Farily new to setting up this kind of router. My experience is mostly with setting up my old netgear router.
I have what I think is a pretty straightforward setup. WAN is setup on eth0 and LAN is on eth1. So far, everything is working well except one issue that I am encountering. I cannot RDP on any of my machines inside the network. Just to clarify, im not refering to port forwarding from the internet to an internal macine. I can't even RDP from 10.0.1.anything to 10.0.1.anything.
Additionally, one thing that is odd is that also can't hit a local IIS (web) server on an internal machine. However, I can access my printer which is on the network as well as my plex media server which is on an internal server.
I am new to this so it is probably something rediculously easy. My config is below. Any help would be greatly appreciated:
firewall { all-ping disable broadcast-ping disable group { } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp address dhcpv6 description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } ip { } speed auto } ethernet eth1 { address 10.0.1.1/24 description Local duplex auto speed auto } ethernet eth2 { address 192.168.2.1/24 description "Local 2" disable duplex auto speed auto } loopback lo { } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth1 wan-interface eth0 } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN1 { authoritative enable subnet 10.0.1.0/24 { default-router 10.0.1.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 10.0.1.38 { stop 10.0.1.243 } static-mapping BRN30055CA66AF5 { ip-address 10.0.1.68 mac-address 30:05:5c:a6:6a:f5 } static-mapping Rich-LT { ip-address 10.0.1.60 mac-address 08:60:6e:09:ba:bd } static-mapping Tablo { ip-address 10.0.1.65 mac-address 50:87:b8:00:87:f5 } static-mapping Upstairs-AP { ip-address 10.0.1.2 mac-address 80:2a:a8:59:57:04 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth1 listen-on eth2 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } ssh { port 22 protocol-version v2 } } system { host-name ubnt login { } } ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone America/Chicago traffic-analysis { dpi disable export enable } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.9.0.4901118.160804.1131 */