I’ve added a 4G LTE USB to my router which I plan to use as a fail over.
Since doing so I’ve noticed ping and tracerouter now timeout directly from the terminal, ping/trace works OK from PC’s on the network.
Here’s the route list
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 ADS 0.0.0.0/0 120.148.AAA.BBB 1
1 DS 0.0.0.0/0 192.168.8.1 2
2 ADC 10.0.10.0/24 10.0.10.1 vlan10_Guest 0
3 ADC 10.0.20.0/24 10.0.20.1 vlan20_DNSProxy 0
4 ADC 10.0.30.0/24 10.0.30.1 vlan30_Kids 0
5 ADC 10.0.40.0/24 10.0.40.1 vlan40_CCTV 0
6 ADC 120.148.AAA.0/17 120.148.AAA.BBB ether1-WAN 0
7 ADC 192.168.8.0/24 192.168.8.100 lte1 0
8 ADC 192.168.100.0/24 192.168.100.254 bridge 0
Sample traceroute
[admin@MikroTik] > tool traceroute www.google.com
# ADDRESS LOSS SENT LAST AVG BEST WORST STD-DEV STATUS
1 100% 2 timeout
2 100% 1 timeout
3 100% 1 timeout
4 100% 1 timeout
5 100% 1 timeout
I’ve disabled the “LTE” interface, the route has disappeared, and I’m still having issues with ping/traceroute.
So it “may” not be related to the LTE device, any ideas?
The last one should be before the first one … ICMP echo reply is related to ICMP echo request … but firewall is dropping those due to general first rule.
As to the traceroute … it really depends on implementation of a particular traceroute programme. But with any protocol, other than ICMP (UDP, TCP), used to probe hops, it needs to receive “ICMP TIME_EXCEEDED” reply from each router on the path. If you forbid all ICMP traffic, traceroute won’t receive any of those TIME_EXCEEDED replies. And ICMP TIME_EXCEEDED are probably not taken as related to whatever IP connection tried/established, so reordering of above rules won’t help with traceroute.
It seems that anti-ICMP frenzy doesn’t really help securing firewalls (hackers have plenty of other ways to find a target), but blocks a few essential internet functionalities.