Hi guys,
I finally got the load balancing to work with 3 wans.
1 on eth0 - ISP1 - 50 Mbps
1 on eth1 - ISP2 - 50 Mbos
1 on eth2 - set to failover only - 10 Mbps
Problem is internet breakout is very slow; speed test just shows 48 Mbps
What I am missing?
>>>Show-Load Balance Status gives me:
Group G
interface : eth0
carrier : up
status : active
gateway : 10.0.0.254
route table : 201
weight : 50%
flows
WAN Out : 264
WAN In : 0
Local Out : 81
interface : eth1
carrier : up
status : active
gateway : 22.0.109.209
route table : 202
weight : 50%
flows
WAN Out : 968
WAN In : 0
Local Out : 349
interface : eth2
carrier : up
status : failover
gateway : 172.16.0.254
route table : 203
weight : 0%
flows
WAN Out : 0
WAN In : 0
Local Out : 0
>>>Show load-balance watchdog gives me:
Group G
eth0
status: Running
pings: 4
fails: 2
run fails: 1/3
route drops: 3
ping gateway: ping.ubnt.com - REACHABLE
last route drop : Sat Oct 1 13:06:36 2016
last route recover: Sat Oct 1 13:09:22 2016
eth1
status: Running
pings: 100
fails: 5
run fails: 0/3
route drops: 0
ping gateway: ping.ubnt.com - REACHABLE
eth2
status: Running
failover-only mode
pings: 95
fails: 7
run fails: 0/3
route drops: 0
ping gateway: ping.ubnt.com - REACHABLE
>>>Config post
firewall {
all-ping enable
broadcast-ping disable
group {
network-group PRIVATE_NETS {
network 192.168.0.0/16
network 172.16.0.0/12
network 10.0.0.0/8
}
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians disable
modify balance {
rule 10 {
action modify
description "do NOT load balance lan to lan"
destination {
group {
network-group PRIVATE_NETS
}
}
modify {
table main
}
}
rule 20 {
action modify
description "do NOT load balance destination public address"
destination {
group {
address-group ADDRv4_eth0
}
}
modify {
table main
}
}
rule 30 {
action modify
description "do NOT load balance destination public address"
destination {
group {
address-group ADDRv4_eth1
}
}
modify {
table main
}
}
rule 40 {
action modify
description "do NOT load balance destination public address"
destination {
group {
address-group ADDRv4_eth2
}
}
modify {
table main
}
}
rule 100 {
action modify
modify {
lb-group G
}
}
}
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
log disable
protocol all
state {
established enable
related enable
}
}
rule 20 {
action accept
description "Drop invalid state"
log disable
protocol all
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address 10.0.0.253/24
description WAN
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth1 {
address 22.0.109.210/24
description "WAN 3"
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth2 {
address 172.16.0.253/24
description "WAN 2"
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth3 {
duplex auto
speed auto
}
ethernet eth4 {
address 192.160.0.1/24
duplex auto
speed auto
}
ethernet eth5 {
address 192.168.1.1/24
description Local
duplex auto
firewall {
in {
modify balance
}
}
speed auto
}
ethernet eth6 {
duplex auto
speed auto
}
ethernet eth7 {
duplex auto
speed auto
}
loopback lo {
}
}
load-balance {
group G {
interface eth0 {
}
interface eth1 {
}
interface eth2 {
failover-only
}
lb-local enable
}
}
port-forward {
auto-firewall enable
hairpin-nat disable
lan-interface eth5
lan-interface eth4
rule 1 {
description EdgeRouter
forward-to {
address 192.168.1.1
port 443
}
original-port 9082
protocol tcp_udp
}
rule 2 {
description Aircontrol
forward-to {
address 192.168.0.99
port 9081
}
original-port 9081
protocol tcp_udp
}
wan-interface eth0
}
protocols {
static {
route 0.0.0.0/0 {
next-hop 10.0.0.254 {
}
next-hop 22.0.109.209 {
}
next-hop 172.16.0.254 {
}
}
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name LAN {
authoritative enable
subnet 192.168.1.0/24 {
default-router 192.168.1.1
dns-server 192.168.1.1
lease 86400
start 192.168.1.248 {
stop 192.168.1.249
}
}
}
use-dnsmasq disable
}
dns {
forwarding {
cache-size 150
listen-on eth5
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 5000 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
rule 5002 {
description "masquerade for WAN 3"
outbound-interface eth1
type masquerade
}
rule 5004 {
description "masquerade for WAN 2"
outbound-interface eth2
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
conntrack {
expect-table-size 4096
hash-size 4096
table-size 32768
tcp {
half-open-connections 512
loose enable
max-retrans 3
}
}
host-name EdgeRo
login {
user test{
authentication {
encrypted-password ****************
plaintext-password ****************
}
full-name ""
level admin
}
}
name-server 8.8.8.8
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone UTC
traffic-analysis {
dpi enable
export enable
}