When I first set up my ER-X, I used the WAN+2LAN2 wizard but only set it up for one LAN.
I'd now like to split the LANs up so that it's the equivalent of the WLAN+2LAN2 with two LANs.
I *could* use the wizard again, but then I'd lose my OpenVPN and other settings. So I was trying to figure out how to do it manually. So far, I haven't succeeded.
What I'd like is:
ETH0: WAN
ETH1: LAN2 192.168.2.1 ~
ETH2-4: LAN 192.1681.1 ~
This is my current config:
person@ubnt:~$ show configuration firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" log enable state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" log enable state { invalid enable } } rule 30 { action accept description "Limit pings" limit { burst 1 rate 50/minute } log enable protocol icmp } rule 50 { action accept description OpenVPN destination { port 1194 } log enable protocol udp } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { address 192.168.2.1/24 description LAN2 duplex auto speed auto } ethernet eth2 { description Local duplex auto speed auto } ethernet eth3 { description Local duplex auto speed auto } ethernet eth4 { description Local duplex auto poe { output pthru watchdog { address 192.168.1.38 disable failure-count 3 interval 120 off-delay 5 start-delay 600 } } speed auto } loopback lo { } openvpn vtun0 { description "OpenVPN server" encryption aes256 hash sha256 mode server openvpn-option "--port 1194" openvpn-option --tls-server openvpn-option "--comp-lzo yes" openvpn-option --persist-key openvpn-option --persist-tun openvpn-option "--keepalive 10 120" openvpn-option "--user nobody" server { name-server 192.168.1.1 push-route 192.168.1.0/24 subnet 10.10.10.0/24 } tls { ca-cert-file /config/auth/cacert.pem cert-file /config/auth/host.pem dh-file /config/auth/dh2048.pem key-file /config/auth/host-decrypted.key } } switch switch0 { address 192.168.1.1/24 description Local mtu 1500 switch-port { interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative disable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.100 { stop 192.168.1.199 } } } shared-network-name LAN2 { subnet 192.168.2.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 start 192.168.2.100 { stop 192.168.2.199 } } } use-dnsmasq disable } dns { dynamic { interface eth0 { service custom-duckdns { host-name redacted login nouser password **************** protocol dyndns2 server www.duckdns.org } } } forwarding { cache-size 150 listen-on switch0 listen-on vtun0 listen-on eth1 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } ssh { disable-password-authentication port 22 protocol-version v2 } } system { host-name ubnt login { user redacted { authentication { encrypted-password **************** plaintext-password **************** public-keys redacted { key **************** type ssh-rsa } } full-name "Karen N" level admin } user ubnt { authentication { encrypted-password **************** plaintext-password **************** } full-name "" level admin } } name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat enable ipsec enable } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC traffic-analysis { dpi enable export enable } }