Quantcast
Viewing all articles
Browse latest Browse all 20028

External SSH access with Load-balance

Hello.

 

I´m trying configure the load-balance in my home to implement in others companies(this product is wonderfull Image may be NSFW.
Clik here to view.
Smiley Very Happy
). So, in the test I have 2 ISP (pppoe0 and eth2), one with pppoe and static IP. To my test, I will manager all the configuration outside the companies, so is very important to me can connect to both ISP router. Image may be NSFW.
Clik here to view.
Smiley LOL

 

 Without activate the load-balance, I can connect to EdgeRouter in both external IP, but after activate de load-balance I can't connect to static internet IP, but I can connect to the pppoe address Image may be NSFW.
Clik here to view.
Mad2
.  I tryed connect to SSH and web GUI. 

 

below is the code

 

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    modify LB {
        rule 10 {
            action modify
            destination {
                port 80,443
            }
            modify {
                lb-group WAN01
            }
            protocol tcp
        }
        rule 20 {
            action modify
            modify {
                lb-group WAN02
            }
        }
    }
    name WAN_IN {
        default-action drop
        rule 1 {
            action accept
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        rule 1 {
            action accept
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            state {
                invalid enable
            }
        }
        rule 98 {
            action accept
            destination {
                port 443
            }
            protocol tcp
        }
        rule 99 {
            action accept
            destination {
                port 2222
            }
            protocol tcp
        }
    }
    name default {
        default-action drop
        rule 1 {
            action accept
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            state {
                invalid enable
            }
        }
    }
    options {
        mss-clamp {
            interface-type pppoe
            mss 1412
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.1.1/24
        duplex auto
        firewall {
            in {
                modify LB
            }
        }
        speed auto
    }
    ethernet eth1 {
        duplex auto
        pppoe 0 {
            default-route auto
            firewall {
                in {
                    name WAN_IN
                }
                local {
                    name WAN_LOCAL
                }
            }
            mtu 1492
            name-server none
            password password@isp
            user-id user@isp
        }
        speed auto
    }
    ethernet eth2 {
        address 192.168.88.30/24
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        mtu 1500
    }
}
load-balance {
    group WAN01 {
        interface eth2 {
            failover-only
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 208.67.222.222
                    }
                }
            }
        }
        interface pppoe0 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 208.67.222.222
                    }
                }
            }
        }
    }
    group WAN02 {
        interface eth2 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 208.67.222.222
                    }
                }
            }
        }
        interface pppoe0 {
            failover-only
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 208.67.222.222
                    }
                }
            }
        }
    }
}
protocols {
    static {
        route 0.0.0.0/0 {
            next-hop 192.168.88.1 {
                distance 1
            }
        }
    }
}
service {
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            outbound-interface pppoe0
            type masquerade
        }
        rule 5001 {
            outbound-interface eth2
            type masquerade
        }
    }
    ssh {
        port 2222
        protocol-version v2
    }
}
system {
    host-name ubnt
    login {
        user ubnt {
            authentication {
                encrypted-password $1$zKNoUbAo$gomzUbYvgyUMcD436Wo66.
            }
            level admin
        }
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1057 */

 

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>