Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| network:internet_multiwan [2024/12/05 17:03] – [Anatomy of a multi-WAN profile] system | network:internet_multiwan [2024/12/06 03:40] (current) – [Anatomy of a multi-WAN profile] system | ||
|---|---|---|---|
| Line 28: | Line 28: | ||
| ===== Anatomy of a multi-WAN profile ===== | ===== Anatomy of a multi-WAN profile ===== | ||
| * A functional multi-WAN profile consists of the following: | * A functional multi-WAN profile consists of the following: | ||
| - | * A name, which can be thought of as a find of folder, under which the interfaces are grouped. There is also a site-wide option that makes the multi-WAN profile available for all clouds in RADIUSdesk. | + | * A name, which can be thought of as a kind of folder, under which the interfaces are grouped. There is also a site-wide option that makes the multi-WAN profile available for all clouds in RADIUSdesk. |
| * One or more interfaces that are used for WAN access. | * One or more interfaces that are used for WAN access. | ||
| ===== Gentle reminders ===== | ===== Gentle reminders ===== | ||
| - | * There will be two gentle reminders with instructions on how to make the multi-WAN profile usable. | + | * There are two gentle reminders with instructions on how to make the multi-WAN profile usable. |
| - | * The first one will remind | + | * The first reminds you that you need to add at least one interface. |
| <panel type=" | <panel type=" | ||
| {{: | {{: | ||
| </ | </ | ||
| - | * The second | + | * The second |
| <panel type=" | <panel type=" | ||
| {{: | {{: | ||
| </ | </ | ||
| - | * Each multi-WAN profile has an associated policy. | + | * Each Multi-WAN profile has an associated policy. |
| - | * This is where you specify | + | * Here you define |
| <panel type=" | <panel type=" | ||
| {{: | {{: | ||
| </ | </ | ||
| - | * After you applied the policy the multi-WAN profile is ready for prime time. | + | * Once you have applied the policy, the multi-WAN profile is ready for use. |
| - | * In the next section | + | * Next, we will look at the settings that are triggered when an interface is marked as **down** or **up**. |
| ===== When to switch sides ===== | ===== When to switch sides ===== | ||
| - | * Each interface | + | * For each interface you define, there is a separate area where you can specify |
| - | * Here are a few things to consider | + | * Here are some things to keep in mind when customising |
| - | * Active monitoring where hosts are pinged is not compulsory. | + | * Active monitoring, where the hosts are pinged, is not mandatory |
| - | * If it is not enabled, the multi-WAN configuration will still monitor | + | * If it is not enabled, the multi-WAN configuration will still monitor |
| - | * Some of the more popular hosts that people use for ping tests might limit the replies | + | * Some of the more popular hosts used for ping testing may limit the number of responses |
| - | * This can result in a false trigger and can also make the device | + | * This can lead to a false trigger and also to the device being unreachable |
| <panel type=" | <panel type=" | ||
| Line 62: | Line 62: | ||
| ------ | ------ | ||
| - | ====== | + | ====== |
| ===== Applying a multi-WAN profile ===== | ===== Applying a multi-WAN profile ===== | ||
| - | * When you attach | + | * When you connect |
| - | * If you select the Multi-WAN option, | + | * If you select the Multi-WAN option, |
| - | * Remember that the multi-wan profile and hardware | + | * Remember that the Multi-WAN profile and the hardware |
| <panel type=" | <panel type=" | ||
| Line 74: | Line 75: | ||
| ===== Multi-WAN reporting ===== | ===== Multi-WAN reporting ===== | ||
| - | * Multi-WAN Internet connections are visually | + | * Multi-WAN Internet connections are visually |
| < | < | ||
| {{: | {{: | ||
| </ | </ | ||
| - | * In the following screenshot we have an Access Point with a multi-WAN profile in failover mode. | + | * In the following screenshot we have an access point with a multi-WAN profile in failover mode. |
| * The WAN interface is active. | * The WAN interface is active. | ||
| - | * Traffic | + | * The traffic |
| * Two LTE interfaces are in the standby role. | * Two LTE interfaces are in the standby role. | ||
| - | * They are actively monitored and thus marked in blue as on standby. | + | * They are actively monitored and are therefore |
| - | * The WiFi interface | + | * The WiFi interface |
| < | < | ||
| {{: | {{: | ||
| </ | </ | ||
| - | * Next we introduce a scenario | + | * Next, we introduce a scenario |
| <code bash> | <code bash> | ||
| - | #We block ping packets on the host to which the access point is configured | + | #We block ping packets |
| #This will trigger | #This will trigger | ||
| sudo iptables -A INPUT -s 197.64.14.100 -p icmp --icmp-type echo-request -j DROP | sudo iptables -A INPUT -s 197.64.14.100 -p icmp --icmp-type echo-request -j DROP | ||
| #We remove the block | #We remove the block | ||
| - | #This result in a fall back. | + | #This leads to a fallback. |
| sudo iptables -D INPUT -s 197.64.14.100 -p icmp --icmp-type echo-request -j DROP | sudo iptables -D INPUT -s 197.64.14.100 -p icmp --icmp-type echo-request -j DROP | ||
| Line 101: | Line 102: | ||
| {{: | {{: | ||
| </ | </ | ||
| - | * Ping block removed and active role link is restored. | + | * Ping block is removed and the active role connection |
| < | < | ||
| {{: | {{: | ||
| </ | </ | ||