I used the loadbalance wizard initially to setup my Edge router lite. I have 2 x pppoe connections (2x VDSL lines).
It all works fine in a 50% loadbalance per connection when both connections are up.
However when one of the pppoe connections goes down i.e. pppoe0, I loose all connectivity to the internet. It doesnt seem to failover to the working pppoe1 link. I have to restart the ERL for the internet to start working via the remaining pppoe1 connection.
Here is my config with login/pwd information redacted.
firewall {
all-ping enable
broadcast-ping disable
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians disable
modify balance {
rule 1 {
action modify
modify {
lb-group G
}
}
}
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 1 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 2 {
action accept
description "Allow PPTP Port 1723"
destination {
port 1723
}
log disable
protocol tcp
}
rule 3 {
action accept
description "Allow PPTP GRE"
log disable
protocol gre
}
rule 4 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
options {
mss-clamp {
mss 1412
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
description "Internet - WAN"
duplex auto
pppoe 0 {
default-route auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
mtu 1492
name-server auto
password *********************************
user-id *********************************
}
speed auto
}
ethernet eth1 {
description "Internet - WAN 2"
duplex auto
pppoe 1 {
default-route auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
mtu 1492
name-server auto
password*********************************
user-id *********************************
}
speed auto
}
ethernet eth2 {
address 192.168.1.254/24
description Local
duplex auto
firewall {
in {
modify balance
}
}
speed auto
}
loopback lo {
}
}
load-balance {
group G {
interface pppoe0 {
}
interface pppoe1 {
}
}
}
protocols {
static {
route 23.246.0.0/18 {
next-hop 192.168.1.254 {
}
}
route 37.77.176.0/20 {
next-hop 192.168.1.254 {
}
}
route 108.175.32.0/20 {
next-hop 192.168.1.254 {
}
}
route 108.175.38.0/24 {
next-hop 192.168.1.254 {
disable
distance 2
}
}
route 185.2.216.0/21 {
next-hop 192.168.1.254 {
}
}
route 185.2.223.0/24 {
next-hop 192.168.1.254 {
disable
distance 2
}
}
route 198.38.96.0/20 {
next-hop 192.168.1.254 {
}
}
route 198.45.48.0/20 {
next-hop 192.168.1.254 {
}
}
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN {
authoritative enable
subnet 192.168.1.0/24 {
default-router 192.168.1.254
dns-server 192.168.1.254
lease 86400
start 192.168.1.80 {
stop 192.168.1.199
}
unifi-controller 192.168.1.6
}
}
}
dns {
dynamic {
interface pppoe0 {
service********** {
host-name *********************************
login *********************************
password *********************************
server *********************************
}
}
interface pppoe1 {
service ********** {
host-name ******************************************
login ***********************************
password *********************************
server *********************************
}
}
}
forwarding {
cache-size 150
listen-on eth2
}
}
gui {
https-port 443
}
nat {
rule 1 {
description "DNS Redirection"
destination {
port 53
}
inbound-interface eth2
inside-address {
address 192.168.1.254
port 53
}
log disable
protocol tcp_udp
source {
address 192.168.1.1-192.168.1.252
}
type destination
}
rule 5000 {
description "masquerade for WAN"
outbound-interface pppoe0
type masquerade
}
rule 5002 {
description "masquerade for WAN 2"
outbound-interface pppoe1
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
conntrack {
expect-table-size 4096
hash-size 4096
table-size 32768
tcp {
half-open-connections 512
loose enable
max-retrans 3
}
}
host-name ***************
login {
user *********************************** {
authentication {
encrypted-password ******************************************************************************************************************************************************************************************************************
plaintext-password ""
}
level admin
}
user ************************* {
authentication {
encrypted-password ******************************************************************************************************************************************************************************************************************
plaintext-password ""
}
full-name ""
level admin
}
}
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone Pacific/Auckland
traffic-analysis {
dpi enable
export enable
}
}
vpn {
pptp {
remote-access {
authentication {
local-users {
username ************ {
password *****************************************************
}
}
mode local
}
client-ip-pool {
start 192.168.1.70
stop 192.168.1.75
}
dns-servers {
server-1 122.56.237.1
server-2 210.55.111.1
}
mtu 1492
}
}
}
/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@4:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.7.0.4783374.150622.1534 */