Hi,
I am new to the ER-X series so appologies if this is simple. I have a simple network configured with Wan2Lan2 wizard. I enabled hwnat offloading to prevent the cpu from maxing at 500mbits, but otherwise the config is pretty much vanilla.
The issue I'm seeing is that I cannot see the results of a tracert from my network. Instead, I see this:
tracert 4.2.2.2 Tracing route to b.resolvers.Level3.net [4.2.2.2] over a maximum of 30 hops: 1 * * * Request timed out. 2 * * * Request timed out. 3 * * * Request timed out. 4 * * * Request timed out. 5 * * * Request timed out. 6 * * * Request timed out. 7 219 ms 4 ms 4 ms b.resolvers.Level3.net [4.2.2.2] Trace complete.
Here's my config:
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 30 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 30 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { description Local duplex auto speed auto } ethernet eth2 { description Local duplex auto speed auto } ethernet eth3 { description Local duplex auto speed auto } ethernet eth4 { description Local duplex auto speed auto } ethernet eth5 { duplex auto speed auto } loopback lo { } switch switch0 { address 192.168.55.1/24 description Local mtu 1500 switch-port { interface eth1 { } interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } } } port-forward { auto-firewall enable hairpin-nat enable lan-interface switch0 rule 1 { description "RDP" forward-to { address 192.168.55.*** port 3389 } original-port 3389 protocol tcp_udp } wan-interface eth0 } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 192.168.55.0/24 { default-router 192.168.55.1 dns-server 192.168.55.1 domain-name ******.******.org lease 86400 start 192.168.55.100 { stop 192.168.55.243 } static-mapping Callipe { ip-address 192.168.55.*** mac-address 44:1E:A1:2F:16:4D } static-mapping HAL { ip-address 192.168.55.*** mac-address D8:CB:8A:5A:8D:76 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on switch0 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } ssh { port 22 protocol-version v2 } upnp { listen-on switch0 { outbound-interface eth0 } } } system { domain-name *****.*******.org host-name ny-edge-fw login { removed ***** } name-server 208.67.222.222 name-server 208.67.220.220 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat enable ipsec enable } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone America/New_York }
Any ideas? Are there additinal rules I need to enable on the FW/NAT?
Thanks!