Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

Load-Balance (dual-wan); Mulitple IP's (comcast) single DHCP (ATT)

$
0
0

I'm getting two ISP's; one for work and one for home (yes finally a separatiion). Anyway, I did the wizard for load-balancing on the EdgePro-8 and have 5 static IP's and am having issues geting in with the Dnat and even getting Snat to work proper. 

 

Can anyone help: 

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group PRIVATE_NETS {
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
        port-group OS_X_Server {
            description "Mac OS X Server Ports needed for use."
            port 25
            port 80
            port 110
            port 143
            port 443
            port 500
            port 587
            port 993
            port 995
            port 1640
            port 1701
            port 1723
            port 2195-2196
            port 4500
            port 5060
            port 5190
            port 5222-5223
            port 5269
            port 5297-5298
            port 5678
            port 5900
            port 8008
            port 8085-8087
            port 8088
            port 8443
            port 11211
            port 16080
            port 16384-16403
        }
        port-group PBX {
            description "Ports for the PBX to work"
            port 443
            port 5060-5090
            port 10000-20000
        }
        port-group Unifi_Video {
            description "Video ports needed for operation"
            port 7080
            port 7443
            port 7445
            port 7446
            port 7447
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify balance {
        rule 10 {
            action modify
            description "do NOT load balance lan to lan"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            modify {
                table main
            }
        }
        rule 20 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth0
                }
            }
            modify {
                table main
            }
        }
        rule 80 {
            action modify
            description "do NOT load balance destination public address"
            destination {
    group {
                    address-group ADDRv4_eth6
                }
            }
            modify {
                table main
            }
        }
        rule 100 {
            action modify
            modify {
                lb-group G
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description "Allow ports to OS X Server"
            destination {
                address 10.102.3.2
                group {
                    port-group OS_X_Server
                }
            }
            log enable
            protocol all
state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 22 {
            action accept
            description "Allow Ports to Security"
            destination {
                address 10.102.3.6
                group {
                    port-group Unifi_Video
                }
            }
            log enable
            protocol all
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 23 {
            action accept
            description "Allow Ports to PBX"
            destination {
                address 10.102.20.2
                group {
                    port-group PBX
                }
            }
            log enable
            protocol all
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
    }
name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 50.243.209.97/29
        address 50.243.209.98/29
        address 50.243.209.99/29
        address 50.243.209.100/29
        address 50.243.209.101/29
        description "Comcast Biz"
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
     duplex auto
        speed auto
    }
    ethernet eth2 {
        duplex auto
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    ethernet eth6 {
        address dhcp
        description WAN
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth7 {
        address 10.102.0.1/24
        description LAN
        duplex auto
        firewall {
            in {
                modify balance
            }
        }
        speed auto
        vif 20 {
            address 10.102.20.1/24
            description VoIP
            mtu 1500
        }
        vif 30 {
            address 10.102.3.1/24
            description DMZ
            mtu 1500
        }
    }
    loopback lo {
    }
}
load-balance {
    group G {
        interface eth0 {
            weight 25
        }
        interface eth6 {
            weight 75
        }
        lb-local enable
        sticky {
            dest-addr enable
            dest-port enable
            source-addr enable
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth7
    rule 1 {
        description "SSL to EdgeMAX Pro"
        forward-to {
            address 10.102.0.1
            port 443
        }
        original-port 443
        protocol tcp
    }
    wan-interface eth0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name DMZ {
            authoritative disable
            subnet 10.102.3.0/24 {
                default-router 10.102.3.1
                dns-server 10.102.3.1
                lease 86400
                start 10.102.3.10 {
                    stop 10.102.3.200
                }
                static-mapping security {
                    ip-address 10.102.3.6
                    mac-address 00:15:17:f4:17:74
                }
                unifi-controller 199.175.55.241
            }
        }
        shared-network-name LAN {
            authoritative enable
            subnet 10.102.0.0/24 {
                default-router 10.102.0.1
                dns-server 10.102.0.1
                domain-name my-it.support
                lease 86400
                start 10.102.0.38 {
                    stop 10.102.0.243
                }
                static-mapping UBNT-EdgeSwitch {
                    ip-address 10.102.0.254
                    mac-address 04:18:d6:31:cb:c4
                }
                static-mapping USG4 {
                    ip-address 10.102.0.4
                    mac-address 44:d9:e7:9f:81:78
                }
                unifi-controller 199.175.55.241
            }
        }
        shared-network-name VoIP {
            authoritative disable
            subnet 10.102.20.0/24 {
              default-router 10.102.20.1
                dns-server 10.102.20.1
                dns-server 10.102.3.2
                lease 86400
                start 10.102.20.10 {
                    stop 10.102.20.200
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth7
            listen-on eth7.30
            listen-on eth7.20
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 1 {
            description "DNAT to OS X Server"
            inbound-interface eth0
            inside-address {
                address 50.243.209.98
            }
            log enable
            protocol all
            source {
                address 10.102.3.2
            }
            type destination
        }
        rule 2 {
            description "DNAT to PBX"
            inbound-interface eth0
            inside-address {
                address 50.243.209.99
            }
       log enable
            protocol all
            source {
                address 10.102.20.2
            }
            type destination
        }
        rule 3 {
            description "DNAT to Security"
            inbound-interface eth0
            inside-address {
                address 50.243.209.100
            }
            log enable
            protocol all
            source {
                address 10.102.3.6
            }
            type destination
        }
        rule 5000 {
            description "SNAT from OS X Server"
            destination {
            }
            log enable
            outbound-interface eth0
            outside-address {
                address 10.102.3.2
            }
            protocol all
            source {
                address 50.243.209.98
            }
            type source
        }
        rule 5001 {
            description "SNAT from PBX"
            destination {
            }
            log enable
            outbound-interface eth0
            outside-address {
                address 10.102.20.2
            }
  protocol all
            source {
                address 50.243.209.99
            }
            type source
        }
        rule 5002 {
            description "SNAT from Security"
            destination {
            }
            log enable
            outbound-interface eth0
            outside-address {
                address 10.102.3.6
            }
            protocol all
            source {
                address 50.243.209.100
            }
            type source
        }
        rule 5003 {
            description "masquerade for WAN 2"
            outbound-interface eth0
            type masquerade
        }
        rule 5004 {
            description "masquerade for WAN"
            outbound-interface eth6
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
           loose enable
            max-retrans 3
        }
    }
    domain-name my-it.support
    gateway-address 50.243.209.102
    host-name gateway
    login {
        user myIT {
            authentication {
                encrypted-password ****************
            }
            level admin
        }
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    static-host-mapping {
        host-name gateway.my-it.support {
            alias gateway
            inet 10.102.0.1
        }
        host-name pbx.my-it.support {
            alias pbx
            inet 10.102.20.2
        }
        host-name security.my-it.support {
            alias security
            inet 10.102.3.6
        }
        host-name server.my-it.support {
            alias server
            inet 10.102.3.2
        }
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    static-host-mapping {
        host-name gateway.my-it.support {
            alias gateway
            inet 10.102.0.1
        }
        host-name pbx.my-it.support {
            alias pbx
            inet 10.102.20.2
        }
        host-name security.my-it.support {
            alias security
            inet 10.102.3.6
        }
        host-name server.my-it.support {
            alias server
            inet 10.102.3.2
        }
        host-name unifi.my-it.support {
            alias unifi
            inet 199.175.55.241
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/New_York
    traffic-analysis {
        dpi enable
        export enable
    }
}

My mission is to get all traffic to and from specified IP's to stay where they are going and coming from. My two ISP's are Comcast (5 Statics) and ATT Gig-Fiber (DHCP).


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>