Hello to all,
I have been trying to apply the configuration to split the traffic by two different ISP's but I have made some mistakes that I am not able to see.
Basically I want to split vlan 2 traffic of the others.
Here is the configuration of the AR2200 Router.
<Router_ElPalau>dis current-configuration
[V200R009C00SPC500]
#
sysname Router_ElPalau
#
drop illegal-mac alarm
#
clock timezone gmt add 01:00:00
clock daylight-saving-time gmt repeating 2:0 last Sunday March 3:0 last Sunday October 01:00 2000 2037
#
vlan batch 2 to 4
#
authentication-profile name default_authen_profile
authentication-profile name dot1x_authen_profile
authentication-profile name mac_authen_profile
authentication-profile name portal_authen_profile
authentication-profile name dot1xmac_authen_profile
authentication-profile name multi_authen_profile
#
dns resolve
dns server 8.8.8.8
#
dhcp enable
#
dhcp server database enable
dhcp server database recover
#
ecc peer-public-key 192.168.4.2 encoding-type der
public-key-code begin
0401C076 1B518194 D82E6B20 45DF3D7E 3034812A 7AF6A572 4A75145B 5EC63902
198BA23E FB0110BF 5F3F6556 C4C0AA47 7296DE36 B55E19A7 7E36569E B58C1A7F
C46E2B01 445B3708 DF599041 7398A0E0 478ADC0C 46B0EEAA 165C490C 096D0FD9
73D123D2 585D8D2C 12BC8486 959C89F8 BFCAF8DA 79CA9F47 93E6DF38 93D6B6B2
706B0D9C 81
public-key-code end
peer-public-key end
#
radius-server template default
#
pki realm default
#
ssl policy default_policy type server
pki-realm default
version tls1.0 tls1.1
ciphersuite rsa_aes_128_cbc_sha
#
acl number 3001
description NAT Outside
rule 2 permit ip source 192.168.110.0 0.0.0.255
rule 4 permit ip source 192.168.4.0 0.0.0.255
rule 5 permit ip source 192.169.1.0 0.0.0.255
acl number 3002
rule 2 permit ip source 192.168.111.0 0.0.0.255
rule 4 permit ip source 192.168.4.0 0.0.0.255
rule 5 permit ip source 192.169.1.0 0.0.0.255
acl number 3003
description Orange Outside
rule 1 permit ip source 172.16.0.0 0.0.7.255
#
ike proposal default
encryption-algorithm aes-256
dh group14
authentication-algorithm sha2-256
authentication-method pre-share
integrity-algorithm hmac-sha2-256
prf hmac-sha2-256
#
traffic classifier c1 operator or
if-match acl 3003
#
traffic behavior b1
#
traffic policy p1
classifier c1 behavior b1 precedence 5
#
free-rule-template name default_free_rule
#
portal-access-profile name portal_access_profile
#
ip pool Alumnes16
gateway-list 172.16.0.1
network 172.16.0.0 mask 255.255.248.0
excluded-ip-address 172.16.0.2 172.16.0.40
lease day 0 hour 2 minute 0
dns-list 213.176.161.16 213.176.161.18
#
ip pool Gestio4
gateway-list 192.168.4.1
network 192.168.4.0 mask 255.255.255.0
excluded-ip-address 192.168.4.10 192.168.4.40
lease day 0 hour 4 minute 0
dns-list 213.176.161.16 213.176.161.18
#
ip pool Profes10
gateway-list 192.168.110.1
network 192.168.110.0 mask 255.255.255.0
excluded-ip-address 192.168.110.2 192.168.110.10
lease day 0 hour 2 minute 0
dns-list 213.176.161.16 213.176.161.18
#
aaa
authentication-scheme default
authentication-scheme radius
authentication-mode radius
authorization-scheme default
accounting-scheme default
domain default
authentication-scheme default
domain default_admin
authentication-scheme default
undo local-user admin
local-user airfi password irreversible-cipher $1a$Rg8cXB5&S/$@YIz)nGRL+J"m,E<hD)1/3qVOwhWN=p_A~4P(U!U$
local-user airfi privilege level 15
local-user airfi service-type terminal ssh http
#
firewall zone OUTSIDE
priority 10
#
firewall zone DMZ
priority 15
#
firewall zone INSIDE
priority 20
#
firewall zone Local
#
firewall interzone INSIDE OUTSIDE
firewall enable
#
firewall interzone INSIDE DMZ
firewall enable
#
interface GigabitEthernet0/0/0
shutdown
#
interface GigabitEthernet0/0/1
shutdown
#
interface GigabitEthernet0/0/2
shutdown
#
interface GigabitEthernet0/0/3
shutdown
#
interface GigabitEthernet0/0/4
ip address 192.169.1.1 255.255.255.0
#
interface GigabitEthernet0/0/5
description Interface Orange Outside
ip address 192.168.1.2 255.255.255.0
nat outbound 3003
#
interface GigabitEthernet0/0/6
shutdown
#
interface GigabitEthernet0/0/7
description Interface Outside Provisional
ip address 192.168.0.5 255.255.255.0
nat outbound 3001
zone OUTSIDE
#
interface GigabitEthernet0/0/8
description Interface Inside
#
interface GigabitEthernet0/0/8.2
dot1q termination vid 2
ip address 172.16.0.1 255.255.248.0
zone DMZ
traffic-policy p1 inbound
dhcp select global
#
interface GigabitEthernet0/0/8.3
dot1q termination vid 3
ip address 192.168.110.1 255.255.255.0
zone INSIDE
dhcp select global
#
interface GigabitEthernet0/0/8.4
dot1q termination vid 4
ip address 192.168.4.1 255.255.255.0
zone INSIDE
dhcp select global
#
interface GigabitEthernet0/0/9
description Interface Outside
ip address 172.16.10.7 255.255.252.0
nat outbound 3001
zone OUTSIDE
#
interface GigabitEthernet0/0/10
description VirtualPort
#
interface Cellular0/0/0
#
interface NULL0
#
snmp-agent local-engineid 800007DB037CC385632530
#
ssh client 192.168.4.2 assign ecc-key 192.168.4.2
ssh client first-time enable
stelnet server enable
#
http secure-server ssl-policy default_policy
http server enable
http secure-server enable
http server permit interface GigabitEthernet0/0/4
#
ip route-static 0.0.0.0 0.0.0.0 172.16.10.1
ip route-static 0.0.0.0 0.0.0.0 192.168.0.1
#
fib regularly-refresh disable
#
nqa test-instance admin KNOW_IP
test-type udp
destination-address ipv4 79.137.44.122
destination-port 7777
frequency 30
start now
#
user-interface con 0
authentication-mode aaa
user-interface vty 0 4
authentication-mode aaa
user privilege level 15
protocol inbound ssh
#
wlan ac
traffic-profile name default
security-profile name default
security-profile name default-wds
security wpa2 psk pass-phrase %^%#@jbr!^3$qFsgv=P]ohHP)_L30}mAxKqAQSR;bs>)%^%# aes
ssid-profile name default
vap-profile name default
wds-profile name default
regulatory-domain-profile name default
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-spoof-profile name default
wids-profile name default
ap-system-profile name default
port-link-profile name default
wired-port-profile name default
ap-group name default
#
dot1x-access-profile name dot1x_access_profile
#
mac-access-profile name mac_access_profile
#
ops
#
autostart
#
secelog
#
return
Thank you very much for your help.