Hi.
I'm a newbie here and just a starter in network management.
I have 5 servers which have 12 public IPs in IDC and on top of it sits a switch from IDC.
I bought ER-8 for securing access to IMPI and future ESXi management and internal connection between servers.
I asked IDC to make some ports of switch for VLAN10.
I configured ER-8 routing as the following and connected eth7.10 to switch.
eth0 ---- WAN
eth1 ---- 10.0.1.1/24
" "
eth5 ---- 10.0.5.1/24
eth7.10 ---- 10.0.0.1/24
I have two problems.
1.
I made a VLAN adapter on Windows server and I could reach eth7.10 of ER-8 directly.
But I could not access ER-8 when the VLAN10 ports of switch were between server and eth7.10.
2.
Eth4 (10.0.4.0/24) is connected to a server of which IP is 10.0.4.10.
2222 port is asigned for SSH and I can reach the server with public IP.
But I cannot reach the server through ER-8 though port forwarding to 10.0.4.10:2222 is done.
From the server the ping to 10.0.4.1 was successful.
I will accept any suggestions and will be grateful.
Thank you so much.
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action accept description "ESXi 1 management" destination { port 1622 } log disable protocol tcp } rule 22 { action accept description "ESXi 1 management" destination { address 10.0.1.10 port 902 } log disable protocol tcp } rule 23 { action accept description "ESXi 2 management" destination { address 10.0.2.10 port 443 } log disable protocol tcp } rule 24 { action accept description "ESXi 2 management" destination { address 10.0.2.10 port 902 } log disable protocol tcp } rule 25 { action accept description "ESXi 3 management" destination { address 10.0.3.10 port 443 } log disable protocol tcp } rule 26 { action accept description "ESXi 3 management" destination { address 10.0.3.10 port 902 } log disable protocol tcp } rule 27 { action accept description "ESXi 4 management" destination { address 10.0.4.10 port 443 } log disable protocol tcp } rule 28 { action accept description "ESXi 4 management" destination { address 10.0.4.10 port 902 } log disable protocol tcp } rule 29 { action accept description "ESXi 5 management" destination { address 10.0.5.10 port 443 } log disable protocol tcp } rule 30 { action accept description "ESXi 5 management" destination { address 10.0.5.10 port 902 } log disable protocol tcp } } name WAN_LOCAL { default-action drop description "WAN to router" rule 1 { action accept description "Allow established/related" state { established enable related enable } } rule 2 { action drop description "Drop invalid state" state { invalid enable } } rule 3 { action accept description "Inbound SSH " destination { port 2222 } log disable protocol tcp } rule 4 { action accept description "Inbound traffic to EdgeMax" destination { port 8443 } log disable protocol tcp_udp } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 183.111.115.170/28 description Internet duplex auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } speed auto } ethernet eth1 { address 10.0.1.1/24 description "ESXi 1" duplex auto speed auto } ethernet eth2 { address 10.0.2.1/24 description "ESXi 2" duplex auto speed auto } ethernet eth3 { address 10.0.3.1/24 description "ESXi 3" duplex auto speed auto } ethernet eth4 { address 10.0.4.1/24 description "ESXi 4" duplex auto speed auto } ethernet eth5 { address 10.0.5.1/24 description "ESXi 5" duplex auto speed auto } ethernet eth6 { duplex auto speed auto } ethernet eth7 { duplex auto speed auto vif 10 { address 10.0.0.1/24 description VLAN10 } } loopback lo { } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth7.10 rule 1 { description "" forward-to { address 10.0.4.10 port 2222 } original-port 1622 protocol tcp_udp } wan-interface eth0 } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN1 { authoritative disable subnet 10.0.1.0/24 { default-router 10.0.1.1 dns-server 10.0.1.1 lease 86400 start 10.0.1.100 { stop 10.0.1.199 } } } shared-network-name LAN2 { authoritative disable subnet 10.0.2.0/24 { default-router 10.0.2.1 dns-server 10.0.2.1 lease 86400 start 10.0.2.100 { stop 10.0.2.199 } } } shared-network-name LAN3 { authoritative disable subnet 10.0.3.0/24 { default-router 10.0.3.1 dns-server 10.0.3.1 lease 86400 start 10.0.3.100 { stop 10.0.3.199 } } } shared-network-name LAN4 { authoritative disable subnet 10.0.4.0/24 { default-router 10.0.4.1 dns-server 10.0.4.1 lease 86400 start 10.0.4.100 { stop 10.0.4.199 } } } shared-network-name LAN5 { authoritative disable subnet 10.0.5.0/24 { default-router 10.0.5.1 dns-server 10.0.5.1 lease 86400 start 10.0.5.100 { stop 10.0.5.199 } } } shared-network-name VLAN10 { authoritative disable subnet 10.0.0.0/24 { default-router 10.0.0.1 dns-server 168.126.63.1 lease 86400 start 10.0.0.100 { stop 10.0.0.199 } } } } dns { forwarding { cache-size 150 listen-on eth7.10 listen-on eth1 listen-on eth2 listen-on eth3 listen-on eth4 listen-on eth5 } } gui { https-port 8443 } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } ssh { port 2222 protocol-version v2 } } system { domain-name *******.*** gateway-address ***.***.***.*** host-name router login { user ******* { authentication { encrypted-password $6$XlUkziqsKjv$iknFZooqwa4ax15jUNPpoYc.tOa9n0BN/OZV5SZzo5DqXT7YirtO7vzeisFjeFBPOdew8oPexZ4a2pjkh9rA3. } full-name "" level admin } } name-server 168.126.63.1 name-server 8.8.8.8 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Asia/Seoul } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.0.4853089.160219.1614 */