I'll post my config below, been trying many different options, nothing is sticking. I setup a VLAN, I setup a DHCP server for it, I tag my UniFi controller wireless network with the correct VLAN ID, the devices on that particular wireless network do get assigned the correct IP address from the DHCP server, BUT NO INTERNET CONNECTION. Racking my brain. I've tryed manually entering in DNS thinking that would do the trick...it ain't. Also, I have another wireless network with no VLAN that works just fine. In the pictures below, not sure if I need the Student Network, but with my EdgeLites, it worked fine. Here is my config:
firewall {
all-ping enable
broadcast-ping disable
group {
network-group PRIVATE_NETS {
network 192.168.0.0/16
network 172.16.0.0/12
network 10.0.0.0/8
}
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians disable
modify balance {
rule 10 {
action modify
description "do NOT load balance lan to lan"
destination {
group {
network-group PRIVATE_NETS
}
}
modify {
table main
}
}
rule 20 {
action modify
description "do NOT load balance destination public address"
destination {
group {
address-group ADDRv4_eth0
}
}
modify {
table main
}
}
rule 30 {
action modify
description "do NOT load balance destination public address"
destination {
group {
address-group ADDRv4_eth1
}
}
modify {
table main
}
}
rule 100 {
action modify
modify {
lb-group G
}
}
}
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address 192.168.2.141/24
description WAN
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth1 {
address 192.168.3.141/24
description "WAN 2"
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth2 {
address 192.168.50.1/24
description Local
duplex auto
firewall {
in {
modify balance
}
}
speed auto
vif 20 {
address 192.168.5.1/24
description Student
mtu 1500
}
}
ethernet eth3 {
duplex auto
speed auto
}
ethernet eth4 {
duplex auto
speed auto
}
ethernet eth5 {
duplex auto
speed auto
}
ethernet eth6 {
duplex auto
speed auto
}
ethernet eth7 {
duplex auto
speed auto
}
loopback lo {
}
}
load-balance {
group G {
interface eth0 {
}
interface eth1 {
}
lb-local enable
}
}
protocols {
static {
route 0.0.0.0/0 {
next-hop 192.168.2.1 {
}
next-hop 192.168.3.1 {
}
}
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN {
authoritative enable
subnet 192.168.50.0/24 {
default-router 192.168.50.1
dns-server 192.168.50.1
lease 86400
start 192.168.50.38 {
stop 192.168.50.243
}
}
}
shared-network-name Student {
authoritative disable
subnet 192.168.5.0/24 {
default-router 192.168.5.1
dns-server 75.75.75.75
dns-server 75.75.76.76
lease 86400
start 192.168.5.6 {
stop 192.168.5.245
}
}
}
use-dnsmasq disable
}
dns {
forwarding {
cache-size 150
listen-on eth2
listen-on eth2.20
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 5000 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
rule 5002 {
description "masquerade for WAN 2"
outbound-interface eth1
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
conntrack {
expect-table-size 4096
hash-size 4096
table-size 32768
tcp {
half-open-connections 512
loose enable
max-retrans 3
}
}
host-name ubnt
login {
user ubnt {
authentication {
encrypted-password $6$CFwCZE.pQkRTir$dHe6qSecQhNdzMB4pU7FCf6pKU3.9FsE4Bk739MuQ0N4tPxO2LJJc4zUDdHvR6jESeAc4fWOWj1ezZ/BQVaNt1
}
level admin
}
}
name-server 75.75.75.75
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone UTC
}
/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.1.4939098.161214.0733 */
![Pic1.png Pic1.png]()
![Pic2.png Pic2.png]()
![Pic3.png Pic3.png]()
![Pic4.png Pic4.png]()
Captured this, but it is giberish to my current knowledgebase:
22:52:43.095631 IP 192.168.5.30.46502 > 104.20.37.73.443: Flags [P.], seq 606:654, ack 200, win 237, length 48
22:52:43.108132 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 1:518, ack 1, win 229, options [nop,nop,TS val 10125534 ecr 4244781883], length 517
22:52:43.108909 IP 173.194.194.125.443 > 192.168.5.31.50876: Flags [S.], seq 270977306, ack 3623525655, win 42408, options [mss 1380,sackOK,TS val 2446394483 ecr 38900897,nop,wscale 7], length 0
22:52:43.112449 IP 192.168.5.31.50876 > 173.194.194.125.443: Flags [.], ack 1, win 229, options [nop,nop,TS val 38900966 ecr 2446394483], length 0
22:52:43.112650 IP 192.168.5.31.50876 > 173.194.194.125.443: Flags [P.], seq 1:73, ack 1, win 229, options [nop,nop,TS val 38900966 ecr 2446394483], length 72
22:52:43.118644 IP 104.20.37.73.443 > 192.168.5.30.46502: Flags [R], seq 224391573, win 0, length 0
22:52:43.129559 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [.], ack 518, win 340, options [nop,nop,TS val 4244782160 ecr 10125534], length 0
22:52:43.130661 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [P.], seq 1:153, ack 518, win 340, options [nop,nop,TS val 4244782160 ecr 10125534], length 152
22:52:43.136926 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [.], ack 153, win 237, options [nop,nop,TS val 10125537 ecr 4244782160], length 0
22:52:43.139387 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 518:718, ack 153, win 237, options [nop,nop,TS val 10125537 ecr 4244782160], length 200
22:52:43.143713 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 718:763, ack 153, win 237, options [nop,nop,TS val 10125538 ecr 4244782160], length 45
22:52:43.144057 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 763:811, ack 153, win 237, options [nop,nop,TS val 10125538 ecr 4244782160], length 48
22:52:43.144294 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 811:845, ack 153, win 237, options [nop,nop,TS val 10125538 ecr 4244782160], length 34
22:52:43.144984 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 845:2114, ack 153, win 237, options [nop,nop,TS val 10125538 ecr 4244782160], length 1269
22:52:43.182659 IP 173.194.194.125.443 > 192.168.5.31.50876: Flags [.], ack 73, win 332, options [nop,nop,TS val 2446394556 ecr 38900966], length 0
22:52:43.182708 IP 173.194.194.125.443 > 192.168.5.31.50876: Flags [P.], seq 1:80, ack 73, win 332, options [nop,nop,TS val 2446394557 ecr 38900966], length 79
22:52:43.185429 IP 192.168.5.31.50876 > 173.194.194.125.443: Flags [.], ack 80, win 229, options [nop,nop,TS val 38901039 ecr 2446394557], length 0
22:52:43.185480 IP 192.168.5.31.50876 > 173.194.194.125.443: Flags [P.], seq 73:239, ack 80, win 229, options [nop,nop,TS val 38901039 ecr 2446394557], length 166
22:52:43.196014 IP 192.168.5.30.42143 > 74.125.28.189.443: Flags [P.], seq 718:763, ack 235, win 237, options [nop,nop,TS val 1880006 ecr 2724235232], length 45
22:52:43.196708 IP 172.217.6.67.443 > 192.168.5.31.55338: UDP, length 132
22:52:43.196748 IP 172.217.6.67.443 > 192.168.5.31.55338: UDP, length 132
22:52:43.198169 IP 192.168.5.31.55338 > 172.217.6.67.443: UDP, length 48
22:52:43.199119 IP 192.168.5.31.55338 > 172.217.6.67.443: UDP, length 42
22:52:43.224661 IP 172.217.6.67.443 > 192.168.5.31.55338: UDP, length 132
22:52:43.224701 IP 172.217.6.67.443 > 192.168.5.31.55338: UDP, length 132
22:52:43.226836 IP 192.168.5.31.55338 > 172.217.6.67.443: UDP, length 45
22:52:43.438201 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 518:845, ack 153, win 237, options [nop,nop,TS val 10125567 ecr 4244782160], length 327
22:52:43.441415 IP 173.194.202.189.443 > 192.168.5.30.44436: Flags [P.], seq 1122:1186, ack 664, win 437, options [nop,nop,TS val 3403550542 ecr 1879981], length 64
22:52:43.455227 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [.], ack 845, win 365, options [nop,nop,TS val 4244782486 ecr 10125567,nop,nop,sack 1 {718:845}], length 0
22:52:43.455704 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [P.], seq 153:201, ack 845, win 365, options [nop,nop,TS val 4244782487 ecr 10125567], length 48
22:52:43.456659 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [P.], seq 201:235, ack 845, win 365, options [nop,nop,TS val 4244782487 ecr 10125567], length 34
22:52:43.456700 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [P.], seq 235:265, ack 845, win 365, options [nop,nop,TS val 4244782487 ecr 10125567], length 30
22:52:43.456849 IP 192.168.5.31.50876 > 173.194.194.125.443: Flags [P.], seq 73:239, ack 80, win 229, options [nop,nop,TS val 38901309 ecr 2446394557], length 166
22:52:43.463510 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 845:2114, ack 153, win 237, options [nop,nop,TS val 10125570 ecr 4244782486], length 1269
22:52:43.463551 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [.], ack 235, win 237, options [nop,nop,TS val 10125570 ecr 4244782487], length 0
22:52:43.463696 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 2114:2144, ack 265, win 237, options [nop,nop,TS val 10125570 ecr 4244782487], length 30
22:52:43.487187 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [.], ack 2144, win 385, options [nop,nop,TS val 4244782518 ecr 10125570], length 0
22:52:43.535614 IP 173.194.194.125.443 > 192.168.5.31.50876: Flags [R], seq 270977386, win 0, length 0
22:52:43.547735 IP 192.168.5.30.44436 > 173.194.202.189.443: Flags [.], ack 1078, win 332, options [nop,nop,TS val 1880041 ecr 3403549743,nop,nop,sack 1 {1122:1186}], length 0
22:52:43.595011 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [P.], seq 265:572, ack 2144, win 385, options [nop,nop,TS val 4244782625 ecr 10125570], length 307
22:52:43.595054 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [P.], seq 572:656, ack 2144, win 385, options [nop,nop,TS val 4244782625 ecr 10125570], length 84
22:52:43.595091 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [P.], seq 656:694, ack 2144, win 385, options [nop,nop,TS val 4244782625 ecr 10125570], length 38
22:52:43.603720 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [.], ack 694, win 245, options [nop,nop,TS val 10125584 ecr 4244782625], length 0
22:52:43.613439 IP 192.168.5.29.48850 > 172.217.6.78.443: Flags [P.], seq 2144:2182, ack 694, win 245, options [nop,nop,TS val 10125585 ecr 4244782625], length 38
22:52:43.640504 IP 192.168.5.29.54779 > 173.194.202.189.443: Flags [S], seq 3998586558, win 29200, options [mss 1460,sackOK,TS val 10125587 ecr 0,nop,wscale 7], length 0
22:52:43.670633 IP 172.217.6.78.443 > 192.168.5.29.48850: Flags [.], ack 2182, win 385, options [nop,nop,TS val 4244782701 ecr 10125585], length 0
22:52:43.686629 IP 173.194.202.189.443 > 192.168.5.29.54779: Flags [S.], seq 2383269232, ack 3998586559, win 42408, options [mss 1380,sackOK,TS val 3372895253 ecr 10125587,nop,wscale 7], length 0
22:52:43.690081 IP 192.168.5.29.54779 > 173.194.202.189.443: Flags [.], ack 1, win 229, options [nop,nop,TS val 10125592 ecr 3372895253], length 0
22:52:43.691243 IP 192.168.5.29.54779 > 173.194.202.189.443: Flags [P.], seq 1:518, ack 1, win 229, options [nop,nop,TS val 10125593 ecr 3372895253], length 517
22:52:43.715986 IP 192.168.5.30.42143 > 74.125.28.189.443: Flags [P.], seq 718:763, ack 235, win 237, options [nop,nop,TS val 1880058 ecr 2724235232], length 45
22:52:43.739247 IP 173.194.202.189.443 > 192.168.5.29.54779: Flags [.], ack 518, win 340, options [nop,nop,TS val 3372895306 ecr 10125593], length 0
22:52:43.741357 IP 173.194.202.189.443 > 192.168.5.29.54779: Flags [P.], seq 1:149, ack 518, win 340, options [nop,nop,TS val 3372895306 ecr 10125593], length 148
22:52:43.747822 IP 192.168.5.29.54779 > 173.194.202.189.443: Flags [.], ack 149, win 237, options [nop,nop,TS val 10125598 ecr 3372895306], length 0
22:52:43.748507 IP 192.168.5.29.54779 > 173.194.202.189.443: Flags [P.], seq 518:561, ack 149, win 237, options [nop,nop,TS val 10125598 ecr 3372895306], length 43
22:52:43.761606 IP 74.125.28.189.443 > 192.168.5.30.42143: Flags [R], seq 3076660574, win 0, length 0
22:52:43.779689 IP 192.168.5.30.42144 > 74.125.28.189.443: Flags [S], seq 2183376822, win 29200, options [mss 1460,sackOK,TS val 1880064 ecr 0,nop,wscale 7], length 0
22:52:43.779784 IP 192.168.5.29.54779 > 173.194.202.189.443: Flags [P.], seq 561:606, ack 149, win 237, options [nop,nop,TS val 10125601 ecr 3372895306], length 45
22:52:43.780069 IP 192.168.5.29.54779 > 173.194.202.189.443: Flags [P.], seq 606:1321, ack 149, win 237, options [nop,nop,TS val 10125601 ecr 3372895306], length 715
22:52:43.825577 IP 74.125.28.189.443 > 192.168.5.30.42144: Flags [S.], seq 1848833146, ack 2183376823, win 42540, options [mss 1430,sackOK,TS val 2558981926 ecr 1880064,nop,wscale 7], length 0
22:52:43.832667 IP 192.168.5.30.42144 > 74.125.28.189.443: Flags [.], ack 1, win 229, options [nop,nop,TS val 1880070 ecr 2558981926], length 0
22:52:43.833188 IP 192.168.5.30.42144 > 74.125.28.189.443: Flags [P.], seq 1:518, ack 1, win 229, options [nop,nop,TS val 1880070 ecr 2558981926], length 517
22:52:43.877101 IP 192.168.5.29.54779 > 173.194.202.189.443: Flags [P.], seq 606:1321, ack 149, win 237, options [nop,nop,TS val 10125611 ecr 3372895306], length 715
22:52:43.878632 IP 74.125.28.189.443 > 192.168.5.30.42144: Flags [.], ack 518, win 341, options [nop,nop,TS val 2558981981 ecr 1880070], length 0
22:52:43.879397 IP 74.125.28.189.443 > 192.168.5.30.42144: Flags [P.], seq 1:153, ack 518, win 341, options [nop,nop,TS val 2558981981 ecr 1880070], length 152
22:52:43.885981 IP 192.168.5.30.42