FTP ¿ERROR? when using wget

Hi, I have a problem when downloading a logs file from Aps whit one script.
I use the script in more networks and it only happen in one center.

When i try to download the log it connect sucessfull, detect the file and start download but really doesnt download nothing.
I tried to upload new files via Winbox and then download them with wget and it only works with files with less than 1KB weight.

http://imgur.com/a/nZYOb

At my controller my firewall export (first rules are a test)
add action=passthrough chain=unused-hs-chain comment=“place hotspot rules here” disabled=yes
add action=accept chain=forward connection-state=invalid,established,related,new connection-type=ftp log=yes
add action=accept chain=forward connection-state=invalid,established,related,new connection-type=ftp log=yes
add action=accept chain=input connection-state=invalid,established,related,new connection-type=ftp log=yes
add action=accept chain=services connection-state=invalid,established,related,new connection-type=ftp
add action=accept chain=output connection-state=invalid,established,related,new connection-type=ftp
add action=drop chain=forward dst-port=25 protocol=tcp
add action=tarpit chain=input comment=“;;;Evitar ataques” dst-port=23 protocol=tcp
add action=drop chain=input comment=“Drop SSH connection from IP addresses in ssh_blacklist address list” disabled=yes dst-port=21,22,8291
protocol=tcp src-address-list=ssh_blacklist
add action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=2w chain=input comment=
“Blocked IP address that attempted multiple SSH connections” connection-state=“” dst-port=21,22,8291 protocol=tcp src-address-list=
ssh_attempt_3
add action=add-src-to-address-list address-list=ssh_attempt_3 address-list-timeout=1m chain=input comment=
“IP address that attempted to create 3 SSH connections” connection-state=“” dst-port=21,22,8291 protocol=tcp src-address-list=
ssh_attempt_2
add action=add-src-to-address-list address-list=ssh_attempt_2 address-list-timeout=1m chain=input comment=
“IP address that attempted to create 2 SSH connections” connection-state=“” dst-port=21,22,8291 protocol=tcp src-address-list=
ssh_attempt_1
add action=add-src-to-address-list address-list=ssh_attempt_1 address-list-timeout=1m chain=input comment=
“IP address that attempted to create an SSH connections” connection-state=“” dst-port=21,22,8291 protocol=tcp
add action=drop chain=input comment=“Drop connections FROM blacklisted hosts - http://forum.mikrotik.com/viewtopic.php\?f=9&t=98804” log=
yes src-address-list=blacklist
add action=drop chain=forward comment=“Drop connections TO blacklisted hosts http://forum.mikrotik.com/viewtopic.php\?f=9&t=98804
dst-address-list=blacklist log=yes log-prefix=Blacklist
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“Port scanners to list”
protocol=tcp psd=21,3s,3,1
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“NMAP FIN Stealth scan”
protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“SYN/FIN scan” log=yes
protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“SYN/RST scan” protocol=tcp
tcp-flags=syn,rst
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“FIN/PSH/URG scan” log=yes
protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“ALL/ALL scan” log=yes
protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list=“port scanners” address-list-timeout=2w chain=input comment=“NMAP NULL scan” log=yes
protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=drop chain=input comment=“;;;dropping port scanners” src-address-list="port scanners"Thanks in advance.