{"id":547,"date":"2018-06-28T10:48:25","date_gmt":"2018-06-28T09:48:25","guid":{"rendered":"https:\/\/lengers.com\/?p=547"},"modified":"2019-09-05T22:17:18","modified_gmt":"2019-09-05T21:17:18","slug":"ubiquiti-edgerouter-x-en-kpn-glasvezel-internet-configuratie-met-experiabox-v10","status":"publish","type":"post","link":"https:\/\/www.lengers.com\/?p=547","title":{"rendered":"Ubiquiti Edgerouter X en KPN glasvezel internet configuratie met Experiabox V10"},"content":{"rendered":"<p><strong>Update 5 September 2019<\/strong><\/p>\n<p>Na de update van het Edgerouter OS van 1.10.6 naar 2.0.6 werkte de IPTV van KPN niet goed meer. Beeld stopte na 10 seconden. De volgende setting moest uit de configuratie verwijderd worden:<\/p>\n<pre>set protocols igmp-proxy disable-quickleave<\/pre>\n<p>Dit kan via de command line maar ook in de Webgui met &#8220;Config tree&#8221; -&gt; &#8220;Protocols&#8221; -&gt; &#8220;IGMP Proxy&#8221; -&gt; &#8220;+ sign op disable-quick-leave&#8221; en dan de preview button.<\/p>\n<p>Dus dan veranderd de config van:<\/p>\n<p>Oud:<\/p>\n<pre>ubnt@ubnt:\/config\/scripts$ show configuration commands | grep -i igmp\nset protocols igmp-proxy disable-quickleave\nset protocols igmp-proxy interface eth0.4 alt-subnet 0.0.0.0\/0\nset protocols igmp-proxy interface eth0.4 role upstream\nset protocols igmp-proxy interface eth0.4 threshold 1\nset protocols igmp-proxy interface eth2 alt-subnet 0.0.0.0\/0\nset protocols igmp-proxy interface eth2 role downstream\nset protocols igmp-proxy interface eth2 threshold 1<\/pre>\n<p>Nieuw:<\/p>\n<pre>ubnt@ubnt:\/config\/scripts$ show configuration commands | grep -i igmp\nset protocols igmp-proxy interface eth0.4 alt-subnet 0.0.0.0\/0\nset protocols igmp-proxy interface eth0.4 role upstream\nset protocols igmp-proxy interface eth0.4 threshold 1\nset protocols igmp-proxy interface eth2 alt-subnet 0.0.0.0\/0\nset protocols igmp-proxy interface eth2 role downstream\nset protocols igmp-proxy interface eth2 threshold 1\nubnt@ubnt:\/config\/scripts$<\/pre>\n<p>Originele artikel:<\/p>\n<p>Ik heb een Reggefiber glasvezel aansluiting (in Apeldoorn) met een KPN triple play abonnement, telefoon, TV en internet. Momenteel heb ik een 200\/200 abonnement. De door KPN geleverde Experiabox (v10 nu) geeft mij niet de gewenste configuratie mogelijkheden, dat zeg ik toch heel netjes \ud83d\ude09<\/p>\n<p>Na veel lezen en help van andere sites ( <a href=\"https:\/\/gathering.tweakers.net\/forum\/list_message\/55536699#55536699\">tweakers.net<\/a> \/ \u00a0<a href=\"https:\/\/kriegsman.io\">kriegsman.io<\/a> \/ <a href=\"http:\/\/www.pimwiddershoven.nl\/entry\/kpn-router-iptv-on-an-ubiquiti-edgerouter-lite-lessons-learned\">pimwiddershoven.nl<\/a>\u00a0\/ <a href=\"http:\/\/www.netwerkje.com\">netwerkje.com<\/a> ) tot de volgende goed werkende configuratie gekomen. Ik heb een aparte router en wifi access point omdat ik na jaren modderen met all-in-one routers van Acer, Netgear en TP-Link daar zo zat van was dat ik opzoek ben gegaan naar beter spul. De grote voordelen zijn, de router kan in de meter kast maar het wifi access point kan op een beter plaats zonder dat het wifi signaal verstoord wordt. Uit gekomen bij Ubiquiti: niet gemakkelijker, wel veel beter. Mijn huidige setup ziet er zo uit:<\/p>\n<p><a href=\"https:\/\/lengers.com\/wp-content\/uploads\/2018\/06\/home-network.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-558 size-large\" src=\"https:\/\/lengers.com\/wp-content\/uploads\/2018\/06\/home-network-1024x518.jpg\" alt=\"\" width=\"1024\" height=\"518\" srcset=\"https:\/\/www.lengers.com\/wp-content\/uploads\/2018\/06\/home-network-1024x518.jpg 1024w, https:\/\/www.lengers.com\/wp-content\/uploads\/2018\/06\/home-network-300x152.jpg 300w, https:\/\/www.lengers.com\/wp-content\/uploads\/2018\/06\/home-network-768x389.jpg 768w, https:\/\/www.lengers.com\/wp-content\/uploads\/2018\/06\/home-network.jpg 1061w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>Een <a href=\"https:\/\/www.ubnt.com\/edgemax\/edgerouter-x\/\">Ubiquiti Edgerouter X<\/a>\u00a0(<a href=\"https:\/\/amzn.to\/2lFZXuH\">amazon.de<\/a>) de volgende aansluitingen:<\/p>\n<p>Port 0 = NT Glasvezel aansluiting<br \/>\nPort 1 = Lokaal LAN 10.10.10.* via een 8 poort\u00a0<a href=\"https:\/\/amzn.to\/2MWaONl\">Netgear ProSAFE Gigabit Plus Switch GS108E<\/a><br \/>\nPort 2 = Lokaal LAN 10.10.10.* voor IPTV via een 5 poort\u00a0<a href=\"https:\/\/amzn.to\/2MUICdG\">Netgear ProSAFE Gigabit Plus Switch GS105E<\/a><br \/>\nPort 3 = Lokaal LAN 10.10.10.* voor WIFI via een <a href=\"https:\/\/amzn.to\/2MXls6y\">Ubiquiti UniFi AP-AC-PRO<\/a><br \/>\nPort 4 = Experia V10 box voor telefonie<\/p>\n<p>De inkomende Vlans zijn 4 = IPTV, 6= internet, 7 = \u00a0Telefonie.\u00a0IPTV kan routed en bridged, ik gebruik routed. <a href=\"http:\/\/www.netwerkje.com\/routed-iptv\">Uitleg hier<\/a>. Ik gebruik de Experiabox dus alleen voor telefonie, ook heb ik de WIFI afgezet op de Experiabox (geen vervuiling van het wifi spectrum).<\/p>\n<p>Ik heb bewust voor de iets duurdere 5 en 8 port Netgear switches gekozen omdat deze goed\u00a0IGMP snooping, nodig voor KPN IPTV, ondersteunen in tegenstelling andere merken die zeggen dat ze het ondersteunen maar bij mij werkte het niet (TP-LINK).<\/p>\n<p>De edgerouter X heeft een configureerbare ingebouwde hardware switch, dat hebben niet alle modellen van Ubiquiti, port 1,2,3 zijn als switch geconfigureerd werken dus als 1 LAN. Ook is <a href=\"https:\/\/help.ubnt.com\/hc\/en-us\/articles\/115006567467-EdgeRouter-Hardware-Offloading-Explained\">hardware offloading<\/a> aangezet, dit is wel zo goed voor de performance.<\/p>\n<p>De GUI van de Edgerouter is mooi maar inloggen met ssh maakt het opzetten gemakkelijker. Wel even opletten wat je doet bij het configureren en aan welke poort met welk (DHCP) Ip adres je je computer hangt waar meer je via ssh in logt. Mijn interne netwerk heeft de ip range 10.10.10.x \/255.255.255.0, als jij wat anders hebt de config aanpassen. Let op! dit is dus geen walk-through-guide maar een weergave van een werkende configuratie.<\/p>\n<p>Op de IPTV routes te updaten als KPN het netwerk aanpast moet het volgende script worden geinstalleerd en iedere 5 minuten worden uitgevoerd. Instructies [hier] (Credit: Kriegsman.io)<\/p>\n <script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- lengers.com-728x90 -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:inline-block;width:728px;height:90px\"\r\n     data-ad-client=\"ca-pub-8335976178265682\"\r\n     data-ad-slot=\"7888284778\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<p>Als je aan de slag gaat natuurlijk de &#8220;set&#8221; commands omgeven met:<\/p>\n<pre>configure\n\n...commands\n\ncommit\nsave\nexit<\/pre>\n<p>Zo ziet mijn configuratie er momenteel uit (Ik heb wat instellingen met XXXX gemarkeerd die je moet vervangen met \u00a0jou data)<\/p>\n<p>Het commentaar met \/\/ moet weg gelaten worden<\/p>\n<pre>$ show configuration commands\n\nset firewall all-ping enable\nset firewall broadcast-ping disable\nset firewall ipv6-name WANv6_IN default-action drop\nset firewall ipv6-name WANv6_IN description 'WAN inbound traffic forwarded to LAN'\nset firewall ipv6-name WANv6_IN enable-default-log\nset firewall ipv6-name WANv6_IN rule 10 action accept\nset firewall ipv6-name WANv6_IN rule 10 description 'Allow established\/related sessions'\nset firewall ipv6-name WANv6_IN rule 10 state established enable\nset firewall ipv6-name WANv6_IN rule 10 state related enable\nset firewall ipv6-name WANv6_IN rule 20 action drop\nset firewall ipv6-name WANv6_IN rule 20 description 'Drop invalid state'\nset firewall ipv6-name WANv6_IN rule 20 state invalid enable\nset firewall ipv6-name WANv6_LOCAL default-action drop\nset firewall ipv6-name WANv6_LOCAL description 'WAN inbound traffic to the router'\nset firewall ipv6-name WANv6_LOCAL enable-default-log\nset firewall ipv6-name WANv6_LOCAL rule 10 action accept\nset firewall ipv6-name WANv6_LOCAL rule 10 description 'Allow established\/related sessions'\nset firewall ipv6-name WANv6_LOCAL rule 10 state established enable\nset firewall ipv6-name WANv6_LOCAL rule 10 state related enable\nset firewall ipv6-name WANv6_LOCAL rule 20 action drop\nset firewall ipv6-name WANv6_LOCAL rule 20 description 'Drop invalid state'\nset firewall ipv6-name WANv6_LOCAL rule 20 state invalid enable\nset firewall ipv6-name WANv6_LOCAL rule 30 action accept\nset firewall ipv6-name WANv6_LOCAL rule 30 description 'Allow IPv6 icmp'\nset firewall ipv6-name WANv6_LOCAL rule 30 protocol ipv6-icmp\nset firewall ipv6-name WANv6_LOCAL rule 40 action accept\nset firewall ipv6-name WANv6_LOCAL rule 40 description 'allow dhcpv6'\nset firewall ipv6-name WANv6_LOCAL rule 40 destination port 546\nset firewall ipv6-name WANv6_LOCAL rule 40 protocol udp\nset firewall ipv6-name WANv6_LOCAL rule 40 source port 547\nset firewall ipv6-receive-redirects disable\nset firewall ipv6-src-route disable\nset firewall ip-src-route disable\nset firewall log-martians enable\nset firewall name WAN_IN default-action drop\nset firewall name WAN_IN description 'WAN to Internal'\nset firewall name WAN_IN enable-default-log\nset firewall name WAN_IN rule 10 action accept\nset firewall name WAN_IN rule 10 description 'Allow established\/related'\nset firewall name WAN_IN rule 10 log enable\nset firewall name WAN_IN rule 10 protocol all\nset firewall name WAN_IN rule 10 state established enable\nset firewall name WAN_IN rule 10 state invalid disable\nset firewall name WAN_IN rule 10 state new disable\nset firewall name WAN_IN rule 10 state related enable\nset firewall name WAN_IN rule 20 action drop\nset firewall name WAN_IN rule 20 description 'Drop invalid state'\nset firewall name WAN_IN rule 20 log enable\nset firewall name WAN_IN rule 20 protocol all\nset firewall name WAN_IN rule 20 state established disable\nset firewall name WAN_IN rule 20 state invalid enable\nset firewall name WAN_IN rule 20 state new disable\nset firewall name WAN_IN rule 20 state related disable\nset firewall name WAN_LOCAL default-action drop\nset firewall name WAN_LOCAL description 'WAN to router'\nset firewall name WAN_LOCAL enable-default-log\nset firewall name WAN_LOCAL rule 10 action accept\nset firewall name WAN_LOCAL rule 10 description 'Allow established\/related'\nset firewall name WAN_LOCAL rule 10 log disable\nset firewall name WAN_LOCAL rule 10 protocol all\nset firewall name WAN_LOCAL rule 10 state established enable\nset firewall name WAN_LOCAL rule 10 state invalid disable\nset firewall name WAN_LOCAL rule 10 state new disable\nset firewall name WAN_LOCAL rule 10 state related enable\nset firewall name WAN_LOCAL rule 20 action drop\nset firewall name WAN_LOCAL rule 20 description 'Drop invalid state'\nset firewall name WAN_LOCAL rule 20 log disable\nset firewall name WAN_LOCAL rule 20 protocol all\nset firewall name WAN_LOCAL rule 20 state established disable\nset firewall name WAN_LOCAL rule 20 state invalid enable\nset firewall name WAN_LOCAL rule 20 state new disable\nset firewall name WAN_LOCAL rule 20 state related disable\nset firewall receive-redirects disable\nset firewall send-redirects enable\nset firewall source-validation disable\nset firewall syn-cookies enable\n\n\/\/ Bridge voor Telefonie\nset interfaces bridge br0 aging 300\nset interfaces bridge br0 bridged-conntrack disable\nset interfaces bridge br0 hello-time 2\nset interfaces bridge br0 max-age 20\nset interfaces bridge br0 priority 32768\nset interfaces bridge br0 promiscuous disable\nset interfaces bridge br0 stp false\n\n\/\/ eth0 is port 0 is een PPPOE voor naar de glasvezel\nset interfaces ethernet eth0 description 'eth0 - FTU'\nset interfaces ethernet eth0 duplex auto\nset interfaces ethernet eth0 mtu 1512\nset interfaces ethernet eth0 speed auto\nset interfaces ethernet eth0 vif 4 address dhcp\nset interfaces ethernet eth0 vif 4 description 'eth0.4 - IPTV'\nset interfaces ethernet eth0 vif 4 dhcp-options client-option 'send vendor-class-identifier &amp;quot;IPTV_RG&amp;quot;;'\nset interfaces ethernet eth0 vif 4 dhcp-options client-option 'request subnet-mask, routers, rfc3442-classless-static-routes;'\nset interfaces ethernet eth0 vif 4 dhcp-options default-route no-update\nset interfaces ethernet eth0 vif 4 dhcp-options default-route-distance 210\nset interfaces ethernet eth0 vif 4 dhcp-options name-server update\n\n\/\/ IP internet verkeer VLAN 6 aan bridge br0 hangen\nset interfaces ethernet eth0 vif 6 description 'eth0.6 - Internet'\nset interfaces ethernet eth0 vif 6 mtu 1508\nset interfaces ethernet eth0 vif 6 pppoe 0 default-route auto\nset interfaces ethernet eth0 vif 6 pppoe 0 dhcpv6-pd no-dns\nset interfaces ethernet eth0 vif 6 pppoe 0 dhcpv6-pd pd 0 interface eth1 prefix-id ':1'\nset interfaces ethernet eth0 vif 6 pppoe 0 dhcpv6-pd pd 0 interface eth1 service slaac\nset interfaces ethernet eth0 vif 6 pppoe 0 dhcpv6-pd pd 0 prefix-length \/48\nset interfaces ethernet eth0 vif 6 pppoe 0 dhcpv6-pd rapid-commit disable\nset interfaces ethernet eth0 vif 6 pppoe 0 firewall in ipv6-name WANv6_IN\nset interfaces ethernet eth0 vif 6 pppoe 0 firewall in name WAN_IN\nset interfaces ethernet eth0 vif 6 pppoe 0 firewall local ipv6-name WANv6_LOCAL\nset interfaces ethernet eth0 vif 6 pppoe 0 firewall local name WAN_LOCAL\nset interfaces ethernet eth0 vif 6 pppoe 0 idle-timeout 180\nset interfaces ethernet eth0 vif 6 pppoe 0 ipv6 address autoconf\nset interfaces ethernet eth0 vif 6 pppoe 0 ipv6 dup-addr-detect-transmits 1\nset interfaces ethernet eth0 vif 6 pppoe 0 ipv6 enable\nset interfaces ethernet eth0 vif 6 pppoe 0 mtu 1500\nset interfaces ethernet eth0 vif 6 pppoe 0 name-server auto\nset interfaces ethernet eth0 vif 6 pppoe 0 password kpn\nset interfaces ethernet eth0 vif 6 pppoe 0 user-id XX-XX-XX-XX-XX@direct-adsl\n\n\/\/ TelefonieVLAN 7 aan bridge br0 hangen\nset interfaces ethernet eth0 vif 7 bridge-group bridge br0\nset interfaces ethernet eth0 vif 7 description 'eth0.7 - VOIP'\nset interfaces ethernet eth0 vif 7 mtu 1500\n\n\/\/ Eth1 is voor mijn normale internet verkeer naar lokaal lan\nset interfaces ethernet eth1 description 'eth1 - LAN'\nset interfaces ethernet eth1 duplex auto\nset interfaces ethernet eth1 speed auto\n\n\/\/ Eth2 is voor IPTV \nset interfaces ethernet eth2 description 'eth2 - IPTV'\nset interfaces ethernet eth2 duplex auto\nset interfaces ethernet eth2 mtu 1500\nset interfaces ethernet eth2 speed auto\n\n\/\/Eth3 is voor mijn WIFI access point, deze kan ook in de switch die aan poort eth1 hangt, werkt ook\nset interfaces ethernet eth3 duplex auto\nset interfaces ethernet eth3 speed auto\n\n\/\/Eth4 gaat naar experiabox voor telefonie\nset interfaces ethernet eth4 description 'eth4 - ExperiaBox'\nset interfaces ethernet eth4 duplex auto\nset interfaces ethernet eth4 speed auto\nset interfaces ethernet eth4 vif 7 bridge-group bridge br0\nset interfaces ethernet eth4 vif 7 description 'eth4.7 - ExperiaBox VOIP'\nset interfaces ethernet eth4 vif 7 mtu 1500\n\n\/\/ Combineer Eth1 \/ eth2 \/ eth3 in 1 switch en geef die het interne router IP.\nset interfaces loopback lo\nset interfaces switch switch0 address 10.10.10.4\/24\nset interfaces switch switch0 mtu 1500\nset interfaces switch switch0 switch-port interface eth1\nset interfaces switch switch0 switch-port interface eth2\nset interfaces switch switch0 switch-port interface eth3\nset interfaces switch switch0 switch-port vlan-aware disable\n\n\/\/ Nog een poort forward, niet nodig om het eea de gang te krijgen\nset port-forward auto-firewall enable\nset port-forward hairpin-nat enable\nset port-forward lan-interface switch0\nset port-forward rule 1 description rest-https\nset port-forward rule 1 forward-to address 10.10.10.3\nset port-forward rule 1 forward-to port 3101\nset port-forward rule 1 original-port 3101\nset port-forward rule 1 protocol tcp\nset port-forward wan-interface pppoe0\n\n\/\/Disable quick leave is nodig anders hapert IPTV zender wisselen\nset protocols igmp-proxy disable-quickleave\nset protocols igmp-proxy interface eth0.4 alt-subnet 0.0.0.0\/0\nset protocols igmp-proxy interface eth0.4 role upstream\nset protocols igmp-proxy interface eth0.4 threshold 1\nset protocols igmp-proxy interface eth2 alt-subnet 0.0.0.0\/0\nset protocols igmp-proxy interface eth2 role downstream\nset protocols igmp-proxy interface eth2 threshold 1\n\n\/\/ Routes opzetten voor IPTV\nset protocols static interface-route6 '::\/0' next-hop-interface pppoe0\nset protocols static route 213.75.112.0\/21 next-hop 10.228.208.1\n\n\/\/ DHCP server aanzetten\nset service dhcp-server disabled false\nset service dhcp-server global-parameters 'option vendor-class-identifier code 60 = string;'\nset service dhcp-server global-parameters 'option broadcast-address code 28 = ip-address;'\nset service dhcp-server hostfile-update disable\nset service dhcp-server shared-network-name LAN authoritative enable\nset service dhcp-server shared-network-name LAN subnet 10.10.10.0\/24 default-router 10.10.10.4\n\n\/\/ Ik gebruik googles DNS servers 8.8.8.8 en 4.4.4.4\n\nset service dhcp-server shared-network-name LAN subnet 10.10.10.0\/24 dns-server 8.8.8.8\nset service dhcp-server shared-network-name LAN subnet 10.10.10.0\/24 dns-server 8.8.4.4\nset service dhcp-server shared-network-name LAN subnet 10.10.10.0\/24 lease 86400\nset service dhcp-server shared-network-name LAN subnet 10.10.10.0\/24 start 10.10.10.100 stop 10.10.10.200\nset service dhcp-server static-arp disable\nset service dhcp-server use-dnsmasq disable\n\n\/\/ Ik gebruik dynamic DNS NOIP. Niet nodig als je niet weet wat dit is.\nset service dns dynamic interface eth0 service noip host-name XXX.XXX.nl\nset service dns dynamic interface eth0 service noip login XXXUsernaam \nset service dns dynamic interface eth0 service noip password XXXPassword\n\n\/\/ DNS forwarding opzetten\nset service dns forwarding cache-size 150\nset service dns forwarding listen-on switch0\nset service dns forwarding name-server 8.8.8.8\nset service dns forwarding name-server 8.8.4.4\nset service dns forwarding options listen-address=10.10.10.4\n\n\/\/ Edgerouter gui alleen van 10.10.10.4 te benaderen\nset service gui http-port 80\nset service gui https-port 443\nset service gui listen-address 10.10.10.4\nset service gui older-ciphers enable\n\n\/\/ Wat NAT rule op IPTV en internet verkeer door te laten\nset service nat rule 5000 description IPTV\nset service nat rule 5000 destination address 10.16.0.0\/16\nset service nat rule 5000 log disable\nset service nat rule 5000 outbound-interface eth0.4\nset service nat rule 5000 protocol all\nset service nat rule 5000 type masquerade\nset service nat rule 5001 description IPTV\nset service nat rule 5001 destination address 213.75.112.0\/21\nset service nat rule 5001 log disable\nset service nat rule 5001 outbound-interface eth0.4\nset service nat rule 5001 protocol all\nset service nat rule 5001 type masquerade\nset service nat rule 5010 description 'KPN Internet'\nset service nat rule 5010 log enable\nset service nat rule 5010 outbound-interface pppoe0\nset service nat rule 5010 protocol all\nset service nat rule 5010 source address 10.10.10.4\/24\nset service nat rule 5010 type masquerade\n\n\/\/ ssh port open zetten voor command line \nset service ssh port 22\nset service ssh protocol-version v2\nset service ubnt-discover disable\n\n\/\/ upnp alleen via switch0 (10.10.10.4) te benaderen\nset service upnp listen-on switch0 outbound-interface pppoe0\nset system host-name XXX\n\n\/\/ User login op Edgerouter opzetten \nset system login user ubnt authentication encrypted-password 'XXXXXXXXXXXXXXXXXXXXXXXXXXX'\nset system login user XXX authentication plaintext-password ''\nset system login user XXX full-name ''\nset system login user XXX level admin\n\n\/\/ Googles DNS servers\nset system name-server 8.8.8.8\nset system name-server 8.8.4.4\n\n\/\/ NTP protocol opzetten\nset system ntp server 0.ubnt.pool.ntp.org\nset system ntp server 1.ubnt.pool.ntp.org\nset system ntp server 2.ubnt.pool.ntp.org\nset system ntp server 3.ubnt.pool.ntp.org\n\n\/\/ Hardware offloading voor de Edgerouter X aanzetten (performance!!)\nset system offload hwnat enable\n\n\/\/ Misc settings\nset system package\nset system syslog global facility all level notice\nset system syslog global facility protocols level debug\nset system time-zone UTC\nset system traffic-analysis dpi disable\nset system traffic-analysis export disable<\/pre>\n <script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- lengers.com-728x90 -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:inline-block;width:728px;height:90px\"\r\n     data-ad-client=\"ca-pub-8335976178265682\"\r\n     data-ad-slot=\"7888284778\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Update 5 September 2019 Na de update van het Edgerouter OS van 1.10.6 naar 2.0.6 werkte de IPTV van KPN niet goed meer. Beeld stopte na 10 seconden. De volgende setting moest uit de configuratie verwijderd worden: set protocols igmp-proxy disable-quickleave Dit kan via de command line maar ook in de Webgui met &#8220;Config tree&#8221; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":555,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"categories":[58,55],"tags":[72,73,70,75,71],"class_list":["post-547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-computing","tag-edgerouter","tag-experiabox","tag-kpn","tag-netgear","tag-wifi","entry","has-media"],"featured_image_src_large":["https:\/\/www.lengers.com\/wp-content\/uploads\/2018\/06\/Screenshot-2018-06-25-12.41.40.png",785,436,false],"author_info":{"display_name":"Remco","author_link":"https:\/\/www.lengers.com\/?author=1"},"comment_info":26,"category_info":[{"term_id":58,"name":"General","slug":"general","term_group":0,"term_taxonomy_id":58,"taxonomy":"category","description":"","parent":0,"count":2,"filter":"raw","cat_ID":58,"category_count":2,"category_description":"","cat_name":"General","category_nicename":"general","category_parent":0},{"term_id":55,"name":"IT","slug":"computing","term_group":0,"term_taxonomy_id":55,"taxonomy":"category","description":"","parent":0,"count":11,"filter":"raw","cat_ID":55,"category_count":11,"category_description":"","cat_name":"IT","category_nicename":"computing","category_parent":0}],"tag_info":[{"term_id":72,"name":"edgerouter","slug":"edgerouter","term_group":0,"term_taxonomy_id":72,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":73,"name":"Experiabox","slug":"experiabox","term_group":0,"term_taxonomy_id":73,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":70,"name":"kpn","slug":"kpn","term_group":0,"term_taxonomy_id":70,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":75,"name":"Netgear","slug":"netgear","term_group":0,"term_taxonomy_id":75,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":71,"name":"wifi","slug":"wifi","term_group":0,"term_taxonomy_id":71,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"}],"taxonomy_info":{"category":[{"value":58,"label":"General"},{"value":55,"label":"IT"}],"post_tag":[{"value":72,"label":"edgerouter"},{"value":73,"label":"Experiabox"},{"value":70,"label":"kpn"},{"value":75,"label":"Netgear"},{"value":71,"label":"wifi"}]},"_links":{"self":[{"href":"https:\/\/www.lengers.com\/index.php?rest_route=\/wp\/v2\/posts\/547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lengers.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lengers.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lengers.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lengers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=547"}],"version-history":[{"count":10,"href":"https:\/\/www.lengers.com\/index.php?rest_route=\/wp\/v2\/posts\/547\/revisions"}],"predecessor-version":[{"id":583,"href":"https:\/\/www.lengers.com\/index.php?rest_route=\/wp\/v2\/posts\/547\/revisions\/583"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lengers.com\/index.php?rest_route=\/wp\/v2\/media\/555"}],"wp:attachment":[{"href":"https:\/\/www.lengers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lengers.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lengers.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}