Hi all
I just bought an EdgeRouter Lite to replace my CISCO RV320 router which was starting to fail on me and I have managed to get most things working the way I want by following some of the suggestions on this forum. I must say that I did think that the router was more "plug and play" than it actually is, so forgive me for being a total idiot in terms of understanding the CLI!!
My setup is that I have a primary fiber connection setup on eth0 which is a pppoe connection and a backup ADSL connection on eth1 which I have setup with a static IP to the Linksys router in front of it. eth2 is the LAN and I have three additional VLANs setup on this.
Everything is working pretty well when either of the two WAN ports are connected individually. However, when I connect both WAN interfaces at the same time, I loose all internet connectivity. I am sure it has something to do with the "protocols" section of the configuration, but I don't really understand enough about the machanics of this function to sort it out. I attach my configuration file and would really appreciate any help you can give me.
Many thanks
firewall { all-ping enable broadcast-ping disable group { network-group PRIVATE_NETS { network 192.168.0.0/16 network 172.16.0.0/12 network 10.0.0.0/8 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians disable modify balance { rule 10 { action modify description "do NOT load balance lan to lan" destination { group { network-group PRIVATE_NETS } } modify { table main } } rule 20 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_pppoe0 } } modify { table main } } rule 30 { action modify description "do NOT load balance destination public address" destination { group { address-group ADDRv4_eth1 } } modify { table main } } rule 40 { action modify modify { lb-group G } } } name WAN_IN { default-action drop description "WAN to internal" rule 1 { action accept description "Allow established/related" state { established enable related enable } } rule 15 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 1 { action accept description "Allow established/related" state { established enable related enable } } rule 2 { action accept description "Allow PPTP Port 1723" destination { port 1723 } log disable protocol tcp } rule 3 { action accept description "Allow PPTP GRE" log disable protocol gre } rule 4 { action drop description "Drop invalid state" state { invalid enable } } } options { mss-clamp { mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { description "Internet - WAN" dhcp-options { default-route update default-route-distance 210 name-server no-update } duplex auto pppoe 0 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server auto password xxxxxxxxxx user-id xxxxxxxxxx } speed auto } ethernet eth1 { address 192.168.0.2/24 description "Internet - WAN 2" dhcp-options { default-route update default-route-distance 210 name-server no-update } duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth2 { address 192.168.1.1/24 description "Management LAN" duplex auto firewall { in { modify balance } } speed auto vif 10 { address 10.0.10.1/24 description "LAN VLAN" } vif 20 { address 10.0.20.1/24 description "Surveillance VLAN" } vif 50 { address 10.0.50.1/24 description "Guest VLAN" mtu 1500 } } loopback lo { } } load-balance { group G { interface eth1 { failover-only } interface pppoe0 { } } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth2 rule 1 { description HTTP forward-to { address 10.0.10.201 port 80 } original-port 80 protocol tcp } rule 2 { description HTTPS forward-to { address 10.0.10.201 port 443 } original-port 443 protocol tcp } rule 3 { description RDP forward-to { address 10.0.10.201 port 2200 } original-port 3389 protocol tcp } rule 4 { description SMTP forward-to { address 10.0.10.240 port 25 } original-port 25 protocol tcp } rule 5 { description "SMTP TLS" forward-to { address 10.0.10.240 port 587 } original-port 587 protocol tcp } rule 6 { description IMAP forward-to { address 10.0.10.240 port 143 } original-port 143 protocol tcp } wan-interface pppoe0 } protocols { static { interface-route 0.0.0.0/0 { next-hop-interface pppoe0 { } } route 0.0.0.0/0 { next-hop 192.168.0.1 { } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.100 { stop 192.168.1.149 } } } shared-network-name VLAN10 { authoritative disable subnet 10.0.10.0/24 { default-router 10.0.10.1 dns-server 10.0.10.1 lease 86400 start 10.0.10.100 { stop 10.0.10.149 } } } shared-network-name VLAN20 { authoritative disable subnet 10.0.20.0/24 { default-router 10.0.20.1 dns-server 10.0.10.1 lease 86400 start 10.0.20.100 { stop 10.0.20.149 } } } shared-network-name VLAN50 { authoritative disable subnet 10.0.50.0/24 { default-router 10.0.50.1 dns-server 8.8.8.8 dns-server 8.8.4.4 lease 86400 start 10.0.50.100 { stop 10.0.50.149 } } } } dns { forwarding { cache-size 150 listen-on eth2 listen-on eth2.10 listen-on eth2.20 listen-on eth2.50 } } gui { https-port 443 } nat { rule 5000 { description "masquerade for WAN" log disable outbound-interface pppoe0 protocol all type masquerade } rule 5002 { description "masquerade for WAN 2" outbound-interface eth1 type masquerade } } snmp { community public { authorization ro } } ssh { port 22 protocol-version v2 } } system { conntrack { expect-table-size 4096 hash-size 4096 table-size 32768 tcp { half-open-connections 512 loose enable max-retrans 3 } } host-name ubnt login { user ubnt { authentication { encrypted-password xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx } level admin } } name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { ipv4 { forwarding enable pppoe enable } } syslog { global { facility all { level notice } facility protocols { level debug } } host 10.0.10.240 { facility all { level err } } } time-zone Asia/Bangkok } vpn { pptp { remote-access { authentication { local-users { username xxxxxxxxxx { password xxxxxxxxxx } } mode local } client-ip-pool { start 10.0.10.150 stop 10.0.10.159 } dns-servers { server-1 8.8.8.8 server-2 8.8.4.4 } mtu 1492 } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.0.4853089.160219.1607 */