I’ve been trying to figure out why I have a slow wifi network, I’ve been getting about 60 mbit. I’ve tried filecopy from a gigabit connected machine to with routeros(RB800@1066, 52n) wifi, netgear 3700 wifi and gigabit connection. I get great linkspeed, 300 on both but really different speeds. The netgear I can pull/push at about 200 mbit with windows file copy, on gigabit connection I get close to full gigabit speed. But on the rb800 I still get poor results, 60mbit.
So today I fiddled a bit with settings, removed WMM and also started the profiler. this seemed to give me about 120 mbit all of a sudden, no clue why since wmm should as I figure not have a impact for single connections, one session. But When I started the profiler the firewall was pedling between 6-13%. How can this be, wifi and eth2 is bridged and I would figure it not to go to the fw.
Flags: X - disabled, I - inactive, D - dynamic
# INTERFACE BRIDGE PRIORITY PATH-COST HORIZON
0 ether1 bridge1 0x80 10 none
1 wlan1 bridge1 0x80 10 none
2 I ether2 bridge1 0x80 10 none
[admin@MikroTik] > ip
[admin@MikroTik] /ip> firewall filter
[admin@MikroTik] /ip firewall filter> print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Accept established connections
chain=input action=accept connection-state=established
1 ;;; Accept related connections
chain=input action=accept connection-state=related
2 ;;; Drop invalid connections
chain=input action=drop connection-state=invalid
3 ;;; UDP
chain=input action=accept protocol=udp
4 ;;; Allow limited pings
chain=input action=accept protocol=icmp limit=50/5s,2
5 ;;; Drop excess pings
chain=input action=drop protocol=icmp
6 ;;; From our LAN
chain=input action=accept src-address=192.168.12.0/24 in-interface=bridge1
7 ;;; PPTP server accept
chain=input action=accept protocol=tcp dst-port=1723
8 ;;; PPTP GRE 47 accept
chain=input action=accept protocol=gre
9 chain=forward action=drop src-address=0.0.0.0/8
10 chain=forward action=drop dst-address=0.0.0.0/8
11 chain=forward action=drop src-address=127.0.0.0/8
12 chain=forward action=drop dst-address=127.0.0.0/8
13 chain=forward action=drop src-address=224.0.0.0/3
14 chain=input action=drop dst-address=224.0.0.0/3
15 ;;; drop ftp brute forcers
chain=input action=drop protocol=tcp src-address-list=ftp_blacklist dst-port=21
16 chain=output action=accept protocol=tcp content=530 Login incorrect dst-limit=1/1m,9,dst-address/1m
17 chain=output action=add-dst-to-address-list protocol=tcp address-list=ftp_blacklist address-list-timeout=3h
content=530 Login incorrect
18 ;;; drop ssh brute forcers
chain=input action=drop protocol=tcp src-address-list=ssh_blacklist dst-port=22
19 chain=input action=add-src-to-address-list connection-state=new protocol=tcp src-address-list=ssh_stage3
address-list=ssh_blacklist address-list-timeout=1w3d dst-port=22
20 chain=input action=add-src-to-address-list connection-state=new protocol=tcp src-address-list=ssh_stage2
address-list=ssh_stage3 address-list-timeout=1m dst-port=22
21 chain=input action=add-src-to-address-list connection-state=new protocol=tcp src-address-list=ssh_stage1
address-list=ssh_stage2 address-list-timeout=1m dst-port=22
22 chain=input action=add-src-to-address-list connection-state=new protocol=tcp address-list=ssh_stage1
address-list-timeout=1m dst-port=22
23 I ;;; PPTP client access
chain=input action=accept in-interface=pptp-in1
24 I ;;; PPTP client access
chain=input action=accept in-interface=pptp-in2
25 I ;;; PPTP client access
chain=input action=accept in-interface=pptp-in3
26 ;;; Log everything else
chain=input action=log log-prefix="DROP INPUT"
27 ;;; Worm Virus
chain=forward action=drop protocol=tcp src-address-list=Worm-Infected-p445 dst-port=445
28 ;;; Drop everything else
chain=input action=drop
[admin@MikroTik] /ip firewall filter>