Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

Strange behavior with load-balance

$
0
0

Hello

 

I'm trying to offload some trafic to a specific conecction using load-balancing groups but strange things occur. Confused

 

In the beginning it works like a charm but this evening i got this.

 

RoutingError.png

 

After a rebooot it worked again.

Working.png

 

I have no clue what's going on here. the IP-address used as "Routing Table" is comming via DHCP on eth6 as Gateway. How can I fix this issue?

 

The idea behind this config is to pin the "server" traffic to eth6 a line with a static IP and offload my Chromecast and FireTV to eth1.

 

the routing between my internal vlans (10.255.4.0/24 and 10.255.5.0/24) is done on a HP Procurve 1910-24G because it's easyer there.

 

Thanks in advance

 

Christoph

 

My Config File.

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group Server {
            address 192.168.0.0/24
            description "Server Infrastruktur"
        }
        address-group Streaming {
            address 192.168.10.0/24
            description "Streaming Clients"
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    modify balance {
        rule 1 {
            action modify
            destination {
            }
            modify {
                lb-group SRV
            }
            source {
                group {
                    address-group Server
                }
            }
        }
        rule 2 {
            action modify
            modify {
                lb-group Stream
            }
            source {
                group {
                    address-group Streaming
                }
            }
        }
        rule 3 {
            action modify
            modify {
                lb-group G
            }
        }
    }
    name Clients_Sperren {
        default-action accept
        description ""
        rule 1 {
            action drop
            description Fernseher
            log disable
            protocol all
            source {
                address 192.168.2.3
            }
            state {
                established enable
                invalid enable
                new enable
                related disable
            }
        }
        rule 2 {
            action drop
            description Stereoanlage
            log disable
            protocol all
            source {
                address 192.168.1.11
            }
            state {
                established enable
                invalid enable
                new enable
                related disable
            }
        }
        rule 3 {
            action drop
            description Drucker
            log disable
            protocol all
            source {
                address 192.168.6.0/24
            }
        }
        rule 4 {
            action drop
            description Loxone
            log disable
            protocol all
            source {
                address 192.168.5.0/24
            }
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        description UPC
        duplex auto
        firewall {
            in {
            }
            local {
            }
        }
        speed auto
    }
    ethernet eth1 {
        address dhcp
        description DREI
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth2 {
        description Local
        duplex auto
        firewall {
            in {
            }
        }
        speed auto
    }
    ethernet eth3 {
        description LocalGuest
        duplex auto
        firewall {
            in {
                modify balance
            }
        }
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    ethernet eth5 {
        duplex auto
        speed auto
    }
    ethernet eth6 {
        address dhcp
        description UPC-LWL
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth7 {
        address 192.168.0.9/16
        description LAN-LWL
        duplex auto
        firewall {
            in {
                modify balance
                name Clients_Sperren
            }
        }
        speed auto
    }
    loopback lo {
    }
}
load-balance {
    group G {
        interface eth1 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
        interface eth6 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
        sticky {
        }
    }
    group SRV {
        interface eth1 {
            failover-only
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
        interface eth6 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
    }
    group Stream {
        interface eth1 {
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
        interface eth6 {
            failover-only
            route-test {
                initial-delay 60
                interval 10
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth7
    rule 1 {
        description SMTP
        forward-to {
            address 192.168.0.5
            port 25
        }
        original-port 25
        protocol tcp
    }
    rule 2 {
        description SMTP2
        forward-to {
            address 192.168.0.5
            port 465
        }
        original-port 465
        protocol tcp
    }
    rule 3 {
        description SMTP3
        forward-to {
            address 192.168.0.5
            port 587
        }
        original-port 587
        protocol tcp
    }
    rule 4 {
        description IMAPS
        forward-to {
            address 192.168.0.5
            port 993
        }
        original-port 993
        protocol tcp
    }
    rule 5 {
        description Softether443
        forward-to {
            address 192.168.0.20
            port 443
        }
        original-port 443
        protocol tcp
    }
    rule 6 {
        description Softether
        forward-to {
            address 192.168.0.20
            port 5555
        }
        original-port 5555
        protocol tcp
    }
    rule 7 {
        description OpenVPN
        forward-to {
            address 192.168.0.20
            port 1194
        }
        original-port 1194
        protocol udp
    }
    wan-interface eth6
}
protocols {
    static {
        route 10.255.4.0/24 {
            next-hop 192.168.0.1 {
                distance 1
            }
        }
        route 10.255.5.0/24 {
            next-hop 192.168.0.1 {
                distance 1
            }
        }
        route 192.168.0.0/16 {
            next-hop 192.168.0.1 {
                distance 1
            }
        }
    }
}
service {
    dns {
        forwarding {
            cache-size 150
            listen-on eth2
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5003 {
            description "masquerade for WAN"
            log disable
            outbound-interface eth6
            protocol all
            type masquerade
        }
        rule 5004 {
            description "masquerade for WAN 2"
            outbound-interface eth1
            type masquerade
        }
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    host-name ubnt
    login {
        user admin {
            authentication {
                encrypted-password XXXXX
                plaintext-password ""
            }
            level admin
        }
        user ubnt {
            authentication {
                encrypted-password XXXXX
                plaintext-password ""
            }
            full-name ""
            level admin
        }
    }
    name-server 192.168.0.20
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
    traffic-analysis {
        dpi enable
        export enable
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1104 */

Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>