RouterOS 5.20 installed on KVM as a virtual machine does arp-spoofing (network scan) My ISP has blocked my KVM.
LOG ISP
@dc2-rtr> show log messages | match 52:54:00:64:5f:48 | no-more
Oct 11 10:47:11 dc2-rtr /kernel: KERN_ARP_ADDR_CHANGE: arp info overwritten for 46.28.67.151 from 00:0e:0c:76:31:6a to 52:54:00:64:5f:48
Oct 11 10:47:12 dc2-rtr /kernel: KERN_ARP_ADDR_CHANGE: arp info overwritten for 82.118.16.182 from 90:2b:34:04:25:c6 to 52:54:00:64:5f:48
Oct 11 10:47:13 dc2-rtr /kernel: KERN_ARP_ADDR_CHANGE: arp info overwritten for 82.118.17.2 from 68:05:ca:00:e7:ed to 52:54:00:64:5f:48
Oct 11 10:47:14 dc2-rtr /kernel: KERN_ARP_ADDR_CHANGE: arp info overwritten for 46.28.64.160 from 52:54:00:64:5f:48 to bc:ae:c5:e5:5c:ee
Oct 11 10:47:15 dc2-rtr /kernel: KERN_ARP_ADDR_CHANGE: arp info overwritten for 46.28.65.176 from 00:22:19:09:51:e9 to 52:54:00:64:5f:48
Installed from the ISO - http://download2.mikrotik.com/mikrotik-5.20.iso
SCHEMA:
INTERNET— IP_ext—||| RouterOS-5.20 IP_int(192.168.10.250)|||--------|||Elastix IP(192.168.10.249)|||
Also be configured tunnel EoIP to other Microtik , to connect to another network 192.168.10.0