Quantcast
Viewing all articles
Browse latest Browse all 20028

Load balance config check, strange readings.....

Hi, running an EdgeRouter 8 port with load balancing configured over 4 WAN interfaces. Currently one of the WAN interfaces (ppppoe2) is down and not functioning. Ive set the weighting on pppoe0 & pppoe1 to 49%, pppoe2 to 0% (because its down) and pppoe3 to 2% as its a much slower line and only needed for incoming SMTP connections.

When I do some random tests its almost as though the weighting is incorrect and I get more occurrances of the pppoe1 connection than I think I should. Also when I issue the "show load-balance status" command I get the following output which appears to not match my config output:

Group WLB
  interface   : pppoe0
  carrier     : up
  status      : inactive
  gateway     : pppoe0
  route table : 201
  weight      : 0%
  flows
      WAN Out : 294
      WAN In  : 10
    Local Out : 1

  interface   : pppoe1
  carrier     : up
  status      : active
  gateway     : pppoe1
  route table : 202
  weight      : 96%
  flows
      WAN Out : 176000
      WAN In  : 20
    Local Out : 1083

  interface   : pppoe2
  carrier     : down
  status      : inactive
  gateway     : unknown
  route table : 203
  weight      : 0%
  flows
      WAN Out : 610000
      WAN In  : 0
    Local Out : 208

  interface   : pppoe3
  carrier     : up
  status      : active
  gateway     : pppoe3
  route table : 204
  weight      : 3%
  flows
      WAN Out : 14104
      WAN In  : 169000
    Local Out : 66

Ive also noticed that although Ive configured a "WAN_LOCAL" firewall rule on ppppoe0 to access the router GUI I can only access via pppoe1.

 

So a few gremlins that Im abit confused by, hopefully someone can point me in the right direction!

Have posted my config output below!

 

Many thanks!

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    modify WLB_POLICY {
        rule 30 {
            action modify
            modify {
                lb-group WLB
            }
        }
    }
    name Dest_Nat_Web_Test {
        default-action drop
        description ""
        rule 10 {
            action drop
            description Drop_Invalid
            log disable
            protocol all
            state {
                established disable
                invalid enable
                new disable
                related disable
            }
        }
        rule 20 {
            action accept
            description "Allow Est_Rel"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 30 {
            action accept
            description "Allow Web Test"
            destination {
                port 80
            }
            disable
            log disable
            protocol tcp
            source {
            }
        }
        rule 40 {
            action accept
            description "Allow SMTP"
            destination {
                port 25
            }
            log disable
            protocol tcp
            source {
            }
        }
        rule 41 {
            action accept
            description Allow_Webmail_to_Server
            destination {
                port 443
            }
            log disable
            protocol tcp
        }
        rule 42 {
            action accept
            description "Allow LDAP Synch"
            destination {
                port 389
            }
            log disable
            protocol tcp
            source {
                address 2.2.2.2
            }
        }
    }
    name WAN1_LOCAL {
        default-action drop
        description ""
        enable-default-log
        rule 1 {
            action accept
            description ALLOW_REMOTE_MAN
            destination {
                port 80,443
            }
            log enable
            protocol tcp
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 2 {
            action accept
            description "Allow SSH from Authorized IPs"
            destination {
                port 22
            }
            log disable
            protocol tcp
            source {
                address 3.3.3.3
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN IN Policy"
        enable-default-log
        rule 10 {
            action drop
            description DROP_INVLAID
            log enable
            protocol all
            state {
                established disable
                invalid enable
                new disable
                related disable
            }
        }
        rule 20 {
            action accept
            description ACCEPT_RELATED_EST
            log enable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 21 {
            action accept
            description ALLOW_1723
            destination {
                port 1723
            }
            log disable
            protocol tcp
            source {
                group {
                }
            }
        }
        rule 22 {
            action accept
            description ALLOW_GRE
            log disable
            protocol gre
            source {
                group {
                    address-group ADDRv4_pppoe1
                }
            }
        }
        rule 23 {
            action accept
            description ALLOW_PORT
            destination {
                port 888
            }
            log disable
            protocol tcp
            source {
                group {
                }
            }
        }
    }
    options {
        mss-clamp {
            interface-type all
            mss 1412
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        description eth0_WAN1
        duplex auto
        pppoe 0 {
            default-route auto
            firewall {
                in {
                    name WAN_IN
                }
                local {
                    name WAN1_LOCAL
                }
            }
            mtu 1492
            name-server auto
            password 11
            user-id 22
        }
        speed auto
    }
    ethernet eth1 {
        description eth1_WAN2
        duplex auto
        pppoe 1 {
            default-route auto
            firewall {
                in {
                    name WAN_IN
                }
            }
            mtu 1492
            name-server auto
            password 33
            user-id 44
        }
        speed auto
    }
    ethernet eth2 {
        description eth2_WAN3
        duplex auto
        speed auto
    }
    ethernet eth3 {
        address 192.168.1.1/24
        description eth3_LAN
        duplex auto
        firewall {
            in {
                modify WLB_POLICY
            }
        }
        pppoe 2 {
            default-route auto
            firewall {
                in {
                    name WAN_IN
                }
            }
            mtu 1492
            name-server auto
            password 55
            user-id 66
        }
        speed auto
        vif 103 {
            address 10.103.0.1/22
            description 103_PUBLIC
            firewall {
                in {
                    modify WLB_POLICY
                }
            }
            mtu 1500
        }
        vif 120 {
            address 192.168.20.1/24
            description 120_CCTV
            firewall {
                in {
                    modify WLB_POLICY
                }
            }
            mtu 1500
        }
    }
    ethernet eth4 {
        description eth4_WAN4
        duplex auto
        pppoe 3 {
            default-route auto
            firewall {
                in {
                    name Dest_Nat_Web_Test
                }
            }
            mtu 1492
            name-server auto
            password 77
            user-id 88
        }
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    ethernet eth6 {
        duplex auto
        speed auto
    }
    ethernet eth7 {
        address 192.168.200.1/24
        description eth7_Backup
        duplex auto
        speed auto
    }
    loopback lo {
    }
}
load-balance {
    group WLB {
        interface pppoe0 {
            weight 49
        }
        interface pppoe1 {
            weight 49
        }
        interface pppoe2 {
            weight 0
        }
        interface pppoe3 {
            weight 2
        }
        lb-local enable
        sticky {
            dest-addr enable
            dest-port enable
            source-addr enable
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth3
    rule 1 {
        description "To HTTPS WFESCORE24"
        forward-to {
            address 192.168.1.5
            port 1066
        }
        original-port 1066
        protocol tcp_udp
    }
    rule 2 {
        description "To HTTPS TSW01"
        forward-to {
            address 192.168.1.6
            port 1067
        }
        original-port 1067
        protocol tcp_udp
    }
    rule 3 {
        description "To HTTPS TSW02"
        forward-to {
            address 192.168.1.7
            port 1068
        }
        original-port 1068
        protocol tcp_udp
    }
    rule 4 {
        description "To HTTPS TSW03"
        forward-to {
            address 192.168.1.8
            port 1069
        }
        original-port 1069
        protocol tcp_udp
    }
    rule 5 {
        description "To HTTPS TSW04"
        forward-to {
            address 192.168.1.9
            port 1070
        }
        original-port 1070
        protocol tcp_udp
    }
    rule 6 {
        description "Main Server"
        forward-to {
            address 192.168.1.3
            port 1723
        }
        original-port 1723
        protocol tcp_udp
    }
    wan-interface pppoe0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name dhcp_Office {
            authoritative disable
            disable
            subnet 192.168.1.0/24 {
                default-router 192.168.1.1
                dns-server 192.168.1.1
                dns-server 8.8.8.8
                lease 86400
                start 192.168.1.200 {
                    stop 192.168.1.210
                }
            }
        }
        shared-network-name dhcp_backup {
            authoritative disable
            subnet 192.168.200.0/24 {
                default-router 192.168.200.1
                dns-server 192.168.200.1
                dns-server 8.8.8.8
                lease 86400
                start 192.168.200.10 {
                    stop 192.168.200.20
                }
            }
        }
        shared-network-name dhcp_cctv {
            authoritative disable
            subnet 192.168.20.0/24 {
                default-router 192.168.20.1
                dns-server 192.168.20.1
                dns-server 8.8.8.8
                lease 86400
                start 192.168.20.50 {
                    stop 192.168.20.70
                }
            }
        }
        shared-network-name dhcp_public {
            authoritative disable
            subnet 10.103.0.0/22 {
                default-router 10.103.0.1
                dns-server 8.8.8.8
                lease 86400
                start 10.103.0.20 {
                    stop 10.103.3.254
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth3
            listen-on eth3.120
            listen-on eth3.103
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 1 {
            description "Dest Nat SMTP -> Exchange"
            destination {
                address 5.5.5.5
                port 25
            }
            inbound-interface pppoe3
            inside-address {
                address 192.168.1.3
                port 25
            }
            log disable
            protocol tcp
            type destination
        }
        rule 2 {
            description "Dest NAT TEst"
            destination {
                address 6.6.6.6
                port 1234
            }
            inbound-interface pppoe3
            inside-address {
                address 192.168.200.10
                port 1234
            }
            log disable
            protocol tcp
            type destination
        }
        rule 3 {
            description "DEST_NAT Web Test"
            destination {
                address 7.7.7.7
                port 80
            }
            inbound-interface pppoe3
            inside-address {
                address 192.168.1.3
                port 80
            }
            log disable
            protocol tcp
            type destination
        }
        rule 4 {
            description Wbmail_Exchange
            destination {
                address 8.8.8.8
                port 443
            }
            inbound-interface pppoe3
            inside-address {
                address 192.168.1.3
                port 443
            }
            log disable
            protocol tcp
            type destination
        }
        rule 5 {
            description "Dest NAT PPTP"
            destination {
                address 9.9.9.9
                port 1723
            }
            inbound-interface pppoe1
            inside-address {
                address 192.168.1.3
                port 1723
            }
            log disable
            protocol tcp
            type destination
        }
        rule 6 {
            description "Dest NAT CCTV"
            destination {
                address 9.9.9.9
                port 888
            }
            inbound-interface pppoe1
            inside-address {
                address 192.168.20.51
                port 888
            }
            log disable
            protocol tcp
            type destination
        }
        rule 7 {
            description "Dest LDAP"
            destination {
                address 8.8.8.8
                port 389
            }
            inbound-interface pppoe3
            inside-address {
                address 192.168.1.3
                port 389
            }
            log disable
            protocol tcp
            source {
            }
            type destination
        }
        rule 5000 {
            description SRC_NAT_WAN1
            log disable
            outbound-interface pppoe0
            type masquerade
        }
        rule 5001 {
            description SRC_NAT_WAN2
            log disable
            outbound-interface pppoe1
            protocol all
            type masquerade
        }
        rule 5002 {
            description SRC_NAT_WAN3
            log disable
            outbound-interface pppoe2
            type masquerade
        }
        rule 5003 {
            description SRC_NAT_WAN4
            log disable
            outbound-interface pppoe3
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name WFER8
    login {
        user EIP {
            authentication {
                encrypted-password ""
                plaintext-password ""
            }
            level admin
        }
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Europe/London
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.0.4901118.160804.1139 */

Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>