Hotspot hosts problem

Hi All,

Can somebody help me please. I am running a wireles netrwork with a number of APs. Users are authenticated via a central User manager server. All is working fine except one issue.

In the AP Hotspot hosts list, MT cpe units often show a second entry related to a device on the LAN side of the client CPE and confuses the User manager. How can i stop these LAN IPs from being detected by the AP? The Client CPEs are set up as simple NAT routers with masquerading on the out interface (wlan1) Client CPE WAN ip address range 10.252.252.0/24 Client CPE Lan ip range 192.168.0.0/24

At the moment when this happens I have to log in and remove all the host entries related to the client CPE then the correct IP will reauthenticate. I have tried changing the amount of allowed ips. I cannot understand how the LAN ip addresses are leaking through the NAT and registering in the AP Hospot host list.

Many thanks in Advance

How do the cpe units connect to the AP? If wireless, is it possible a few clients are connecting to the backhaul by mistake? If the masquerade is functioning correctly, the localnet addresses should not go through the cpe. Can you post the masquerade rule from a cpe? You might want to post part of the hotspot hosts list that shows the problem.

Hi

Attached is the hosts file showing a Client IP in the 192.168.0.0. range
And also the masquarade rule
natrule.jpg
hosts.jpg

The client is connecting wirelessly to the AP ok. However as you can see from the hosts file the 192.168.0.253 address has been picked up from the clients CPE Lan side.

How can this be possible??

The mac address that is shown in the pic is the correct one for the client and there is a second entry in the hosts file (not visable in the pic) for the same MAC that has authorised correctly.

My problem is that sometimes the hotspot tries to authenicate on the Clinets LAN IP and gets all confused resulting in the client losing connectivity untill I delete all the entrys relating to the affected connection.

Oddly enough This problem only occurs with MT cpe´s. I have many other brands eg: ubiquiti etc that also connect to the same AP without a problem.

Somehow the client CPE LAN IP address is leaking through the CPE NAT and the AP is picking it up.

There is no possiblty of clients connecting to the Backhaul as the backhaul uses a different wireless technology from the distribution.

I am not saying it is not a bug, but I like to make certain. Can you post your “/ip firewall nat” rules?

And what technology is it on your backhaul that an intrepid hacker can’t connect to?

Hi

Just the one static NAT rule + a whole bunch of dynamic rules put in by the Hotspot service

NAT RULE:

/ip firewall nat

add action=masquerade chain=srcnat comment=“masquerade hotspot network”
disabled=no out-interface=wlan1 src-address=10.252.253.0/24
nat rules.jpg
My Backhaul uses a non standard proprietry form of 80211n Is is secured with MAC authorization and WPA encryption I know anything is hackable but we are talking about silver surfers here as the network covers a retirement village. :slight_smile:

Forgot to mention AP is running ROS 3.28 the cpe’s are either 3.28 or 3.3

User manager is ver 3.28

Clients authenticate with user manager by Mac address

Here is the challenge:

/ip firewall nat
add action=masquerade chain=srcnat comment=“masquerade hotspot network”
disabled=no out-interface=wlan1 src-address=10.252.253.0/24

Remove the src-address entry. It does not masquerade any 192.168.x.x addresses.

ADD: Watch the “silver surfer” stereotype. I am going to be 60 this year.

Hi,

I will try this today and report back

Hi,

Ok well I removed the source address in the masquerade NAT Rule in the AP

add action=masquerade chain=srcnat comment=“” disabled=no out-interface=
ether1

Stupid Question, I am correct in assigning the out interface as ether1 ? and you where talking about the AP not the Client CPE

Unfortunately the problem is still present
hosts.jpg
As you can see the Hotspot has picked up an IP from the connected Clients CPE LAN side ???

I dont think I mentioned before , but the CPE is also set up as NAT router with

NAT rule

/ip firewall nat
add action=masquerade chain=srcnat comment=“” disabled=no out-interface=wlan1

so my network works thus
Backhaul ip range 172.16.0.0 nats to 10.0.0.0 in the AP and then nats to 192.168.0.0. in the CPE. 192.168.0.0 being the clients private LAN. The whole network is using subnet /24 from backhaul to client private LAN

My bad. Is this nat you posted from the cpe? The nat should be in the cpe. Otherwise, the 192.168.x.x addresses will pass through untranslated to the AP.

I dont think I mentioned before , but the CPE is also set up as NAT router with

NAT rule

/ip firewall nat
add action=masquerade chain=srcnat comment=“” disabled=no out-interface=wlan1

so my network works thus
Backhaul ip range 172.16.0.0 nats to 10.0.0.0 in the AP and then nats to 192.168.0.0. in the CPE. 192.168.0.0 being the clients private LAN. The whole network is using subnet /24 from backhaul to client private LAN

Is this problem only with the one cpe assigned 10.249.254.242? Or do both leak private ips?

Hi,

Any MT based CPE has same problem this is just one example.

Ubiquiti and others are OK

I have 11 APs same problem with MK Cpes on all of them

Sounds like you need to generate a supout.rif file in the CPE and send it to MikroTik support with an explanation of the problem. They might see something I don’t.

Ok I will do that,

many thanks for your help

Hey guys i am also facing same problem, please help me..

What kind of device is associated with the mac address 00:1A:E2:FF:B3:CB?