Ok per
I am easily a novice at this stuff. But I finally got things where I thought they would work and I have multiple issues.
1. No internet connectivity with both WANs plugged in. If I remove one I can then get out
2. VPN, I can connect and ping internal devices but cannot RDP to those same systems
3. Once I do have things working, getting DHCP from my internal settings I can no longer get to the IP Address of the ERPRO unless I go back to static IP of something in the same range. But I can ping it :/
4. Guest Wifif on VLAN 20 works fine, but our inhouse (No VLAN) does not get an IP Address
Here is my current config I was working with, I am hoping some of you very knowledgable people can help me sort this out. I am on a timeline to get rid of the Cisco device this is replacing.
firewall { all-ping enable broadcast-ping disable group { network-group PRIVATE_NETS { network 192.168.0.0/16 network 172.16.0.0/12 network 10.0.0.0/8 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify balance { rule 10 { action modify description "do NOT load balance lan to lan" destination { group { network-group PRIVATE_NETS } } modify { table main } } rule 20 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth0 } } modify { table main } } rule 30 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth1 } } modify { table main } } rule 100 { action modify modify { lb-group G } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action accept description "Allow IKE for remote VPN server" destination { port 500 } log disable protocol udp } rule 22 { action accept description "Allow L2TP for remote VPN Server" destination { port 1701 } log disable protocol udp } rule 23 { action accept description "Allow ESP for remote VPN" log disable protocol 50 } rule 24 { action accept description "Allow NAT Traversal for VPN" destination { port 4500 } log disable protocol udp } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { bridge br0 { address 192.168.218.3/23 aging 300 bridged-conntrack disable hello-time 2 max-age 20 priority 32768 promiscuous disable stp false vif 20 { address 192.168.100.1/24 description "VLAN20 for Guest Wifi" } } ethernet eth0 { address <EXTERNAL IP 1>/24 description WAN duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { address <EXTERNAL IP 2>/24 description "WAN 2" duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth2 { bridge-group { bridge br0 } description eth2 duplex auto firewall { in { modify balance } } speed auto } ethernet eth3 { bridge-group { bridge br0 } duplex auto speed auto } ethernet eth4 { bridge-group { bridge br0 } duplex auto speed auto } ethernet eth5 { bridge-group { bridge br0 } duplex auto speed auto } ethernet eth6 { duplex auto speed auto } ethernet eth7 { duplex auto speed auto } loopback lo { } } load-balance { group G { interface eth0 { } interface eth1 { failover-only } lb-local enable } } protocols { static { route 0.0.0.0/0 { next-hop <EXTERNAL IP NEXT HOP 1> { } next-hop <EXTERNAL IP NEXT HOP 2> { } } } } service { dhcp-relay { interface br0 server 192.168.218.248 server 192.168.218.245 } dhcp-server { disabled false hostfile-update disable shared-network-name VLAN20 { authoritative disable subnet 192.168.100.0/24 { default-router 192.168.100.1 dns-server 192.168.218.248 dns-server 192.168.218.245 lease 86400 start 192.168.100.10 { stop 192.168.100.254 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on br0 name-server 192.168.218.248 name-server 192.168.218.245 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5000 { description "masquerade for WAN" outbound-interface eth0 type masquerade } rule 5002 { description "masquerade for WAN 2" outbound-interface eth1 type masquerade } } ssh { port 22 protocol-version v2 } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } host-name ubnt login { user benandjerry { authentication { encrypted-password <ENCRYPTED> plaintext-password "" } full-name Administrator level admin } user baskinrobbins { authentication { encrypted-password <ENCRYPTED> plaintext-password "" } full-name "Ice Cream Man" level admin } } name-server 8.8.8.8 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } vpn { ipsec { auto-firewall-nat-exclude disable ipsec-interfaces { interface eth0 } nat-networks { allowed-network 10.0.0.0/8 { } allowed-network 172.16.0.0/12 { } allowed-network 192.168.0.0/16 { } } nat-traversal enable } l2tp { remote-access { authentication { local-users { username chunkyMonkey { password eatme } } mode local } client-ip-pool { start 192.168.200.10 stop 192.168.200.254 } ipsec-settings { authentication { mode pre-shared-secret pre-shared-secret <SHARED SECRET> } ike-lifetime 3600 } mtu 1492 outside-address <EXTERNAL IP 1> outside-nexthop <EXTERNAL IP NEXT HOP 1> } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1139 */