Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- firewall {
- all-ping enable
- broadcast-ping disable
- group {
- address-group A4_BoekhSrv {
- address **.**.97.114
- address 192.168.13.10
- }
- address-group A4_BoekhWin7 {
- address 192.168.13.19
- address **.**.97.114
- }
- address-group A4_ELTO17 {
- address 192.168.16.17
- }
- address-group A4_ELTO23 {
- address 192.168.16.23
- }
- address-group A4_Files {
- address 192.168.16.5
- address **.**.97.115
- }
- address-group A4_NAS110J {
- address 192.168.16.16
- }
- address-group A4_NAS409 {
- address 192.168.16.13
- }
- address-group A4_OVPN {
- address **.**.97.117
- address 192.168.16.9
- }
- address-group A4_OpenVPN {
- address **.**.97.118
- address 192.168.16.4
- }
- address-group A4_PSP {
- address **.**.97.116
- address 192.168.16.20
- }
- address-group A4_SBS {
- address 192.168.16.8
- }
- address-group A4_Webserver {
- address 192.168.2.2
- address **.**.97.113
- }
- address-group FTP_Allow {
- address 84.53.201.130
- address 212.103.203.242
- address 193.246.249.90
- address 80.63.86.162
- address 120.195.221.83
- address 218.206.113.151
- address 120.195.221.126
- address 221.130.59.135
- address 221.130.59.136
- address 221.130.59.137
- address 182.236.7.6
- address 180.131.111.244
- }
- ipv6-address-group A6_BoekhSrv {
- description "Boekhoud Server IPv6"
- ipv6-address **:**:**:13::10
- }
- ipv6-address-group A6_BoekhWin7 {
- description "Boekhoud Win7 IPv6"
- ipv6-address **:**:**:13::19
- }
- ipv6-address-group A6_ELTO17 {
- description "ELTO17 IPv6"
- ipv6-address **:**:**:1::17
- }
- ipv6-address-group A6_ELTO23 {
- description "ELTO23 IPv6"
- ipv6-address **:**:**:1::23
- }
- ipv6-address-group A6_Files {
- description "Files IPv6"
- ipv6-address **:**:**:1::5
- }
- ipv6-address-group A6_NAS110J {
- description "NAS110J IPv6"
- ipv6-address **:**:**:1::16
- }
- ipv6-address-group A6_NAS409 {
- description "NAS409 IPv6"
- ipv6-address **:**:**:1::13
- }
- ipv6-address-group A6_OVPN {
- description "OVPN IPv6"
- ipv6-address **:**:**:1::9
- }
- ipv6-address-group A6_OpenVPN {
- description "OpenVPN IPv6"
- ipv6-address **:**:**:1::4
- }
- ipv6-address-group A6_PSP {
- description "PSP IPv6"
- ipv6-address **:**:**:1::20
- }
- ipv6-address-group A6_SBS {
- description "SBS IPv6"
- ipv6-address **:**:**:1::8
- }
- ipv6-address-group A6_Webserver {
- description "Webserver IPv6"
- ipv6-address **:**:**:2::2
- }
- ipv6-network-group GASTv6 {
- }
- ipv6-network-group LAN2v6 {
- description "Visitors IPv6"
- ipv6-network **:**:**:2::0/64
- }
- ipv6-network-group LAN13v6 {
- description "Boekh IPv6"
- ipv6-network **:**:**:13::0/64
- }
- ipv6-network-group LAN16v6 {
- description "Main IPv6"
- ipv6-network **:**:**:1::0/64
- }
- ipv6-network-group MGNTv6 {
- description "Management IPv6"
- ipv6-network **:**:**:99::0/64
- }
- network-group BOGONS {
- description "Invalid WAN networks"
- network 100.64.0.0/10
- network 127.0.0.0/8
- network 169.254.0.0/16
- network 172.16.0.0/12
- network 192.0.0.0/24
- network 192.0.2.0/24
- network 192.168.0.0/16
- network 198.18.0.0/15
- network 198.51.100.0/24
- network 203.0.113.0/24
- network 224.0.0.0/3
- network 10.0.0.0/8
- }
- network-group GAST {
- network 192.168.5.0/24
- }
- network-group LAN2 {
- description Visitors
- network 192.168.2.0/24
- }
- network-group LAN13 {
- description Boekh
- network 192.168.13.0/24
- }
- network-group LAN16 {
- description Main
- network 192.168.16.0/24
- }
- network-group MGNT {
- description Management
- network 192.168.1.0/24
- }
- network-group PRIVATE_NETS {
- network 192.168.0.0/16
- network 172.16.0.0/12
- network 10.0.0.0/8
- }
- port-group P_BoekhSrv {
- port 80
- }
- port-group P_BoekhWin7 {
- port 3389
- }
- port-group P_ELTO17 {
- port 3389
- }
- port-group P_ELTO23 {
- port 3389
- }
- port-group P_Files {
- port 80
- port 443
- }
- port-group P_NAS110J {
- }
- port-group P_NAS409 {
- port 21
- port 55536-55567
- }
- port-group P_OpenVPN {
- port 443
- port 943
- port 1194
- }
- port-group P_PSP {
- port 80
- port 443
- }
- port-group P_SBS {
- port 25
- port 80
- port 443
- port 987
- port 287
- }
- port-group P_Webserver {
- port 80
- port 443
- }
- }
- ipv6-name GASTv6_IN {
- default-action drop
- rule 1 {
- action accept
- description "Allow established related"
- state {
- established enable
- new enable
- related enable
- }
- }
- rule 2 {
- action drop
- state {
- invalid enable
- }
- }
- rule 3 {
- action accept
- description Files
- destination {
- group {
- ipv6-address-group A6_Files
- port-group P_Files
- }
- }
- protocol tcp_udp
- }
- rule 4 {
- action drop
- description "Block LAN13"
- destination {
- group {
- ipv6-network-group LAN13v6
- }
- }
- protocol all
- }
- rule 5 {
- action drop
- description "Block LAN16"
- destination {
- group {
- ipv6-network-group LAN16v6
- }
- }
- protocol all
- }
- rule 6 {
- action drop
- description "Block MGNT"
- destination {
- group {
- ipv6-network-group MGNTv6
- }
- }
- protocol all
- }
- rule 7 {
- action accept
- description ipv6-icmp
- protocol ipv6-icmp
- }
- }
- ipv6-name GASTv6_LOCAL {
- default-action drop
- rule 1 {
- action accept
- description "Allow established related"
- state {
- established enable
- new enable
- related enable
- }
- }
- rule 2 {
- action drop
- state {
- invalid enable
- }
- }
- rule 3 {
- action accept
- description DNS_DHCP
- destination {
- port 53,67
- }
- protocol udp
- }
- rule 4 {
- action accept
- description ipv6-icmp
- protocol ipv6-icmp
- }
- }
- ipv6-name LAN2v6_IN {
- default-action drop
- rule 1 {
- action accept
- description "Allow established related"
- state {
- established enable
- new enable
- related enable
- }
- }
- rule 2 {
- action drop
- description "Drop invalid"
- state {
- invalid enable
- }
- }
- rule 3 {
- action drop
- description "Drop to GAST"
- destination {
- group {
- ipv6-network-group GASTv6
- }
- }
- protocol all
- }
- rule 4 {
- action drop
- description "Drop to LAN13"
- destination {
- group {
- ipv6-network-group LAN13v6
- }
- }
- protocol all
- }
- rule 5 {
- action drop
- description "Drop to LAN16"
- destination {
- group {
- ipv6-network-group LAN16v6
- }
- }
- protocol all
- }
- rule 6 {
- action drop
- description "Drop to LAN MGNT"
- destination {
- group {
- ipv6-network-group MGNTv6
- }
- }
- protocol all
- }
- rule 7 {
- action accept
- description ipv6-icmp
- protocol ipv6-icmp
- }
- }
- ipv6-name LAN2v6_LOCAL {
- default-action drop
- rule 1 {
- action accept
- description "Allow established related"
- state {
- established enable
- related enable
- }
- }
- rule 2 {
- action drop
- description "Drop invalid"
- state {
- invalid enable
- }
- }
- rule 3 {
- action accept
- description "DNS DHCP"
- destination {
- port 53,67
- }
- protocol udp
- }
- rule 4 {
- action accept
- description ipv6-icmp
- protocol ipv6-icmp
- }
- }
- ipv6-name LAN13v6_OUT {
- default-action drop
- rule 1 {
- action accept
- description "Allow established related"
- state {
- established enable
- related enable
- }
- }
- rule 2 {
- action reject
- state {
- invalid enable
- }
- }
- rule 3 {
- action accept
- destination {
- group {
- ipv6-address-group A6_BoekhSrv
- port-group P_BoekhSrv
- }
- }
- }
- rule 4 {
- action accept
- description ipv6-icmp
- protocol ipv6-icmp
- }
- rule 5 {
- action accept
- description BoekhWin7
- destination {
- group {
- ipv6-address-group A6_BoekhWin7
- port-group P_BoekhWin7
- }
- }
- protocol tcp
- }
- }
- ipv6-name LAN16v6_IN {
- default-action reject
- rule 1 {
- action accept
- description "Allow established related"
- state {
- established enable
- new enable
- related enable
- }
- }
- rule 2 {
- action reject
- state {
- invalid enable
- }
- }
- rule 30 {
- action accept
- protocol ipv6-icmp
- }
- rule 31 {
- action accept
- destination {
- group {
- ipv6-address-group A6_BoekhSrv
- port-group P_BoekhSrv
- }
- }
- protocol tcp
- }
- rule 32 {
- action accept
- destination {
- group {
- ipv6-address-group A6_Webserver
- }
- }
- protocol tcp_udp
- }
- rule 50 {
- action drop
- destination {
- group {
- ipv6-network-group LAN13v6
- }
- }
- }
- }
- ipv6-name LAN16v6_LOCAL {
- default-action reject
- rule 1 {
- action accept
- description "Allow established related"
- state {
- established enable
- new enable
- related enable
- }
- }
- rule 2 {
- action reject
- state {
- invalid enable
- }
- }
- rule 30 {
- action accept
- protocol ipv6-icmp
- }
- rule 40 {
- action accept
- destination {
- port 546
- }
- protocol udp
- source {
- port 547
- }
- }
- }
- ipv6-name MGNTv6_IN {
- default-action accept
- }
- ipv6-name MGNTv6_LOCAL {
- default-action accept
- }
- ipv6-name WANv6_IN {
- default-action drop
- rule 10 {
- action accept
- description "Allow established related"
- state {
- established enable
- related enable
- }
- }
- rule 20 {
- action drop
- description "Drop invalid state"
- state {
- invalid enable
- }
- }
- rule 30 {
- action accept
- description "ICMP v6"
- protocol ipv6-icmp
- }
- rule 40 {
- action accept
- description Webserver
- destination {
- group {
- ipv6-address-group A6_Webserver
- port-group P_Webserver
- }
- }
- protocol tcp_udp
- }
- rule 41 {
- action accept
- description Files
- destination {
- group {
- ipv6-address-group A6_Files
- port-group P_Files
- }
- }
- protocol tcp_udp
- }
- rule 42 {
- action accept
- description BoekhSrv
- destination {
- group {
- ipv6-address-group A6_BoekhSrv
- port-group P_BoekhSrv
- }
- }
- protocol tcp
- }
- rule 43 {
- action accept
- description PSP
- destination {
- group {
- ipv6-address-group A6_PSP
- port-group P_PSP
- }
- }
- protocol tcp_udp
- }
- rule 44 {
- action accept
- description SBS
- destination {
- group {
- ipv6-address-group A6_SBS
- port-group P_SBS
- }
- }
- }
- rule 45 {
- action accept
- description OVPN
- destination {
- group {
- ipv6-address-group A6_OVPN
- port-group P_OpenVPN
- }
- }
- protocol tcp_udp
- }
- rule 46 {
- action accept
- description OpenVPN
- destination {
- group {
- ipv6-address-group A6_OpenVPN
- port-group P_OpenVPN
- }
- }
- protocol tcp_udp
- }
- rule 47 {
- action accept
- description BoekhWin7
- destination {
- group {
- ipv6-address-group A6_BoekhWin7
- port-group P_BoekhWin7
- }
- }
- protocol all
- }
- rule 48 {
- action accept
- description NAS409
- destination {
- group {
- ipv6-address-group A6_NAS409
- port-group P_NAS409
- }
- }
- }
- rule 49 {
- action accept
- description ELTO17
- destination {
- group {
- ipv6-address-group A6_ELTO17
- port-group P_ELTO17
- }
- }
- protocol all
- }
- rule 50 {
- action accept
- description ELTO23
- destination {
- group {
- ipv6-address-group A6_ELTO23
- port-group P_ELTO23
- }
- }
- protocol all
- }
- }
- ipv6-name WANv6_LOCAL {
- default-action drop
- rule 10 {
- action accept
- description "Allow established related"
- state {
- established enable
- related enable
- }
- }
- rule 20 {
- action drop
- description "drop invalid state"
- state {
- invalid enable
- }
- }
- rule 30 {
- action accept
- description "allow ipv6 icmp"
- protocol ipv6-icmp
- }
- rule 40 {
- action accept
- description "allow dhcpv6"
- destination {
- port 546
- }
- protocol udp
- source {
- port 547
- }
- }
- }
- ipv6-receive-redirects disable
- ipv6-src-route disable
- ip-src-route disable
- log-martians enable
- modify balance {
- rule 10 {
- action modify
- description "do NOT load balance lan to lan"
- destination {
- group {
- network-group PRIVATE_NETS
- }
- }
- modify {
- table main
- }
- }
- rule 20 {
- action modify
- description "do NOT load balance destination public address"
- destination {
- group {
- address-group ADDRv4_pppoe0
- }
- }
- modify {
- table main
- }
- }
- rule 30 {
- action modify
- description "do NOT load balance destination public address"
- destination {
- group {
- address-group ADDRv4_eth2
- }
- }
- modify {
- table main
- }
- }
- rule 40 {
- action modify
- modify {
- lb-group G
- }
- }
- }
- name GAST_IN {
- default-action drop
- rule 1 {
- action accept
- description "Allow established related"
- log disable
- protocol all
- state {
- established enable
- invalid disable
- new enable
- related enable
- }
- }
- rule 2 {
- action drop
- log disable
- protocol all
- state {
- established disable
- invalid enable
- new disable
- related disable
- }
- }
- rule 3 {
- action accept
- description Files
- destination {
- group {
- address-group A4_Files
- port-group P_Files
- }
- }
- log disable
- protocol tcp_udp
- }
- rule 4 {
- action accept
- description Webserver
- destination {
- group {
- address-group A4_Webserver
- port-group P_Webserver
- }
- }
- log disable
- protocol tcp_udp
- }
- rule 6 {
- action drop
- description "Block LAN13"
- destination {
- group {
- network-group LAN13
- }
- }
- log disable
- protocol all
- }
- rule 7 {
- action drop
- description "Block LAN16"
- destination {
- group {
- network-group LAN16
- }
- }
- log disable
- protocol all
- }
- rule 8 {
- action drop
- description "Block MGNT"
- destination {
- group {
- network-group MGNT
- }
- }
- log disable
- protocol all
- }
- rule 9 {
- action accept
- description "Naar XS4All"
- destination {
- group {
- address-group ADDRv4_pppoe0
- }
- }
- log disable
- protocol all
- source {
- group {
- network-group LAN2
- }
- }
- }
- rule 10 {
- action accept
- description "Naar Ziggo"
- destination {
- group {
- address-group ADDRv4_eth2
- }
- }
- log disable
- protocol all
- source {
- group {
- network-group LAN2
- }
- }
- }
- }
- name GAST_LOCAL {
- default-action drop
- rule 1 {
- action accept
- description "Allow established related"
- log disable
- protocol all
- state {
- established enable
- invalid disable
- new disable
- related enable
- }
- }
- rule 2 {
- action drop
- log disable
- protocol all
- state {
- established disable
- invalid enable
- new disable
- related disable
- }
- }
- rule 3 {
- action accept
- description "Allow DNS"
- destination {
- port 53
- }
- log disable
- protocol udp
- }
- rule 4 {
- action accept
- description "Allow DHCP"
- destination {
- port 67
- }
- log disable
- protocol udp
- }
- }
- name LAN2_IN {
- default-action drop
- rule 1 {
- action accept
- description "Allow established related"
- state {
- established enable
- new enable
- related enable
- }
- }
- rule 2 {
- action drop
- description "Drop Invalid"
- log disable
- state {
- invalid enable
- }
- }
- rule 3 {
- action drop
- description "Block GAST"
- destination {
- group {
- network-group GAST
- }
- }
- protocol all
- }
- rule 4 {
- action drop
- description "Block LAN13"
- destination {
- group {
- network-group LAN13
- }
- }
- protocol all
- }
- rule 5 {
- action drop
- description "Block LAN16"
- destination {
- group {
- network-group LAN16
- }
- }
- protocol all
- }
- rule 6 {
- action drop
- description "Block MGNT"
- destination {
- group {
- network-group MGNT
- }
- }
- protocol all
- }
- rule 7 {
- action accept
- description "Allow to XS4All"
- destination {
- group {
- address-group ADDRv4_pppoe0
- }
- }
- log disable
- protocol all
- }
- rule 8 {
- action accept
- description "Allow to Ziggo"
- destination {
- group {
- address-group ADDRv4_eth2
- }
- }
- log disable
- protocol all
- }
- }
- name LAN2_LOCAL {
- default-action drop
- rule 1 {
- action accept
- description "Allow established related"
- state {
- established enable
- related enable
- }
- }
- rule 2 {
- action drop
- description "Drop invalid"
- state {
- invalid enable
- }
- }
- rule 3 {
- action accept
- description "DHCP DNS"
- destination {
- port 53,67
- }
- protocol udp
- }
- }
- name LAN13_OUT {
- default-action reject
- rule 1 {
- action accept
- description "Allow established related"
- log disable
- protocol all
- state {
- established enable
- invalid disable
- new disable
- related enable
- }
- }
- rule 2 {
- action reject
- log disable
- protocol all
- state {
- established disable
- invalid enable
- new disable
- related disable
- }
- }
- rule 3 {
- action accept
- description Weburen
- destination {
- group {
- address-group A4_BoekhSrv
- port-group P_BoekhSrv
- }
- }
- log disable
- protocol tcp
- }
- rule 4 {
- action accept
- description BoekhWin7
- destination {
- group {
- address-group A4_BoekhWin7
- port-group P_BoekhWin7
- }
- }
- log disable
- protocol tcp
- }
- }
- name LAN16_IN {
- default-action reject
- rule 1 {
- action accept
- description "Allow established related"
- log disable
- protocol all
- state {
- established enable
- invalid disable
- new enable
- related enable
- }
- }
- rule 2 {
- action reject
- log disable
- protocol all
- state {
- established disable
- invalid enable
- new disable
- related disable
- }
- }
- rule 3 {
- action accept
- description Webserver
- destination {
- group {
- address-group A4_Webserver
- port-group P_Webserver
- }
- }
- log disable
- protocol tcp_udp
- }
- rule 4 {
- action accept
- description Weburen
- destination {
- group {
- address-group A4_BoekhSrv
- port-group P_BoekhSrv
- }
- }
- log disable
- protocol tcp
- }
- rule 5 {
- action accept
- description BoekhWin7
- destination {
- group {
- address-group A4_BoekhWin7
- port-group P_BoekhWin7
- }
- }
- log disable
- protocol tcp
- }
- rule 6 {
- action accept
- description "Naar XS4All"
- destination {
- group {
- address-group ADDRv4_pppoe0
- }
- }
- log disable
- protocol all
- source {
- group {
- network-group LAN16
- }
- }
- }
- rule 7 {
- action accept
- description "Naar Ziggo"
- destination {
- group {
- address-group ADDRv4_eth2
- }
- }
- log disable
- protocol all
- source {
- group {
- network-group LAN16
- }
- }
- }
- }
- name LAN16_LOCAL {
- default-action reject
- rule 1 {
- action accept
- description "Allow established related"
- log disable
- protocol all
- state {
- established enable
- invalid disable
- new enable
- related enable
- }
- }
- rule 2 {
- action reject
- log disable
- protocol all
- state {
- established disable
- invalid enable
- new disable
- related disable
- }
- }
- rule 3 {
- action accept
- description DNS_DHCP
- destination {
- port 53,67
- }
- log disable
- protocol udp
- }
- rule 4 {
- action accept
- description "443 en ssh"
- destination {
- port 22,443
- }
- log disable
- protocol tcp_udp
- source {
- group {
- network-group LAN16
- }
- }
- }
- }
- name MGT_IN {
- default-action accept
- }
- name MGT_LOCAL {
- default-action accept
- description "Management eth0"
- }
- name WAN_IN {
- default-action drop
- description "WAN to internal"
- rule 1 {
- action accept
- description "Allow established/related"
- state {
- established enable
- related enable
- }
- }
- rule 2 {
- action drop
- description "Drop invalid state"
- state {
- invalid enable
- }
- }
- rule 3 {
- action drop
- description "drop BOGON source"
- protocol all
- source {
- group {
- network-group BOGONS
- }
- }
- }
- rule 4 {
- action accept
- description Webserver
- destination {
- group {
- address-group A4_Webserver
- port-group P_Webserver
- }
- }
- protocol tcp_udp
- }
- rule 5 {
- action accept
- description SBS
- destination {
- group {
- address-group A4_SBS
- port-group P_SBS
- }
- }
- log disable
- protocol tcp_udp
- }
- rule 6 {
- action accept
- description "File server"
- destination {
- group {
- address-group A4_Files
- port-group P_Files
- }
- }
- log disable
- protocol tcp_udp
- }
- rule 7 {
- action accept
- description BoekhSrv
- destination {
- group {
- address-group A4_BoekhSrv
- port-group P_BoekhSrv
- }
- }
- log disable
- protocol tcp
- }
- rule 8 {
- action accept
- description BoekhWin7
- destination {
- group {
- address-group A4_BoekhWin7
- port-group P_BoekhWin7
- }
- }
- log disable
- protocol all
- }
- rule 9 {
- action accept
- description PSP
- destination {
- group {
- address-group A4_PSP
- port-group P_PSP
- }
- }
- log disable
- protocol tcp_udp
- }
- rule 10 {
- action accept
- description OVPN
- destination {
- group {
- address-group A4_OVPN
- port-group P_OpenVPN
- }
- }
- log disable
- protocol tcp_udp
- }
- rule 11 {
- action accept
- description OpenVPN
- destination {
- group {
- address-group A4_OpenVPN
- port-group P_OpenVPN
- }
- }
- log disable
- protocol tcp_udp
- }
- rule 12 {
- action accept
- description NAS409
- destination {
- group {
- address-group A4_NAS409
- port-group P_NAS409
- }
- }
- log disable
- protocol tcp
- source {
- group {
- address-group FTP_Allow
- }
- }
- }
- rule 14 {
- action accept
- description ELTO17
- destination {
- group {
- address-group A4_ELTO17
- port-group P_ELTO17
- }
- }
- log disable
- protocol tcp
- }
- }
- name WAN_LOCAL {
- default-action drop
- description "WAN to router"
- rule 1 {
- action accept
- description "Allow established/related"
- state {
- established enable
- related enable
- }
- }
- rule 2 {
- action drop
- description "Drop invalid state"
- state {
- invalid enable
- }
- }
- rule 3 {
- action accept
- description "Allow L2TP"
- destination {
- port 500,1701,4500
- }
- log disable
- protocol udp
- }
- rule 4 {
- action accept
- description "Allow ESP for VPN"
- log disable
- protocol esp
- }
- rule 5 {
- action accept
- description ICMP
- limit {
- burst 1
- rate 50/minute
- }
- log disable
- protocol icmp
- }
- rule 6 {
- action drop
- description "drop BOGON source"
- protocol all
- source {
- group {
- network-group BOGONS
- }
- }
- }
- rule 7 {
- action drop
- description "Drop 443 en 22"
- destination {
- port 443,22
- }
- log disable
- protocol tcp_udp
- }
- }
- options {
- mss-clamp {
- mss 1412
- }
- }
- receive-redirects disable
- send-redirects enable
- source-validation disable
- syn-cookies enable
- }
- interfaces {
- ethernet eth0 {
- address 192.168.1.1/24
- address **:**:**:99::1/64
- address 10.10.10.10/24
- description Management
- duplex auto
- firewall {
- in {
- ipv6-name MGNTv6_IN
- modify balance
- name MGT_IN
- }
- local {
- ipv6-name MGNTv6_LOCAL
- name MGT_LOCAL
- }
- }
- ipv6 {
- dup-addr-detect-transmits 1
- router-advert {
- cur-hop-limit 64
- link-mtu 0
- managed-flag false
- max-interval 600
- name-server **:**:**:99::1
- other-config-flag false
- prefix **:**:**:99::/64 {
- autonomous-flag true
- on-link-flag true
- valid-lifetime 2592000
- }
- radvd-options "RDNSS **:**:**:99::1{};"
- reachable-time 0
- retrans-timer 0
- send-advert true
- }
- }
- mtu 1500
- speed auto
- }
- ethernet eth1 {
- description "FTTH - XS4All"
- duplex auto
- mtu 1512
- speed auto
- vif 6 {
- description VLAN6
- mtu 1508
- pppoe 0 {
- default-route none
- description "Internet - XS4All"
- dhcpv6-pd {
- no-dns
- pd 0 {
- interface eth0 {
- host-address ::1
- prefix-id :99
- service slaac
- }
- interface eth4 {
- host-address ::1
- prefix-id :5
- service slaac
- }
- interface eth5 {
- host-address ::1
- prefix-id :2
- service slaac
- }
- interface eth6 {
- host-address ::1
- prefix-id :1
- service slaac
- }
- interface eth7 {
- host-address ::1
- prefix-id :13
- service slaac
- }
- prefix-length /48
- }
- prefix-only
- rapid-commit enable
- }
- firewall {
- in {
- ipv6-name WANv6_IN
- name WAN_IN
- }
- local {
- ipv6-name WANv6_LOCAL
- name WAN_LOCAL
- }
- }
- idle-timeout 180
- ipv6 {
- address {
- autoconf
- secondary **:**:**::1/48
- }
- dup-addr-detect-transmits 1
- enable {
- }
- }
- mtu 1500
- name-server none
- password 123456
- user-id ***@xs4all.nl
- }
- }
- }
- ethernet eth2 {
- address dhcp
- address dhcpv6
- description "Internet - Ziggo"
- dhcp-options {
- default-route no-update
- default-route-distance 210
- name-server no-update
- }
- duplex auto
- firewall {
- in {
- ipv6-name WANv6_IN
- name WAN_IN
- }
- local {
- ipv6-name WANv6_LOCAL
- name WAN_LOCAL
- }
- }
- speed auto
- }
- ethernet eth3 {
- duplex auto
- speed auto
- }
- ethernet eth4 {
- address 192.168.5.1/24
- address **:**:**:5::1/64
- description "LAN Gast"
- duplex auto
- firewall {
- in {
- ipv6-name GASTv6_IN
- modify balance
- name GAST_IN
- }
- local {
- ipv6-name GASTv6_LOCAL
- name GAST_LOCAL
- }
- }
- ipv6 {
- dup-addr-detect-transmits 1
- router-advert {
- cur-hop-limit 64
- link-mtu 0
- managed-flag false
- max-interval 600
- name-server **:**:**:5::1
- other-config-flag false
- prefix **:**:**:5::/64 {
- autonomous-flag true
- on-link-flag true
- valid-lifetime 2592000
- }
- radvd-options "RDNSS **:**:**:5::1 {};"
- reachable-time 0
- retrans-timer 0
- send-advert true
- }
- }
- mtu 1500
- speed auto
- }
- ethernet eth5 {
- address 192.168.2.1/24
- address **:**:**:2::1/64
- description LAN2
- duplex auto
- firewall {
- in {
- ipv6-name LAN2v6_IN
- modify balance
- name LAN2_IN
- }
- local {
- ipv6-name LAN2v6_LOCAL
- name LAN2_LOCAL
- }
- }
- ipv6 {
- dup-addr-detect-transmits 1
- router-advert {
- cur-hop-limit 64
- link-mtu 0
- managed-flag false
- max-interval 600
- name-server **:**:**:2::1
- other-config-flag false
- prefix **:**:**:2::/64 {
- autonomous-flag true
- on-link-flag true
- valid-lifetime 2592000
- }
- radvd-options "RDNSS **:**:**:2::1{};"
- reachable-time 0
- retrans-timer 0
- send-advert true
- }
- }
- mtu 1500
- speed auto
- }
- ethernet eth6 {
- address 192.168.16.1/24
- address **:**:**:1::1/64
- description LAN16
- duplex auto
- firewall {
- in {
- ipv6-name LAN16v6_IN
- modify balance
- name LAN16_IN
- }
- local {
- ipv6-name LAN16v6_LOCAL
- name LAN16_LOCAL
- }
- }
- ipv6 {
- dup-addr-detect-transmits 1
- router-advert {
- cur-hop-limit 64
- link-mtu 0
- managed-flag false
- max-interval 600
- name-server **:**:**:1::8
- other-config-flag false
- prefix **:**:**:1::/64 {
- autonomous-flag true
- on-link-flag true
- valid-lifetime 2592000
- }
- radvd-options "RDNSS **:**:**:1::8{};"
- reachable-time 0
- retrans-timer 0
- send-advert true
- }
- }
- mtu 1500
- speed auto
- }
- ethernet eth7 {
- address 192.168.13.1/24
- address **:**:**:13::1/64
- description LAN13
- duplex auto
- firewall {
- in {
- modify balance
- }
- out {
- ipv6-name LAN13v6_OUT
- name LAN13_OUT
- }
- }
- ipv6 {
- dup-addr-detect-transmits 1
- router-advert {
- cur-hop-limit 64
- link-mtu 0
- managed-flag false
- max-interval 600
- name-server **:**:**:13::10
- other-config-flag false
- prefix **:**:**:13::/64 {
- autonomous-flag true
- on-link-flag true
- valid-lifetime 2592000
- }
- radvd-options "RDNSS **:**:**:13::10 {};"
- reachable-time 0
- retrans-timer 0
- send-advert true
- }
- }
- mtu 1500
- speed auto
- }
- loopback lo {
- }
- }
- load-balance {
- group G {
- interface eth2 {
- failover-only
- }
- interface pppoe0 {
- }
- transition-script /config/scripts/wlb-transition
- }
- }
- protocols {
- static {
- interface-route 0.0.0.0/0 {
- next-hop-interface pppoe0 {
- }
- }
- interface-route6 ::/0 {
- next-hop-interface pppoe0 {
- }
- }
- }
- }
- service {
- dhcp-server {
- disabled false
- hostfile-update disable
- shared-network-name GAST {
- authoritative disable
- subnet 192.168.5.0/24 {
- default-router 192.168.5.1
- dns-server 192.168.5.1
- lease 86400
- start 192.168.5.10 {
- stop 192.168.5.150
- }
- }
- }
- shared-network-name LAN2 {
- authoritative disable
- subnet 192.168.2.0/24 {
- default-router 192.168.2.1
- dns-server 192.168.2.1
- lease 86400
- start 192.168.2.100 {
- stop 192.168.2.200
- }
- static-mapping ubuntuserver {
- ip-address 192.168.2.2
- mac-address 00:0c:29:c8:c9:03
- }
- }
- }
- shared-network-name MGNT {
- authoritative enable
- subnet 192.168.1.0/24 {
- default-router 192.168.1.1
- dns-server 192.168.1.1
- lease 86400
- start 192.168.1.38 {
- stop 192.168.1.243
- }
- }
- }
- }
- dns {
- dynamic {
- interface eth2 {
- service dyndns {
- host-name ***.gotdns.com
- host-name **.dnsalias.com
- login *****
- password ****
- protocol dyndns2
- }
- web dyndns
- }
- interface pppoe0 {
- service dyndns {
- host-name ***.gotdns.com
- login ****
- password ****
- protocol dyndns1
- }
- web dyndns
- }
- }
- forwarding {
- cache-size 150
- listen-on eth0
- listen-on eth5
- listen-on l2tp0
- listen-on eth4
- }
- }
- gui {
- https-port 443
- listen-address 192.168.1.1
- listen-address 10.10.10.10
- listen-address 192.168.16.1
- }
- lldp {
- interface all {
- location {
- civic-based {
- ca-type 0 {
- ca-value dutch
- }
- ca-type 2 {
- ca-value Netherlands
- }
- ca-type 3 {
- ca-value *****
- }
- ca-type 6 {
- ca-value "D****"
- }
- ca-type 19 {
- ca-value 33
- }
- ca-type 23 {
- ca-value "****."
- }
- ca-type 24 {
- ca-value ****
- }
- country-code NL
- }
- }
- }
- interface eth2 {
- }
- interface eth5 {
- }
- interface eth6 {
- }
- interface eth7 {
- }
- management-address 192.168.1.1
- }
- nat {
- rule 2 {
- description "XS4All - Webserver"
- destination {
- group {
- address-group A4_Webserver
- port-group P_Webserver
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.2.2
- }
- log disable
- protocol tcp_udp
- type destination
- }
- rule 3 {
- description "XS4All - BoekhSrv"
- destination {
- group {
- address-group A4_BoekhSrv
- port-group P_BoekhSrv
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.13.10
- }
- log disable
- protocol tcp
- type destination
- }
- rule 4 {
- description "XS4All - BoekhWin7"
- destination {
- group {
- address-group A4_BoekhWin7
- port-group P_BoekhWin7
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.13.19
- }
- log disable
- protocol tcp
- type destination
- }
- rule 5 {
- description "XS4All - Files"
- destination {
- group {
- address-group A4_Files
- port-group P_Files
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.16.5
- }
- log disable
- protocol tcp_udp
- type destination
- }
- rule 6 {
- description "XS4All - PSP"
- destination {
- group {
- address-group A4_PSP
- port-group P_PSP
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.16.20
- }
- log disable
- protocol tcp_udp
- type destination
- }
- rule 7 {
- description "XS4All - OVPN"
- destination {
- group {
- address-group A4_OVPN
- port-group P_OpenVPN
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.16.9
- }
- log disable
- protocol tcp_udp
- type destination
- }
- rule 8 {
- description "XS4All - OpenVPN"
- destination {
- group {
- address-group A4_OpenVPN
- port-group P_OpenVPN
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.16.4
- }
- log disable
- protocol tcp_udp
- type destination
- }
- rule 9 {
- description "XS4All - NAS409"
- destination {
- group {
- address-group ADDRv4_pppoe0
- port-group P_NAS409
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.16.13
- }
- log disable
- protocol tcp
- source {
- group {
- address-group FTP_Allow
- }
- }
- type destination
- }
- rule 10 {
- description "XS4All - SBS"
- destination {
- group {
- address-group ADDRv4_pppoe0
- port-group P_SBS
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.16.8
- }
- log disable
- protocol tcp
- source {
- group {
- }
- }
- type destination
- }
- rule 11 {
- description "XS4All - ELTO17"
- destination {
- group {
- address-group ADDRv4_pppoe0
- port-group P_ELTO17
- }
- }
- inbound-interface pppoe0
- inside-address {
- address 192.168.16.17
- }
- log disable
- protocol tcp
- source {
- group {
- }
- }
- type destination
- }
- rule 12 {
- description "Ziggo - SBS"
- destination {
- group {
- port-group P_SBS
- }
- }
- inbound-interface eth2
- inside-address {
- address 192.168.16.8
- }
- log disable
- protocol tcp_udp
- type destination
- }
- rule 13 {
- description "Ziggo - Files"
- destination {
- group {
- }
- port 442
- }
- inbound-interface eth2
- inside-address {
- address 192.168.16.5
- port 443
- }
- log disable
- protocol tcp_udp
- type destination
- }
- rule 14 {
- description "Ziggo - Webserver"
- destination {
- group {
- }
- port 444
- }
- inbound-interface eth2
- inside-address {
- address 192.168.2.2
- port 443
- }
- log disable
- protocol tcp_udp
- type destination
- }
- rule 15 {
- description "Ziggo - Weburen"
- destination {
- group {
- }
- port 81
- }
- inbound-interface eth2
- inside-address {
- address 192.168.13.10
- port 80
- }
- log disable
- protocol tcp
- type destination
- }
- rule 16 {
- description "Ziggo - FTP"
- destination {
- group {
- }
- port 21,55536-55567
- }
- inbound-interface eth2
- inside-address {
- address 192.168.16.13
- }
- log disable
- protocol tcp_udp
- source {
- group {
- address-group FTP_Allow
- }
- }
- type destination
- }
- rule 17 {
- description "Ziggo - OpenVPN"
- destination {
- group {
- }
- port 943,1194
- }
- inbound-interface eth2
- inside-address {
- address 192.168.16.4
- }
- log disable
- protocol tcp_udp
- type destination
- }
- rule 18 {
- description "Ziggo - ELTO17"
- destination {
- group {
- port-group P_ELTO17
- }
- }
- inbound-interface eth2
- inside-address {
- address 192.168.16.17
- }
- log disable
- protocol tcp
- type destination
- }
- rule 5001 {
- description "masquerade for WAN"
- log disable
- outbound-interface pppoe0
- protocol all
- type masquerade
- }
- rule 5002 {
- description "masquerade for WAN 2"
- outbound-interface eth2
- type masquerade
- }
- }
- ssh {
- listen-address 192.168.16.1
- listen-address 192.168.1.1
- listen-address 10.10.10.10
- port 22
- protocol-version v2
- }
- ubnt-discover {
- }
- }
- system {
- conntrack {
- expect-table-size 4096
- hash-size 4096
- table-size 32768
- tcp {
- half-open-connections 512
- loose enable
- max-retrans 3
- }
- }
- domain-name ****.com
- host-name ubnt
- login {
- banner {
- post-login "Welkom op de EdgeRouter Pro van **** B.V.\n\neth0 = mngt = 192.168.1.1 + DHCP Server en 10.10.10.10 (L2TP)\neth1 = WAN XS4All - vif6 - pppoe0\neth2 = WAN Ziggo - DHCP\neth5 = LAN2 = 192.168.2.1 + DHCP Server\neth6 = LAN16 = 192.168.16.1\neth7 = LAN13 = 192.168.13.1\n\n"
- pre-login "\nWelcome \nPlease login.\n\n"
- }
- user **** {
- authentication {
- encrypted-password *********.SHa0
- }
- level admin
- }
- }
- name-server 208.67.222.222
- name-server 8.8.8.8
- name-server 2620:0:ccc::2
- name-server 2001:4860:4860::8888
- ntp {
- server 0.ubnt.pool.ntp.org {
- }
- server 1.ubnt.pool.ntp.org {
- }
- server 2.ubnt.pool.ntp.org {
- }
- server 3.ubnt.pool.ntp.org {
- }
- }
- offload {
- ipsec enable
- ipv4 {
- forwarding enable
- gre enable
- pppoe enable
- vlan enable
- }
- ipv6 {
- forwarding enable
- pppoe enable
- }
- }
- package {
- repository wheezy {
- components "main contrib non-free"
- distribution wheezy
- password ""
- url http://ftp.nl.debian.org/debian
- username ""
- }
- repository wheezy-backport {
- components main
- distribution wheezy-backports
- password ""
- url http://ftp.nl.debian.org/debian
- username ""
- }
- repository wheezy-security {
- components main
- distribution wheezy/updates
- password ""
- url http://security.debian.org
- username ""
- }
- }
- static-host-mapping {
- host-name files.***.com {
- inet 192.168.16.5
- inet **:**:**:1::5
- }
- host-name openvpn.***.com {
- inet 192.168.16.4
- }
- host-name ovpn.***.com {
- inet 192.168.16.9
- }
- host-name psp.***.com {
- inet 192.168.16.20
- inet **:**:**:1::20
- }
- host-name ubnt.***.com {
- inet 192.168.1.1
- inet 10.10.10.10
- }
- host-name webmail.***.com {
- alias vacation.***.com
- alias remote.***.com
- inet 192.168.16.8
- inet **:**:**:1::8
- }
- host-name weburen.***.com {
- inet 192.168.13.10
- inet **:**:**:13::10
- }
- host-name www.***.com {
- alias ***.com
- alias v3.***.com
- alias next.***.com
- inet 192.168.2.2
- inet **:**:**:2::2
- }
- }
- syslog {
- global {
- facility all {
- level notice
- }
- facility protocols {
- level debug
- }
- }
- host 192.168.16.13 {
- facility all {
- level err
- }
- }
- }
- time-zone Europe/Amsterdam
- traffic-analysis {
- dpi enable
- export enable
- }
- }
- vpn {
- ipsec {
- auto-firewall-nat-exclude enable
- ipsec-interfaces {
- interface eth0
- interface pppoe0
- interface eth2
- }
- nat-networks {
- allowed-network 0.0.0.0/0 {
- }
- }
- nat-traversal enable
- }
- l2tp {
- remote-access {
- authentication {
- local-users {
- username *** {
- password ***
- }
- username *** {
- password ***
- }
- }
- mode local
- }
- client-ip-pool {
- start 10.10.10.101
- stop 10.10.10.110
- }
- dns-servers {
- server-1 10.10.10.10
- }
- ipsec-settings {
- authentication {
- mode pre-shared-secret
- pre-shared-secret ****
- }
- ike-lifetime 3600
- }
- mtu 1492
- outside-address 0.0.0.0
- }
- }
- }
- /* Warning: Do not remove the following line. */
- /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
- /* Release version: v1.8.0.4853089.160219.1614 */
Advertisement
Add Comment
Please, Sign In to add comment