Hello
I'm trying to offload some trafic to a specific conecction using load-balancing groups but strange things occur.
In the beginning it works like a charm but this evening i got this.
After a rebooot it worked again.
I have no clue what's going on here. the IP-address used as "Routing Table" is comming via DHCP on eth6 as Gateway. How can I fix this issue?
The idea behind this config is to pin the "server" traffic to eth6 a line with a static IP and offload my Chromecast and FireTV to eth1.
the routing between my internal vlans (10.255.4.0/24 and 10.255.5.0/24) is done on a HP Procurve 1910-24G because it's easyer there.
Thanks in advance
Christoph
My Config File.
firewall { all-ping enable broadcast-ping disable group { address-group Server { address 192.168.0.0/24 description "Server Infrastruktur" } address-group Streaming { address 192.168.10.0/24 description "Streaming Clients" } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify balance { rule 1 { action modify destination { } modify { lb-group SRV } source { group { address-group Server } } } rule 2 { action modify modify { lb-group Stream } source { group { address-group Streaming } } } rule 3 { action modify modify { lb-group G } } } name Clients_Sperren { default-action accept description "" rule 1 { action drop description Fernseher log disable protocol all source { address 192.168.2.3 } state { established enable invalid enable new enable related disable } } rule 2 { action drop description Stereoanlage log disable protocol all source { address 192.168.1.11 } state { established enable invalid enable new enable related disable } } rule 3 { action drop description Drucker log disable protocol all source { address 192.168.6.0/24 } } rule 4 { action drop description Loxone log disable protocol all source { address 192.168.5.0/24 } } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { description UPC duplex auto firewall { in { } local { } } speed auto } ethernet eth1 { address dhcp description DREI duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth2 { description Local duplex auto firewall { in { } } speed auto } ethernet eth3 { description LocalGuest duplex auto firewall { in { modify balance } } speed auto } ethernet eth4 { duplex auto speed auto } ethernet eth5 { duplex auto speed auto } ethernet eth6 { address dhcp description UPC-LWL duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth7 { address 192.168.0.9/16 description LAN-LWL duplex auto firewall { in { modify balance name Clients_Sperren } } speed auto } loopback lo { } } load-balance { group G { interface eth1 { route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } interface eth6 { route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } sticky { } } group SRV { interface eth1 { failover-only route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } interface eth6 { route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } } group Stream { interface eth1 { route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } interface eth6 { failover-only route-test { initial-delay 60 interval 10 type { ping { target 8.8.8.8 } } } } } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth7 rule 1 { description SMTP forward-to { address 192.168.0.5 port 25 } original-port 25 protocol tcp } rule 2 { description SMTP2 forward-to { address 192.168.0.5 port 465 } original-port 465 protocol tcp } rule 3 { description SMTP3 forward-to { address 192.168.0.5 port 587 } original-port 587 protocol tcp } rule 4 { description IMAPS forward-to { address 192.168.0.5 port 993 } original-port 993 protocol tcp } rule 5 { description Softether443 forward-to { address 192.168.0.20 port 443 } original-port 443 protocol tcp } rule 6 { description Softether forward-to { address 192.168.0.20 port 5555 } original-port 5555 protocol tcp } rule 7 { description OpenVPN forward-to { address 192.168.0.20 port 1194 } original-port 1194 protocol udp } wan-interface eth6 } protocols { static { route 10.255.4.0/24 { next-hop 192.168.0.1 { distance 1 } } route 10.255.5.0/24 { next-hop 192.168.0.1 { distance 1 } } route 192.168.0.0/16 { next-hop 192.168.0.1 { distance 1 } } } } service { dns { forwarding { cache-size 150 listen-on eth2 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5003 { description "masquerade for WAN" log disable outbound-interface eth6 protocol all type masquerade } rule 5004 { description "masquerade for WAN 2" outbound-interface eth1 type masquerade } } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } host-name ubnt login { user admin { authentication { encrypted-password XXXXX plaintext-password "" } level admin } user ubnt { authentication { encrypted-password XXXXX plaintext-password "" } full-name "" level admin } } name-server 192.168.0.20 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC traffic-analysis { dpi enable export enable } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.5.4884695.160608.1104 */