Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

cannot reach LAN through WAN

$
0
0

Hi.

I'm a newbie here and just a starter in network management.

I have 5 servers which have 12 public IPs in IDC and on top of it sits a switch from IDC.

I bought ER-8 for securing access to IMPI and future ESXi management and internal connection between servers.

 

I asked IDC to make some ports of switch for VLAN10.

I configured ER-8 routing as the following and connected eth7.10 to switch.

 

eth0 ---- WAN

eth1 ---- 10.0.1.1/24

  "                "

eth5 ---- 10.0.5.1/24

eth7.10  ---- 10.0.0.1/24

 

I have two problems.

 

1.

I made a VLAN adapter on Windows server and I could reach eth7.10 of ER-8 directly.

But I could not access ER-8 when the VLAN10 ports of switch were between server and eth7.10.

2.

Eth4 (10.0.4.0/24) is connected to a server of which IP is 10.0.4.10. 

2222 port is asigned for SSH and I can reach the server with public IP.

But I cannot reach the server through ER-8 though port forwarding to 10.0.4.10:2222 is done.

From the server the ping to 10.0.4.1 was successful.

 

I will accept any suggestions and will be grateful.

Thank you so much.

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 21 {
            action accept
            description "ESXi 1 management"
            destination {
                port 1622
            }
            log disable
            protocol tcp
        }
        rule 22 {
            action accept
            description "ESXi 1 management"
            destination {
                address 10.0.1.10
                port 902
            }
            log disable
            protocol tcp
        }
        rule 23 {
            action accept
            description "ESXi 2 management"
            destination {
                address 10.0.2.10
                port 443
            }
            log disable
            protocol tcp
        }
        rule 24 {
            action accept
            description "ESXi 2 management"
            destination {
                address 10.0.2.10
                port 902
            }
            log disable
            protocol tcp
        }
        rule 25 {
            action accept
            description "ESXi 3 management"
            destination {
                address 10.0.3.10
                port 443
            }
            log disable
            protocol tcp
        }
        rule 26 {
            action accept
            description "ESXi 3 management"
            destination {
                address 10.0.3.10
                port 902
            }
            log disable
            protocol tcp
        }
        rule 27 {
            action accept
            description "ESXi 4 management"
            destination {
                address 10.0.4.10
                port 443
            }
            log disable
            protocol tcp
        }
        rule 28 {
            action accept
            description "ESXi 4 management"
            destination {
                address 10.0.4.10
                port 902
            }
            log disable
            protocol tcp
        }
        rule 29 {
            action accept
            description "ESXi 5 management"
            destination {
                address 10.0.5.10
                port 443
            }
            log disable
            protocol tcp
        }
        rule 30 {
            action accept
            description "ESXi 5 management"
            destination {
                address 10.0.5.10
                port 902
            }
            log disable
            protocol tcp
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 1 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 3 {
            action accept
            description "Inbound SSH "
            destination {
                port 2222
            }
            log disable
            protocol tcp
        }
        rule 4 {
            action accept
            description "Inbound traffic to EdgeMax"
            destination {
                port 8443
            }
            log disable
            protocol tcp_udp
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 183.111.115.170/28
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        speed auto
    }
    ethernet eth1 {
        address 10.0.1.1/24
        description "ESXi 1"
        duplex auto
        speed auto
    }
    ethernet eth2 {
        address 10.0.2.1/24
        description "ESXi 2"
        duplex auto
        speed auto
    }
    ethernet eth3 {
        address 10.0.3.1/24
        description "ESXi 3"
        duplex auto
        speed auto
    }
    ethernet eth4 {
        address 10.0.4.1/24
        description "ESXi 4"
        duplex auto
        speed auto
    }
    ethernet eth5 {
        address 10.0.5.1/24
        description "ESXi 5"
        duplex auto
        speed auto
    }
    ethernet eth6 {
        duplex auto
        speed auto
    }
    ethernet eth7 {
        duplex auto
        speed auto
        vif 10 {
            address 10.0.0.1/24
            description VLAN10
        }
    }
    loopback lo {
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth7.10
    rule 1 {
        description ""
        forward-to {
            address 10.0.4.10
            port 2222
        }
        original-port 1622
        protocol tcp_udp
    }
    wan-interface eth0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN1 {
            authoritative disable
            subnet 10.0.1.0/24 {
                default-router 10.0.1.1
                dns-server 10.0.1.1
                lease 86400
                start 10.0.1.100 {
                    stop 10.0.1.199
                }
            }
        }
        shared-network-name LAN2 {
            authoritative disable
            subnet 10.0.2.0/24 {
                default-router 10.0.2.1
                dns-server 10.0.2.1
                lease 86400
                start 10.0.2.100 {
                    stop 10.0.2.199
                }
            }
        }
        shared-network-name LAN3 {
            authoritative disable
            subnet 10.0.3.0/24 {
                default-router 10.0.3.1
                dns-server 10.0.3.1
                lease 86400
                start 10.0.3.100 {
                    stop 10.0.3.199
                }
            }
        }
        shared-network-name LAN4 {
            authoritative disable
            subnet 10.0.4.0/24 {
                default-router 10.0.4.1
                dns-server 10.0.4.1
                lease 86400
                start 10.0.4.100 {
                    stop 10.0.4.199
                }
            }
        }
        shared-network-name LAN5 {
            authoritative disable
            subnet 10.0.5.0/24 {
                default-router 10.0.5.1
                dns-server 10.0.5.1
                lease 86400
                start 10.0.5.100 {
                    stop 10.0.5.199
                }
            }
        }
        shared-network-name VLAN10 {
            authoritative disable
            subnet 10.0.0.0/24 {
                default-router 10.0.0.1
                dns-server 168.126.63.1
                lease 86400
                start 10.0.0.100 {
                    stop 10.0.0.199
                }
            }
        }
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth7.10
            listen-on eth1
            listen-on eth2
            listen-on eth3
            listen-on eth4
            listen-on eth5
        }
    }
    gui {
        https-port 8443
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth0
            type masquerade
        }
    }
    ssh {
        port 2222
        protocol-version v2
    }
}
system {
    domain-name *******.***
    gateway-address ***.***.***.***
    host-name router
    login {
        user ******* {
            authentication {
                encrypted-password $6$XlUkziqsKjv$iknFZooqwa4ax15jUNPpoYc.tOa9n0BN/OZV5SZzo5DqXT7YirtO7vzeisFjeFBPOdew8oPexZ4a2pjkh9rA3.
            }
            full-name ""
            level admin
        }
    }
    name-server 168.126.63.1
    name-server 8.8.8.8
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Asia/Seoul
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.0.4853089.160219.1614 */ 

Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>