Hi, running an EdgeRouter 8 port with load balancing configured over 4 WAN interfaces. Currently one of the WAN interfaces (ppppoe2) is down and not functioning. Ive set the weighting on pppoe0 & pppoe1 to 49%, pppoe2 to 0% (because its down) and pppoe3 to 2% as its a much slower line and only needed for incoming SMTP connections.
When I do some random tests its almost as though the weighting is incorrect and I get more occurrances of the pppoe1 connection than I think I should. Also when I issue the "show load-balance status" command I get the following output which appears to not match my config output:
Group WLB interface : pppoe0 carrier : up status : inactive gateway : pppoe0 route table : 201 weight : 0% flows WAN Out : 294 WAN In : 10 Local Out : 1 interface : pppoe1 carrier : up status : active gateway : pppoe1 route table : 202 weight : 96% flows WAN Out : 176000 WAN In : 20 Local Out : 1083 interface : pppoe2 carrier : down status : inactive gateway : unknown route table : 203 weight : 0% flows WAN Out : 610000 WAN In : 0 Local Out : 208 interface : pppoe3 carrier : up status : active gateway : pppoe3 route table : 204 weight : 3% flows WAN Out : 14104 WAN In : 169000 Local Out : 66
Ive also noticed that although Ive configured a "WAN_LOCAL" firewall rule on ppppoe0 to access the router GUI I can only access via pppoe1.
So a few gremlins that Im abit confused by, hopefully someone can point me in the right direction!
Have posted my config output below!
Many thanks!
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable modify WLB_POLICY { rule 30 { action modify modify { lb-group WLB } } } name Dest_Nat_Web_Test { default-action drop description "" rule 10 { action drop description Drop_Invalid log disable protocol all state { established disable invalid enable new disable related disable } } rule 20 { action accept description "Allow Est_Rel" log disable protocol all state { established enable invalid disable new disable related enable } } rule 30 { action accept description "Allow Web Test" destination { port 80 } disable log disable protocol tcp source { } } rule 40 { action accept description "Allow SMTP" destination { port 25 } log disable protocol tcp source { } } rule 41 { action accept description Allow_Webmail_to_Server destination { port 443 } log disable protocol tcp } rule 42 { action accept description "Allow LDAP Synch" destination { port 389 } log disable protocol tcp source { address 2.2.2.2 } } } name WAN1_LOCAL { default-action drop description "" enable-default-log rule 1 { action accept description ALLOW_REMOTE_MAN destination { port 80,443 } log enable protocol tcp state { established enable invalid disable new disable related enable } } rule 2 { action accept description "Allow SSH from Authorized IPs" destination { port 22 } log disable protocol tcp source { address 3.3.3.3 } } } name WAN_IN { default-action drop description "WAN IN Policy" enable-default-log rule 10 { action drop description DROP_INVLAID log enable protocol all state { established disable invalid enable new disable related disable } } rule 20 { action accept description ACCEPT_RELATED_EST log enable protocol all state { established enable invalid disable new disable related enable } } rule 21 { action accept description ALLOW_1723 destination { port 1723 } log disable protocol tcp source { group { } } } rule 22 { action accept description ALLOW_GRE log disable protocol gre source { group { address-group ADDRv4_pppoe1 } } } rule 23 { action accept description ALLOW_PORT destination { port 888 } log disable protocol tcp source { group { } } } } options { mss-clamp { interface-type all mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { description eth0_WAN1 duplex auto pppoe 0 { default-route auto firewall { in { name WAN_IN } local { name WAN1_LOCAL } } mtu 1492 name-server auto password 11 user-id 22 } speed auto } ethernet eth1 { description eth1_WAN2 duplex auto pppoe 1 { default-route auto firewall { in { name WAN_IN } } mtu 1492 name-server auto password 33 user-id 44 } speed auto } ethernet eth2 { description eth2_WAN3 duplex auto speed auto } ethernet eth3 { address 192.168.1.1/24 description eth3_LAN duplex auto firewall { in { modify WLB_POLICY } } pppoe 2 { default-route auto firewall { in { name WAN_IN } } mtu 1492 name-server auto password 55 user-id 66 } speed auto vif 103 { address 10.103.0.1/22 description 103_PUBLIC firewall { in { modify WLB_POLICY } } mtu 1500 } vif 120 { address 192.168.20.1/24 description 120_CCTV firewall { in { modify WLB_POLICY } } mtu 1500 } } ethernet eth4 { description eth4_WAN4 duplex auto pppoe 3 { default-route auto firewall { in { name Dest_Nat_Web_Test } } mtu 1492 name-server auto password 77 user-id 88 } speed auto } ethernet eth5 { duplex auto speed auto } ethernet eth6 { duplex auto speed auto } ethernet eth7 { address 192.168.200.1/24 description eth7_Backup duplex auto speed auto } loopback lo { } } load-balance { group WLB { interface pppoe0 { weight 49 } interface pppoe1 { weight 49 } interface pppoe2 { weight 0 } interface pppoe3 { weight 2 } lb-local enable sticky { dest-addr enable dest-port enable source-addr enable } } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth3 rule 1 { description "To HTTPS WFESCORE24" forward-to { address 192.168.1.5 port 1066 } original-port 1066 protocol tcp_udp } rule 2 { description "To HTTPS TSW01" forward-to { address 192.168.1.6 port 1067 } original-port 1067 protocol tcp_udp } rule 3 { description "To HTTPS TSW02" forward-to { address 192.168.1.7 port 1068 } original-port 1068 protocol tcp_udp } rule 4 { description "To HTTPS TSW03" forward-to { address 192.168.1.8 port 1069 } original-port 1069 protocol tcp_udp } rule 5 { description "To HTTPS TSW04" forward-to { address 192.168.1.9 port 1070 } original-port 1070 protocol tcp_udp } rule 6 { description "Main Server" forward-to { address 192.168.1.3 port 1723 } original-port 1723 protocol tcp_udp } wan-interface pppoe0 } service { dhcp-server { disabled false hostfile-update disable shared-network-name dhcp_Office { authoritative disable disable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 dns-server 8.8.8.8 lease 86400 start 192.168.1.200 { stop 192.168.1.210 } } } shared-network-name dhcp_backup { authoritative disable subnet 192.168.200.0/24 { default-router 192.168.200.1 dns-server 192.168.200.1 dns-server 8.8.8.8 lease 86400 start 192.168.200.10 { stop 192.168.200.20 } } } shared-network-name dhcp_cctv { authoritative disable subnet 192.168.20.0/24 { default-router 192.168.20.1 dns-server 192.168.20.1 dns-server 8.8.8.8 lease 86400 start 192.168.20.50 { stop 192.168.20.70 } } } shared-network-name dhcp_public { authoritative disable subnet 10.103.0.0/22 { default-router 10.103.0.1 dns-server 8.8.8.8 lease 86400 start 10.103.0.20 { stop 10.103.3.254 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth3 listen-on eth3.120 listen-on eth3.103 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 1 { description "Dest Nat SMTP -> Exchange" destination { address 5.5.5.5 port 25 } inbound-interface pppoe3 inside-address { address 192.168.1.3 port 25 } log disable protocol tcp type destination } rule 2 { description "Dest NAT TEst" destination { address 6.6.6.6 port 1234 } inbound-interface pppoe3 inside-address { address 192.168.200.10 port 1234 } log disable protocol tcp type destination } rule 3 { description "DEST_NAT Web Test" destination { address 7.7.7.7 port 80 } inbound-interface pppoe3 inside-address { address 192.168.1.3 port 80 } log disable protocol tcp type destination } rule 4 { description Wbmail_Exchange destination { address 8.8.8.8 port 443 } inbound-interface pppoe3 inside-address { address 192.168.1.3 port 443 } log disable protocol tcp type destination } rule 5 { description "Dest NAT PPTP" destination { address 9.9.9.9 port 1723 } inbound-interface pppoe1 inside-address { address 192.168.1.3 port 1723 } log disable protocol tcp type destination } rule 6 { description "Dest NAT CCTV" destination { address 9.9.9.9 port 888 } inbound-interface pppoe1 inside-address { address 192.168.20.51 port 888 } log disable protocol tcp type destination } rule 7 { description "Dest LDAP" destination { address 8.8.8.8 port 389 } inbound-interface pppoe3 inside-address { address 192.168.1.3 port 389 } log disable protocol tcp source { } type destination } rule 5000 { description SRC_NAT_WAN1 log disable outbound-interface pppoe0 type masquerade } rule 5001 { description SRC_NAT_WAN2 log disable outbound-interface pppoe1 protocol all type masquerade } rule 5002 { description SRC_NAT_WAN3 log disable outbound-interface pppoe2 type masquerade } rule 5003 { description SRC_NAT_WAN4 log disable outbound-interface pppoe3 type masquerade } } ssh { port 22 protocol-version v2 } } system { host-name WFER8 login { user EIP { authentication { encrypted-password "" plaintext-password "" } level admin } } name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Europe/London } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1139 */