View Single Post
Hei,

Noen som har mulighet muligheten til å hjelpe meg litt med oppsett av IPTV som har erfaring med EdgeOS?

Oppsett per nå:

Fiber —> Edgerouter X-SFP —> Unifi USW-8-60W —> AP
Mediekonverteren er tatt bort pga. plassmangel i skap.

“Internett delen”/vlan 102 fungerer utmerket.

2 mulige løsninger:

1. bridge 101 til fysisk port på ER-X (og ta ytelses tapet)
- Har forsøkt dette uten hell.

2. Via switch
eth5 (eth5.102) – WAN
· ERX —> VLAN 101, VLAN 102 —> Switch
· Fra Switch —> VLAN 101 —> Dekoder/STB
· Fra Switch —> VLAN 102 —> AP

- Ingen hell med dette heller.

I utgangspunktet ønsker jeg å benytte meg av løsning 2, men er ikke avhengig av dette da kun 1 STB skal benyttes.

Legger ved config.

Takk for all hjelp!

SPOILER ALERT! Vis spoiler


Kode

sanitized

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description IKE
            destination {
                port 500
            }
            log disable
            protocol udp
        }
        rule 30 {
            action accept
            description L2TP
            destination {
                port 1701
            }
            log disable
            protocol udp
        }
        rule 40 {
            action accept
            description ESP
            log disable
            protocol esp
        }
        rule 50 {
            action accept
            description NAT-T
            destination {
                port 4500
            }
            log disable
            protocol udp
        }
        rule 60 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    bridge br1 {
        vif 101 {
        }
    ethernet eth0 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth1 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        description "Local - Uplink"
        duplex auto
        poe {
            output off
        }
        speed auto
    }
    ethernet eth3 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth4 {
        bridge-group {
            bridge br1
        }
        description Local
        duplex auto
        speed auto
    }
    ethernet eth5 {
        duplex auto
        mac XXXXXXXXXXX
        speed auto
        vif 101 {
            bridge-group {
                bridge br1
            }
            description "Altibox TV"
            mtu 1492
        }
        vif 102 {
            address dhcp
            description Internet
            firewall {
                in {
                    name WAN_IN
                }
                local {
                    name WAN_LOCAL
                }
            }
            mtu 1492
        }
    }
    loopback lo {
    }
    switch switch0 {
        address 192.168.99.1/24
        description Local
        mtu 1500
        switch-port {
            interface eth0 {
            }
            interface eth1 {
            }
            interface eth2 {
            }
            interface eth3 {
            }
            interface eth4 {
            }
            vlan-aware disable
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat enable
    lan-interface eth5
    wan-interface eth5.102
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN {
            authoritative enable
            subnet 192.168.99.0/24 {
                default-router 192.168.99.1
                dns-server 192.168.99.1
                lease 86400
                start 192.168.99.38 {
                    stop 192.168.99.243
                }
            }
        }
        use-dnsmasq disable
    }
    dns {
        dynamic {
            interface eth5 {
                service afraid {
                    host-name XXXX
                    login XXXXX
                    password ****XXXXXXX************
                    server freedns.afraid.org
                }
                web dyndns
            }
        }
        forwarding {
            cache-size 150
            listen-on switch0
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            log disable
            outbound-interface eth5.102
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name ER-X-SFP
    login {
        user XX {
            authentication {
                encrypted-password *******XXX*********
                plaintext-password *******XXX*********
            }
            full-name XXXX
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    offload {
        hwnat enable
        ipsec disable
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone UTC
    traffic-analysis {
        dpi enable
        export enable
    }
}
vpn {
    ipsec {
        auto-firewall-nat-exclude disable
        ipsec-interfaces {
            interface eth5
        }
        nat-traversal enable
    }
    l2tp {
        remote-access {
            authentication {
                local-users {
                    XXXXX
                    }
                }
                mode local
            }
            client-ip-pool {
                start 192.168.99.160
                stop 192.168.99.170
            }
            dhcp-interface eth5.102
            dns-servers {
                server-1 8.8.8.8
                server-2 8.8.4.4
            }
            ipsec-settings {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret ********XXX********
                }
                ike-lifetime 3600
            }
            mtu 1492
        }
    }
}