Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

ERPRO L2TP RDP - 2 WAN - NO INTERNET - etc

$
0
0

Ok per  I am opening my own thread.

 

I am easily a novice at this stuff. But I finally got things where I thought they would work and I have multiple issues.

 

1. No internet connectivity with both WANs plugged in. If I remove one I can then get out

 

2. VPN, I can connect and ping internal devices but cannot RDP to those same systems

 

3. Once I do have things working, getting DHCP from my internal settings I can no longer get to the IP Address of the ERPRO unless I go back to static IP of something in the same range. But I can ping it :/

 

4. Guest Wifif on VLAN 20 works fine, but our inhouse (No VLAN) does not get an IP Address

 

Here is my current config I was working with, I am hoping some of you very knowledgable people can help me sort this out. I am on a timeline to get rid of the Cisco device this is replacing.

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group PRIVATE_NETS {
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify balance {
        rule 10 {
            action modify
            description "do NOT load balance lan to lan"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            modify {
                table main
            }
        }
        rule 20 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth0
                }
            }
            modify {
                table main
            }
        }
        rule 30 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth1
                }
            }
            modify {
                table main
            }
        }
        rule 100 {
            action modify
            modify {
                lb-group G
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description "Allow IKE for remote VPN server"
            destination {
                port 500
            }
            log disable
            protocol udp
        }
        rule 22 {
            action accept
            description "Allow L2TP for remote VPN Server"
            destination {
                port 1701
            }
            log disable
            protocol udp
        }
        rule 23 {
            action accept
            description "Allow ESP for remote VPN"
            log disable
            protocol 50
        }
        rule 24 {
            action accept
            description "Allow NAT Traversal for VPN"
            destination {
                port 4500
            }
            log disable
            protocol udp
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    bridge br0 {
        address 192.168.218.3/23
        aging 300
        bridged-conntrack disable
        hello-time 2
        max-age 20
        priority 32768
        promiscuous disable
        stp false
        vif 20 {
            address 192.168.100.1/24
            description "VLAN20 for Guest Wifi"
        }
    }
    ethernet eth0 {
        address <EXTERNAL IP 1>/24
        description WAN
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address <EXTERNAL IP 2>/24
        description "WAN 2"
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth2 {
        bridge-group {
            bridge br0
        }
        description eth2
        duplex auto
        firewall {
            in {
                modify balance
            }
        }
        speed auto
    }
    ethernet eth3 {
        bridge-group {
            bridge br0
        }
        duplex auto
        speed auto
    }
    ethernet eth4 {
        bridge-group {
            bridge br0
        }
        duplex auto
        speed auto
    }
    ethernet eth5 {
        bridge-group {
            bridge br0
        }
        duplex auto
        speed auto
    }
    ethernet eth6 {
        duplex auto
        speed auto
    }
    ethernet eth7 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
load-balance {
    group G {
        interface eth0 {
        }
        interface eth1 {
            failover-only
        }
        lb-local enable
    }
}
protocols {
    static {
        route 0.0.0.0/0 {
            next-hop <EXTERNAL IP NEXT HOP 1> {
            }
            next-hop <EXTERNAL IP NEXT HOP 2> {
            }
        }
    }
}
service {
    dhcp-relay {
        interface br0
        server 192.168.218.248
        server 192.168.218.245
    }
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name VLAN20 {
            authoritative disable
            subnet 192.168.100.0/24 {
                default-router 192.168.100.1
                dns-server 192.168.218.248
                dns-server 192.168.218.245
                lease 86400
                start 192.168.100.10 {
                    stop 192.168.100.254
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on br0
            name-server 192.168.218.248
            name-server 192.168.218.245
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
        rule 5002 {
            description "masquerade for WAN 2"
            outbound-interface eth1
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    host-name ubnt
    login {
        user benandjerry {
            authentication {
                encrypted-password <ENCRYPTED>
                plaintext-password ""
            }
            full-name Administrator
            level admin
        }
        user baskinrobbins {
            authentication {
                encrypted-password <ENCRYPTED>
                plaintext-password ""
            }
            full-name "Ice Cream Man"
            level admin
        }
    }
    name-server 8.8.8.8
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
}
vpn {
    ipsec {
        auto-firewall-nat-exclude disable
        ipsec-interfaces {
            interface eth0
        }
        nat-networks {
            allowed-network 10.0.0.0/8 {
            }
            allowed-network 172.16.0.0/12 {
            }
            allowed-network 192.168.0.0/16 {
            }
        }
        nat-traversal enable
    }
    l2tp {
        remote-access {
            authentication {
                local-users {
                    username chunkyMonkey {
                        password eatme
                    }
                }
                mode local
            }
            client-ip-pool {
                start 192.168.200.10
                stop 192.168.200.254
            }
            ipsec-settings {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret <SHARED SECRET>
                }
                ike-lifetime 3600
            }
            mtu 1492
            outside-address <EXTERNAL IP 1>
            outside-nexthop <EXTERNAL IP NEXT HOP 1>
        }
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1139 */

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>