Yes, my RB4011 is my home router. You mean fully disable fasttrack on my RB4011 and try again? I can do that, tomorrow. Just funny that it worked on 6.48.You have all frags ok.
Your RB works in location when your server rdp is, true ?
Means traffic from internet you DNAT to your RDP machine.
My suggestion is to disable fasttrack, reboot and check again.
When this not help then contact with support because your RDP works but is not stable at ros7.1rc*.
# jan/02/2002 09:35:19 by RouterOS 7.1rc3
# software id = NO-NO
#
# model = RB4011iGS+
# serial number = NO
/interface ethernet
set [ find default-name=ether2 ] disabled=yes
set [ find default-name=ether3 ] disabled=yes
set [ find default-name=ether4 ] disabled=yes
set [ find default-name=ether5 ] disabled=yes
set [ find default-name=ether6 ] disabled=yes
set [ find default-name=ether7 ] disabled=yes
set [ find default-name=ether8 ] disabled=yes
set [ find default-name=ether9 ] disabled=yes
set [ find default-name=ether10 ] disabled=yes poe-out=off
/interface vlan
add interface=sfp-sfpplus1 name="Guest Wifi" vlan-id=200
add interface=sfp-sfpplus1 name=IoT vlan-id=10
add interface=sfp-sfpplus1 name=VMs vlan-id=20
add interface=sfp-sfpplus1 name=Wifi vlan-id=7
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 name=pppoe-out user=NO
/interface list
add name=WAN
add name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip dhcp-server option
add code=42 name=NTPVMs value="'172.16.20.1'"
add code=42 name=NTPLAN value="'172.16.6.1'"
add code=42 name=NTPIoT value="'172.16.10.1'"
add code=42 name=NTPWifi value="'172.16.7.1'"
add code=42 name="NTPGuest Wifi" value="'172.16.200.1'"
/ip dhcp-server option sets
add name=Wifi options=NTPWifi
add name=LAN options=NTPLAN
add name=VMs options=NTPVMs
add name="Guest Wifi" options="NTPGuest Wifi"
add name=IoT options=NTPIoT
/ip ipsec profile
set [ find default=yes ] dh-group=modp2048 enc-algorithm=aes-128 hash-algorithm=sha256
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha256 enc-algorithms=aes-256-gcm,aes-192-ctr,aes-192-gcm,aes-128-gcm lifetime=0s pfs-group=modp2048
/ip pool
add name=IoT_pool ranges=172.16.10.100-172.16.10.254
add name=LAN_pool ranges=172.16.6.100-172.16.6.254
add name="Guest Wifi_pool" ranges=172.16.200.2-172.16.200.254
add name=VMs_pool ranges=172.16.20.100-172.16.20.254
add name=Wifi_pool ranges=172.16.7.100-172.16.7.254
/ip dhcp-server
add address-pool=IoT_pool dhcp-option-set=IoT interface=IoT lease-time=1w name=IoT
add address-pool=LAN_pool dhcp-option-set=LAN interface=sfp-sfpplus1 lease-time=1w name=LAN
add address-pool="Guest Wifi_pool" dhcp-option-set="Guest Wifi" interface="Guest Wifi" lease-time=1w name="Guest Wifi"
add address-pool=VMs_pool dhcp-option-set=VMs interface=VMs lease-time=1w name=VMs
add address-pool=Wifi_pool dhcp-option-set=Wifi interface=Wifi lease-time=1w name=Wifi
/queue simple
add burst-limit=2M/2M burst-threshold=2M/2M burst-time=10s/10s comment="Guest Wifi" limit-at=1M/1M max-limit=1M/1M name="Guest Wifi" priority=6/6 queue=default/default target="Guest Wifi"
/routing bgp template
set default as=65530 disabled=no name=default output.network=bgp-networks
/routing table
add fib name=""
/system logging action
set 3 remote=172.16.6.2
/zerotier
set zt1 comment="ZeroTier Central controller - https://my.zerotier.com/" identity="NO" name=zt1 port=9993
/zerotier interface
add instance=zt1 mac-address=62:8F:2E:C8:F7:2F name=zerotier1 network=NO
/ip neighbor discovery-settings
set discover-interface-list=none
/interface list member
add interface=ether1 list=WAN
add interface=sfp-sfpplus1 list=LAN
add interface="Guest Wifi" list=LAN
add interface=IoT list=LAN
add interface=VMs list=LAN
add interface=Wifi list=LAN
add interface=pppoe-out list=WAN
/ip address
add address=172.16.6.1/24 interface=sfp-sfpplus1 network=172.16.6.0
add address=172.16.7.1/24 interface=Wifi network=172.16.7.0
add address=172.16.10.1/24 interface=IoT network=172.16.10.0
add address=172.16.20.1/24 interface=VMs network=172.16.20.0
add address=172.16.200.1/24 interface="Guest Wifi" network=172.16.200.0
add address=192.168.254.253/24 interface=ether1 network=192.168.254.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-server lease
add address=172.16.6.15 client-id=apc mac-address=00:C0:B7:31:A7:AD
add address=172.16.10.2 client-id=HeidiNightstand mac-address=60:38:E0:F1:C8:71
add address=172.16.10.5 client-id=HueBridge mac-address=00:17:88:A5:42:D9
add address=172.16.7.5 client-id=erx mac-address=04:18:D6:06:18:6F
add address=172.16.7.15 mac-address=70:2C:09:69:FF:88
add address=172.16.10.4 client-id=1:b0:be:76:46:b9:92 mac-address=B0:BE:76:46:B9:92 server=IoT
add address=172.16.7.4 client-id=1:44:90:bb:5:c0:cd mac-address=44:90:BB:05:C0:CD server=Wifi
add address=172.16.10.3 client-id=1:2c:aa:8e:d6:93:4c mac-address=2C:AA:8E:D6:93:4C server=IoT
add address=172.16.7.3 client-id=1:dc:52:85:d4:15:9f mac-address=DC:52:85:D4:15:9F server=Wifi
add address=172.16.20.3 client-id=1:52:54:0:c8:d0:49 mac-address=52:54:00:C8:D0:49 server=VMs
add address=172.16.20.4 client-id=1:52:54:0:be:8c:1c mac-address=52:54:00:BE:8C:1C server=VMs
/ip dhcp-server network
add address=172.16.6.0/24 dns-server=172.16.6.1 domain=mccloud.lan gateway=172.16.6.1 netmask=24
add address=172.16.7.0/24 dns-server=172.16.7.1 domain=mccloud.lan gateway=172.16.7.1
add address=172.16.10.0/24 dns-server=172.16.10.1 domain=mccloud.lan gateway=172.16.10.1
add address=172.16.20.0/24 dns-server=172.16.20.1 domain=mccloud.lan gateway=172.16.20.1
add address=172.16.200.0/24 dns-server=172.16.200.1 domain=mccloud.lan gateway=172.16.200.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1
/ip dns static
add address=172.16.6.2 name=transmission.smccloud.com
add address=172.16.6.2 name=unimus.smccloud.com
add address=172.16.6.2 name=airsonic.smccloud.com
add address=172.16.6.2 name=home.smccloud.com
add address=172.16.6.2 name=jackett.smccloud.com
add address=172.16.20.3 name=jenkins.smccloud.com
add address=172.16.6.2 name=lidarr.smccloud.com
add address=172.16.6.2 name=nzbget.smccloud.com
add address=172.16.6.2 name=omada.smccloud.com
add address=172.16.6.2 name=ombi.smccloud.com
add address=172.16.6.2 name=paperless.smccloud.com
add address=172.16.6.2 name=piwigo.smccloud.com
add address=172.16.6.2 name=plex.smccloud.com
add address=172.16.6.2 name=radarr.smccloud.com
add address=172.16.6.2 name=sonarr.smccloud.com
add address=172.16.6.2 name=speedtest.smccloud.com
add address=172.16.6.2 name=subversion.smccloud.com
add address=172.16.6.2 name=syncthing.smccloud.com
add address=172.16.6.2 name=tautulli.smccloud.com
add address=172.16.6.2 name=tdarr.smccloud.com
add address=172.16.20.3 name=jumpbox
add address=172.16.6.2 name=bb-8
add address=172.16.20.3 name=jumpbox.mccloud.lan
add address=172.16.6.2 name=bb-8.mccloud.lan
/ip firewall filter
add action=fasttrack-connection chain=forward connection-mark=!ipsec connection-state=established,related hw-offload=yes
add action=accept chain=forward connection-state=established,related,untracked
add action=fasttrack-connection chain=input connection-mark=!ipsec connection-state=established,related hw-offload=yes
add action=accept chain=input connection-state=established,related,untracked
add action=fasttrack-connection chain=output connection-mark=!ipsec connection-state=established,related hw-offload=yes
add action=accept chain=output connection-state=established,related,untracked
add action=accept chain=input connection-state=established,related
add action=drop chain=input connection-state=invalid
add action=accept chain=input in-interface=pppoe-out protocol=icmp
add action=drop chain=input in-interface=pppoe-out
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-mark=!ipsec connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
add action=drop chain=forward in-interface="Guest Wifi" out-interface=IoT
add action=drop chain=forward in-interface="Guest Wifi" out-interface=VMs
add action=drop chain=forward in-interface="Guest Wifi" out-interface=Wifi
add action=drop chain=forward in-interface="Guest Wifi" out-interface=sfp-sfpplus1
add action=drop chain=forward in-interface=IoT out-interface="Guest Wifi"
add action=drop chain=forward in-interface=VMs out-interface="Guest Wifi"
add action=drop chain=forward in-interface=Wifi out-interface="Guest Wifi"
add action=drop chain=forward in-interface=sfp-sfpplus1 out-interface="Guest Wifi"
/ip firewall nat
add action=dst-nat chain=dstnat comment=SSH in-interface=pppoe-out port=NO protocol=tcp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment=HTTP in-interface=pppoe-out port=NO protocol=tcp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment=HTTPS in-interface=pppoe-out port=NO protocol=tcp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment=RDP in-interface=pppoe-out port=NO protocol=tcp to-addresses=172.16.20.3 to-ports=NO
add action=dst-nat chain=dstnat comment=RDP in-interface=pppoe-out port=NO protocol=udp to-addresses=172.16.20.3 to-ports=NO
add action=dst-nat chain=dstnat comment=Plex in-interface=pppoe-out port=NO protocol=tcp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment=Syncthing in-interface=pppoe-out port=NO protocol=tcp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment=Syncthing port=NO protocol=udp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment=Transmission dst-address=172.16.6.2 in-interface=pppoe-out port=NO protocol=tcp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment=Transmission dst-address=172.16.6.2 in-interface=pppoe-out port=NO protocol=udp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment="Resilio Sync" in-interface=pppoe-out port=NO protocol=tcp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment="Resilio Sync" in-interface=pppoe-out port=NO protocol=tcp to-addresses=172.16.6.2 to-ports=NO
add action=dst-nat chain=dstnat comment="Resilio Sync" in-interface=pppoe-out port=NO protocol=udp to-addresses=172.16.6.2 to-ports=NO
add action=masquerade chain=srcnat comment="nat to modem" dst-address=192.168.254.254 out-interface=ether1
add action=masquerade chain=srcnat comment=Masquerade out-interface-list=WAN
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set www-ssl certificate=router disabled=no tls-version=only-1.2
set api disabled=yes
set api-ssl certificate=router tls-version=only-1.2
/ip ssh
set strong-crypto=yes
/ipv6 nd
set [ find default=yes ] advertise-dns=no
/snmp
set contact=smccloud@smccloud.com enabled=yes location="Mechanical Room"
/system clock
set time-zone-name=America/Chicago
/system identity
set name=RB4011iGS+RM
/system logging
add action=remote topics=critical
add action=remote topics=error
add action=remote topics=info
add action=remote topics=warning
/system ntp client
set enabled=yes mode=multicast
/system ntp server
set enabled=yes manycast=yes multicast=yes
/system ntp client servers
add address=128.101.101.101
add address=134.84.84.84
/system package update
set channel=development
/system resource irq rps
set sfp-sfpplus1 disabled=no
/tool bandwidth-server
set authenticate=no enabled=no
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=none
/tool mac-server ping
set enabled=no
And mine is a 2012 R2 server.I must say that I've had the same problem since upgrading my RB4011 to v7.1rc1.
Mostly connections to Windows 2012 R2 servers. They are probably really sensitive to interrupted data streams.
I am using direct RDP, TCP+UDP, over IPSEC.
Hmm, I update more and more RB to 7.1.1 and not have problem with RDP.. but many ppl report here problem.I am planning on flattening my network in the future.
Code: Select all# jan/02/2002 09:35:19 by RouterOS 7.1rc3 /ip firewall filter ... add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN ...
wireguard test forward: in:Lan out:wireguardADM, src-mac X, proto UDP, server2012r2:3389->CLIENT_RDP:61792, len 40
ip/firewall/connection/tracking/set udp-timeout=20s
Thanks ! It works !hi
I must miss led you I pass my log its not a rule
if you want some code to paste in termilal try this:Code: Select allip/firewall/connection/tracking/set udp-timeout=20s
windows reconnect exactly 75 seconds apart. After five try's every 15s apart.
Thanks ! It works !hi
I must miss led you I pass my log its not a rule
if you want some code to paste in termilal try this:Code: Select allip/firewall/connection/tracking/set udp-timeout=20s
windows reconnect exactly 75 seconds apart. After five try's every 15s apart.
You rule !!!!
+1, this #23 answer is solution.hi
I must miss led you I pass my log its not a rule :?
if you want some code to paste in termilal try this:Code: Select allip/firewall/connection/tracking/set udp-timeout=20s
windows reconnect exactly 75 seconds apart. After five try's every 15s apart.
Great! It works! I had this problem for months on 2012 rdp via openvpn and wireguard....thank you, for now everything seems to be ok.hi
I must miss led you I pass my log its not a rule
if you want some code to paste in termilal try this:Code: Select allip/firewall/connection/tracking/set udp-timeout=20s
windows reconnect exactly 75 seconds apart. After five try's every 15s apart.
Good Questionrafalgit writeWhy this setting at ros6 as 10s not couse us any problems ?
Thank you. Increasing the udp timeout fixes the issue. Looks like v7 does not detect properly udp streams.
Thank you very much! You saved my day Using 7.5 CHR and Windows 2012 R2, increasing udp interval solved my problem. Just interesting why no one from developers still not answered why this problem still presist in 7.x.x ROS ?hi
I must miss led you I pass my log its not a rule
if you want some code to paste in termilal try this:Code: Select allip/firewall/connection/tracking/set udp-timeout=20s
windows reconnect exactly 75 seconds apart. After five try's every 15s apart.
6,47.10Can anyone please confirm how the default UDP timeout setting is set on 6.x firmware?
enabled: auto
tcp-syn-sent-timeout: 5s
tcp-syn-received-timeout: 5s
tcp-established-timeout: 1d
tcp-fin-wait-timeout: 10s
tcp-close-wait-timeout: 10s
tcp-last-ack-timeout: 10s
tcp-time-wait-timeout: 10s
tcp-close-timeout: 10s
tcp-max-retrans-timeout: 5m
tcp-unacked-timeout: 5m
loose-tcp-tracking: yes
udp-timeout: 10s
udp-stream-timeout: 3m
icmp-timeout: 10s
generic-timeout: 10m
max-entries: 217960
total-entries: 3
Can confirm this on ROS 7.6 with RB750Gr3. Increased UDP timeout from 00:10 to 00:20 -- didn't help.I have the same problem with RDP on Windows Server 2012 R2. I managed to force the end the cyclic disconnection by reducing the MTU from 1500 to 1492. I reported a problem with version 7.x and RDP to technical support. I think he doesn't believe me, than this problem exist. Also write to them, if there are more of us, they may believe.
How can you keep a running server with no patches ?I can confirm that setting UDP timeout to 20s resolves the issue. For me with Server 2019. However, the machine is not fully patched yet and I'm not sure when it is going to be.
How can you keep a running server with no patches ?
We have built a common firewall between two Windows Server devices and they communicate over UDP RDP without any problems. It seems that we are missing some little detail in order to reproduce this issue.
As I my environment requires the WireGuard to connect the win 2012, I can only provide the pcap files under the ROSv7.Unfortunately, we still have not received any packet captures from the problematic scenario. If anyone is ready to share them, then please send .pcap files to support@mikrotik.com. Also please include supout file just in case.
/ip/firewall/
/ip firewall connection tracking
set enabled=auto generic-timeout=10m icmp-timeout=10s loose-tcp-tracking=yes tcp-close-timeout=10s \
tcp-close-wait-timeout=10s tcp-established-timeout=1d tcp-fin-wait-timeout=10s tcp-last-ack-timeout=10s \
tcp-max-retrans-timeout=5m tcp-syn-received-timeout=5s tcp-syn-sent-timeout=5s tcp-time-wait-timeout=10s \
tcp-unacked-timeout=5m udp-stream-timeout=3m udp-timeout=20s
/ip/firewall/connection/tracking
Possibly original config had proxy arp enabled on bridge.UPGRADED (!) to RB4011 with Router OS 6.49.7, all same settings.
STILL ISSUE >>>> RDP cannot connect via L2TP/IPSEC VPN "Remote Desktop can't connect to the remote computer for one of these reasons... 1) Remote access to the server is not enabled 2) The remote computer is turned off 3) The remote computer is not available on the network"
/ip firewall connection tracking
set udp-timeout=20s
/ip firewall filter
add action=accept chain=forward comment="all from WAN DSTNATed" connection-nat-state=dstnat connection-state=new in-interface-list=WAN
Hi,Are there any updates regarding this issue?
...
From what I understand, these modifications can do no harm but I would like to understand the situation better.
What's new in 7.14 (2024-Feb-29 09:10):
*) firewall - increased default "udp-timeout" value from 10s to 30s;
For starters, in Linux newer Kernel versions (in RouterOS terms - v7) UDP stream is delayed for 2 seconds. That is done by Kernel for some reason. So, for example, if your RDP connection did reach stream status in the past somewhere between 8-10s, then it worked with v6, but will not work with v7.
As for the connection itself. We have inspected problematic connections and RouterOS is doing everything properly from our point of view. All packets are processed properly, connections are treated properly. Simply these UDP connections can be time-consuming and seems that simply RDP has a bit longer stream establishment compared to other UDP streams. That is why it was the one which was noticed after an upgrade to v7.
We will consider increasing default udp-timeout values in the future RouterOS releases.
Thanks ! It works !hi
I must miss led you I pass my log its not a rule
if you want some code to paste in termilal try this:Code: Select allip/firewall/connection/tracking/set udp-timeout=20s
windows reconnect exactly 75 seconds apart. After five try's every 15s apart.