/ip/firewall/export
Hi there! The best way to submit a new feature is through the support portal:Can we get source IP on bandwidth test tool
Really painful on complex link routers when you can't control what IP the test launches from.
/interface bridge host print
Ahhh okay! The masquerade rule should still work though. On the RB, do you see any rule counter increasing? Any NAT counter increasing?Yes, the home router assigned 192.168.1.146 to the RB.Do you have an IP on eth1_WAN? And a default route?
Google
OpenDNS
Level3
Comodo
DNS.WATCH
Quad9
CloudFlare DNS
Custom
show crypto ipsec sa
/interface/wifi/configuration
set [where name=hidden_2G] channel="2G N"
/log/print where topics~".*dhcp.*"
/ip/address/print
/ip/firewall/address-list/print
/interface/list/member/print
/ip/dhcp-server/export
> /ip/dhcp-server/network/export
...
/ip dhcp-server network
add address=192.168.2.0/24 dns-server=192.168.2.1 gateway=192.168.2.1 netmask=24
/interface/ethernet/set [find name=sfp1] arp=proxy-arp
/ip/route/add dst-address=10.30.30.2/32 gateway=192.168.88.254
/ip/arp/print
Glad to hear it! Please mark this as solved if you get a chance.Fixed in Observium. Thanks for your support.
snmpwalk [...] -m MIKROTIK-MIB -m LLDP-MIB 192.168.2.1 1.0.8802.1.1.2
/interface/bonding/print
/interface/bridge/port print
/interface/bridge/print detail
ip addr
ip route list
/interface bridge export
/interface wifi access-list
add action=reject disabled=no signal-range=-85..120
/interface/bridge/port/print where interface=ether3-green
disable-dco
Jan 25 15:28:49 zoidberg sshd[275510]: debug2: input_userauth_request: try method none [preauth]
sudo journalctl -xr -u ssh
/system ssh user=<some non root user on the linux server> 192.168.4.5
/ip/neighbor/discovery-settings/print
/interface/list/member/print
/ip/address/export verbose
/ip/firewall/nat/export
/ip/firewall/filter/export
/system/logging/ add action=memory prefix=ipsec topics=ipsec
/ip/firewall/filter/print chain=input
I tried adding another rule so now it becomes:
#0: Chain: forward, Action: accept, In Interface: vlan20, Out Interface: vlan30
#1: Chain: forward, Action: drop, In Interface: vlan30, Out Interface: vlan20
Correct, server not router.I think you meant SERVER!
/ip firewall nat
chain=srcnat action=masquerade log=no log-prefix=""