firewall { all-ping enable broadcast-ping disable group { network-group RFC1918 { description "RFC1918 ranges" network 10.0.0.0/8 network 172.16.0.0/12 network 192.168.0.0/16 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name Guest_LOCAL { default-action drop description "" rule 1 { action accept description "Allow established/related" log disable protocol all state { established enable invalid disable new disable related enable } } rule 2 { action drop description "Drop invalid state" log disable protocol all state { established disable invalid enable new disable related disable } } rule 3 { action accept description "Allow DNS" destination { port 53 } log disable protocol tcp_udp } rule 4 { action accept description "Allow DHCP" destination { port 67 } log disable protocol udp } } name Smarthome_LOCAL { default-action drop description "" rule 1 { action accept description "Allow established/related" log disable protocol all state { established enable invalid disable new disable related enable } } rule 2 { action drop description "Drop invalid state" log disable protocol all state { established disable invalid enable new disable related disable } } rule 3 { action accept description "Allow DNS" destination { port 53 } log disable protocol tcp_udp } rule 4 { action accept description "Allow DHCP" destination { port 67 } log disable protocol udp } } name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { description "Internet (PPPoE)" duplex auto pppoe 0 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } } mtu 1492 name-server auto password user-id } speed auto } ethernet eth1 { description Local duplex auto speed auto } ethernet eth2 { description Local duplex auto speed auto } ethernet eth3 { description Local disable duplex auto speed auto } ethernet eth4 { description Local duplex auto speed auto } loopback lo { } switch switch0 { address 192.168.1.1/24 description Local mtu 1500 switch-port { interface eth1 { vlan { pvid 10 vid 20 vid 30 } } interface eth2 { vlan { vid 10 } } interface eth3 { vlan { vid 20 } } interface eth4 { vlan { pvid 10 vid 20 vid 30 } } vlan-aware enable } vif 10 { address 192.168.178.1/24 description Hauptnetzwerk } vif 20 { address 192.168.20.1/24 description Smarthome firewall { local { name Smarthome_LOCAL } } mtu 1500 } vif 30 { address 192.168.30.1/24 description Gäste firewall { local { name Guest_LOCAL } } mtu 1500 } } } port-forward { auto-firewall enable hairpin-nat enable lan-interface switch0.10 rule 1 { description forward-to { address 192.168.178.xx port } original-port protocol tcp } rule 2 { description forward-to { address 192.168.178.xx port } original-port protocol tcp } rule 3 { description "" forward-to { address 192.168.178.xx port } original-port protocol tcp } wan-interface pppoe0 } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN { authoritative enable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.38 { stop 192.168.1.243 } } } shared-network-name VLAN10 { authoritative disable subnet 192.168.178.0/24 { default-router 192.168.178.1 dns-server 192.168.178.1 lease 86400 start 192.168.178.30 { stop 192.168.178.150 } static-mapping { ip-address 192.168.178.26 mac-address } static-mapping { ip-address 192.168.178.xx mac-address } static-mapping { ip-address 192.168.178.24 mac-address } } } shared-network-name VLAN20 { authoritative disable subnet 192.168.20.0/24 { default-router 192.168.20.1 dns-server 192.168.20.1 lease 86400 start 192.168.20.30 { stop 192.168.20.150 } } } shared-network-name VLAN30 { authoritative disable subnet 192.168.30.0/24 { default-router 192.168.30.1 dns-server 192.168.30.1 lease 86400 start 192.168.30.30 { stop 192.168.30.150 } } } static-arp disable use-dnsmasq enable } dns { dynamic { interface pppoe0 { service custom-spdyn { host-name login password protocol noip server } } } forwarding { cache-size 150 listen-on switch0 listen-on switch0.10 listen-on switch0.20 listen-on switch0.30 name-server 8.8.8.8 name-server 8.8.4.4 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" outbound-interface pppoe0 type masquerade } } ssh { listen-address 192.168.1.1 port 22 protocol-version v2 } unms { disable } } system { analytics-handler { send-analytics-report false } crash-handler { send-crash-report false } domain-name haus.loc host-name ubnt login { user { authentication { encrypted-password plaintext-password "" } level admin } } name-server 127.0.0.1 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat enable ipsec enable } static-host-mapping { } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone UTC } vpn { ipsec { allow-access-to-local-interface disable auto-firewall-nat-exclude enable esp-group FOO0 { compression disable lifetime 3600 mode tunnel pfs enable proposal 1 { encryption aes256 hash sha1 } } ike-group FOO0 { ikev2-reauth no key-exchange ikev1 lifetime 28800 proposal 1 { dh-group 2 encryption aes256 hash sha1 } } site-to-site { peer { authentication { mode pre-shared-secret pre-shared-secret } connection-type initiate description ike-group FOO0 ikev2-reauth inherit local-address any tunnel 1 { allow-nat-networks disable allow-public-networks disable esp-group FOO0 local { prefix 192.168.178.0/24 } remote { prefix 192.168.188.0/24 } } } } } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:suspend@1:system@5:ubnt-l2tp@1:ubnt-pptp@1:ubnt-udapi-server@1:ubnt-unms@2:ubnt-util@1:vrrp@1:vyatta-netflow@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v2.0.9.5346345.201028.1647 */