Have 2 sites, can VNC only one-way

Hi,

Please help since I do not know how to resolve this.

I have two homes, A and B, both with a Mikrotik CPE (One with HaP AC2, one with HaP AC3+LTE (RBD53GR-5HacD2HnD)).
Behind both CPE’s, computers with real VNC installed, forwarding rules set on the routers.

It always works from the AC2 site towards AC3, but it doesn’t work from AC3 towards AC2.

When trying the second, the VNC connection just times out. If I disconnect from wireless (but also tried wired) and connect to my phone’s Mobile Hotspot, it works like a charm from the same computer. Also from the phone, where I have an Android VNC app, its the same - works through the mobile network, NOT from the AC3 wireless.

I do know a bit or two about routers, but not so much - and no matter how much I’ve looked through the WebFig menus I can’t seem to understand what is the matter, why this happens.

Can you please help?

Does either router get a public IP (static or dynamic) or do both get private IPs from the upstream device.

Both routers get public IP (not fixed, but public) from actually the same provider, using PPPOE.

I use no-ip DDNS, not setup on the mikrotiks since this is… complicated - but on other devices.

Looking back, this should probably be moved to the “General” forum.

Here is a dump of my AC3 configuration:

(was not complete, deleted, please see 2 posts below)

No, it isn’t, that is only a part of it.
Follow this:
http://forum.mikrotik.com/t/forum-rules/173010/1
And when you paste it on your next post please do remember to put it inside code tags, it makes the whole thread much more readable.

Here is a correct dump of my AC3 configuration:

# mar/04/2024 16:35:58 by RouterOS 6.49.13
# software id = xxx
#
# model = RBD53GR-5HacD2HnD
# serial number = xxx
/interface bridge
add admin-mac=xxx auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether2 ] advertise=100M-full,1000M-half,1000M-full
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 keepalive-timeout=\
    disabled name=pppoe-out1 password=xxxx user=xxxx
/interface lte
set [ find ] allow-roaming=no disabled=yes name=lte1
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa2-psk mode=dynamic-keys name=xxx_sec \
    supplicant-identity=MikroTik wpa2-pre-shared-key=xxxx
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX \
    country=no_country_set disabled=no distance=indoors frequency=2452 \
    frequency-mode=superchannel installation=indoor mode=ap-bridge \
    security-profile=xxxxx_sec ssid=ADN-Up-2.4 wds-default-bridge=bridge \
    wds-mode=dynamic-mesh wireless-protocol=802.11
set [ find default-name=wlan2 ] band=5ghz-n/ac channel-width=20/40/80mhz-XXXX \
    country=no_country_set disabled=no distance=indoors frequency=auto \
    frequency-mode=superchannel installation=indoor mode=ap-bridge \
    security-profile=xxxxx_sec ssid=ADN-Up-5 wds-default-bridge=bridge \
    wds-mode=dynamic-mesh wireless-protocol=802.11
/ip pool
add name=default-dhcp ranges=192.168.88.140-192.168.88.180
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wlan1
add bridge=bridge comment=defconf interface=wlan2
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=lte1 list=WAN
add interface=ether1 list=WAN
/ip address
add address=192.168.88.88/24 comment=defconf interface=bridge network=\
    192.168.88.0
add address=192.168.1.10/24 disabled=yes interface=bridge network=192.168.1.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-server lease
add address=192.168.88.181 client-id=1:0:af:a5:36:b3:78 mac-address=\
    00:AF:A5:36:B3:78 server=defconf
add address=192.168.88.191 client-id=1:68:ec:c5:48:4c:16 mac-address=\
    68:EC:C5:48:4C:16 server=defconf
add address=192.168.88.182 client-id=1:30:7b:c9:c7:d5:b2 mac-address=\
    30:7B:C9:C7:D5:B2 server=defconf
add address=192.168.88.89 client-id=1:64:d1:54:8c:c:8e mac-address=\
    64:D1:54:8C:0C:8E server=defconf
add address=192.168.88.90 client-id=1:dc:2c:6e:e7:84:9a mac-address=\
    DC:2C:6E:E7:84:9A server=defconf
add address=192.168.88.183 mac-address=D4:E8:53:98:F3:01 server=defconf
add address=192.168.88.184 mac-address=D4:E8:53:98:F3:05 server=defconf
add address=192.168.88.91 mac-address=18:FD:74:07:0E:09
add address=192.168.88.92 mac-address=B8:69:F4:53:AD:7E
add address=192.168.88.93 mac-address=48:A9:8A:6B:50:BC
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.88 gateway=\
    192.168.88.88
/ip dns
set allow-remote-requests=yes servers=8.8.8.8,8.8.4.4
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" disabled=yes \
    ipsec-policy=out,none out-interface=lte1
add action=masquerade chain=srcnat out-interface=pppoe-out1
add action=dst-nat chain=dstnat dst-port=8601 protocol=tcp to-addresses=\
    192.168.88.181 to-ports=8601
add action=dst-nat chain=dstnat dst-port=8602 protocol=tcp to-addresses=\
    192.168.88.181 to-ports=8602
add action=dst-nat chain=dstnat dst-port=8603 protocol=tcp to-addresses=\
    192.168.88.181 to-ports=8603
add action=dst-nat chain=dstnat dst-port=5900 protocol=tcp to-addresses=\
    192.168.88.191 to-ports=5900
add action=dst-nat chain=dstnat dst-port=8612 protocol=tcp to-addresses=\
    192.168.88.182 to-ports=80-554
add action=dst-nat chain=dstnat dst-port=8613 protocol=tcp to-addresses=\
    192.168.88.182 to-ports=554
add action=dst-nat chain=dstnat dst-port=8621 protocol=tcp to-addresses=\
    192.168.88.183 to-ports=80
add action=dst-nat chain=dstnat dst-port=8622 protocol=tcp to-addresses=\
    192.168.88.183 to-ports=8000
add action=dst-nat chain=dstnat dst-port=8623 protocol=tcp to-addresses=\
    192.168.88.183 to-ports=554
add action=dst-nat chain=dstnat dst-port=8624 protocol=tcp to-addresses=\
    192.168.88.183 to-ports=443
add action=dst-nat chain=dstnat dst-port=8631 protocol=tcp to-addresses=\
    192.168.88.184 to-ports=80
add action=dst-nat chain=dstnat dst-port=8632 protocol=tcp to-addresses=\
    192.168.88.184 to-ports=8000
add action=dst-nat chain=dstnat dst-port=8633 protocol=tcp to-addresses=\
    192.168.88.184 to-ports=554
add action=dst-nat chain=dstnat dst-port=8634 protocol=tcp to-addresses=\
    192.168.88.184 to-ports=443
/system clock
set time-zone-name=Europe/Bucharest
/system identity
set name=ADN-Caciulati-CPE
/system routerboard mode-button
set enabled=yes on-event=dark-mode
/system script
add comment=defconf dont-require-permissions=no name=dark-mode owner=*sys \
    policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
    source="\r\
    \n   :if ([system leds settings get all-leds-off] = \"never\") do={\r\
    \n     /system leds settings set all-leds-off=immediate \r\
    \n   } else={\r\
    \n     /system leds settings set all-leds-off=never \r\
    \n   }\r\
    \n "
/system watchdog
set ping-timeout=5m watch-address=8.8.8.8
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
  1. /interface list member
    add comment=defconf interface=bridge list=LAN
    add comment=defconf interface=lte1 list=WAN
    add interface=ether1 list=WAN

Should be
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface**=pppoe-out1** list=WAN

  1. Why do you have two addresses assigned to the bridge??
    /ip address
    add address=192.168.88.88/24 comment=defconf interface=bridge network=
    192.168.88.0
    add address=192.168.1.10/24 disabled=yes interface=bridge network=192.168.1.0

3 All your port forwarding dstnat rules are missing in-interface-list=WAN

Thank you so much anav, the issue is now solved!

To answer each point:

  1. I have a LTE backup on this and at some point it was important to have two WAN interfaces with LTE as fail-over. At that point I fumbled through the menu, probably made these changes.
    I have now changed from ether1 towards pppoe-out1 as target for list=WAN

  2. This has nothing to do with the current situation. I needed it in the past because of some cameras I installed in my LAN that were having default IP’s from that class. Now as you can see I have disabled=yes for the second class.

  3. Added in-interface-list=WAN for all the dstnat rules.

Now it works!

Thank you once more.

Glad its working for you.