Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

Cannot assign switch0 to bridge-group (switch-port mode error)

$
0
0

Hello all. I'm trying to bridge vtun0 and switch0 as br0 so I can get a client IP automatically over the VPN. I've confirmed as much as I can that my configuration is correct but when I try to

 

set interfaces switch switch0 bridge-group br0
commit

 

I get the error

 

All switch interfaces must be in switch-port mode to bridge the switch

Commit failed

 

As far as I can tell, eth2, 3, and 4 are in "switch-port mode". How does one manually go about confirming this? I've tried removing the interfaces from switch0 and readding them but that doesn't help. Any ideas?

 

Back story: I had the OpenVPN server working perfectly with a static IP on a different subnet. What I want is to automatically obtain an IP through the router's dhcp server because I was having an issue where if I disconnect one client and connect another before restarting the VPN server, I could not access the push-routed subnet. The way I'm trying to set this up I don't have to worry about push-routes at all. Everything is ready except switch0 bridged on br0. I used this thread for the changes: Edgemax 5 Port OpenVPN Server "Road Warrior" config - bridge?

 

Here's my configuration:

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 1 {
            action accept
            description OpenVPN
            destination {
                port 1194
            }
            log disable
            protocol udp
        }
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description "Allow SSH"
            destination {
                port 22
            }
            log disable
            protocol tcp
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    bridge br0 {
        aging 300
        bridged-conntrack disable
        hello-time 2
        max-age 20
        priority 32768
        promiscuous disable
        stp false
    }
    ethernet eth0 {
        address 192.168.1.1/24
        description "Local 2"
        duplex auto
        speed auto
    }
    ethernet eth1 {
        address dhcp
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth2 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth3 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth4 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    openvpn vtun0 {
        bridge-group {
            bridge br0
        }
        hash sha256
        mode server
        openvpn-option --comp-lzo
        openvpn-option "--server-bridge 192.168.2.1 255.255.255.0 192.168.2.41 192.168.2.50"
        openvpn-option "--push redirect-gateway def1 bypass-dhcp"
        server {
            client xxxxx.xxxx.xxx {
            }
            name-server 192.168.2.1
            name-server 192.168.1.1
            subnet 192.168.2.0/24
        }
        tls {
            ca-cert-file /config/auth/cacert.pem
            cert-file /config/auth/server.pem
            dh-file /config/auth/dhp.pem
            key-file /config/auth/server.key
        }
    }
    switch switch0 {
        address 192.168.2.1/24
        description Local
        mtu 1500
        switch-port {
            interface eth2 {
            }
            interface eth3 {
            }
            interface eth4 {
            }
            vlan-aware disable
        }
    }
}

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>