Quantcast
Channel: MikroTik
Viewing all articles
Browse latest Browse all 15133

Beginner Basics • can't ping from the router

$
0
0
Hi,
I am new to Microtik and are trying to setup a multi-wan load balancing network, got the load balancing working, and trying to setup wireguard with ip cloud, this is when i found out that the router can't ping outside, while pc on network can. Can someone help me have a look at this, and maybe give me some suggestion on the firewall as well? Don't know if that is enough.
Thanks.
Code:
# 2024-02-01 02:12:55 by RouterOS 7.10.2# software id = 2KKG-QJS4## model = RB5009UG+S+# serial number = HDD0865R1CF/interface bridgeadd name=bridge/interface ethernetset [ find default-name=ether1 ] name=LAN1set [ find default-name=ether2 ] disabled=yes name=LAN2set [ find default-name=ether3 ] disabled=yes name=LAN3set [ find default-name=ether4 ] name=LAN4set [ find default-name=sfp-sfpplus1 ] name=LANsset [ find default-name=ether5 ] name=WAN1set [ find default-name=ether6 ] name=WAN2set [ find default-name=ether7 ] name=WAN3set [ find default-name=ether8 ] name=WAN4/interface wireguardadd listen-port=13231 mtu=1420 name=wireguard1/interface listadd name=WAN_listadd name=LAN_list/interface wireless security-profilesset [ find default=yes ] supplicant-identity=MikroTik/ip pooladd name=dhcp_pool ranges=192.168.88.2-192.168.88.254/ip dhcp-serveradd address-pool=dhcp_pool interface=bridge lease-time=10m name=dhcp/routing tableadd disabled=no fib name=to_WAN1add disabled=no fib name=to_WAN2add disabled=no fib name=to_WAN3add disabled=no fib name=to_WAN4/interface bridge portadd bridge=bridge interface=LAN_list/ip neighbor discovery-settingsset discover-interface-list=LAN_list/interface list memberadd interface=WAN1 list=WAN_listadd interface=WAN2 list=WAN_listadd interface=WAN3 list=WAN_listadd interface=WAN4 list=WAN_listadd interface=LANs list=LAN_listadd interface=LAN1 list=LAN_listadd interface=LAN2 list=LAN_listadd interface=LAN4 list=LAN_listadd interface=LAN3 list=LAN_listadd interface=wireguard1 list=LAN_list/ip addressadd address=192.168.88.1/24 interface=bridge network=192.168.88.0add address=192.168.100.1/24 interface=wireguard1 network=192.168.100.0/ip cloudset ddns-enabled=yes ddns-update-interval=1h/ip dhcp-clientadd interface=WAN1 script=":local cWANIP [/ip address get [find interface=\"WA\    N1\"] address];\r\    \n/ip firewall mangle remove [find comment=\"##firewallwan1##\"];\r\    \n/ip firewall mangle add chain=prerouting dst-address= \$cWANIP in-interf\    ace-list=LAN_list action=accept comment=\"##firewallwan1##\";\r\    \n/ip firewall mangle move [find comment=\"##firewallwan1##\"] 4;\r\    \n\r\    \n/ip route\r\    \nremove [find comment=\"##routewan1##\"];\r\    \nadd check-gateway=ping disabled=no dst-address=0.0.0.0/0 gateway=\$\"gat\    eway-address\" routing-table=to_WAN1 suppress-hw-offload=no comment=\"##ro\    utewan1##\";\r\    \nadd distance=1 dst-address=0.0.0.0/0 gateway=\$\"gateway-address\" comme\    nt=\"##routewan1##\";\r\    \n"add interface=WAN2 script=":local cWANIP [/ip address get [find interface=\"WA\    N2\"] address];\r\    \n/ip firewall mangle remove [find comment=\"##firewallwan2##\"];\r\    \n/ip firewall mangle add chain=prerouting dst-address= \$cWANIP in-interf\    ace-list=LAN_list action=accept comment=\"##firewallwan2##\";\r\    \n/ip firewall mangle move [find comment=\"##firewallwan2##\"] 4;\r\    \n\r\    \n/ip route\r\    \nremove [find comment=\"##routewan2##\"];\r\    \nadd check-gateway=ping disabled=no dst-address=0.0.0.0/0 gateway=\$\"gat\    eway-address\" routing-table=to_WAN2 suppress-hw-offload=no comment=\"##ro\    utewan2##\";\r\    \nadd distance=2 dst-address=0.0.0.0/0 gateway=\$\"gateway-address\" comme\    nt=\"##routewan2##\";\r\    \n"add interface=WAN3 script=":local cWANIP [/ip address get [find interface=\"WA\    N3\"] address];\r\    \n/ip firewall mangle remove [find comment=\"##firewallwan3##\"];\r\    \n/ip firewall mangle add chain=prerouting dst-address= \$cWANIP in-interf\    ace-list=LAN_list action=accept comment=\"##firewallwan3##\";\r\    \n/ip firewall mangle move [find comment=\"##firewallwan3##\"] 4;\r\    \n\r\    \n/ip route\r\    \nremove [find comment=\"##routewan3##\"];\r\    \nadd check-gateway=ping disabled=no dst-address=0.0.0.0/0 gateway=\$\"gat\    eway-address\" routing-table=to_WAN3 suppress-hw-offload=no comment=\"##ro\    utewan3##\";\r\    \nadd distance=3 dst-address=0.0.0.0/0 gateway=\$\"gateway-address\" comme\    nt=\"##routewan3##\";"add interface=WAN4 script=":local cWANIP [/ip address get [find interface=\"WA\    N4\"] address];\r\    \n/ip firewall mangle remove [find comment=\"##firewallwan4##\"];\r\    \n/ip firewall mangle add chain=prerouting dst-address= \$cWANIP in-interf\    ace-list=LAN_list action=accept comment=\"##firewallwan4##\";\r\    \n/ip firewall mangle move [find comment=\"##firewallwan4##\"] 4;\r\    \n\r\    \n/ip route\r\    \nremove [find comment=\"##routewan4##\"];\r\    \nadd check-gateway=ping disabled=no dst-address=0.0.0.0/0 gateway=\$\"gat\    eway-address\" routing-table=to_WAN4 suppress-hw-offload=no comment=\"##ro\    utewan4##\";\r\    \nadd distance=4 dst-address=0.0.0.0/0 gateway=\$\"gateway-address\" comme\    nt=\"##routewan4##\";"/ip dhcp-server networkadd address=192.168.88.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=192.168.88.1/ip dnsset allow-remote-requests=yes servers=8.8.8.8,8.8.4.4/ip firewall address-listadd address=0.0.0.0/8 comment=RFC6890 list=not_in_internetadd address=172.16.0.0/12 comment=RFC6890 list=not_in_internetadd address=192.168.0.0/16 comment=RFC6890 list=not_in_internetadd address=10.0.0.0/8 comment=RFC6890 list=not_in_internetadd address=169.254.0.0/16 comment=RFC6890 list=not_in_internetadd address=127.0.0.0/8 comment=RFC6890 list=not_in_internetadd address=224.0.0.0/4 comment=Multicast list=not_in_internetadd address=198.18.0.0/15 comment=RFC6890 list=not_in_internetadd address=192.0.0.0/24 comment=RFC6890 list=not_in_internetadd address=192.0.2.0/24 comment=RFC6890 list=not_in_internetadd address=198.51.100.0/24 comment=RFC6890 list=not_in_internetadd address=203.0.113.0/24 comment=RFC6890 list=not_in_internetadd address=100.64.0.0/10 comment=RFC6890 list=not_in_internetadd address=240.0.0.0/4 comment=RFC6890 list=not_in_internetadd address=192.88.99.0/24 comment="6to4 relay Anycast [RFC 3068]" list=\    not_in_internetadd address=192.168.88.0/24 list=ipooladd address=192.168.100.0/24 list=ipooladd address=10.0.0.0/8 list=RFC1918add address=172.16.0.0/12 list=RFC1918add address=192.168.0.0/16 list=RFC1918/ip firewall filteradd action=accept chain=input comment=\    "defconf: accept established,related,untracked" connection-state=\    established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=\    invalidadd action=accept chain=input comment="allow wireguard" dst-port=13231 \    protocol=udpadd action=accept chain=input protocol=icmpadd action=accept chain=input dst-address-list=ipooladd action=accept chain=input comment=\    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=drop chain=input in-interface-list=!LAN_listadd action=fasttrack-connection chain=forward comment=FastTrack \    connection-state=established,related disabled=yes hw-offload=yesadd action=accept chain=forward comment="Established, Related" \    connection-state=established,relatedadd action=drop chain=forward comment="Drop invalid" connection-state=invalid \    log=yes log-prefix=invalidadd action=drop chain=forward comment=\    "Drop tries to reach not public addresses from LAN" dst-address-list=\    not_in_internet in-interface-list=LAN_list log=yes log-prefix=\    !public_from_LAN out-interface-list=!LAN_listadd action=drop chain=forward comment=\    "Drop incoming packets that are not NAT`ted" connection-nat-state=!dstnat \    connection-state=new in-interface-list=LAN_list log=yes log-prefix=!NATadd action=jump chain=forward comment="jump to ICMP filters" jump-target=icmp \    protocol=icmpadd action=drop chain=forward comment=\    "Drop incoming from internet which is not public IP" in-interface-list=\    LAN_list log=yes log-prefix=!public src-address-list=not_in_internetadd action=drop chain=forward comment=\    "Drop packets from LAN that do not have LAN IP" in-interface-list=\    LAN_list log=yes log-prefix=LAN_!LAN src-address-list=!ipooladd action=accept chain=icmp comment="echo reply" icmp-options=0:0 protocol=\    icmpadd action=accept chain=icmp comment="net unreachable" icmp-options=3:0 \    protocol=icmpadd action=accept chain=icmp comment="host unreachable" icmp-options=3:1 \    protocol=icmpadd action=accept chain=icmp comment=\    "host unreachable fragmentation required" icmp-options=3:4 protocol=icmpadd action=accept chain=icmp comment="allow echo request" icmp-options=8:0 \    protocol=icmpadd action=accept chain=icmp comment="allow time exceed" icmp-options=11:0 \    protocol=icmpadd action=accept chain=icmp comment="allow parameter bad" icmp-options=12:0 \    protocol=icmpadd action=drop chain=icmp comment="deny all other types"/ip firewall mangleadd action=accept chain=prerouting dst-address-list=RFC1918 src-address-list=\    RFC1918add action=accept chain=prerouting comment=##firewallwan3## dst-address=\    218.250.160.0/24 in-interface-list=LAN_listadd action=accept chain=prerouting comment=##firewallwan1## dst-address=\    42.98.99.0/24 in-interface-list=LAN_listadd action=accept chain=prerouting comment=##firewallwan2## dst-address=\    112.119.218.0/24 in-interface-list=LAN_listadd action=accept chain=prerouting comment=##firewallwan4## dst-address=\    218.250.160.0/24 in-interface-list=LAN_listadd action=mark-connection chain=input connection-state=new in-interface=WAN1 \    new-connection-mark=WAN1_conn passthrough=noadd action=mark-connection chain=input connection-state=new in-interface=WAN2 \    new-connection-mark=WAN2_conn passthrough=noadd action=mark-connection chain=input connection-state=new in-interface=WAN3 \    new-connection-mark=WAN3_conn passthrough=noadd action=mark-connection chain=input connection-state=new in-interface=WAN4 \    new-connection-mark=WAN4_conn passthrough=noadd action=mark-connection chain=output connection-mark=no-mark \    connection-state=new new-connection-mark=WAN1_conn passthrough=yes \    per-connection-classifier=both-addresses:4/0add action=mark-connection chain=output connection-mark=no-mark \    connection-state=new new-connection-mark=WAN2_conn passthrough=yes \    per-connection-classifier=both-addresses:4/1add action=mark-connection chain=output connection-mark=no-mark \    connection-state=new new-connection-mark=WAN3_conn passthrough=yes \    per-connection-classifier=both-addresses:4/2add action=mark-connection chain=output connection-mark=no-mark \    connection-state=new new-connection-mark=WAN4_conn passthrough=yes \    per-connection-classifier=both-addresses:4/3add action=mark-connection chain=prerouting connection-mark=no-mark \    connection-state=new dst-address-type=!local in-interface-list=LAN_list \    new-connection-mark=WAN1_conn passthrough=no per-connection-classifier=\    both-addresses:4/0add action=mark-connection chain=prerouting connection-mark=no-mark \    connection-state=new dst-address-type=!local in-interface-list=LAN_list \    new-connection-mark=WAN2_conn passthrough=no per-connection-classifier=\    both-addresses:4/1add action=mark-connection chain=prerouting connection-mark=no-mark \    connection-state=new dst-address-type=!local in-interface-list=LAN_list \    new-connection-mark=WAN3_conn passthrough=no per-connection-classifier=\    both-addresses:4/2add action=mark-connection chain=prerouting connection-mark=no-mark \    connection-state=new dst-address-type=!local in-interface-list=LAN_list \    new-connection-mark=WAN4_conn passthrough=no per-connection-classifier=\    both-addresses:4/3add action=mark-routing chain=output connection-mark=WAN1_conn \    new-routing-mark=to_WAN1 passthrough=noadd action=mark-routing chain=output connection-mark=WAN2_conn \    new-routing-mark=to_WAN2 passthrough=noadd action=mark-routing chain=output connection-mark=WAN3_conn \    new-routing-mark=to_WAN3 passthrough=noadd action=mark-routing chain=output connection-mark=WAN4_conn \    new-routing-mark=to_WAN4 passthrough=noadd action=mark-routing chain=prerouting connection-mark=WAN1_conn \    in-interface-list=LAN_list new-routing-mark=to_WAN1 passthrough=noadd action=mark-routing chain=prerouting connection-mark=WAN2_conn \    in-interface-list=LAN_list new-routing-mark=to_WAN2 passthrough=noadd action=mark-routing chain=prerouting connection-mark=WAN3_conn \    in-interface-list=LAN_list new-routing-mark=to_WAN3 passthrough=noadd action=mark-routing chain=prerouting connection-mark=WAN4_conn \    in-interface-list=LAN_list new-routing-mark=to_WAN4 passthrough=no/ip firewall natadd action=masquerade chain=srcnat out-interface=WAN1 src-address-list=\    RFC1918add action=masquerade chain=srcnat out-interface=WAN2 src-address-list=\    RFC1918add action=masquerade chain=srcnat out-interface=WAN3 src-address-list=\    RFC1918add action=masquerade chain=srcnat out-interface=WAN4 src-address-list=\    RFC1918/ip routeadd check-gateway=ping comment=##routewan3## disabled=no dst-address=\    0.0.0.0/0 gateway=218.250.160.254 routing-table=to_WAN3 \    suppress-hw-offload=noadd comment=##routewan3## distance=3 dst-address=0.0.0.0/0 gateway=\    218.250.160.254add check-gateway=ping comment=##routewan1## disabled=no dst-address=\    0.0.0.0/0 gateway=42.98.99.254 routing-table=to_WAN1 suppress-hw-offload=\    noadd comment=##routewan1## distance=1 dst-address=0.0.0.0/0 gateway=\    42.98.99.254add check-gateway=ping comment=##routewan2## disabled=no dst-address=\    0.0.0.0/0 gateway=112.119.218.254 routing-table=to_WAN2 \    suppress-hw-offload=noadd comment=##routewan2## distance=2 dst-address=0.0.0.0/0 gateway=\    112.119.218.254add check-gateway=ping comment=##routewan4## disabled=no dst-address=\    0.0.0.0/0 gateway=218.250.160.254 routing-table=to_WAN4 \    suppress-hw-offload=noadd comment=##routewan4## distance=4 dst-address=0.0.0.0/0 gateway=\    218.250.160.254/ip serviceset telnet disabled=yesset ftp disabled=yesset www address=192.168.88.0/24set ssh disabled=yes port=2200set api disabled=yesset winbox address=192.168.88.0/24set api-ssl disabled=yes/ip sshset strong-crypto=yes/ipv6 firewall address-listadd address=::/128 comment="defconf: unspecified address" list=bad_ipv6add address=::1/128 comment="defconf: lo" list=bad_ipv6add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6add address=100::/64 comment="defconf: discard only " list=bad_ipv6add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6add address=fd12:672e:6f65:8899::/64 list=allowedadd address=fe80::/16 list=allowedadd address=ff02::/16 comment=multicast list=allowed/ipv6 firewall filteradd action=accept chain=input comment="allow established and related" \    connection-state=established,relatedadd action=accept chain=input comment="accept ICMPv6" protocol=icmpv6add action=accept chain=input comment="defconf: accept UDP traceroute" port=\    33434-33534 protocol=udpadd action=accept chain=input comment=\    "accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp \    src-address=fe80::/10add action=accept chain=input comment="allow allowed addresses" \    src-address-list=allowedadd action=drop chain=inputadd action=accept chain=forward comment=established,related connection-state=\    established,relatedadd action=drop chain=forward comment=invalid connection-state=invalid log=\    yes log-prefix=ipv6,invalidadd action=accept chain=forward comment=icmpv6 in-interface-list=!LAN_list \    protocol=icmpv6add action=accept chain=forward comment="local network" in-interface-list=\    !LAN_list src-address-list=allowedadd action=drop chain=forward log-prefix=IPV6/system clockset time-zone-name=Asia/Hong_Kong/system noteset show-at-login=no/tool bandwidth-serverset enabled=no/tool mac-serverset allowed-interface-list=LAN_list/tool mac-server mac-winboxset allowed-interface-list=LAN_list
config.rsc

Statistics: Posted by dpong01 — Wed Jan 31, 2024 10:02 pm



Viewing all articles
Browse latest Browse all 15133

Trending Articles