New Member
Posts: 3
Registered: ‎10-13-2016
Accepted Solution

DUAL WAN FAILOVER ERX {FIRMWARE BUGGY??}

I've searched through discussion boards and visted every support forum with little to no success, this just happens to be my final attempt to get this working. I currently have dual wan failover configured with static ip addresses on eth1 and eth2 with static routes configured, but it seems that whenever I make the connection on eth2 I lose access to the internet and have to disable the stsic route on eth2 to resolve it. After that I noticed there are two different routes that were not configured. Can anyone shed some light on the this?

 

 

 

 

SV-Admin@cfi:~$ show configuration all
firewall {
    all-ping enable
    broadcast-ping disable
    group {
        network-group PRIVATE_NETS {
            network 192.168.0.0/16
            network 172.16.0.0/12
            network 10.0.0.0/8
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    modify balance {
        rule 1 {
            action modify
            description "do NOT load balance lan to lan"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            modify {
                table main
            }
        }
        rule 3 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth1
                }
            }
            modify {
                table main
            }
        }
        rule 4 {
            action modify
            description "do NOT load balance destination public address"
            destination {
                group {
                    address-group ADDRv4_eth2
                }
            }
            modify {
                table main
            }
        }
        rule 7 {
            action modify
            modify {
                lb-group LAN_NETWORKS
            }
        }
    }
    name CORPORATE_IN {
        default-action accept
        rule 10 {
            action accept
            description "Accept Corporate to Corporate"
            destination {
                group {
                    address-group NETv4_eth0.2
                }
            }
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop corporate to other LANs"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            log disable
            protocol all
        }
    }
    name CORPORATE_LOCAL {
        default-action drop
        rule 1 {
            action accept
            description "DHCP Server"
            destination {
                port 67
            }
            log disable
            protocol udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 2 {
            action accept
            description "Allow corporate DNS"
            destination {
                address 192.168.1.1
                port 53
            }
            log disable
            protocol tcp_udp
        }
    }
    name GUEST_IN {
        default-action accept
        rule 1 {
            action drop
            description "Drop guests to other LANs"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            log disable
            protocol all
        }
    }
    name GUEST_LOCAL {
        default-action drop
        rule 1 {
            action accept
            description DHCP
            destination {
                port 67
            }
            log disable
            protocol udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 2 {
            action accept
            description "Allow guests DNS"
            destination {
                address 192.168.1.1
                port 53
            }
            log disable
            protocol tcp_udp
        }
        rule 3 {
            action drop
            description "Drop guests to other LANs"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            log disable
            protocol all
        }
    }
    name VIDEO_IN {
        default-action accept
        rule 1 {
            action drop
            description "Drop video to other LANs"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            log disable
            protocol all
        }
    }
    name VIDEO_LOCAL {
        default-action drop
        rule 1 {
            action accept
            description DHCP
            destination {
                port 67
            }
            log disable
            protocol udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 2 {
            action accept
            description "Allow video DNS"
            destination {
                address 192.168.1.1
                port 53
            }
            log disable
            protocol tcp_udp
        }
    }
    name VOIP_IN {
        default-action accept
        rule 1 {
            action drop
            description "Drop voip to other LANs"
            destination {
                group {
                    network-group PRIVATE_NETS
                }
            }
            log disable
            protocol all
        }
    }
    name VOIP_LOCAL {
        default-action drop
        rule 1 {
            action accept
            description DHCP
            destination {
                port 67
            }
            log disable
            protocol udp
            state {
                established enable
                invalid disable
                new enable
                related enable
            }
        }
        rule 2 {
            action accept
            description "Allow voip DNS"
            destination {
                address 192.168.1.1
                port 53
            }
            log disable
            protocol tcp_udp
        }
    }
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description Remote_to_Applianz
            destination {
                address 192.168.2.3
                port 30000-30060
            }
            log disable
            protocol tcp
        }
        rule 30 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 1 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 2 {
            action drop
            description "Drop invalid state"
            log disable
            state {
                invalid enable
            }
        }
        rule 3 {
            action accept
            description IKE
            destination {
                port 500
            }
            log disable
            protocol udp
        }
        rule 4 {
            action accept
            description ESP
            log disable
            protocol esp
        }
        rule 5 {
            action accept
            description NAT-T
            destination {
                port 4500
            }
            log disable
            protocol udp
        }
        rule 6 {
            action accept
            description L2TP
            destination {
                port 1701
            }
            ipsec {
                match-ipsec
            }
            log disable
            protocol udp
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 192.168.1.1/24
        description Management
        duplex auto
        mtu 1500
        speed auto
        vif 2 {
            address 192.168.2.1/24
            description Corporate
            firewall {
                in {
                    name CORPORATE_IN
                }
                local {
                    name CORPORATE_LOCAL
                }
            }
            mtu 1500
        }
        vif 3 {
            address 192.168.3.1/24
            description Guest
            firewall {
                in {
                    name GUEST_IN
                }
                local {
                    name GUEST_LOCAL
                }
            }
            mtu 1500
        }
        vif 4 {
            address 192.168.4.1/24
            description VOIP
            firewall {
                in {
                    name VIDEO_IN
                }
                local {
                    name VIDEO_LOCAL
                }
            }
            mtu 1500
        }
        vif 5 {
            address 192.168.5.1/24
            description Video
            firewall {
                in {
                    name VOIP_IN
                }
                local {
                    name VOIP_LOCAL
                }
            }
            mtu 1500
        }
    }
    ethernet eth1 {
        address xxx.xxx.xxx.xxx/xx
        description WAN_MAIN
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        mtu 1500
        speed auto
    }
    ethernet eth2 {
        address xxx.xxx.xxx.xxx/xx
        description WAN_BACKUP
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        mtu 1500
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        mtu 1500
    }
}
load-balance {
    group WAN_FAILOVER {
        interface eth1 {
            route-test {
                count {
                    failure 3
                    success 3
                }
                initial-delay 10
                interval 5
                type {
                    ping {
                        target 8.8.8.8
                    }
                }
            }
        }
        interface eth2 {
            failover-only
        }
        lb-local disable
    }
}
protocols {
    static {
        route 0.0.0.0/0 {
            next-hop xxx.xxx.xxx.xxx {
                description "ISP [ Smartnet ]"
                disable
            }
            next-hop xxx.xxx.xxx.xxx {
                description "ISP [ Surge Broadband ]"
            }
        }
    }
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name Corporate {
            authoritative disable
            subnet 192.168.2.0/24 {
                default-router 192.168.2.1
                dns-server 192.168.1.1
                lease 28800
                start 192.168.2.96 {
                    stop 192.168.2.146
                }
                static-mapping Annette_PC {
                    ip-address 192.168.2.18
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping Applianz {
                    ip-address 192.168.2.3
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping BROTHER_MFC_L2740DW {
                    ip-address 192.168.2.65
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping BROTHER_MFC_L5850DW {
                    ip-address 192.168.2.66
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping BROTHER_MFC_L8900CDW {
                    ip-address 192.168.2.67
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping CC-MACHINE {
                    ip-address 192.168.2.78
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping Howard_PC {
                    ip-address 192.168.2.17
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping Joe_PC {
                    ip-address 192.168.2.19
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping WorkStation_1 {
                    ip-address 192.168.2.20
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping WorkStation_3 {
                    ip-address 192.168.2.21
                    mac-address xx:xx:xx:xx:xx:xx
                }
                static-mapping WorkStation_4 {
                    ip-address 192.168.2.22
                    mac-address xx:xx:xx:xx:xx:xx
                }
                unifi-controller 192.168.1.3
            }
        }
        shared-network-name Guest {
            authoritative disable
            subnet 192.168.3.0/24 {
                default-router 192.168.3.1
                dns-server 192.168.1.1
                lease 1800
                start 192.168.3.101 {
                    stop 192.168.3.130
                }
                unifi-controller 192.168.1.3
            }
        }
        shared-network-name VOIP {
            authoritative disable
            disable
            subnet 192.168.4.0/24 {
                default-router 192.168.4.1
                dns-server 192.168.1.1
                lease 86400
                unifi-controller 192.168.1.3
            }
        }
        shared-network-name Video {
            authoritative disable
            disable
            subnet 192.168.5.0/24 {
                default-router 192.168.5.1
                dns-server 192.168.1.1
                lease 86400
                unifi-controller 192.168.1.3
            }
        }
        use-dnsmasq disable
    }
    dns {
        forwarding {
            cache-size 500
            listen-on eth0.2
            listen-on eth0.3
            listen-on eth0.4
            listen-on eth0.5
            name-server 8.8.8.8
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 1 {
            description Remote_to_Applianz
            destination {
                address xxx.xxx.xxx.xxx
                port 30000-30060
            }
            inbound-interface eth1
            inside-address {
                address 192.168.2.3
                port 30000-30060
            }
            log disable
            protocol tcp
            type destination
        }
        rule 2 {
            description Remote_to_Applianz_2
            destination {
                address xxx.xxx.xxx.xxx
                port 30000-30060
            }
            inbound-interface eth2
            inside-address {
                address 192.168.2.3
                port 30000-30060
            }
            log disable
            protocol tcp
            type destination
        }
        rule 5002 {
            description "masquerade for WAN"
            outbound-interface eth1
            type masquerade
        }
        rule 5004 {
            description "masquerade for WAN 2"
            outbound-interface eth2
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    conntrack {
        expect-table-size 4096
        hash-size 4096
        table-size 32768
        tcp {
            half-open-connections 512
            loose enable
            max-retrans 3
        }
    }
    host-name cfi.east.r1
    login {
        user SV-Admin {
            authentication {
                encrypted-password ****************
                plaintext-password ****************
            }
            full-name "xxx"
            level admin
        }
    }
    name-server 8.8.8.8
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/St_Thomas
    traffic-analysis {
        dpi enable
        export enable
    }
}
vpn {
    ipsec {
        auto-firewall-nat-exclude disable
        ipsec-interfaces {
            interface eth1
            interface eth2
        }
    }
    l2tp {
        remote-access {
            authentication {
                local-users {
                    username xxxxxxxx {
                        password ****************
                    }
                    username xxxxxx {
                        password ****************
                        static-ip 192.168.1.13
                    }
                    username xxxxxxxxxx {
                        password ****************
                        static-ip 192.168.1.14
                    }
                }
                mode local
                require mschap-v2
            }
            client-ip-pool {
                start 192.168.2.49
                stop 192.168.2.62
            }
            dns-servers {
                server-1 8.8.8.8
                server-2 8.8.4.4
            }
            ipsec-settings {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret ****************
                }
                ike-lifetime 3600
            }
            outside-address 0.0.0.0
        }
    }
}
SV-Admin@cfi:~$:::


Accepted Solutions
Veteran Member
Posts: 4,128
Registered: ‎05-15-2014
Kudos: 1548
Solutions: 282

Re: DUAL WAN FAILOVER ERX {FIRMWARE BUGGY??}

[ Edited ]

{FIRMWARE not BUGGY - USER ERROR}

 

You don't have modify (load balance) applied to any of your LAN subnets. Review the HOW-TO especially where you apply the modify rule in the interfaces section.

In your config you probably want to add following:

set interfaces ethernet eth0 firewall in modify balance
set interfaces ethernet eth0 vif 2 firewall in modify balance
set interfaces ethernet eth0 vif 3 firewall in modify balance
set interfaces ethernet eth0 vif 4 firewall in modify balance
set interfaces ethernet eth0 vif 5 firewall in modify balance

 

View solution in original post


All Replies
Veteran Member
Posts: 4,128
Registered: ‎05-15-2014
Kudos: 1548
Solutions: 282

Re: DUAL WAN FAILOVER ERX {FIRMWARE BUGGY??}

[ Edited ]

{FIRMWARE not BUGGY - USER ERROR}

 

You don't have modify (load balance) applied to any of your LAN subnets. Review the HOW-TO especially where you apply the modify rule in the interfaces section.

In your config you probably want to add following:

set interfaces ethernet eth0 firewall in modify balance
set interfaces ethernet eth0 vif 2 firewall in modify balance
set interfaces ethernet eth0 vif 3 firewall in modify balance
set interfaces ethernet eth0 vif 4 firewall in modify balance
set interfaces ethernet eth0 vif 5 firewall in modify balance

 

Highlighted
New Member
Posts: 3
Registered: ‎10-13-2016

Re: DUAL WAN FAILOVER ERX {FIRMWARE BUGGY??}

It is always good to get a fresh pair of eyes, I've looked at this for days and did not realize what was missing. BranoB thank you for your assistance.