Packet sniffer behaviour or wrong VLAN configuration
Posted: Mon Jun 13, 2022 5:55 pm
Hi,
if i sniff all packets from my hEX (with the internal packet sniffer) with this simple configuration i see that the Mikrotik sent out packet with and without VLAN header (ICMP and TCP traffic from winbox) from 192.168.10.2/24:
/interface bridge
add ingress-filtering=yes name=bridge1 vlan-filtering=yes
/interface vlan
add interface=bridge1 name=vlan-10 vlan-id=10
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 ingress-filtering=yes interface=ether2 pvid=10
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether5
/interface bridge vlan
add bridge=bridge1 tagged=ether1,ether3,ether4,ether5,bridge1 untagged=ether2 vlan-ids=10
/ip address
add address=192.168.1.2/24 interface=bridge1 network=192.168.1.0
add address=192.168.10.2/24 interface=vlan-10 network=192.168.10.0
with wireshark i see huge amount of TCP Dup and Retrasmission becouse of this.
It is normal?
if i sniff all packets from my hEX (with the internal packet sniffer) with this simple configuration i see that the Mikrotik sent out packet with and without VLAN header (ICMP and TCP traffic from winbox) from 192.168.10.2/24:
/interface bridge
add ingress-filtering=yes name=bridge1 vlan-filtering=yes
/interface vlan
add interface=bridge1 name=vlan-10 vlan-id=10
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 ingress-filtering=yes interface=ether2 pvid=10
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether5
/interface bridge vlan
add bridge=bridge1 tagged=ether1,ether3,ether4,ether5,bridge1 untagged=ether2 vlan-ids=10
/ip address
add address=192.168.1.2/24 interface=bridge1 network=192.168.1.0
add address=192.168.10.2/24 interface=vlan-10 network=192.168.10.0
with wireshark i see huge amount of TCP Dup and Retrasmission becouse of this.
It is normal?