Quantcast
Viewing all articles
Browse latest Browse all 20028

Pseudo ethernet woes

I'm trying to create a separate subnet for certain devices on my network. To this end I created a pseudo-ethernet interface attached to one of my internal network ports.

 

eth0 WAN external ip
eth1 LAN xx.xx.10.1/24
eth2 Other LAN xx.xx.20.1/24
peth1 eth1 xx.xx.30.1/24

 

DHCP on eth1 and eth2, not on peth1.

 

Bare minimum firewall rules on eth0.

 

I attach a manually addressed machine with xx.xx.30.5 as the address and xx.xx.30.1 as the gateway but I'm not able to ping anything or resolve any names.

 

I'm not sure what step I'm missing in the big picture.

 

Any help appreciated.

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description SSH
            destination {
                port 22
            }
            log disable
            protocol tcp_udp
            state {
                established enable
                invalid disable
                new enable
                related disable
            }
        }
        rule 30 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description WAN
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address xx.xx.10.1/24
        description LAN
        duplex auto
        speed auto
    }
    ethernet eth2 {
        address xx.xx.20.1/24
        description WLAN
        duplex auto
        speed auto
    }
    loopback lo {
    }
    pseudo-ethernet peth1 {
        description Gamesys
        link eth1
        mac 00:02:03:04:05:06
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth1
    wan-interface eth0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN1 {
            authoritative enable
            subnet xx.xx.10.0/24 {
                default-router xx.xx.10.1
                dns-server xx.xx.10.1
                lease 86400
                start xx.xx.10.200 {
                    stop xx.xx.10.243
                }
            }
        }
        shared-network-name WLAN-subnet {
            authoritative disable
            subnet xx.xx.20.0/24 {
                default-router xx.xx.20.1
                dns-server xx.xx.20.1
                lease 86400
                start xx.xx.20.100 {
                    stop xx.xx.20.200
                }
                static-mapping HomeAP {
                    ip-address xx.xx.20.2
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        dynamic {
            interface eth0 {
                service custom-noip {
                }
                web dyndns
            }
        }
        forwarding {
            cache-size 150
            listen-on eth1
            listen-on eth2
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name DTB-Router
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipv4 {
            forwarding enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/Vancouver
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1131 */

Viewing all articles
Browse latest Browse all 20028

Trending Articles