Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

Sourced Based Routing Still broken ERX V1.9.1Beta1

$
0
0

As mentioned in this thread:

https://community.ubnt.com/t5/EdgeMAX/Policy-based-routing-source-address-based-not-working-in-EdgeMAX/td-p/1648890

 

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    modify SOURCE_ROUTE {
        rule 10 {
            action modify
            modify {
                table 1
            }
            source {
                address 192.168.2.250/32
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 20 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 30 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow Ping"
            destination {
                group {
                    address-group ADDRv4_pppoe0
                }
            }
            log disable
            protocol icmp
        }
        rule 20 {
            action accept
            description "Allow Nat-T for Remote VPN Server"
            destination {
                port 4500
            }
            log enable
            protocol udp
        }
        rule 30 {
            action accept
            description "Allow L2TP for Remote VPN Server"
            destination {
                port 1701
            }
            log enable
            protocol udp
        }
        rule 40 {
            action accept
            description "Allow IKE for Remote VPN Serve"
            destination {
                port 500
            }
            log enable
            protocol udp
        }
        rule 50 {
            action accept
            description "Allow ESP for Remote VPN Server"
            log enable
            protocol esp
        }
        rule 60 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 70 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    options {
        mss-clamp {
            interface-type pppoe
            mss 1452
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        duplex auto
        speed auto
        vif 35 {
            description "Internet (PPPoE)"
            pppoe 0 {
                default-route auto
                firewall {
                    in {
                        modify SOURCE_ROUTE
                        name WAN_IN
                    }
                    local {
                        name WAN_LOCAL
                    }
                }
                mtu 1492
                name-server auto
                password *******
                user-id *******
            }
        }
    }
    ethernet eth1 {
        address 192.168.100.1/24
        description DMZ
        duplex auto
        speed auto
    }
    ethernet eth2 {
        address 192.168.2.1/24
        description LAN
        duplex auto
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        address 192.168.3.1/24
        description WIFI
        duplex auto
        speed auto
    }
    loopback lo {
    }
    openvpn vtun0 {
        config-file /config/auth/nordvpn/us321.ovpn
        description "NordVPN USA321"
        mode client
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth2
    rule 1 {
        description ""
        forward-to {
            address 192.168.2.100
        }
        original-port 32400
        protocol tcp_udp
    }
    rule 2 {
        description ""
        forward-to {
            address 192.168.2.100
        }
        original-port 1194
        protocol udp
    }
    wan-interface pppoe0
}
protocols {
    static {
        table 1 {
            interface-route 0.0.0.0/0 {
                next-hop-interface vtun0 {
                }
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN1 {
            authoritative enable
            subnet 192.168.100.0/24 {
                default-router 192.168.100.1
                dns-server 192.168.100.1
                lease 86400
                start 192.168.100.38 {
                    stop 192.168.100.243
                }
            }
        }
        shared-network-name LAN2 {
            authoritative enable
            subnet 192.168.2.0/24 {
                default-router 192.168.2.1
                dns-server 192.168.2.1
                lease 86400
                start 192.168.2.38 {
                    stop 192.168.2.243
                }
                static-mapping FireTv {
                    ip-address 192.168.2.250
                    mac-address 0C:47:C9:C5:1A:BD
                }
                static-mapping SipuraSPA {
                    ip-address 192.168.2.39
                    mac-address 00:0e:08:24:9e:54
                }
            }
        }
        shared-network-name Wifi {
            authoritative disable
            subnet 192.168.3.0/24 {
                default-router 192.168.3.1
                dns-server 192.168.2.1
                lease 86400
                start 192.168.3.10 {
                    stop 192.168.3.100
                }
                unifi-controller 192.168.2.52
            }
        }
        use-dnsmasq disable
    }
    dns {
        dynamic {
            interface pppoe0 {
                service dyndns {
                    host-name all.dnsomatic.com
                    login mik**************@gmail.com
                    password *************
                    server updates.dnsomatic.com
                }
                web dyndns
            }
        }
        forwarding {
            cache-size 1500
            listen-on eth1
            listen-on eth2
            listen-on eth3
            listen-on eth4
            options listen-address=192.168.2.1
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface pppoe0
            type masquerade
        }
        rule 5011 {
            description "VPN NAT"
            log disable
            outbound-interface vtun0
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name ubnt
    login {
        user admin {
            authentication {
                encrypted-password $6$i8Hdwc5mYRkwhjz$S9MG2mfisbnHeHUgznlvUrRaO7bCFgWvbHagnSZuw759034PlfsXuxEukTeddkl4elOmF6V5XJWUqoyoL3o2Z.
            }
            level admin
        }
    }
    name-server 208.67.222.222
    name-server 208.67.220.220
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipsec disable
    }
    package {
        repository wheezy {
            components "main contrib non-free"
            distribution wheezy
            password ""
            url http://http.us.debian.org/debian
            username ""
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/Toronto
    traffic-analysis {
        dpi enable
        export enable
    }
}
traffic-control {
    smart-queue Smart_Q {
        upload {
            ecn enable
            flows 1024
            fq-quantum 1514
            limit 10240
            rate 50mbit
        }
        wan-interface pppoe0
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.1alpha2.4931052.161116.0900 */

Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>