Hi Guys.
I have setup PCC Loadbalancing and Hotspot on the same box.
Everything is working fine and the users are loadbalanced after authentication however they can’t seem to access the Mikrotik hotspot /status and /logout etc pages.
Does anyone know how I can fix this?
/ipfirewall address-list
add address=10.20.30.0/24 disabled=no list=Local_NAT_Networks
/ipfirewall filter
add action=add-src-to-address-list address-list=HACKER address-list-timeout=0s chain=input comment=“Add Third SSH Connection to HACKER” disabled=no dst-port=22 protocol=tcp src-address-list=TEMP_BAN2
add action=add-src-to-address-list address-list=TEMP_BAN2 address-list-timeout=10s chain=input comment=“Add Second SSH Connection to TEMP_BAN2” connection-state=new disabled=no dst-port=22 protocol=tcp
src-address-list=TEMP_BAN1
add action=add-src-to-address-list address-list=TEMP_BAN1 address-list-timeout=10s chain=input comment=“Add First SSH Connection to TEMP_BAN1” connection-state=new disabled=no dst-port=22 protocol=tcp
add action=passthrough chain=unused-hs-chain comment=“place hotspot rules here” disabled=yes
add action=drop chain=input comment=“Drop All HACKER” disabled=no src-address-list=HACKER
/ipfirewall mangle
add action=accept chain=prerouting disabled=no dst-address=10.20.30.1
add action=accept chain=prerouting disabled=no src-address=10.20.30.1
add action=mark-connection chain=input comment=“Mark Packet FROM PPPoE1 as WAN1” connection-state=new disabled=no in-interface=PPPoE1 new-connection-mark=WAN1_connection passthrough=yes
add action=mark-connection chain=input comment=“Mark Packet FROM PPPoE2 as WAN2” connection-state=new disabled=no in-interface=PPPoE2 new-connection-mark=WAN2_connection passthrough=yes
add action=mark-routing chain=output comment=“Send all Packets marked WAN1 to WAN1” connection-mark=WAN1_connection disabled=no new-routing-mark=to_WAN1 passthrough=yes
add action=mark-routing chain=output comment=“Send all Packets marked WAN2 to WAN2” connection-mark=WAN2_connection disabled=no new-routing-mark=to_WAN2 passthrough=yes
add action=mark-connection chain=prerouting comment=“Marking for NEW connection Type, Authenticated & Not Local & PCC 2/0” connection-state=new disabled=no dst-address-type=!local hotspot=auth
new-connection-mark=WAN1_connection passthrough=yes per-connection-classifier=both-addresses:2/0 src-address-list=Local_NAT_Networks
add action=mark-connection chain=prerouting comment=“Marking for NEW connection Type, Authenticated & Not Local & PCC 2/1” connection-state=new disabled=no dst-address-type=!local hotspot=auth
new-connection-mark=WAN2_connection passthrough=yes per-connection-classifier=both-addresses:2/1 src-address-list=Local_NAT_Networks
add action=mark-connection chain=prerouting comment=“Marking for ESTABLISHED connection Type. Mark 1” connection-state=established disabled=no dst-address-type=!local hotspot=auth new-connection-mark=
WAN1_connection passthrough=yes per-connection-classifier=both-addresses:2/0 src-address-list=Local_NAT_Networks
add action=mark-connection chain=prerouting comment=“Marking for ESTABLISHED connection Type. Mark 2” connection-state=established disabled=no dst-address-type=!local hotspot=auth new-connection-mark=
WAN2_connection passthrough=yes per-connection-classifier=both-addresses:2/1 src-address-list=Local_NAT_Networks
add action=mark-connection chain=prerouting comment=“Marking for RELATED connection Type. Mark 1” connection-state=related disabled=no dst-address-type=!local hotspot=auth new-connection-mark=
WAN1_connection passthrough=yes per-connection-classifier=both-addresses:2/0 src-address-list=Local_NAT_Networks
add action=mark-connection chain=prerouting comment=“Marking for RELATED connection Type. Mark 2” connection-state=related disabled=no dst-address-type=!local hotspot=auth new-connection-mark=
WAN2_connection passthrough=yes per-connection-classifier=both-addresses:2/1 src-address-list=Local_NAT_Networks
add action=mark-routing chain=prerouting connection-mark=WAN1_connection disabled=no new-routing-mark=to_WAN1 passthrough=yes src-address-list=Local_NAT_Networks
add action=mark-routing chain=prerouting connection-mark=WAN2_connection disabled=no new-routing-mark=to_WAN2 passthrough=yes src-address-list=Local_NAT_Networks
/ipfirewall nat
add action=accept chain=pre-hotspot disabled=no dst-address-type=local
add action=masquerade chain=srcnat disabled=no out-interface=PPPoE1
add action=masquerade chain=srcnat disabled=no out-interface=PPPoE2
add action=masquerade chain=srcnat disabled=no src-address=172.20.11.0/24
add action=masquerade chain=srcnat comment=“masquerade hotspot network” disabled=no src-address=10.20.30.0/24
add action=passthrough chain=unused-hs-chain comment=“place hotspot rules here” disabled=yes