Thanks.
When things go haywire, does any sort of traffic shaping kick in?
Not that I have setup, but not sure if RouterOS is doing something behind the scenes. I don't know how to check. Nothing changed in my configuration from when it was working to when it stopped working, other than possible iOS and RouterOS updates (I guess AT&T could have also updated broadband and/or carrier things). In other words, I didn't explicitly change anything.
What's the UL speed of your wired subscription? What type of device is your MT router? How do FW rules look like? (paste output of /ip firewall filter export in [ code] ... [ /code] environment
50/10 connection, I get about 45/11 Mbps per Ookla speed test
MT router: CRS125-24G-1S-2HnD running 6.43.8
Results from /ip firewall export below. Note that I have tried with all filter drop rules disabled, and WiFi calling still breaks:
/ip firewall filter
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="For L2TP/IPSec" port=1701,500,4500 protocol=udp
add action=accept chain=input comment="For L2TP/IPSec" protocol=ipsec-esp
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
I understand that the phone is establishing and IPsec tunnel with the carrier, is the masquerade possibly getting in the way (and if so, why would it work for 15-20 seconds?). On a different forum for Ubiquiti products, I did see someone else with a iPhone that was exhibiting similar behavior, and they said the are able to see that after 15-20 seconds the outbound packets aren't making it to/through the router.