Community discussions

MikroTik App
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Eth1 vlan 911 tagging for ISP connection

Thu Apr 25, 2024 9:20 pm

Hi,

I am after some guidance.
Basically I am unable to connect my router: MikroTik RB5009UPr+S+IN
to ISP's network.
ISP's requirements:
"You basically need to provision the WAN/Internet interface for IP over Ethernet.
Second requirement is that VLAN tagging needs to be enabled on the interface and set to vlan 911.
Third requirement is that the interface IP needs to be set to DHCP. That way it automatically gets assigned an IP from our DHCP server."

My config (it seems that I cannot get an address from DHCP):

Image
I would appreciate if someone would help me to get my router connected. Thanks
Last edited by Airiasas on Sun Apr 28, 2024 3:14 pm, edited 2 times in total.
 
Benzebub
just joined
Posts: 1
Joined: Sun Mar 17, 2024 11:42 am

Re: Eth1 vlan 911 tagging for ISP connection

Thu Apr 25, 2024 9:47 pm

Do you have any firewall rules that might block?
 
User avatar
anav
Forum Guru
Forum Guru
Posts: 19581
Joined: Sun Feb 18, 2018 11:28 pm
Location: Nova Scotia, Canada
Contact:

Re: Eth1 vlan 911 tagging for ISP connection

Thu Apr 25, 2024 11:45 pm

You need to go to IP DHCP client next.....
and select vlan 911 as the interface ( not vlanfiber! )
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 2:53 am

Image

vlanfibre is a vlan created and set to vlan 911 the only other option I have is Fiber_eth1, I cannot add vlan 911 as you mentioned in DHCP client?
Even when I switch dhcp client up to Fiber_eth1,same issue it does not seem to get and address
Can you advise further? sorry
Last edited by Airiasas on Sun Apr 28, 2024 3:09 pm, edited 1 time in total.
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 3578
Joined: Sun May 01, 2016 7:12 pm
Location: California

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 3:42 am

The 1st requirement is kinda odd: "IP over ethernet". If that mean PPPoE (or perhaps Mikrotik specific EoIP?) that be different story, but I presume they just mean it has VLAN. But step 1 is an odd way to state a requirement.

One thing might help here, is if you can use /tool/torch on the fiber or VLAN, and just see what kinda of packets are flowing over the line and/or what VLAN they appear.
Last edited by Amm0 on Fri Apr 26, 2024 3:44 am, edited 1 time in total.
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 3:42 am

Do you have any firewall rules that might block?
Does not seem like there is anything that could block it?
Image
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 3578
Joined: Sun May 01, 2016 7:12 pm
Location: California

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 3:45 am

Did you add "vlanfiber" VLAN interface as a LAN in /interface/list?
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 3:52 am

Did you add "vlanfiber" VLAN interface as a LAN in /interface/list?
Image

Torch results:
Image
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 3578
Joined: Sun May 01, 2016 7:12 pm
Location: California

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 4:04 am

Yeah I meant WAN. So that's right.

Try the ether1 in torch, to see if you getting any traffic from upstream. The torch above shows your dhcp-client looking for an address on VLAN 911.

Might want to post your config too. In terminal, :export file=config.rsc then download from Files.
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 4:10 am

Yeah I meant WAN. So that's right.

Try the ether1 in torch, to see if you getting any traffic from upstream. The torch above shows your dhcp-client looking for an address on VLAN 911.

Might want to post your config too. In terminal, :export file=config.rsc then download from Files.
ether1 results in torch:
Image
config:
# apr/26/2024 02:08:43 by RouterOS 7.8

# model = RB5009UPr+S+

/interface bridge
add admin-mac=********** auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether1 ] comment=Port1 name=Fiber_eth1
/interface vlan
add interface=Fiber_eth1 name=vlanfiber vlan-id=911
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=dhcp interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=sfp-sfpplus1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=vlanfiber list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
    192.168.88.0
/ip dhcp-client
add interface=vlanfiber
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=\
    192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=\
    33434-33534 protocol=udp
add action=accept chain=input comment=\
    "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
    udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
    protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=input comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
add action=accept chain=forward comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
    "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
    hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
    500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=forward comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
/system clock
set time-zone-name=Europe/London
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
Last edited by Airiasas on Sat Apr 27, 2024 1:35 am, edited 5 times in total.
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 3578
Joined: Sun May 01, 2016 7:12 pm
Location: California

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 4:33 am

This all looks right. The odd thing is that it does look like the ISP thinks your IP is 10.2.118.106 on VLAN 911.

You're running an older version. And I want to say some version had some bug in dhcp-client around that time.

You may want to download latest stable release, and copy it to the root of Files, then reboot:
https://download.mikrotik.com/routeros/ ... -arm64.npk
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 4:48 am

This all looks right. The odd thing is that it does look like the ISP thinks your IP is 10.2.118.106 on VLAN 911.

You're running an older version. And I want to say some version had some bug in dhcp-client around that time.

You may want to download latest stable release, and copy it to the root of Files, then reboot:
https://download.mikrotik.com/routeros/ ... -arm64.npk
After the update torch results:
Image
Image

config:
# 2024-04-26 02:38:02 by RouterOS 7.14.3

# model = RB5009UPr+S+

/interface bridge
add admin-mac=********** auto-mac=no comment=defconf name=bridge \
    port-cost-mode=short
/interface ethernet
# poe-out status: short_circuit
set [ find default-name=ether1 ] comment=Port1 name=Fiber_eth1
/interface vlan
add interface=Fiber_eth1 name=vlanfiber vlan-id=911
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=dhcp interface=bridge lease-time=10m name=defconf
/ip smb users
set [ find default=yes ] disabled=yes
/interface bridge port
add bridge=bridge comment=defconf interface=ether2 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=ether3 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=ether4 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=ether5 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=ether6 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=ether7 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=ether8 internal-path-cost=10 \
    path-cost=10
add bridge=bridge comment=defconf interface=sfp-sfpplus1 internal-path-cost=\
    10 path-cost=10
/ip firewall connection tracking
set udp-timeout=10s
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=vlanfiber list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
    192.168.88.0
/ip dhcp-client
add interface=vlanfiber
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=\
    192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
/ip smb shares
set [ find default=yes ] directory=/pub
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=\
    33434-33534 protocol=udp
add action=accept chain=input comment=\
    "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
    udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
    protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=input comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
add action=accept chain=forward comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
    "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
    hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
    icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
    500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
    ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
    ipsec-esp
add action=accept chain=forward comment=\
    "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
    "defconf: drop everything else not coming from LAN" in-interface-list=\
    !LAN
/system clock
set time-zone-name=Europe/London
/system note
set show-at-login=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
I am at a bit of a loss, it's never easy...
Last edited by Airiasas on Sun Apr 28, 2024 3:27 pm, edited 5 times in total.
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 3578
Joined: Sun May 01, 2016 7:12 pm
Location: California

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 5:06 am

Maybe disable PoE on ether1? e.g. you have this message:
# poe-out status: short_circuit
Possible that interfering with the traffic, since your not getting anything back (or at least only a few packets).

Can also look at Logs, and see if anything there has errors/warning.

But I'm kinda out of suggestions here. Maybe someone else has an idea here.
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 5:18 am

Maybe disable PoE on ether1? e.g. you have this message:
# poe-out status: short_circuit
Possible that interfering with the traffic, since your not getting anything back (or at least only a few packets).

Can also look at Logs, and see if anything there has errors/warning.

But I'm kinda out of suggestions here. Maybe someone else has an idea here.
Disabled it, rebooted the router - error disappeared

did another torch scan:
Image
Image

I hope someone can help, I raised this with ISP too, will see what they say as I am out of ideas
Last edited by Airiasas on Sun Apr 28, 2024 3:20 pm, edited 1 time in total.
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 3578
Joined: Sun May 01, 2016 7:12 pm
Location: California

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 5:27 am

I supose you can try disabling the "input" firewall filter rule with "drop" and "!LAN" & see if you get a DHCP address after that.
If that works, then you might have to allow DHCP from the VLAN 911 to the firewall to allow it I guess.

And/or, just assign the IP address it's showing torch as an /ip/address for the VLAN. e.g.
/ip/address/add interface=vlanfiber address=10.2.118.106/24
Then see if /ping 10.2.118.1 works from RouterOS Terminal?
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 5:43 am

I supose you can try disabling the "input" firewall filter rule with "drop" and "!LAN" & see if you get a DHCP address after that.
If that works, then you might have to allow DHCP from the VLAN 911 to the firewall to allow it I guess.

And/or, just assign the IP address it's showing torch as an /ip/address for the VLAN. e.g.
/ip/address/add interface=vlanfiber address=10.2.118.106/24
Then see if /ping 10.2.118.1 works from RouterOS Terminal?
Disabled the "input" firewall filter rule with "drop" and "!LAN" & rebooted the router, did not get DHCP address after that

I assigned the IP address, does not seem to ping:
   sent=180 received=0 packet-loss=100% 
  SEQ HOST                                     SIZE TTL TIME       STATUS        
  180 10......                                                   timeout       
  181 10.......                                          timeout       
  182 10.......                                                 timeout       
  183 10.......                    84  64 31ms535us  host unreac...
 
    sent=200 received=0 packet-loss=100% 
Last edited by Airiasas on Sun Apr 28, 2024 3:22 pm, edited 1 time in total.
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 3578
Joined: Sun May 01, 2016 7:12 pm
Location: California

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 6:05 am

Okay, that all I got. I was guessing at the default gateway, and it's unclear why touchthe dst-addr of 10.x.x.x

Is there a modem to reboot? But I think you're going to have to confirm with your ISP the needed settings. As I said, the first step "IP over ethernet" is just pretty vague.
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 6:21 am

Okay, that all I got. I was guessing at the default gateway, and it's unclear why touchthe dst-addr of 10.x.x.x

Is there a modem to reboot? But I think you're going to have to confirm with your ISP the needed settings. As I said, the first step "IP over ethernet" is just pretty vague.
Am I missing PPPoe settings or set up on the router? can they use PPPoe without a username and password? would I have to potentially clone the MAC address of the ISP's router on my Mikrotik router (if that's even possible)? as I assume they would have provided it when I contacted them regarding router set-up...
as I have seen this forum post of someone setting up a tp-link router same provider they seem to have a similar issue https://forums.thinkbroadband.com/fibre ... .html?vc=1

I have contacted the ISP again for clarification and support, but if anyone else has any ideas I would appreciate your support. Thanks
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 3578
Joined: Sun May 01, 2016 7:12 pm
Location: California

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 7:18 am

Yeah, they may need to know your MAC address. You can "clone it" but simply entering your old router's MAC address on the ether1 interface, obviously your older router have be unplugged after.
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Fri Apr 26, 2024 9:56 pm

Cloning MAC address of ISP's router did not work, still seems to be doing the same thing where it does not pick up IP from DHCP, still waiting for a response from ISP...
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection

Sun Apr 28, 2024 1:37 am

Just and update for anyone who might be experiencing or going through a similar issue, ISP advised that router config seems to be fine they reduced DHCP lease to 5 min and advised to connect Mikrotik router, o have restarted the ONT & Mikrotik router, unfortunately it still appears to be searching for IP address and did not receive one yet 30 minutes later, router will be left plugged in overnight and will see if anything changes by tomorrow...

Asked ISP what further steps will be taken to resolve the issue if this won't fix it, currently waiting for further guidance...
 
Airiasas
just joined
Topic Author
Posts: 14
Joined: Thu Apr 25, 2024 9:14 pm

Re: Eth1 vlan 911 tagging for ISP connection  [SOLVED]

Sun Apr 28, 2024 3:02 pm

Eventually, the Mikrotik router seemed to pick up the IP from DHCP after ISP reduced the lease time from DHCP to 5 minutes, not entirely sure why it took so long...

Who is online

Users browsing this forum: ShanerWarnerX, triangulum33 and 28 guests