Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

ERL 1.8.5 DHCP PPPoE over GPON not receiving DNS servers

$
0
0

Hi,

 

 

As mentioned in subject, I have a PPPoE connection over GPON, and it is not getting the DNS servers, even though it received the IP just fine.

 

Config:

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name LAN_IN {
        default-action accept
        description "LAN to internal"
        rule 10 {
            action reject-tcp
            application {
                category P2P
            }
            description "Send TCP RST for P2P"
            protocol tcp
        }
        rule 20 {
            action reject
            application {
                category P2P
            }
            description "Send ICMP unreachable for P2P"
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 1 {
            action reject-tcp
            application {
                category TopSites-Adult
            }
            description "Reject adult websites"
            protocol tcp
        }
        rule 2 {
            action reject-tcp
            application {
                category P2P
            }
            description "Reject P2P"
            protocol tcp
        }
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "Allow icmp"
            log disable
            protocol icmp
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
        rule 30 {
            action accept
            description "Allow WAN access"
            destination {
                port 443
            }
            log disable
            protocol tcp
        }
        rule 40 {
            action accept
            description "Allow icmp"
            protocol icmp
        }
    }
    name WAN_OUT {
        default-action accept
        description "internal to WAN"
        rule 10 {
            action reject-tcp
            application {
                category P2P
            }
            description "Send TCP RST for P2P"
            protocol tcp
        }
        rule 20 {
            action reject
            application {
                category P2P
            }
            description "Send ICMP unreachable for P2P"
            log disable
        }
    }
    options {
        mss-clamp {
            interface-type all
            mss 1412
        }
        mss-clamp6 {
            interface-type all
            mss 1412
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.171.1/24
        description "LAN 1"
        duplex auto
        firewall {
            in {
                name LAN_IN
            }
        }
        speed auto
    }
    ethernet eth1 {
        address 192.168.172.1/24
        description "LAN 2"
        duplex auto
        firewall {
            in {
                name LAN_IN
            }
        }
        speed auto
    }
    ethernet eth2 {
        description Internet
        duplex auto
        pppoe 0 {
            default-route auto
            firewall {
                in {
                    name WAN_IN
                }
                local {
                    name WAN_LOCAL
                }
                out {
                    name WAN_OUT
                }
            }
            mtu 1492
            name-server auto
            password ******
            user-id ******@******.com.sg
        }
        speed auto
    }
    loopback lo {
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth0
    lan-interface eth1
    rule 1 {
        description UniFi
        forward-to {
            address 192.168.171.3
            port 8443
        }
        original-port 18443
        protocol tcp
    }
    rule 2 {
        description "Cloud Key"
        forward-to {
            address 192.168.171.3
            port 443
        }
        original-port ****
        protocol tcp
    }
    rule 3 {
        description "Managed Switch"
        forward-to {
            address 192.168.171.2
            port 80
        }
        original-port ****
        protocol tcp
    }
    rule 4 {
        description Xerox
        forward-to {
            address 192.168.171.10
            port 80
        }
        original-port ****
        protocol tcp
    }
    rule 5 {
        description CCTV
        forward-to {
            address 192.168.171.20
            port 80
        }
        original-port ****
        protocol tcp_udp
    }
    rule 6 {
        description CCTV2
        forward-to {
            address 192.168.171.20
            port ****
        }
        original-port ****
        protocol tcp_udp
    }
    wan-interface pppoe0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN1 {
            authoritative enable
            subnet 192.168.171.0/24 {
                default-router 192.168.171.1
                dns-server 192.168.171.1
                dns-server 8.8.8.8
                lease 86400
                start 192.168.171.50 {
                    stop 192.168.171.199
                }
                unifi-controller 192.168.171.3
            }
        }
        shared-network-name LAN2 {
            authoritative enable
            subnet 192.168.172.0/24 {
                default-router 192.168.172.1
                dns-server 192.168.172.1
                dns-server 8.8.8.8
                lease 86400
                start 192.168.172.50 {
                    stop 192.168.172.199
                }
                unifi-controller 192.168.171.3
            }
        }
    }
    dns {
        dynamic {
            interface pppoe0 {
                service dyndns {
                    host-name ****.dyndns.org
                    login ****
                    password ****
                }
            }
        }
        forwarding {
            cache-size 150
            listen-on eth0
            listen-on eth1
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            log disable
            outbound-interface pppoe0
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name ****
    login {
        user **** {
            authentication {
                encrypted-password ****
            }
            level admin
        }
    }
    name-server 203.116.0.36
    name-server 203.116.1.78
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat disable
        ipv4 {
            forwarding enable
            pppoe enable
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone Asia/Singapore
    traffic-analysis {
        dpi enable
        export enable
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1057 */

Running "show log all" gets this:

 

Jun 18 23:37:16 ****** pppd[1724]: pppd 2.4.4 started by root, uid 0
Jun 18 23:37:16 ****** pppd[1724]: Connected to 2c:54:**:**:**:** via interface eth2
Jun 18 23:37:16 ****** pppd[1724]: Connect: ppp0 <--> eth2
Jun 18 23:37:16 ****** pppd[1724]: PAP authentication succeeded
Jun 18 23:37:16 ****** pppd[1724]: peer from calling number 2C:54:**:**:**:** authorized
Jun 18 23:37:16 ****** pppd[1724]: Unsupported protocol 'IPv6 Control Protovol' (0x8057) received
Jun 18 23:37:16 ****** pppd[1724]: local  IP address 122.*.*.*
Jun 18 23:37:16 ****** pppd[1724]: remote IP address 27.*.*.*

 

And /var/log/vyatta/ppp_pppoe0.log gets me this:

 

Sun Jun 19 01:20:20 SGT 2016: Starting PPP daemon for pppoe0
Connected to 2c:54:**:**:**:** via interface eth2
using channel 2
Starting negotiation on eth2
ioctl(SIOCSIFMTU): No such device
sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x25696421> <mrru 1492> <endpoint [MAC:04:18:**:**:**:**]>]
rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0x58b724c3>]
lcp_reqci: returning CONFACK.
sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0x58b724c3>]
rcvd [LCP ConfRej id=0x1 <mrru 1492>]
sent [LCP ConfReq id=0x2 <mru 1492> <magic 0x25696421> <endpoint [MAC:04:18:**:**:**:**]>]
rcvd [LCP ConfAck id=0x2 <mru 1492> <magic 0x25696421> <endpoint [MAC:04:18:**:**:**:**]>]
ioctl(SIOCSIFMTU): No such device
Couldn't get PPP statistics: No such device
sent [LCP EchoReq id=0x0 magic=0x25696421]
sent [PAP AuthReq id=0x1 user="****@****.com.sg" password=<hidden>]
rcvd [LCP EchoRep id=0x0 magic=0x58b724c3]
rcvd [PAP AuthAck id=0x1 ""]
PAP authentication succeeded
peer from calling number 2C:54:**:**:**:** authorized
Using interface ppp0
sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns3 0.0.0.0>]
rcvd [IPCP ConfReq id=0x1 <addr 27.*.*.*>]
ipcp: returning Configure-ACK
sent [IPCP ConfAck id=0x1 <addr 27.*.*.*>]
rcvd [IPV6CP ConfReq id=0x1 <addr fe80::2e54:2dff:fe8c:4000>]
Unsupported protocol 'IPv6 Control Protovol' (0x8057) received
sent [LCP ProtRej id=0x3 80 57 01 01 00 0e 01 0a 2e 54 2d ff fe 8c 40 00]
rcvd [IPCP ConfRej id=0x1 <ms-dns1 0.0.0.0> <ms-dns3 0.0.0.0>]
sent [IPCP ConfReq id=0x2 <addr 0.0.0.0>]
rcvd [IPCP ConfNak id=0x2 <addr 203.*.*.*>]
sent [IPCP ConfReq id=0x3 <addr 203.*.*.*>]
rcvd [IPCP ConfAck id=0x3 <addr 203.*.*.*>]
ipcp: up
Script /etc/ppp/ip-pre-up started (pid 7926)
Script /etc/ppp/ip-pre-up finished (pid 7926), status = 0x0
local  IP address 203.117.121.107
remote IP address 27.54.54.0
Script /etc/ppp/ip-up started (pid 7977)
Script /etc/ppp/ip-up finished (pid 7977), status = 0x0

 

For now, I had to set a static DNS system wide for it to work.

 

When using a vanilla DLink DIR-868L I can receive the DNS server IPs with no issues. Is there some compatibility flags or something that I might have missed?

 

Any ideas?


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>