Very weird and frustrating problem here. UniFi wireless setup with dsl router. Had to move the router to the other side of the room as the telephone wiring under the room had degraded. No wired networking on the other side so I put in a HAP AX2 to run a wireless bridge (router was ISP managed). Ran it on the 2.4GHz band for range as the line tops out at 25Mbps. All good, problem solved, went home. A day or so later, it all falls apart and nothing is working. After a bit of poking it all starts working again for a few hours. I've tried switching to 5GHz, getting the ISP's router switched to modem-only so that our HAP is in control and I can get access etc. Also set up Dude to monitor all the infrastructure and put it all on static IPs. It went down again today and I managed to get some diagnostics.
Dude said everything was reachable and up. I could access it all from a wireguard VPN I set up. Plugging a laptop in to a switch on the far side of the wireless bridge, I could ping everything locally and access the HAP but I couldn't ping the internet. I could see the icmp packets arrive at the HAP by torching the wifi interface but nothing was being routed out to the internet. Reboot the HAP and all good again but probably only temporarily. Everything worked if I connected to the HAP over wired ethernet so I've run a network cable and taped it to the skirting boards to get us to next year. Has anyone seen this or know of something I'm missing?
Slightly trimmed code - the extra IP on bridge was for an IPSEC connection allowing that single IP to a single IP at the other end of the tunnel, just for remote access before the ISPs router was put in modem-only mode.
Many thanks,
Gareth
/interface wifi
set [ find default-name=wifi2 ] channel.band=5ghz-ax .skip-dfs-channels=10min-cac .width=20/40/80mhz configuration.country="United Kingdom" .mode=station-pseudobridge .ssid=<SSID> name=wifi-5GHz security.authentication-types=wpa2-psk .ft=no .ft-over-ds=no
/dude
set enabled=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wifi-5GHz
add bridge=bridge comment=defconf interface=wifi-2.4
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=Claranet list=WAN
/ip address
add address=192.168.0.1/24 comment=defconf interface=bridge network=192.168.0.0
add address=10.1.245.1/24 interface=bridge network=10.1.245.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip pool
add name=DHCP-Pool ranges=192.168.0.50-192.168.0.159
/ip dhcp-server
add address-pool=DHCP-Pool interface=bridge name=DHCP
/ip dhcp-server network
add address=192.168.0.0/24 dns-server=192.168.0.1,208.67.222.222 gateway=192.168.0.1
/ip dns
set allow-remote-requests=yes servers=208.67.220.220,208.67.222.222
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid log-prefix="Drop Input invalid:"
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=accept chain=input comment="Allow Remote Management - Winbox" dst-port=8291 protocol=tcp src-address-list=RemoteManagement
add action=accept chain=input comment="Allow Remote Management - SNMP" dst-port=161 protocol=udp src-address-list=RemoteManagement
add action=accept chain=input comment="Allow Dude SNMP" disabled=yes dst-port=161 protocol=udp src-address=192.168.0.1
add action=accept chain=input comment="Allow Dude DNS & SNMP" dst-port=53,161 protocol=udp src-address=192.168.0.1
add action=accept chain=forward comment="Allow Remote Management - RDP" dst-port=3389 protocol=tcp src-address-list=RemoteManagement
add action=accept chain=input comment="Allow Wireguard" dst-port=13231 in-interface-list=WAN protocol=udp
add action=accept chain=input comment="Allow Wireguard DNS" dst-port=53 in-interface=wireguard protocol=udp src-address=172.20.1.0/24
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN log-prefix="default drop: "
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid log-prefix="Drop fwd invalid: "
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
add action=reject chain=forward comment="Reject egress to RFC1918 address ranges" dst-address-list=RFC1918 out-interface-list=WAN reject-with=icmp-network-unreachable
add action=reject chain=output comment="Reject egress to RFC1918 address ranges" dst-address-list=RFC1918 log=yes out-interface-list=WAN reject-with=icmp-network-unreachable
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN