ip firewall filter: (note #12 and #13 are just for testing to try and resolve this… but they dont work anyways)
[admin@RR_gate] /ip firewall filter> p
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Added by webbox
chain=input action=accept protocol=icmp
1 ;;; Added by webbox
chain=input action=accept connection-state=established in-interface=e1-gateway
2 chain=input action=accept connection-state=related in-interface=e1-gateway
3 chain=input action=drop in-interface=e1-gateway
4 ;;; fwd from e1-gw to customer chain
chain=forward action=jump jump-target=customer in-interface=e1-gateway
5 chain=customer action=accept connection-state=established
6 chain=customer action=accept connection-state=related
7 chain=customer action=drop
8 chain=input action=accept connection-state=established in-interface=e5-gateway2
9 chain=input action=accept connection-state=related in-interface=e5-gateway2
10 ;;; fwd from e5-gw to customer chain
chain=forward action=jump jump-target=customer in-interface=e5-gateway2
11 chain=input action=drop in-interface=e5-gateway2
12 X ;;; fwd LAN to VOIP accept
chain=forward action=accept dst-address-list=VOIP-SUBNET in-interface=e4-168-0-1
13 X ;;; fwd VOIP to LAN accept
chain=forward action=accept dst-address-list=LAN-SUBNET in-interface=e2
ip firewall nat:
[admin@RR_gate] /ip firewall nat> p
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Added by webbox
chain=srcnat action=masquerade out-interface=e1-gateway
1 chain=srcnat action=masquerade out-interface=e5-gateway2
ip firewall mangle (note #1 is disabled because I dont need it, it is also for testing):
[admin@RR_gate] /ip firewall mangle> p
Flags: X - disabled, I - invalid, D - dynamic
0 chain=prerouting action=mark-routing new-routing-mark=voip passthrough=yes src-address-list=VOIP-SUBNET
1 X chain=prerouting action=mark-routing new-routing-mark=voip passthrough=no dst-address-list=VOIP-SUBNET
2 chain=prerouting action=mark-routing new-routing-mark=other passthrough=yes src-address-list=LAN-SUBNET
3 chain=prerouting action=mark-packet new-packet-mark=voip passthrough=no routing-mark=voip
4 chain=prerouting action=mark-packet new-packet-mark=other passthrough=no routing-mark=other
and just for completeness:
ip address
[admin@RR_gate] /ip address> p
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK BROADCAST INTERFACE
0 192.168.2.1/24 192.168.2.0 192.168.2.255 e2
1 192.168.0.1/24 192.168.0.0 192.168.0.255 e4-168-0-1
2 192.168.1.1/24 192.168.1.0 192.168.1.255 e3
3 D aa.bb.cc.dd/24 aa.bb.cc.0 aa.bb.cc.255 e1-gateway
4 D ww.xx.yy.zz/24 ww.xx.yy.0 ww.xx.yy.255 e5-gateway2
ip route
[admin@RR_gate] /ip route> p detail
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
0 ADS dst-address=0.0.0.0/0 gateway=64.180.60.254 interface=e1-gateway gateway-state=reachable distance=0 scope=30
target-scope=10
1 S dst-address=0.0.0.0/0 gateway=aa.bb.cc.254 interface=e1-gateway gateway-state=reachable distance=2 scope=30
target-scope=10 routing-mark=other
2 A S dst-address=0.0.0.0/0 gateway=aa.bb.cc.254 interface=e1-gateway check-gateway=ping gateway-state=reachable
distance=1 scope=30 target-scope=10 routing-mark=voip
3 A S dst-address=0.0.0.0/0 gateway=ww.xx.yy.254 interface=e5-gateway2 check-gateway=ping gateway-state=reachable
distance=1 scope=30 target-scope=10 routing-mark=other
4 S dst-address=0.0.0.0/0 gateway=ww.xx.yy.254 interface=e5-gateway2 gateway-state=reachable distance=2 scope=30
target-scope=10 routing-mark=voip
5 DS dst-address=0.0.0.0/0 gateway=ww.xx.yy.254 interface=e5-gateway2 gateway-state=reachable distance=0 scope=30
target-scope=10
6 ADC dst-address=aa.bb.cc.0/24 pref-src=aa.bb.cc.dd interface=e1-gateway distance=0 scope=10
7 ADC dst-address=192.168.0.0/24 pref-src=192.168.0.1 interface=e4-168-0-1 distance=0 scope=10
8 ADC dst-address=192.168.1.0/24 pref-src=192.168.1.1 interface=e3 distance=0 scope=200
9 ADC dst-address=192.168.2.0/24 pref-src=192.168.2.1 interface=e2 distance=0 scope=10
10 ADC dst-address=ww.xx.yy.0/24 pref-src=ww.xx.yy.zz interface=e5-gateway2 distance=0 scope=10
as you can see, voip traffic is on e2, and works out and in (as does nat from/to the asterisk server). regular lan traffic is on e4 and works out and in. LAN traffic goes out through e5. voip traffic goes out through e1. they fall back to each other when one fails, no problem.
I just cant route from e2 to e4 !! (and vice-versa, and same with e3).