I have 2WAN on sfp1 (61.219.84.107) and sfp2 (61.219.84.108), now i would like to add the third WAN on sfp3 (61.219.84.105).
The local area network keeps the default address to 192.168.88.1/24.
A very strange thing is if i add 61.219.84.105 to the “Address List”, then local network will be forced to change to 61.219.84.105 from 192.168.88.1
Whenever you change it, it will automatically be forced back to 61.219.84.105.
There is nothing weird going on, the router is simply working in accordance with the rules you have made.
To comment further
/export file=anynameyouwish ( minus router serial number, any real public WANIP info, keys etc.)
Yes. Different WAN IP (Totally 6 IPs) to the same gateway.
ANS1: No priority.
ANS2: Yes, sfp1 to general use and Exchange Server. sfp2 to NAS.
ANS3: Yes, NAS and Exchange Server, SharePoint Server, etc.
ANS4: WAN ports are all disabled.
ANS5: I will add masquerade and actually added before, but i don’t need to add it to make “quick set” change my local network from 192.168.88.1 to 61.219.84.105, therefore i didn’t set it before i pack the configuration.
ANS6: the question is, the original working routing, just added the third address 61.219.84.105 then “quick set” change my local network from 192.168.88.1 to 61.219.84.105, and no a thing i added than adding the address.
Question not answered, why do you have three WANs??
If you dont have a priority WAN and the other two being backkup what is the thinking?
If you want Lan users to be able to use all three WANs then that is a load sharing setup for the wans.
You should not be using QuickSet if you have multiple WAN.
The reason QuickSet show the wrong LAN IPs, is that it’s looking for the IP of an interface named “bridge”. Since you renamed that, it’s just guessing the first interface is the LAN. But this is only an issue if you click OK in QuickSet – which will then make the IP shown the LAN & break everything.
Three WANs are for serving 3 different servers on Internet, Exchange Server on sfp1, NAS server on sfp2, Proxmox Environment on sfp3. Internal LAN users will surf Internet with sfp1, the default routing interface. No priority.
That is, the major incoming traffic are from Internet, when goes for email, they go sfp1 to Exchange Server, for NAS, goes to sfp2, for PVE, goes to sfp3. Those on the internal network will be loop back by DNS to connect internally without going to sfp interfaces.
No, even the Quickset LAN shows WAN IP, it didn’t break the connection of sfp3 or any other connections.
The bridge didn’t include WAN interfaces, they are all disabled but keep for references.
No, QuickSet recognizes my third WAN (sfp3) as LAN, not LAN as WAN.
I didn’t configure QuickSet, i only add “address list”, IP->routes->WAN3, mangle to prerouting mark WAN3, masquerade, srcnet to internal server.
If you place Quickset window side by side with “Address List” window, add WAN IP to address list, Quickset LAN shows WAN IP right away. Disabled or remove WAN IP, Quickset shows normal LAN IP 192.168.88.1/24 as before. No others involves.
QuickSet might need the comment “defconf” on the bridge for it show the right LAN. Since I use QuickSet as a status page… I know it uses either the name or comment “defconf”. On a particular device, it pretty deterministic but varies by device/version how it specifically find LAN etc.
To be clear, QuickSet showing something wrong is not going to break anything. It really is just guessing from the config wrong.
Lan interface is not a bridge port by the way…
Also cannot make heads or tails of this dstnat rule.
add action=dst-nat chain=dstnat comment=“NAS Channel” dst-address=
61.219.84.108 in-interface=sfp2 log=yes protocol=tcp to-addresses=
192.168.88.220 to-ports=0-65535
You want your router to accept all traffic (every port) hitting your WANIP ???
Until we rationalize it…removed.
FW are crap
+++++++++++++++++++++++++++++++++++++++++++++
Just tried defconf, but it doesn’t lock Lan on 192.168.88.1/24 either. Quickset simply swap my local network ip 192.168.88.1/24 to WAN IP 61.219.84.105…
Please ignore quickset so we can focus on a working config. Unless your a squirrel
(1) Added back NAS on port 443 to the config.
(2) This had no meaning… /interface bridge port
add bridge=BridgeLAN ingress-filtering=no interface=BondingNAS
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN ingress-filtering=no interface=ether1
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN ingress-filtering=no interface=ether2
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN ingress-filtering=no interface=ether3
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN disabled=yes ingress-filtering=no interface=sfp1
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN ingress-filtering=no interface=ether4
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN ingress-filtering=no interface=ether5
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN ingress-filtering=no interface=ether6
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN ingress-filtering=no interface=ether7
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN disabled=yes ingress-filtering=no interface=sfp2
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN disabled=yes ingress-filtering=no interface=sfp3
internal-path-cost=10 path-cost=10
add bridge=BridgeLAN ingress-filtering=no interface=sfp4 internal-path-cost=
10 path-cost=10 add bridge=BridgeLAN ingress-filtering=no interface=LAN internal-path-cost=10
path-cost=10****
There is no such interface!! Removed.
There is a interface-list called LAN, but no interface! What goes under bridge ports are typically etherports and wifiports.
(3) The Routing is setup such that sfp1 is the primary WAN. Thus we need not do anything special for:
a. all users, will thus always be routed out WAN1
b. Servers on LAN accessed via WAN1 will have traffic returned out WAN1 ( no mangling required )
c. Servers on LAN accessed via WAN2 will have traffic retured out WAN2.
add bridge=BridgeLAN ingress-filtering=no interface> =LAN > internal-path-cost=10
path-cost=10[/i]
There is no such interface!! Removed.
There is a > interface-list > called LAN, but no interface! What goes under bridge ports are typically etherports and wifiports.
Thanks again for finding out the unnecessary setting, it’s inactive and removed.
(3) The Routing is setup such that sfp1 is the primary WAN. Thus we need not do anything special for:
a. all users, will thus always be routed out WAN1
b. Servers on LAN accessed via WAN1 will have traffic returned out WAN1 ( no mangling required )
c. Servers on LAN accessed via WAN2 will have traffic retured out WAN2.