Hello guys,
I am literally in real pain.
I can not figure out why am i unable to communicate with my windows server in another subnet.
I did configure the IP Routes as much as I can, and I use the default firewall rules.
The weird in my situation is that I can communicate with my domain controllers but with another servers… (they are all in the same subnet)
I am trying to make a CAPsManager out of this RB4011 with different VLANS, and RADIUS server ( Windows NPS )
Back in 2020 I already achived to make a fully working caps system, but even with those configs nothing works.
I do accept any help. Thank you guys.
br,
Defty
Here is my config:
# jan/19/2021 15:30:51 by RouterOS 6.48
# software id = AXUJ-693Y
#
# model = RB4011iGS+
# serial number = D4480C4E5665
/interface bridge
add admin-mac=48:8F:5A:F3:37:1C auto-mac=no comment=defconf name=bridge
add name=cap_bridge
/interface vlan
add interface=cap_bridge name=cap_br_2150 vlan-id=2150
add interface=cap_bridge name=cap_br_2151 vlan-id=2151
add interface=cap_bridge name=cap_br_2169 vlan-id=2169
add interface=ether1 name=uplink_vlan_2150 vlan-id=2150
add interface=ether1 name=uplink_vlan_2152 vlan-id=2152
add interface=ether1 name=uplink_vlan_2169 vlan-id=2169
add interface=ether1 name=uplink_vlan_2300 vlan-id=2300
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add name=cap_list
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp interface=bridge name=defconf
/caps-man manager interface
add forbid=yes interface=ether1
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=ether9
add bridge=bridge comment=defconf interface=ether10
add bridge=bridge comment=defconf interface=sfp-sfpplus1
/ip neighbor discovery-settings
set discover-interface-list=all
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=cap_bridge list=cap_list
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
192.168.88.0
add address=172.20.169.133/24 interface=uplink_vlan_2169 network=172.20.169.0
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=172.20.150.11,172.20.150.12
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
disabled=yes in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=accept chain=forward comment="Allow Established connections" \
connection-state=established
add action=accept chain=forward comment="Allow Related connections" \
connection-state=related
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
out-interface=ether1
add action=masquerade chain=srcnat out-interface=ether1 src-address=\
172.20.169.0/24
/ip route
add distance=1 gateway=172.20.169.254
add distance=1 dst-address=172.20.150.0/24 gateway=172.20.169.254
/ip route rule
add action=lookup-only-in-table dst-address=172.20.150.0/24 table=main
/system clock
set time-zone-name=Europe/Budapest
/system ntp client
set enabled=yes primary-ntp=172.20.169.254
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN