CCR1009 collision and loop

Hi All,
this is my first topic.
I have one routerboard CCR1009 in my home (version with passive dissipation, no noise otherwise my wife throws me out of the house :frowning:( … ).
Configured in load balance and failover through wiki mikrotik (3 WAN) and 1 LAN in OUT.
The LAN OUT is connected a switch Netgear GS116, but all client connected (laptop and pc) in this switch lost packets (loss over 40% of the packets).
Are novice and not understand this problem … loop? collision?

So you have created a bridge over two ports? Where does to packet loss occur, between the router and the clients?

Post your configuration “/export compact”

Start by looking at the cable between the CCR and netgear device, replace if necessary

Thanks for reply Mada3k and Czfan,
answer your question.
CZFAN: I tried with another cable Cat.5E, but nothing…

MADA3K: None bridge ports in my configuration
Loss packet starts when attach CCR on switch with clients.
I have try another switch “Hp procurve 16 ports” always gigabit, equal problem.

Example: I have start ping 8.8.8.8 in terminal of CCR, ping started normally, zero loss packet. Just attached port WAN OUT at switch, started loss packet in terminal CCR and the clients equal


export compact

\

jan/04/1970 19:50:07 by RouterOS 6.46.3

software id = RIZI-ILQX

model = CCR1009-7G-1C-1S+

serial number = 9153082E0F1B

/interface ethernet
set [ find default-name=combo1 ] name=WAN-OUT
set [ find default-name=ether1 ] name=WAN1
set [ find default-name=ether2 ] name=WAN2
set [ find default-name=ether3 ] name=WAN3
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip address
add address=192.168.0.225/24 interface=CONSOLE network=192.168.0.0
add address=192.168.3.2/24 interface=WAN1 network=192.168.3.0
add address=192.168.4.2/24 interface=WAN2 network=192.168.4.0
add address=192.168.5.2/24 interface=WAN3 network=192.168.5.0
add address=193.168.0.1/20 interface=WAN-OUT network=193.168.0.0
/ip firewall mangle
add action=mark-connection chain=input in-interface=WAN1 new-connection-mark=WAN1_conn
add action=mark-connection chain=input in-interface=WAN2 new-connection-mark=WAN2_conn
add action=mark-connection chain=input in-interface=WAN3 new-connection-mark=WAN3_conn
add action=mark-routing chain=output connection-mark=WAN1_conn new-routing-mark=to_WAN1
add action=mark-routing chain=output connection-mark=WAN2_conn new-routing-mark=to_WAN2
add action=mark-routing chain=output connection-mark=WAN3_conn new-routing-mark=to_WAN3
add action=accept chain=prerouting dst-address=192.168.3.0/24 in-interface=WAN-OUT
add action=accept chain=prerouting dst-address=192.168.4.0/24 in-interface=WAN-OUT
add action=accept chain=prerouting dst-address=192.168.5.0/24 in-interface=WAN-OUT
add action=mark-connection chain=prerouting dst-address-type=!local in-interface=WAN-OUT new-connection-mark=WAN1_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/0
add action=mark-connection chain=prerouting dst-address-type=!local in-interface=WAN-OUT new-connection-mark=WAN2_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/1
add action=mark-connection chain=prerouting dst-address-type=!local in-interface=WAN-OUT new-connection-mark=WAN3_conn passthrough=yes per-connection-classifier=both-addresses-and-ports:3/2
add action=mark-routing chain=prerouting connection-mark=WAN1_conn in-interface=WAN-OUT new-routing-mark=to_WAN1
add action=mark-routing chain=prerouting connection-mark=WAN2_conn in-interface=WAN-OUT new-routing-mark=to_WAN2
add action=mark-routing chain=prerouting connection-mark=WAN3_conn in-interface=WAN-OUT new-routing-mark=to_WAN3
/ip firewall nat
add action=masquerade chain=srcnat out-interface=WAN1
add action=masquerade chain=srcnat out-interface=WAN2
add action=masquerade chain=srcnat out-interface=WAN3
/ip route
add check-gateway=ping distance=1 gateway=192.168.3.1 routing-mark=to_WAN1
add check-gateway=ping distance=1 gateway=192.168.4.1 routing-mark=to_WAN2
add check-gateway=ping distance=1 gateway=192.168.5.1 routing-mark=to_WAN3
add check-gateway=ping distance=1 gateway=192.168.3.1
add check-gateway=ping distance=2 gateway=192.168.4.1
add check-gateway=ping distance=3 gateway=192.168.5.1
/lcd
set backlight-timeout=never color-scheme=dark

add address=193.168.0.1/20 interface=WAN-OUT network=193.168.0.0

You cannot use 193.168.0.0/20 on your LAN as it is a public routed subnet not a Private allocated one!

Hi IngDaka,
thanks for reply.
Sorry I’m not very experienced in the matter.
What addressing can I use for my LAN? (in total 11 terminals between pc, laptop, nas and other)

You can use 172.16.0.0/24 range is allocated for private!

Convert all my LAN address on mask 172.16.0.0/24 and set address interface WAN-OUT 172.16.0.1, but continue to lost packet or collision :frowning: