19:19:22 dhcp,warning DHCP offering lease 172.29.40.60 for 08:00:0F:8F:C0:0E without success
19:19:22 dhcp,info DHCP assigned 172.29.40.60 to 08:00:0F:8F:C0:0E
All the same!I also have the same problem session stops on the DHCP offered. The problem is version 6.38 and higher. Version 6.37.4 is ok.
v6.39rc17 broke STP on my rb2011UiAS-2HnD, it makes the bridge root port the ether my DVR is on and will not pass traffic. I can remove that port from bridge, disable the ether, or set STP to none to start passing traffic again. I updated from v6.38rc46. The DVR is a Directv Genie (HR44/700) and has a pass-through ether (2 ports) which may actually be the cause. It had been working fine before the upgrade.Version 6.38 had an issue related to STP which was resolved in 6.38.1. Also 6.38 changelog included note which said, that all devices should be upgraded to latest version to implement proper STP functionality in network. Same goes for 6.38.1 We have not seen any actual issues in 6.38.1 version related to software. Usually some devices in network are not upgraded and that is the cause of DHCP problems.
Same issue for me- 6.37.3, 6.38.1, 6.39rc17- all software versions have dhcp issues for me.We are seeing this issues with version 6.38.1 as well. I have downgraded one of my test routers to 6.37.3 to see if it resolves.
15:37:55 dhcp,warning dhcp3 offering lease 10.225.119.50 for 74:D0:2B:8C:78:9D without success
15:38:25 dhcp,warning dhcp3 offering lease 10.225.119.50 for 74:D0:2B:8C:78:9D without success
I have logged a support request and included a link to this topic. I hope more confirm this in the mean time.
Hello,
Sorry for delayed reply. Now we have fixed some bridging bugs from 6.38.x which could cause DHCP related problems and recommend upgrading to the latest v6.39rc.
Best regards,
Janis B.
--
MikroTik.com
So, I upgraded several routers last night to 6.38.1. A hEx Lite and a CRS125 both had DHCP issues with Ubiquiti access points (both UAP/UAP-LR's and UAP-AC's). I rolled both of them back to 6.37.4 and troubles are gone.
Other locations that did not have issues included CRS125's (same exact model as the one with problems), RB2011L's, hEx's, and an hAP AC Lite. Many of these locations also have Ubiquiti AP's.
All access points were already updated to their latest firmware.
One thing that I noticed was that Unifi Discovery was reporting the AP IP address as "192.168.2.20?", putting a question mark for the last digit and it could not reach them to send commands. I didn't have any issues with any of the wired clients except for the APs.
If the broadcast bit is not set and 'giaddr' is zero and
'ciaddr' is zero, then the server unicasts DHCPOFFER and DHCPACK
messages to the client's hardware address and 'yiaddr' address.
I confirm the recovery of DHCP server assignment by the changing of any STP Protocol mode to another (maybe you might want to disable and re-enabled it again), so it seems a feasible workaround for me. But it is worth to mention that this just will work in the meantime the device is not rebooted in which case it has to be applied again.Problem in v6.38.5 also. Upgraded a CCR1036 this morning per Mikrotik support request on another issue entirely. DHCP stopped working after the update.
Seeing "SERVER offering lease x.x.x.x without success" in log.
I disabled RSTP on the bridge interface and the issue appears to be resolved.
This statement is correct. I had to reboot the affected router over the weekend and DHCP subsequently stopped working.But it is worth to mention that this just will work in the meantime the device is not rebooted in which case it has to be applied again.
I also upgrade to 6.38.5 and I had this issue, I went to System -> Package List and click "downgrade" selecting nothing.. I'm still on 6.38.5.. Maybe it reinstall the package but at the moment the problem there isn't. Could you explain more regardin the admin-mac? What mac I have to put in case this problem come out again? ThanksI've updated my RB2011 to 6.38.5.
Setting the administrative MAC on the bridge-interfaces helped with this dhcp-problem.
(Kudos to tulluk on reddit: https://www.reddit.com/r/mikrotik/comme ... e_to_6385/)in the bridge settings on the RB2011 set the 'admin MAC' of the wireless bridge0 to be the same as its actual MAC. This results in the DHCP packets having the right source MAC for return from the AP device. no need to change anything else, nor disable the STP. Everything also worked on reboot.
To downgrade you need to download the release you which to "walk back to" and put the files on the router. Then click downgrade.I also upgrade to 6.38.5 and I had this issue, I went to System -> Package List and click "downgrade" selecting nothing.. I'm still on 6.38.5.. Maybe it reinstall the package but at the moment the problem there isn't. Could you explain more regardin the admin-mac? What mac I have to put in case this problem come out again? ThanksI've updated my RB2011 to 6.38.5.
Setting the administrative MAC on the bridge-interfaces helped with this dhcp-problem.
Sorry but I'm italian and I don't understand exactly. I have my modem connected to port #1, port#4 there is connected a switch, from this switch there are connected 4 AP. My wlan1 is disabled. Which mac should i put?See post of mdkberry (viewtopic.php?p=593272#p590626) above:
(Kudos to tulluk on reddit: https://www.reddit.com/r/mikrotik/comme ... e_to_6385/)in the bridge settings on the RB2011 set the 'admin MAC' of the wireless bridge0 to be the same as its actual MAC. This results in the DHCP packets having the right source MAC for return from the AP device. no need to change anything else, nor disable the STP. Everything also worked on reboot.
Done.On bridge "Internal" put MAC "4C:..." also into the field "Admin. MAC Address".
Yes, hope it works.Please make sure, that your dhcp-service is bound to that bridge (IP->DHCP Server, look at "Interface").
What do you mean with "the same problem" as people are discussing different problems here...And again the same problem with 6.39.
DHCP server does not work unless you disable STP.What do you mean with "the same problem" as people are discussing different problems here...And again the same problem with 6.39.
In general, or only to one single device that you tested?Got the same issue when I upgrade my RB750Gr2 from 6.37.5 to 6.38.7, the AP hAP AC Lite failed to assign IP address any more.
I have a hAP AC Lite, and a Linksys EA6500v2 working in AP mode, both device failed to obtain ip from dhcp server, after I upgrade hEX to 6.38.7 and reboot the device.In general, or only to one single device that you tested?Got the same issue when I upgrade my RB750Gr2 from 6.37.5 to 6.38.7, the AP hAP AC Lite failed to assign IP address any more.
Hi, is exactly what I see, with a hAP Lite version 6.43.11 or 6.44 and the TP-Link RE450 repeater. No client using the RE450 as wifi entry point gets a DHCP address. 30 seconds assigned offer, and that's it. We know that a pseudo bridge replaces the MAC address of the client by its own MAC address. So yes you will have multiple IP adresses assigned for the same ARP MAC address, but different DHCP MAC addresses. The factory installed RouterOS version on the hAP Lite is 6.42.1 . As far as I understand this is the lowest version I can downgrade to. Is 6.37.4 out of reach? Replacing the RE450 with a wAP, cAP or mAP? And using routed networks and DHCP relay, to be able to manage the user account versus IP address logging from the central DHCP server?As far i could see, from client side (wireshark), DHCP packet is sent to the broadcast (Msg type: discover ) which Mikrotik device receive and send back a Msg Type: offer. Thing here (and tested several times) is either DHCP packet type (offer) is not sent correctly or is sent as ARP broadcast asking for assigned IP in the offer. In any case client does not receive DHCP packet msg type: offer but ARP broadcast from dhcp-server asking for offered IP instead.
So in that way, client sent again broadcast with discoveries DHCP packets until number of tries it has configured (usually three).
I have the dhcp server listening on a bridge interface so it is possible there are some issue relative to sending broadcast packets via bridge interfaces (on my scenario). Also possible some bug on DHCP server (misconfiguration for new version could be a possible as well) that don't really send offers packets via dhcp-server listening interface.
Exactly same configuration from both sides (client/server) work as expected on previous version 6.37.4.
Yesterday i updated to 6.38.4 but same results.
Edited: Just to clarify that from Mikrotik device side i ran a packet sniffer and both (packet snifer and wireshark) match on results here exposed.
Hi pe1chi, thanks for the information. I do see these ARP requests in the DHCP offer-bonding transition, as an attempt to get over the offer state.The DHCP server is not run in reverse over the pseudobridge. I tried the "always broadcast" and other combinations with "Authorative" and "add ARP for Leases" in the DHCP server. Even removed "conflict detection" in 6.44 . On the bridge interface changed STP to RSTP and none as mentioned in this forum topic.You cannot run DHCP over a pseudobrigde operated in reverse. (i.e. with the DHCP server at the station side and the DHCP client at the AP side), as you will encounter the problem you describe.
However that is true for all WiFi equipment.
In the "normal" situation of having the DHCP server at the AP side and the client at the station side, it will work OK.
When you encounter problems with DHCP replies resulting in ARP requests you can use "always broadcast" in the DHCP server setting.
Have been watching (Wireshark) the wireless traffic on the client side, and again changed the settings in the DHCP server as suggested. But it seems that the Mikrotik DHCP server is NEVER sending the DHCPoffer as a broadcast. At least the client (behind a universal mode repeater like the TP-link RE450) never sees a DHCPoffer from the Mikrotik. When another DHCP server (Draytek 2132ac) is used replacing the Mikrotik then there is no problem with the RE450.You cannot run DHCP over a pseudobrigde operated in reverse. (i.e. with the DHCP server at the station side and the DHCP client at the AP side), as you will encounter the problem you describe.
However that is true for all WiFi equipment.
In the "normal" situation of having the DHCP server at the AP side and the client at the station side, it will work OK.
When you encounter problems with DHCP replies resulting in ARP requests you can use "always broadcast" in the DHCP server setting.
I guess this is the exact problem why my OpenWRT + relayd based wireless repeater doesn't work. I have set always-broadcast to "yes" but gotUnfortunately broadcast of the DHCPoffer in Mikrotiks DHCP is sending the packet to IP address 255.255.255.255 as expected, but does NOT alter the destination MAC address to ff:ff:ff:ff:ff:ff, but leaves the destination MAC address as the unicast MAC address.
Message defconf offering lease 192.168.88.254 for 00:EA:4C:6D:11:96 to 54:E6:FC:F2:B8:48 without success
Hi, is exactly what I see, with a hAP Lite version 6.43.11 or 6.44 and the TP-Link RE450 repeater. No client using the RE450 as wifi entry point gets a DHCP address. 30 seconds assigned offer, and that's it. We know that a pseudo bridge replaces the MAC address of the client by its own MAC address. So yes you will have multiple IP adresses assigned for the same ARP MAC address, but different DHCP MAC addresses. The factory installed RouterOS version on the hAP Lite is 6.42.1 . As far as I understand this is the lowest version I can downgrade to. Is 6.37.4 out of reach? Replacing the RE450 with a wAP, cAP or mAP? And using routed networks and DHCP relay, to be able to manage the user account versus IP address logging from the central DHCP server?As far i could see, from client side (wireshark), DHCP packet is sent to the broadcast (Msg type: discover ) which Mikrotik device receive and send back a Msg Type: offer. Thing here (and tested several times) is either DHCP packet type (offer) is not sent correctly or is sent as ARP broadcast asking for assigned IP in the offer. In any case client does not receive DHCP packet msg type: offer but ARP broadcast from dhcp-server asking for offered IP instead.
So in that way, client sent again broadcast with discoveries DHCP packets until number of tries it has configured (usually three).
I have the dhcp server listening on a bridge interface so it is possible there are some issue relative to sending broadcast packets via bridge interfaces (on my scenario). Also possible some bug on DHCP server (misconfiguration for new version could be a possible as well) that don't really send offers packets via dhcp-server listening interface.
Exactly same configuration from both sides (client/server) work as expected on previous version 6.37.4.
Yesterday i updated to 6.38.4 but same results.
Edited: Just to clarify that from Mikrotik device side i ran a packet sniffer and both (packet snifer and wireshark) match on results here exposed.
bpwl, thanks for your researchI guess this is the exact problem why my OpenWRT + relayd based wireless repeater doesn't work. I have set always-broadcast to "yes" but gotUnfortunately broadcast of the DHCPoffer in Mikrotiks DHCP is sending the packet to IP address 255.255.255.255 as expected, but does NOT alter the destination MAC address to ff:ff:ff:ff:ff:ff, but leaves the destination MAC address as the unicast MAC address.relayd doesn't forward dhcp replies to PC'sCode: Select allMessage defconf offering lease 192.168.88.254 for 00:EA:4C:6D:11:96 to 54:E6:FC:F2:B8:48 without success
dhcp1 offering lease 10.10.x.x for C0:74:AD:xx:xx:xx without success
Thanks for this clear explanation. Would this apply to standard wireless client setup with say multiple cAP AC, all ports bridged CAPs mode with local forwarding?Who's to blame? The bridge forwarding, the DHCP broadcast packet, the pseudo bridge ???
But it's a step forward. The RE450 has 3x3 radio's and now I have a usable AP with good wifi. Repeating as a "home AP" (different subnets) works fine. Need some experiments to see if the "repeater" function (transparant subnet) is usable with an uplink to MT AP and DHCP server.The most common problem is that the client router cannot pass the DHCP message between the main router and the client connected to the client router. Currently it seems to be the hardware/SOC limitation (related to MAC cloning?)
I compared responses (DHCP ACKs) coming via Mikrotik and non-Mikrotik APs.
the only difference is that in the latter the response has a broadcast address in the Ethernet header (works) while in the former it's the MAC address of the WiFi client (doesn't work).
Any update on this?I upgraded all APs to v6.49beta46 because there were several entries for wireless fixes in the release notes. After 4 days the problem is back as with previous versions. So no dice.
Its been several days since I sent wireless captures to MT support with no reply or even an acknowledgement of receipt on the the ticket.
This seems to be working for me. I haven't seen the "DHCP offered without success" in days at this point.--But I can't really say I thoroughly understand everything I am doing. (RouterOS has a ton of toggles, easily half of which I have no idea as to what they do.)Would really like to have a look at your configuration (/export hide-sensitive file=anythingyoulike), @InTheSprawl.
# sep/30/2021 21:49:12 by RouterOS 6.48.4
# software id = D1JC-XXXX
#
# model = RB4011iGS+5HacQ2HnD
# serial number = A28209XXXXXX
/interface bridge
add admin-mac=B8:69:F4:XX:XX:XX auto-mac=no comment=defconf name=bridge \
priority=0x10
/interface wireless
# managed by CAPsMAN
# channel: 5640/20-eeCe/ac/DP(24dBm)+5775/80(27dBm), SSID: nowires, CAPsMAN forwarding
set [ find default-name=wlan1 ] band=5ghz-n/ac channel-width=20/40/80mhz-XXXX \
distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=\
"nowires-5G" station-roaming=enabled wireless-protocol=802.11 \
wps-mode=disabled
# managed by CAPsMAN
# channel: 2412/20-Ce/gn(27dBm), SSID: nowires, CAPsMAN forwarding
set [ find default-name=wlan2 ] band=2ghz-g/n channel-width=20/40mhz-XX \
distance=indoors frequency=auto installation=indoor mode=ap-bridge ssid=\
"nowires" station-roaming=enabled wireless-protocol=802.11
/interface ethernet
set [ find default-name=ether1 ] loop-protect=on mac-address=\
B8:69:F4:X0:X0:X0 rx-flow-control=auto tx-flow-control=auto
set [ find default-name=ether2 ] loop-protect=on rx-flow-control=auto \
tx-flow-control=auto
set [ find default-name=ether3 ] loop-protect=on rx-flow-control=auto \
tx-flow-control=auto
set [ find default-name=ether4 ] loop-protect=on rx-flow-control=auto \
tx-flow-control=auto
set [ find default-name=ether5 ] loop-protect=on rx-flow-control=auto \
tx-flow-control=auto
set [ find default-name=ether6 ] loop-protect=on rx-flow-control=auto \
tx-flow-control=auto
set [ find default-name=ether7 ] loop-protect=on rx-flow-control=auto \
tx-flow-control=auto
set [ find default-name=ether8 ] loop-protect=on rx-flow-control=auto \
tx-flow-control=auto
set [ find default-name=ether9 ] loop-protect=on rx-flow-control=auto \
tx-flow-control=auto
set [ find default-name=ether10 ] loop-protect=on poe-out=off \
rx-flow-control=auto tx-flow-control=auto
set [ find default-name=sfp-sfpplus1 ] loop-protect=on rx-flow-control=auto \
tx-flow-control=auto
/caps-man datapath
add arp=reply-only bridge=bridge name=datapath1
/caps-man security
add authentication-types=wpa-psk,wpa2-psk disable-pmkid=yes encryption=\
aes-ccm group-encryption=aes-ccm group-key-update=1h name=security1
/caps-man configuration
add channel.band=2ghz-onlyn country="united states" datapath=datapath1 \
datapath.arp=reply-only datapath.bridge=bridge installation=indoor mode=\
ap name=2GHz-N security=security1 ssid="nowires"
add channel.band=5ghz-n/ac country="united states" datapath=datapath1 \
datapath.arp=reply-only datapath.bridge=bridge installation=indoor mode=\
ap name=5GHz-AC-N security=security1 ssid="nowires"
/caps-man interface
add configuration=5GHz-AC-N datapath=datapath1 disabled=no l2mtu=1600 \
mac-address=B8:69:F4:0X:0X:0X master-interface=none name=cap5 radio-mac=\
B8:69:F4:0X:0X:0X radio-name=B869F40X0X0X security=security1
add configuration=2GHz-N datapath=datapath1 disabled=no l2mtu=1600 \
mac-address=B8:69:F4:11:11:11 master-interface=none name=cap6 radio-mac=\
B8:69:F4:11:11:11 radio-name=B869F4111111 security=security1
add configuration=5GHz-AC-N datapath=datapath1 disabled=no l2mtu=1600 \
mac-address=E4:8D:8C:22:22:22 master-interface=none name=cap7 radio-mac=\
E4:8D:8C:22:22:22 radio-name=E48D8C222222 security=security1
add configuration=2GHz-N datapath=datapath1 disabled=no l2mtu=1600 \
mac-address=E4:8D:8C:YY:YY:YY master-interface=none name=cap8 radio-mac=\
E4:8D:8C:YY:YY:YY radio-name=E48D8CYYYYYY security=security1
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk mode=dynamic-keys \
supplicant-identity=MikroTik
/ip ipsec peer
# This entry is unreachable
add comment=L2TP name=L2TPpeer passive=yes
# This entry is unreachable
add name=l2tp-in-server passive=yes
/ip ipsec profile
set [ find default=yes ] enc-algorithm=aes-256,3des
/ip ipsec proposal
set [ find default=yes ] enc-algorithms=aes-256-cbc,3des pfs-group=none
/ip kid-control
add fri=0s-23h59m mon=0s-23h59m name=KID sat=0s-23h59m sun=0s-23h59m thu=\
0s-23h59m tue=0s-23h59m wed=0s-23h59m
add fri=0s-23h59m mon=0s-23h59m name=GUEST sat=0s-23h59m sun=0s-23h59m \
thu=0s-23h59m tue=0s-23h59m wed=0s-23h59m
/ip pool
add name=vpn ranges=192.168.23.251-192.168.23.254
add name=dhcp ranges=192.168.1.10-192.168.1.250
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=dhcp
/ppp profile
set *FFFFFFFE local-address=192.168.23.1 remote-address=vpn
/user group
set full policy="local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,pas\
sword,web,sniff,sensitive,api,romon,dude,tikapp"
/caps-man access-list
add allow-signal-out-of-range=10s comment=DEVICE1 disabled=yes \
mac-address=50:32:37:XX:XX:XX signal-range=-70..120 ssid-regexp="" time=\
0s-1d,sun,mon,tue,wed,thu,fri,sat
add allow-signal-out-of-range=10s comment="DEVICE2" disabled=yes \
mac-address=D6:7A:D3:XX:XX:XX signal-range=-70..120 ssid-regexp="" time=\
0s-1d,sun,mon,tue,wed,thu,fri,sat
add allow-signal-out-of-range=10s comment="DEVICE3" disabled=yes \
mac-address=F0:18:98:XX:XX:XX signal-range=-120..120 ssid-regexp="" time=\
0s-1d,sun,mon,tue,wed,thu,fri,sat
/caps-man manager
set ca-certificate=auto certificate=auto enabled=yes upgrade-policy=\
suggest-same-version
/caps-man provisioning
add action=create-dynamic-enabled hw-supported-modes=gn,g-turbo \
master-configuration=2GHz-N name-format=prefix-identity name-prefix=CAP
add action=create-dynamic-enabled hw-supported-modes=ac,an,a-turbo \
master-configuration=5GHz-AC-N name-format=prefix-identity name-prefix=\
CAP
/certificate settings
set crl-download=yes crl-use=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=ether9
add bridge=bridge comment=defconf interface=ether10
add bridge=bridge comment=defconf interface=sfp-sfpplus1
add bridge=bridge comment=defconf interface=wlan1
add bridge=bridge comment=defconf interface=wlan2
add bridge=bridge disabled=yes interface=ether1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface detect-internet
set detect-interface-list=all
/interface l2tp-server server
set allow-fast-path=yes authentication=mschap2 default-profile=L2TP-Profile \
enabled=yes max-mru=1460 max-mtu=1460 use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add interface=ether1 list=WAN
/interface ovpn-server server
set certificate=CAP-E48D8CXXXXXX
/interface sstp-server server
set default-profile=default-encryption
/interface wireless cap
#
set bridge=bridge caps-man-addresses=127.0.0.1 certificate=\
CAPsMAN-B869F4XXXXXX enabled=yes interfaces=wlan1,wlan2 lock-to-caps-man=\
yes
/ip address
add address=192.168.1.1/24 comment=defconf interface=ether2 network=\
192.168.1.0
/ip arp
add address=192.168.1.2 comment=CAP1 interface=bridge mac-address=\
E4:8D:8C:XX:XX:XX
add address=192.168.1.5 comment=BRIDGEA interface=bridge mac-address=\
4C:5E:0C:XX:XX:XX
/ip cloud
set ddns-enabled=yes ddns-update-interval=10m
/ip dhcp-client
add disabled=no interface=ether1
/ip dhcp-server lease
add address=192.168.1.112 client-id=DEVICE4 comment="DEVICE4" \
mac-address=D0:81:7A:XX:XX:XX server=dhcp
add address=192.168.1.28 client-id=1:48:d7:5:XX:XX:XX comment=\
DEVICE5 mac-address=48:D7:05:XX:XX:XX server=dhcp
add address=192.168.1.108 mac-address=C4:7F:51:XX:XX:XX server=dhcp
/ip dhcp-server network
add address=192.168.1.0/24 comment=defconf dns-server=\
1.1.1.1,1.0.0.1 gateway=192.168.1.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1
/ip dns static
add address=192.168.1.1 comment=defconf name=router.lan
add address=1.1.1.1 name=cloudflare-dns.com
add address=1.0.0.1 name=cloudflare-dns.com
/ip firewall filter
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input comment="allow IPsec NAT" disabled=yes dst-port=4500 \
protocol=udp
add action=accept chain=input comment="allow IKE" disabled=yes dst-port=500 protocol=udp
add action=accept chain=input comment="allow l2tp" disabled=yes dst-port=1701 protocol=udp
add action=accept chain=input comment="allow pptp" disabled=yes dst-port=1723 \
protocol=tcp
add action=accept chain=input comment="allow sstp" disabled=yes dst-port=443 \
protocol=tcp
add action=accept chain=input comment=Webserver disabled=yes dst-address=\
192.168.1.42 dst-port=80 log=yes protocol=tcp src-port=80
add action=accept chain=input comment="defconf: accept ICMP" disabled=yes \
protocol=icmp
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=\
192.168.23.0/24
add action=dst-nat chain=dstnat disabled=yes dst-port=80 in-interface=\
all-ethernet log=yes protocol=tcp to-addresses=192.168.1.42 to-ports=80
add action=dst-nat chain=dstnat disabled=yes dst-port=443 in-interface=ether1 \
log=yes protocol=tcp to-addresses=192.168.1.42 to-ports=443
add action=masquerade chain=srcnat out-interface-list=WAN
add action=masquerade chain=srcnat out-interface-list=WAN
/ip ipsec identity
add comment="L2TP IPSEC Encryption" generate-policy=port-override peer=\
L2TPpeer
add comment=l2tp-in-server generate-policy=port-strict peer=l2tp-in-server \
remote-id=ignore
/ip kid-control device
add mac-address=58:55:CA:XX:XX:XX name=LAPTOP user=KID
add mac-address=B8:F6:B1:XX:XX:XX name=OS2 user=KID
add mac-address=34:A8:EB:XX:XX:XX name=GUESTOS user=GUEST
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set www-ssl certificate=192.168.1.1 disabled=no port=443
/ip smb
set allow-guests=no
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=bridge type=internal
/ppp profile
add bridge=bridge change-tcp-mss=yes comment=L2TP dns-server=\
192.168.1.1,1.1.1.1 local-address=*1 name=L2TP-Profile remote-address=vpn
/ppp secret
add name=vpn profile=default-encryption
add comment=L2TPvpn name=L2TPvpn profile=L2TP-Profile service=l2tp
/system clock
set time-zone-autodetect=no time-zone-name=America/New_York
/system identity
set name=Router
/system leds
add interface=wlan2 leds="wlan2_signal1-led,wlan2_signal2-led,wlan2_signal3-le\
d,wlan2_signal4-led,wlan2_signal5-led" type=wireless-signal-strength
add interface=wlan2 leds=wlan2_tx-led type=interface-transmit
add interface=wlan2 leds=wlan2_rx-led type=interface-receive
/system ntp client
set enabled=yes primary-ntp=128.138.140.44 secondary-ntp=132.163.96.1 \
server-dns-names=time.cloudflare.com
/system scheduler
add comment="DDNS timer" interval=15m name="DDNS timer" on-event=\
"/system script run DDNS" policy=read,write,policy,test start-date=\
jan/23/2020 start-time=06:00:00
/system script
add comment="DNS" dont-require-permissions=no name=DDNS owner=admin \
policy=read,write,policy,test source=":global actualIP value=[/ip address \
get [find where interface=MATRIX] value-name=address];\
\n:global actualIP value=[:pick \$actualIP -1 [:find \$actualIP \"/\" -1] \
];\
\n:if ([:len [/file find where name=ipstore.txt]] < 1 ) do={\
\n /file print file=ipstore.txt where name=ipstore.txt;\
\n /delay delay-time=2;\
\n /file set ipstore.txt contents=\"0.0.0.0\";\
\n};\
\n:global previousIP value=[/file get [find where name=ipstore.txt ] value\
-name=contents];\
\n:if (\$previousIP != \$actualIP) do={\
\n :log info message=(\"Try to Update DYNDNS with actual IP \".\$actualIP\
.\" - Previous IP are \".\$previousIP);\
\n /tool fetch mode=https keep-result=yes dst-path=dyndns-result.txt addr\
ess=[:resolve www.dyndns.com] port=443 host=www.dyndns.com src-path=(\"/\
update\?domains=home&token=XXXXXX-XXXX-XXXX-XXXX-XXXXXXXX&ip=\
\".\$actualIP);\
\n /delay delay-time=5;\
\n :global lastChange value=[/file get [find where name=dyndns-result.txt\
\_] value-name=contents];\
\n :global previousIP value=\$actualIP;\
\n /file set ipstore.txt contents=\$actualIP;\
\n :if (\$lastChange = \"OK\") do={:log warning message=(\"DYNDNS update \
successfull with IP \".\$actualIP);};\
\n :if (\$lastChange = \"KO\") do={:log error message=(\"Fail to update DY\
NDNS with new IP \".\$actualIP);};\
\n};"
/tool bandwidth-server
set enabled=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
5 offers in a row => no response, restarting with unicast
# jan/02/1970 00:03:53 by RouterOS 6.48.6
# software id = xxxxxxx
#
# model = RBD52G-5HacD2HnD
# serial number = xxxxxxx
/interface wireless
set [ find default-name=wlan2 ] ssid=MikroTik
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa2-psk eap-methods="" mode=dynamic-keys name=\
mywifi supplicant-identity=""
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX \
country=italy disabled=no frequency=auto security-profile=mywifi ssid=\
"MY WIFI" wireless-protocol=802.11
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip dhcp-client
add disabled=no interface=wlan1
/system routerboard settings
set auto-upgrade=yes
# mar/11/2022 18:33:31 by RouterOS 7.1.3
# software id = xxxxx
#
# model = RBmAPL-2nD
# serial number = xxxxxxxx
/interface bridge
add name=bridge_lan
/interface wireless
set [ find default-name=wlan1 ] ssid=MikroTik
/interface wireguard
add listen-port=49625 mtu=1420 name=wireguard1
/interface list
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=pool_lan ranges=10.1.1.160-10.1.1.249
add name=pool_ovpn ranges=10.158.38.30-10.158.38.254
/ip dhcp-server
add address-pool=pool_lan interface=bridge_lan lease-time=1h name=dhcp_lan
/ppp profile
add bridge=bridge_lan local-address=pool_ovpn name=ovpn_profile \
remote-address=pool_ovpn use-compression=no use-encryption=required
/interface bridge port
add bridge=bridge_lan interface=ether1
/ipv6 settings
set disable-ipv6=yes
/interface list member
add interface=bridge_lan list=LAN
add interface=wireguard1 list=LAN
/interface ovpn-server server
set auth=sha1 certificate=server cipher=aes256 default-profile=ovpn_profile \
enabled=yes require-client-certificate=yes
/interface wireguard peers
add allowed-address=10.168.66.2/24 interface=wireguard1 public-key=\
"xxxx"
/ip address
add address=10.1.1.7/24 interface=bridge_lan network=10.1.1.0
add address=10.168.66.1/24 interface=wireguard1 network=10.168.66.0
/ip cloud
set ddns-enabled=yes ddns-update-interval=5m
/ip dhcp-server alert
add alert-timeout=30m disabled=no interface=bridge_lan on-alert="/tool e-mail \
send to=\"mail@mail.com\" subject=\"ALERT Unauthorized DHCP Server\" b\
ody=\"ALERT Server DHCP non autorizzato rilevato in rete \$[/system identi\
ty get name]\"" valid-server=B6:91:B1:C0:AE:4D
/ip dhcp-server network
add address=10.1.1.0/24 dns-server=10.1.1.7 gateway=10.1.1.1
add address=10.158.38.0/24 dns-server=10.1.1.7 gateway=10.1.1.7 netmask=24
/ip dns
set allow-remote-requests=yes cache-size=512KiB servers=\
137.74.48.215,94.140.14.14,94.140.15.15,8.8.8.8,1.1.1.1
/ip firewall filter
add action=accept chain=input comment="accept da lan" src-address=10.1.1.0/24
add action=accept chain=input comment="allow port 1194" dst-port=1194 \
protocol=tcp
add action=accept chain=input comment="allow port wireguard" dst-port=49625 \
protocol=udp
add action=accept chain=input comment="allow all from openvpn" src-address=\
10.158.38.0/24
add action=drop chain=input comment="drop 8291 da tutti" disabled=yes \
dst-port=8291 protocol=tcp
add action=drop chain=input comment=\
"drop all da NON LAN subnet e state = INVALID e NEW" connection-state=\
invalid,new src-address=!10.1.1.0/24
/ip firewall nat
add action=masquerade chain=srcnat comment="MASQUERADE OPENVPN" src-address=\
10.158.38.0/24
add action=masquerade chain=srcnat comment="MASQUERADE WIREGUARD\r\
\n" src-address=10.168.66.0/24
add action=netmap chain=dstnat dst-address=192.168.150.0/24 to-addresses=\
10.1.1.0/24
add action=netmap chain=srcnat dst-address=192.168.70.0/24 to-addresses=\
10.1.1.0/24
/ip route
add disabled=no dst-address=0.0.0.0/0 gateway=10.1.1.1 routing-table=main \
suppress-hw-offload=no
/ip service
set telnet disabled=yes
set ftp disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/ppp secret
add name=client1 profile=ovpn_profile service=ovpn
/system clock
set time-zone-name=Europe/Rome
/system identity
set name=MAP-LITE-MY-OFFICE
/system logging
add disabled=yes topics=dhcp
/system ntp client
set enabled=yes
/system ntp client servers
add address=time.google.com
add address=time.cloudflare.com
/system routerboard settings
set auto-upgrade=yes
/system scheduler
add interval=1d name="Backup And Update" on-event=\
"/system script run BackupAndUpdate;" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-date=dec/28/2021 start-time=23:10:00
add interval=1d name=reboot_night on-event="\
\n:execute {/system reboot;}" policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-date=jan/03/2017 start-time=04:01:00
add disabled=yes interval=1d name=schedule_autoupdate on-event="/system packag\
e update\r\
\ncheck-for-updates once\r\
\n:delay 3s;\r\
\n:if ( [get status] = \"New version is available\") do={ install }" \
policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-date=jan/03/2017 start-time=04:00:00
/tool e-mail
set address=smtp.gmail.com from=my@gmail.com port=587 tls=starttls \
user=my@gmail.com
It has been there since 6.49, but no information found so far.
DHCP problems are seen since 6.38. Related somehow or not?
When and how to use it ? Are the 2 release notes lines saying the same ? Otherwise, how to set the 2nd ?
.Code: Select all*) winbox - added "dhcp" option to "multicast-helper" setting; *) wireless - added override for multicast-to-unicast translation of DHCP traffic;
Or is this some enhancement of 6.40? "*) wireless - always use "multicast-helper" when DHCP is being used;"
Greetings.
I have a MKrb750gr3 as core router. I removed 2 unifi AP (have to sell them), and replaced them with 3 TP-Link products. (Archer c60 by now -changing to a C80-, 2 RE200 as wifi extender or repeater, and a WR840, all by TP-Link).
Im having a problem with MK DHCP. When i walk from a room where my cell phone connects to main (Archer c60) wifi router, DHCP works fine... i have a 172.16.0.0/20 network, with queue trees for each network. But when i move to another room where i installed a re200 wifi extender, cell phone connect, DHCP give me the correct IP Address, but traffic is blocked.
The only solution is, with my administration computer, log into the MK and "disable" and "enable" DHCP reservation of my cell phone. After doing this, the cell phone connects to the internet without changing nothing on the phone, just the "!" (no connection) sign dissapear.