hi, my rb433 has last update.
as you can see in attached image.we have about 9mb/s unknown load;disabling the address of interface has no effect.
please see attachment
tried this, no change. no packet on firewall role status tab.Hi
http://www.speedguide.net/port.php?port=5200
http://www.speedguide.net/port.php?port=37083
there is not an explicit info, you can drop it with firewall and see what happens or what application or protocol stops working
yes.( rb433)both src and dst interfaces are on RB411 ? if not what device they are ??
thank you for reply.ok i will do it. thank you again.This is traffic that was destined from one host on the disabled IP network to another host on the same IP network. Disabling the IP address on the Mikrotik is not enough to take away that IP range, and not enough to stop the host from sending the packets- As long as the client device wants to send these packets, it can do so. What's interesting is that the Mikrotik is receiving them at the IP interface instead of simply bridging them to the destination host....
I also noticed that the IP address was associated with a hotspot - perhaps the source host of the traffic has the Mikrotik's MAC address stuck in its ARP cache as the holder of IP address 172.17.6.137 (which in a hotspot scenario is easily the case) - You need to find the device by its MAC address. Try making a quick packet capture with the sniffer tool and examining the packets to find the MAC of the sender - then track that down by using the Hosts list on the bridge or hotspot menus (or even the switch menu if your router has a hardware switch)
I recommend doing a quick packet capture instead. Torch can be a bit ambiguous (at least to me) as to which direction the packets are actually going and who is really the source/dst of the traffic.we have no ipv6 enabled device in our network.