/export hide-sensitive file=somename
/ip firewall address-list add address=188.8.131.52 list=ipCLOUD add address=184.108.40.206 list=ipCLOUD /ip firewall filter add action=drop chain=output dst-address-list=ipCLOUD place-before=1 add action=drop chain=forward dst-address-list=ipCLOUD place-before=1 /ip dns cache flush
Did You disable "Cloud" AND "Update Time"? AFAIK they run independently - and this "Update Time" talks to the cloud server.I have disabled Cloud and DNS service on the unit. But it still send request to those IPs. I have added rules to IP firewall rules but it is still happening.
How can I stop these requests or block these Cloud IPs on the Routerboard?
Note: Time-zone-autodetect by default is enabled on new RouterOS installation and after configuration reset. The time zone is detected depending on routers public IP address and our Cloud servers database. Since RouterOS v6.43 your device will use cloud2.mikrotik.com to communicate with the MikroTik's Cloud server. Older versions will use cloud.mikrotik.com to communicate with the MikroTik's Cloud server.
- Approximate time (accuracy of several seconds, depends on UDP packet latency)
- Updates time after a reboot and during every DDNS update (when router's WAN IP address changes or after the force-update command is used)
- Sends encrypted packets to cloud.mikrotik.com or cloud2.mikrotik.com using UDP/15252 port
- Detects time-zone depending on the router's public IP address and our commercial database
I did itDisable everything cloud and use NTP Client for clock updating instead.