Hi all!
I have Mikrotik ccr-1036 with 6.13 routerOS.
We use src NAT, (from 10.10.0.0 to 91.233.x.x) (in 719 vlan) and looks like some packets are bypassing NAT.
this is configuration
[lisena@MikroTik-1] /ip firewall nat> print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=src-nat to-addresses=91.233.219.xx9
src-address-list=seo1 out-interface=V719
1 chain=srcnat action=src-nat to-addresses=91.233.219.xx9
src-address-list=seo2 out-interface=V719
2 chain=srcnat action=src-nat to-addresses=91.233.219.xx0
src-address-list=dev out-interface=V719
3 chain=srcnat action=src-nat to-addresses=91.233.219.xx0
src-address-list=office out-interface=V719
4 chain=srcnat action=src-nat to-addresses=91.233.219.xx1
src-address-list=guest_net out-interface=V719
[lisena@MikroTik-1] /ip firewall nat>
[lisena@MikroTik-1] /interface vlan> print
Flags: X - disabled, R - running, S - slave
NAME MTU ARP VLAN-ID INTERFACE
0 R V718 1500 enabled 718 bond1
1 R V719 1500 enabled 719 bond1
and after that, i have packets with src address 10.10.16.0.
here is data from packet sniffer on microtik
[lisena@MikroTik-1] /tool sniffer> quick interface=bond1 direction=tx
INTERFACE TIME NUM DIR SRC-MAC DST-MAC VLAN SRC-ADDRESS DST-ADDRESS PROTOCOL SIZE
bond1 4.6 32700 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.6 32701 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.6 32702 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.6 32703 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.6 32704 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.6 32705 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.6 32706 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.6 32707 → 4C:5E:0C:23:E6:A8 00:24:C4:74:38:BF 719 91.233.219.210:59925 54.225.70.39:443 (https) ip:tcp 58
bond1 4.6 32708 → 4C:5E:0C:23:E6:A8 00:24:C4:74:38:BF 719 91.233.219.210:59925 54.225.70.39:443 (https) ip:tcp 58
bond1 4.601 32709 → 4C:5E:0C:23:E6:A8 00:24:C4:74:38:BF 719 91.233.219.210:59925 54.225.70.39:443 (https) ip:tcp 58
bond1 4.602 32710 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 69.171.247.29:443 (https) 10.10.12.142:59917 ip:tcp 127
bond1 4.602 32711 → 4C:5E:0C:23:E6:A8 00:24:C4:74:38:BF 719 10.10.16.54:60760 111.221.74.18:80 (http) ip:tcp 58
bond1 4.603 32712 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.603 32713 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.603 32714 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.603 32715 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.603 32716 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.603 32717 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.603 32718 → 00:00:5E:00:01:02 00:24:C4:74:38:BF 718 54.225.70.39:443 (https) 10.10.10.204:59925 ip:tcp 1518
bond1 4.603 32719 → 4C:5E:0C:23:E6:A8 00:24:C4:74:38:BF 719 91.233.219.209:62042 79.165.232.60:61252 ip:udp 49
update sofrware from 6.5 to 6.13 did not help ![]()
any ideas ?