "" } repository wheezy-security { components main distribution wheezy/updates password "" url http://security.debian.org username "" } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Europe/Vienna traffic-analysis { dpi disable export disable } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1139 */