Hello.
I´m trying configure the load-balance in my home to implement in others companies(this product is wonderfull Image may be NSFW.
Clik here to view.). So, in the test I have 2 ISP (pppoe0 and eth2), one with pppoe and static IP. To my test, I will manager all the configuration outside the companies, so is very important to me can connect to both ISP router. Image may be NSFW.
Clik here to view.
Without activate the load-balance, I can connect to EdgeRouter in both external IP, but after activate de load-balance I can't connect to static internet IP, but I can connect to the pppoe address Image may be NSFW.
Clik here to view.. I tryed connect to SSH and web GUI.
below is the code
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable modify LB { rule 10 { action modify destination { port 80,443 } modify { lb-group WAN01 } protocol tcp } rule 20 { action modify modify { lb-group WAN02 } } } name WAN_IN { default-action drop rule 1 { action accept state { established enable related enable } } rule 2 { action drop state { invalid enable } } } name WAN_LOCAL { default-action drop rule 1 { action accept state { established enable related enable } } rule 2 { action drop state { invalid enable } } rule 98 { action accept destination { port 443 } protocol tcp } rule 99 { action accept destination { port 2222 } protocol tcp } } name default { default-action drop rule 1 { action accept state { established enable related enable } } rule 2 { action drop state { invalid enable } } } options { mss-clamp { interface-type pppoe mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 192.168.1.1/24 duplex auto firewall { in { modify LB } } speed auto } ethernet eth1 { duplex auto pppoe 0 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server none password password@isp user-id user@isp } speed auto } ethernet eth2 { address 192.168.88.30/24 duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth3 { duplex auto speed auto } ethernet eth4 { duplex auto speed auto } loopback lo { } switch switch0 { mtu 1500 } } load-balance { group WAN01 { interface eth2 { failover-only route-test { initial-delay 60 interval 10 type { ping { target 208.67.222.222 } } } } interface pppoe0 { route-test { initial-delay 60 interval 10 type { ping { target 208.67.222.222 } } } } } group WAN02 { interface eth2 { route-test { initial-delay 60 interval 10 type { ping { target 208.67.222.222 } } } } interface pppoe0 { failover-only route-test { initial-delay 60 interval 10 type { ping { target 208.67.222.222 } } } } } } protocols { static { route 0.0.0.0/0 { next-hop 192.168.88.1 { distance 1 } } } } service { gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { outbound-interface pppoe0 type masquerade } rule 5001 { outbound-interface eth2 type masquerade } } ssh { port 2222 protocol-version v2 } } system { host-name ubnt login { user ubnt { authentication { encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66. } level admin } } name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.5.4884695.160608.1057 */