Hi,
Why am I seeing public ip addresses in mt traffic analysis on my ERL lite.
below is my config:
firewall {
all-ping enable
broadcast-ping disable
ipv6-name WANv6_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related sessions"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow IPv6 ICMP"
protocol ipv6-icmp
}
}
ipv6-name WANv6_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related sessions"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow DHCPv6"
destination {
port dhcpv6-client
}
protocol udp
source {
port dhcpv6-server
}
}
rule 40 {
action accept
description "Allow IPv6 ICMP"
protocol ipv6-icmp
}
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name Guest_VLAN {
default-action accept
rule 1 {
action drop
description "Drop to LAN"
destination {
address 192.168.1.0/24
}
log disable
protocol all
}
rule 2 {
action drop
description "Drop to 192.168.2.0"
destination {
address 192.168.2.0/24
}
log disable
protocol all
}
}
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 30 {
action accept
description "Allow Plex Remote Access"
destination {
address 192.168.1.75
port 32400
}
protocol tcp_udp
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 21 {
action accept
description "Allow IKE for Remote VPN Server"
destination {
port 500
}
log disable
protocol udp
}
rule 22 {
action accept
description "Allow L2TP for Remote VPN Server"
destination {
port 1701
}
ipsec {
match-ipsec
}
log disable
protocol udp
}
rule 23 {
action accept
description "Allow ESP for Remote VPN Server"
log disable
protocol 50
}
rule 24 {
action accept
description "Allow NAT-T for remote VPN Server"
destination {
port 4500
}
log disable
protocol udp
}
}
options {
mss-clamp {
mss 1412
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
description "Internet (PPPoE)"
duplex auto
pppoe 0 {
default-route auto
dhcpv6-pd {
pd 0 {
interface eth1 {
prefix-id :1
service slaac
}
interface eth2 {
prefix-id :2
service slaac
}
prefix-length 48
}
rapid-commit enable
}
firewall {
in {
ipv6-name WANv6_IN
name WAN_IN
}
local {
ipv6-name WANv6_LOCAL
name WAN_LOCAL
}
}
ipv6 {
dup-addr-detect-transmits 1
enable {
}
}
mtu 1492
name-server auto
password ****************
user-id *******************
}
speed auto
}
ethernet eth1 {
address 192.168.1.1/24
description Local
duplex auto
speed auto
vif 2 {
address 192.168.3.1/24
description guest
firewall {
in {
name Guest_VLAN
}
local {
name Guest_VLAN
}
}
}
}
ethernet eth2 {
address 192.168.2.1/24
description "Local 2"
duplex auto
speed auto
}
loopback lo {
}
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name Guest_Network {
authoritative enable
subnet 192.168.3.0/24 {
default-router 192.168.3.1
dns-server 192.168.3.1
lease 14400
start 192.168.3.120 {
stop 192.168.3.160
}
}
}
shared-network-name LAN1 {
authoritative enable
subnet 192.168.1.0/24 {
default-router 192.168.1.1
dns-server 192.168.1.1
exclude 192.168.1.75
lease 86400
start 192.168.1.21 {
stop 192.168.1.240
}
static-mapping Debian-Sever {
ip-address 192.168.1.2
mac-address ***********************
}
static-mapping Pauls-MBP {
ip-address 192.168.1.10
mac-address *******************
}
static-mapping RaspPi {
ip-address 192.168.1.5
mac-address *******************
}
static-mapping Tower {
ip-address 192.168.1.75
mac-address **********************
}
static-mapping Win-10 {
ip-address 192.168.1.70
mac-address *************************
}
}
}
shared-network-name LAN2 {
authoritative enable
subnet 192.168.2.0/24 {
default-router 192.168.2.1
dns-server 192.168.2.1
lease 86400
start 192.168.2.21 {
stop 192.168.2.240
}
}
}
use-dnsmasq disable
}
dns {
forwarding {
cache-size 1000
listen-on eth2
listen-on eth1
listen-on eth1.2
}
}
gui {
http-port 80
https-port 443
listen-address 192.168.1.1
older-ciphers enable
}
nat {
rule 20 {
description "Plex Access"
destination {
port 32400
}
inbound-interface pppoe0
inside-address {
address 192.168.1.75
port 32400
}
protocol tcp_udp
type destination
}
rule 5010 {
outbound-interface pppoe0
type masquerade
}
rule 5011 {
description "MASQ hairpin eth0 Plex"
destination {
address 192.168.1.0/24
port 32400
}
outbound-interface eth1
protocol tcp_udp
source {
address 192.168.1.0/24
}
type masquerade
}
}
ssh {
listen-address 192.168.1.1
port 22
protocol-version v2
}
webproxy {
cache-size 10000
default-port 3128
listen-address 127.0.0.1 {
}
listen-address 192.168.1.1 {
}
listen-address 192.168.3.1 {
}
mem-cache-size 20
proxy-bypass-source 192.168.1.22
proxy-bypass-source 192.168.1.214
proxy-bypass-source 192.168.1.216
proxy-bypass-source 192.168.1.10
proxy-bypass-source 192.168.1.20
proxy-bypass-source 192.168.1.70
url-filtering {
squidguard {
auto-update {
update-hour 2
}
block-category aggressive
block-category ddos
block-category dangerous_material
block-category dialer
block-category drogue
block-category drugs
block-category malware
block-category porn
block-category proxy
block-category phishing
block-category tricheur
block-category redirector
block-category warez
block-category violence
default-action allow
enable-safe-search
log aggressive
log ddos
log dangerous_material
log drogue
log drugs
log malware
log porn
log proxy
log phishing
log tricheur
log redirector
log warez
log violence
redirect-url https://www.google.co.uk
}
}
}
}
system {
host-name ubnt
ipv6 {
}
login {
user ******* {
authentication {
encrypted-password ****************
plaintext-password ****************
}
level admin
}
}
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
offload {
hwnat disable
ipv4 {
forwarding enable
pppoe enable
vlan enable
}
ipv6 {
forwarding enable
pppoe enable
}
}
package {
repository wheezy {
components "main contrib non-free"
distribution wheezy
password ****************
url http://ftp.uk.debian.org/debian
username ""
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone Europe/London
traffic-analysis {
dpi enable
export enable
}
}
vpn {
ipsec {
auto-firewall-nat-exclude disable
ipsec-interfaces {
interface pppoe0
interface eth0
}
nat-networks {
allowed-network 10.0.0.0/8 {
}
allowed-network 172.16.0.0/16 {
}
allowed-network 192.168.0.0/16 {
}
}
nat-traversal enable
}
l2tp {
remote-access {
authentication {
local-users {
username ***************** {
password ****************
}
}
mode local
}
client-ip-pool {
start 172.16.1.100
stop 172.16.1.110
}
dns-servers {
server-1 8.8.8.8
server-2 8.8.4.4
}
ipsec-settings {
authentication {
mode pre-shared-secret
pre-shared-secret ****************
}
ike-lifetime 3600
}
mtu 1492
outside-address ************
outside-nexthop 0.0.0.0
}
}
}
Any help/pointers would be greatly appreciated.
Thanks
Paul