Community discussions

MikroTik App
 
edon2005
just joined
Topic Author
Posts: 6
Joined: Wed Apr 21, 2021 7:05 pm

CCR2004 slow speed

Thu Aug 19, 2021 1:25 pm

Hi,

I have in home WAN 10Gb. And I used SFP+RJ10 module for CCR2004.
But it looks like download speed whole time reduced over one port.
I have Netgear Access Point that has 2.5 Ethernet port and internal speed test. Download is always from 1Gb till 1.8Gb. But usually it is 1.3Gb. While upload is always 2.3Gb.
When I run 2 simultaneous Speedtest on 2 separated devices over switch with 10Gb ports -> I got that 1st device has better performance than 2nd. But it looks like both together have that 1.3Gb, while I have 10Gb WAN.
And upload is never reduced. so both test show together about 2Gbps. If I run on 3 devices upload will be 3 Gbps. but download speed will be reduced and 1.3GBps will be devided 3 devices.
Is CCR2004 good enough to support 10Gb WAN?
[admin@MikroTik] > /export
# aug/17/2021 04:51:10 by RouterOS 6.49beta54
# software id = BM5G-AFHN
#
# model = CCR2004-1G-12S+2XS
# serial number = D4F00D218230
/interface bridge
add name=bridge1
/interface ethernet
set [ find default-name=sfp-sfpplus1 ] advertise=10000M-full
set [ find default-name=sfp-sfpplus2 ] disabled=yes
set [ find default-name=sfp-sfpplus3 ] disabled=yes
set [ find default-name=sfp-sfpplus4 ] disabled=yes
set [ find default-name=sfp-sfpplus5 ] advertise=1000M-full,2500M-full,5000M-full,10000M-full
set [ find default-name=sfp-sfpplus6 ] disabled=yes
set [ find default-name=sfp-sfpplus7 ] disabled=yes
set [ find default-name=sfp-sfpplus8 ] disabled=yes
set [ find default-name=sfp-sfpplus9 ] advertise=1000M-full,2500M-full,5000M-full,10000M-full
set [ find default-name=sfp-sfpplus10 ] disabled=yes
set [ find default-name=sfp-sfpplus11 ] disabled=yes
set [ find default-name=sfp-sfpplus12 ] disabled=yes
set [ find default-name=sfp28-1 ] disabled=yes
set [ find default-name=sfp28-2 ] disabled=yes
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp ranges=192.168.25.100-192.168.25.254
add name=vpn-l2tp-ipsec ranges=10.0.1.100-10.0.1.200
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge1 name=dhcp1
/ppp profile
add bridge=bridge1 local-address=vpn-l2tp-ipsec name=vpn-l2tp-ipsec remote-address=vpn-l2tp-ipsec
/caps-man manager
set enabled=yes
/caps-man manager interface
set [ find default=yes ] forbid=yes
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 interface=sfp-sfpplus2
add bridge=bridge1 interface=sfp-sfpplus3
add bridge=bridge1 interface=sfp-sfpplus4
add bridge=bridge1 interface=sfp-sfpplus5
add bridge=bridge1 interface=sfp-sfpplus6
add bridge=bridge1 interface=sfp-sfpplus7
add bridge=bridge1 interface=sfp-sfpplus8
add bridge=bridge1 interface=sfp-sfpplus9
add bridge=bridge1 interface=sfp-sfpplus10
add bridge=bridge1 interface=sfp-sfpplus11
add bridge=bridge1 interface=sfp-sfpplus12
add bridge=bridge1 interface=sfp28-1
add bridge=bridge1 interface=sfp28-2
/ip neighbor discovery-settings
set discover-interface-list=none
/interface detect-internet
set detect-interface-list=all
/interface list member
add interface=sfp-sfpplus1 list=WAN
add interface=bridge1 list=LAN
/ip address
add address=192.168.25.1/24 interface=ether1 network=192.168.25.0
/ip cloud
set update-time=no
/ip dhcp-client
add disabled=no interface=sfp-sfpplus1
add disabled=no interface=bridge1
/ip dhcp-server lease
add address=192.168.25.3 mac-address=80:CC:9C:AB:53:3F server=dhcp1
add address=192.168.25.77 client-id=1:0:11:32:8e:b0:c0 mac-address=00:11:32:8E:B0:C0 server=dhcp1
add address=192.168.25.4 mac-address=80:CC:9C:AB:87:5F server=dhcp1
/ip dhcp-server network
add address=192.168.25.0/24 gateway=192.168.25.1 netmask=24
/ip firewall address-list
add address=192.168.25.2-192.168.25.254 list=allowed_to_router
add address=0.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=172.16.0.0/12 comment=RFC6890 list=not_in_internet
add address=192.168.0.0/16 comment=RFC6890 list=not_in_internet
add address=10.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=169.254.0.0/16 comment=RFC6890 list=not_in_internet
add address=127.0.0.0/8 comment=RFC6890 list=not_in_internet
add address=224.0.0.0/4 comment=Multicast list=not_in_internet
add address=198.18.0.0/15 comment=RFC6890 list=not_in_internet
add address=192.0.0.0/24 comment=RFC6890 list=not_in_internet
add address=192.0.2.0/24 comment=RFC6890 list=not_in_internet
add address=198.51.100.0/24 comment=RFC6890 list=not_in_internet
add address=203.0.113.0/24 comment=RFC6890 list=not_in_internet
add address=100.64.0.0/10 comment=RFC6890 list=not_in_internet
add address=240.0.0.0/4 comment=RFC6890 list=not_in_internet
/ip firewall filter
add action=accept chain=input comment="default configuration" connection-state=established,related
add action=accept chain=input src-address-list=allowed_to_router
add action=accept chain=input protocol=icmp
add action=drop chain=input disabled=yes
add action=fasttrack-connection chain=forward comment=FastTrack connection-state=established,related
add action=accept chain=forward comment="Established, Related" connection-state=established,related
add action=drop chain=forward comment="Drop invalid" connection-state=invalid disabled=yes log=yes log-prefix=\
    invalid
add action=drop chain=forward comment="Drop tries to reach not public addresses from LAN" disabled=yes \
    dst-address-list=not_in_internet in-interface=bridge1 log=yes log-prefix=!public_from_LAN out-interface=\
    !bridge1
add action=drop chain=forward comment="Drop incoming packets that are not NATted" connection-nat-state=!dstnat \
    connection-state=new disabled=yes in-interface=sfp-sfpplus1 log=yes log-prefix=!NAT
add action=drop chain=forward comment="Drop incoming from internet which is not public IP" disabled=yes \
    in-interface=sfp-sfpplus1 log=yes log-prefix=!public src-address-list=not_in_internet
add action=drop chain=forward comment="Drop packets from LAN that do not have LAN IP" disabled=yes in-interface=\
    bridge1 log=yes log-prefix=LAN_!LAN src-address=!192.168.25.0/24
/ip firewall nat
add action=masquerade chain=srcnat out-interface-list=WAN
/ip service
set telnet disabled=yes
set ftp disabled=yes
set api disabled=yes
set winbox address=192.168.25.0/24
set api-ssl disabled=yes
/ip ssh
set strong-crypto=yes
/system clock
set time-zone-name=Europe/Warsaw
/system logging
add prefix="[VPN]" topics=l2tp
/system package update
set channel=testing
/system script
add dont-require-permissions=yes name=FunControll owner=admin policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=\
    "{\
    \n:local systemtemp [/system health get temperature]\
    \n:put \$systemtemp \
    \n}"
/tool bandwidth-server
set enabled=no
/tool mac-server
set allowed-interface-list=none
/tool mac-server mac-winbox
set allowed-interface-list=none
/tool mac-server ping
set enabled=no

Who is online

Users browsing this forum: Bing [Bot] and 46 guests