Right now you are switching inbound traffic to a routing table that no longer has the destination it is supposed to reach.Create a second rule that applies a new routing mark to packets marked with the connection mark and coming from the DMZ.
Is there actually any official statement from MT on this? ("Yeah, we will consider thinking about doing it in the future" doesn't count)Not currently. Mikrotik is working on a controller feature, but it isn't out yet.
Nope, Checkpoint, Cisco and ShrewSoft (the last one) are all IPSec-Clients.Do those clients even support PPTP?
9, 16, 36:AFAIK, Tile-Gx 8000 series has only 16-, 36-, 64- and 100-core versions
/export compact hide-sensitive
So why not on CCR?microUSB cables have ugly big connector (the square plastic around connector tip), you can't plug it without having that hole.
Does RouterOS support DDMI from SFPS?
That's the device I'd like to see from MT!, but with 3x3 MIMO or Dual 2,4/5 Ghz operation and ports on one side so it can be wall mounted with the cables going up.
Riiiiiiiight....so what would you call a RB750 then? 9600 Baud Modem?And now i see that CCR not for me, its just another office switch\router
I don't think there's any chance for that.Q1 2013 is possible?
/ip firewall nat
add action=masquerade chain=srcnat comment=NAT disabled=no
add action=dst-nat chain=dstnat comment="SSH" disabled=no dst-address=5.x.x.x dst-port=22 protocol=tcp to-addresses=192.168.x.x to-ports=22
/system reset skip-backup=yes no-defaults=yes
Don't use dynamic interfacesis there no way MT can remember the dynamic interfaces
Depends.is that all i need.
Depends on the model...Will a normal gateway router do this??
One for each network a,b,c.and with the NAT rules, do i need one or a whole lot?
/ip route
add dst-addr=0.0.0.0/0 gatew=192.168.0.1
/ip fire nat
add chain=srcnat src-address=192.168.1.0/24 out-int=ether1 action=src-nat to-addr=192.168.1.1
with web-only interface =)
in the same time with a web interface (which I have yet to see).vlan 15
untag 1-24
tag 25,26
add action=masquerade chain=srcnat comment="default configuration" disabled=no out-interface=ether1-gateway
add action=masquerade chain=srcnat comment="default configuration" disabled=no out-interface=pppoe-out1
That is the value I've seen in all my (netio-)tests with cheap Realtek or Yukon chipsets under Linux.650 Mbit/s full duplex on the links
Yup.can anyone see the live video stream in tiktube.com ?
traceroute to remote.endpoint (8.xxx.xxx.1), 30 hops max, 40 byte packets
1 router (9.xxx.xxx.1) 0.463 ms 1.036 ms 1.004 ms
2 ac.provider (6.xxx.xxx.1) 16.176 ms 18.056 ms 18.675 ms
[...]
ip fire addr add list=allowed-users addr=10.0.0.1
/ip fire nat add src-address-list=!allowed-users chain=dstnat dst-port=80 to-addresses=192.168.0.111
Some basic spoofing prevention as well as filtering.what do you want to do with that rule?
I don't really like the idea of creating over 80 rulesin-interface=pppoe-whatever
ip fire nat add chain=src-nat out-interface=pppoe-client action=masq
- Set the operation mode of the wlan interface to station and make sure it connects.In the Ubiquity software, I just select bridge mode, and accosiate it with the AP, and everything works ok!