hello
after reading some manuals from network by glueing them i finally setup ER-X like that:
-openvpn client connected to nordvpn provider + vpn killswitch (if vpn connection will drop er-x doesnt allow packets on wan eth0)
-nordvpn dns instead of my isp dns added to the wan port eth0
-wan eth0 input = lan eth1 to eth4 openvpn outputs
all lan ports give me openvpn tunelled connection
what i need exactly to fix right now is:
new options:
-receive openvn tunnel on eth1 throuth eth0 (wan) only
-receive my isp network clear ip on eth2 - to eth4 througth eth0 (wan) with standard dns from isp
does anybody could explain how i can setup it to get new options ?
this is my actuall config:
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description Internet dhcp-options { default-route update default-route-distance 210 name-server no-update } duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mac xxxxxxxxxxxxxx speed auto } ethernet eth1 { description Local duplex auto speed auto } ethernet eth2 { description Local duplex auto speed auto } ethernet eth3 { description Local duplex auto speed auto } ethernet eth4 { description Local duplex auto speed auto } loopback lo { } openvpn vtun0 { config-file /config/auth/xxxxxxxxxxxxx description vpn hash sha1 mode client openvpn-option -comp.lzo remote-host xxxxxxxxxxxx } switch switch0 { address 192.168.1.1/24 description Local mtu 1500 switch-port { interface eth1 { } interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.38 { stop 192.168.1.243 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on switch0 name-server xxxxxxxxx name-server xxxxxxxxx system } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5011 { description test log disable outbound-interface vtun0 type masquerade } } ssh { port 22 protocol-version v2 } } system { host-name ubnt login { user root { authentication { encrypted-password $6$CKAWyfG.ABK0$6VuttyVvGR4626XbRuOKWfBnyR6/R.QBFvEh0GXwosNdFP5QQvRfmAGhb86uSjBwOiCfpu4ntJY.YF/2bukoJ0 plaintext-password "" } level admin } user ubnt { authentication { encrypted-password $6$3QeCM7YtNGEO$Fdxjccog6mpUufpy.zpo3yXHs1lriLE6sd.2jz95GML.414qj5Y07E.yfrBdRms147jfRt..czXX5M1OzJ3X. plaintext-password "" } level admin } } name-server 127.0.0.1 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } /* Release version: v1.9.0.4901118.160804.1131 */
thanks
-xian1