This weekend I failed to deploy my ERLs, because of a traffic issue occurring with one of the two.
ERL1 = local office ERL. I was able to test the configuration and found it to function with no problems. Traffic passed fine to the devices with 1-to-1 NAT
ERL2 = data center ERL. Due to [reasons] it was not possible to test this prior to the deployment attempt; thus, I mimicked the configuration of the known, working ERL1 as much as I could, obviously changing IP addresses as necessary. Traffic for hosts that weren't involved with 1-to-1 NAT worked fine. Traffic for hosts that had 1-to-1 NAT failed, which makes me think the issue is with how I've configured NAT.
Configuration caveats:
- Security through obscurity: I've altered the IP addresses of the hosts and interfaces, but they should be valid for the /24 and /28 networks involved.
- The old Cisco ASA had two interfaces in the outside-VLAN with one address assigned to them.
eth1
will eventually be that second interface. - I was so focused on just getting Internet connectivity to all of the hosts, I did not test the success of the site-to-site VPN.
- All configurations (except the obscuring of the IP addresses) were done using the GUI.
This is the configuration of the ERL2 as it was Saturday night.
Here's the current question: Do you folks see a problem with the NAT configuration? There should be 1-to-1 NAT for the IIS server and PostFix server. All other hosts (SQL server, etc.) use NAT-overload as its destination NAT.
firewall {
all-ping enable
broadcast-ping disable
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action drop
description "Deny traffic from 74.6.168.184"
log disable
protocol all
source {
address 74.6.168.184
}
}
rule 20 {
action drop
description "Deny traffic from 23.253.40.182"
log disable
protocol all
source {
address 23.253.40.182
}
}
rule 30 {
action drop
description "Deny traffic from 72.30.14.0/24"
log disable
protocol all
source {
address 72.30.14.0/24
}
}
rule 40 {
action accept
description "Allow HTTP to IIS"
destination {
address 172.16.254.12
port 80
}
log disable
protocol tcp
}
rule 50 {
action accept
description "Allow HTTPS to IIS"
destination {
address 172.16.254.12
port 443
}
log disable
protocol tcp
}
rule 60 {
action accept
description "Allow FTP to IIS"
destination {
address 172.16.254.12
port 21
}
log disable
protocol tcp
}
rule 70 {
action accept
description "Allow SMTP to PostFix"
destination {
address 172.16.254.14
port 25
}
log disable
protocol tcp
}
rule 80 {
action accept
description "Allow SMTP-SSL to PostFix"
destination {
address 172.16.254.14
port 465
}
log disable
protocol tcp
}
rule 90 {
action accept
description "Allow SMTP-MSA to PostFix"
destination {
address 172.16.254.14
port 587
}
log disable
protocol tcp
}
rule 100 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 110 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address 65.254.219.164/28
address 65.254.219.165/28
address 65.254.219.166/28
description Internet
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth1 {
address 172.16.100.1/24
description "Local 2"
duplex auto
speed auto
}
ethernet eth2 {
address 172.16.254.1/24
description Local
duplex auto
speed auto
}
loopback lo {
}
}
service {
dns {
forwarding {
cache-size 150
listen-on eth1
listen-on eth2
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 1 {
description "Outside to IIS"
destination {
address 65.254.219.165
}
inbound-interface eth0
inside-address {
address 172.16.254.12
}
log disable
protocol all
type destination
}
rule 2 {
description "Outside to PostFix"
destination {
address 65.254.219.166
}
inbound-interface eth0
inside-address {
address 172.16.254.14
}
log disable
type destination
}
rule 5000 {
description "IIS to Outside"
log disable
outbound-interface eth0
outside-address {
address 65.254.219.165
}
protocol all
source {
address 172.16.254.12
}
type source
}
rule 5001 {
description "PostFix to Outside"
log disable
outbound-interface eth0
outside-address {
address 65.254.219.166
}
protocol all
source {
address 172.16.254.14
}
type source
}
rule 5002 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
unms {
disable
}
}
system {
gateway-address 65.254.219.161
host-name erl-peak10
login {
user SomeUser {
authentication {
encrypted-password GIBBERISH.
}
level admin
}
}
name-server 8.8.8.8
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone America/New_York
traffic-analysis {
dpi enable
export enable
}
}
vpn {
ipsec {
auto-firewall-nat-exclude enable
esp-group FOO0 {
compression disable
lifetime 3600
mode tunnel
pfs enable
proposal 1 {
encryption aes128
hash sha1
}
}
ike-group FOO0 {
ikev2-reauth no
key-exchange ikev1
lifetime 28800
proposal 1 {
dh-group 14
encryption aes128
hash sha1
}
}
site-to-site {
peer 50.241.10.49 {
authentication {
mode pre-shared-secret
pre-shared-secret GIBBERISH
}
connection-type initiate
description Office
ike-group FOO0
ikev2-reauth inherit
local-address 172.16.254.1
tunnel 1 {
allow-nat-networks disable
allow-public-networks disable
esp-group FOO0
local {
prefix 172.16.254.0/24
}
remote {
prefix 172.16.253.0/24
}
}
}
}
}
}
/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-unms@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.9.7+hotfix.4.5024004.171005.0403 */