goedemorgen.
ik heb op men microtik op dit momend de volgende configuratie.
ik heb echter op dit momend 2 problemen waar ik tegen aan loop.
probleem 1:
de ip adaressen beginnend met 44.137.83.x (zoas: 44.137.83.66) zijn van buitenaf onberijkbaar.
probleem 2:
als ik:
ik vermoed dat het gewoon iets klijnst is dat ik over het hoofd zie waardoor de configuratie niet goed werkt.
maar warschijnlijk zie ik zelf dus iets over het hoofd.
hopelijk kan iemand me verder helpen en een oplosing geven voor dit probleem..
alvast heel erg bedankt voor de hulp.
ik heb op men microtik op dit momend de volgende configuratie.
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
| /interface bridge add admin-mac=18:FD:74:BB:B8:8A auto-mac=no comment=defconf name=bridge /interface wireless set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX \ disabled=no distance=indoors frequency=auto mode=ap-bridge ssid=\ xxxx wireless-protocol=802.11 set [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=\ 20/40/80mhz-XXXX disabled=no distance=indoors frequency=auto mode=\ ap-bridge ssid=xxxx wireless-protocol=802.11 /interface list add comment=defconf name=WAN add comment=defconf name=LAN /interface wireless security-profiles set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk mode=\ dynamic-keys supplicant-identity=MikroTik add authentication-types=wpa-psk,wpa2-psk mode=dynamic-keys name=profile \ supplicant-identity=MikroTik /interface wireless add disabled=no mac-address=1A:FD:74:BB:B8:94 master-interface=wlan2 name=\ wlan3 security-profile=profile ssid=xxxx add disabled=no mac-address=DE:2C:6E:52:59:66 master-interface=wlan1 name=\ wlan4 security-profile=profile ssid=xxxx /ip pool add name=default-dhcp ranges=192.168.88.10-192.168.88.254 add name=pool-ether5 ranges=172.22.9.1-172.22.15.254 add name=pool-ether6 ranges=172.22.17.1-172.22.23.1 add name=pool-ether7 ranges=172.22.25.1-172.22.31.254 add name=pool-ether8 ranges=172.22.33.1-172.22.39.254 add name=pool-ether9 ranges=172.22.41.1-172.22.47.254 add name=pool-ether10 ranges=172.22.49.1-172.22.55.254 add name=pool-wlan1 ranges=172.22.57.1-172.22.63.254 add name=pool-wlan2 ranges=172.22.65.1-172.22.71.254 add name=pool-wlan3 ranges=172.22.73.1-172.22.79.254 add name=pool-wlan4 ranges=172.22.81.1-172.22.87.254 /ip dhcp-server add address-pool=default-dhcp interface=bridge name=defconf add address-pool=pool-ether5 interface=ether5 name=ether5 add address-pool=pool-ether6 interface=ether6 name=ether6 add address-pool=pool-ether7 interface=ether7 name=ether7 add address-pool=pool-ether8 interface=ether8 name=ether8 add address-pool=pool-ether9 interface=ether9 name=ether9 add address-pool=pool-ether10 interface=ether10 name=ether10 add address-pool=pool-wlan1 interface=wlan1 name=wlan1 add address-pool=pool-wlan2 interface=wlan2 name=wlan2 add address-pool=pool-wlan3 interface=wlan3 name=wlan3 add address-pool=pool-wlan4 interface=wlan4 name=wlan4 /ipv6 dhcp-server add address-pool=v6pool-ether5 interface=ether5 name=ether5 add address-pool=v6pool-ether6 interface=ether6 name=ether6 add address-pool=v6pool-ether7 interface=ether7 name=ether7 add address-pool=v6pool-ether8 interface=ether8 name=ether8 add address-pool=v6pool-ether9 interface=ether9 name=ether9 add address-pool=v6pool-ether10 interface=ether10 name=ether10 add address-pool=v6pool-wlan1 interface=wlan1 name=wlan1 add address-pool=v6pool-wlan2 interface=wlan2 name=wlan2 add address-pool=v6pool-wlan3 interface=wlan3 name=wlan3 add address-pool=v6pool-wlan4 interface=wlan4 name=wlan4 /ipv6 pool add name=v6pool-ether5 prefix=fd08::/13 prefix-length=64 add name=v6pool-ether6 prefix=fd10::/13 prefix-length=64 add name=v6pool-ether7 prefix=fd18::/13 prefix-length=64 add name=v6pool-ether8 prefix=fd20::/13 prefix-length=64 add name=v6pool-ether9 prefix=fd28::/13 prefix-length=64 add name=v6pool-ether10 prefix=fd30::/13 prefix-length=64 add name=v6pool-wlan1 prefix=fd38::/13 prefix-length=64 add name=v6pool-wlan2 prefix=fd40::/13 prefix-length=64 add name=v6pool-wlan3 prefix=fd48::/13 prefix-length=64 add name=v6pool-wlan4 prefix=fd50::/13 prefix-length=64 /routing table add disabled=no fib name=tabel_eth1 add disabled=no fib name=tabel_eth2 add disabled=no fib name=tabel_eth3 add disabled=no fib name=tabel_eth4 /interface bridge filter # in/out-bridge-port matcher not possible when interface (wlan3) is not slave add action=drop chain=forward in-interface=wlan3 # in/out-bridge-port matcher not possible when interface (wlan3) is not slave add action=drop chain=forward out-interface=wlan3 # in/out-bridge-port matcher not possible when interface (wlan4) is not slave add action=drop chain=forward in-interface=wlan4 # in/out-bridge-port matcher not possible when interface (wlan4) is not slave add action=drop chain=forward out-interface=wlan4 /ip neighbor discovery-settings set discover-interface-list=LAN /interface list member add interface=bridge list=LAN add interface=ether1 list=WAN add interface=ether2 list=WAN add interface=ether3 list=WAN add interface=ether4 list=WAN add interface=ether5 list=LAN add interface=ether6 list=LAN add interface=ether7 list=LAN add interface=ether8 list=LAN add interface=ether9 list=LAN add interface=ether10 list=LAN add interface=wlan1 list=LAN add interface=wlan2 list=LAN add interface=wlan3 list=LAN add interface=wlan4 list=LAN /ip address add address=192.168.88.1/24 interface=bridge network=192.168.88.0 add address=172.22.8.1/21 interface=ether5 network=172.22.8.0 add address=172.22.16.1/21 interface=ether6 network=172.22.16.0 add address=172.22.24.1/21 interface=ether7 network=172.22.24.0 add address=172.22.32.1/21 interface=ether8 network=172.22.32.0 add address=172.22.40.1/21 interface=ether9 network=172.22.40.0 add address=172.22.48.1/21 interface=ether10 network=172.22.48.0 add address=172.22.56.1/21 interface=wlan1 network=172.22.56.0 add address=172.22.64.1/21 interface=wlan2 network=172.22.64.0 add address=172.22.72.1/21 interface=wlan3 network=172.22.72.0 add address=172.22.80.1/21 interface=wlan4 network=172.22.80.0 add address=44.137.83.65/28 interface=ether3 network=44.137.83.64 add address=44.137.83.66/28 interface=ether3 network=44.137.83.64 add address=44.137.83.67/28 interface=ether3 network=44.137.83.64 add address=44.137.83.68/28 interface=ether3 network=44.137.83.64 add address=44.137.83.69/28 interface=ether3 network=44.137.83.64 add address=44.137.83.70/28 interface=ether3 network=44.137.83.64 add address=44.137.83.81/28 interface=ether4 network=44.137.83.80 add address=44.137.83.82/28 interface=ether4 network=44.137.83.80 add address=44.137.83.83/28 interface=ether4 network=44.137.83.80 add address=44.137.83.84/28 interface=ether4 network=44.137.83.80 add address=44.137.83.85/28 interface=ether4 network=44.137.83.80 add address=172.21.1.23/24 interface=ether1 network=172.21.1.0 add address=192.168.178.239/24 interface=ether2 network=192.168.178.0 /ip dhcp-server lease add address=172.22.55.253 client-id=1:e8:9c:25:3a:78:db comment=werkpc \ mac-address=E8:9C:25:3A:78:DB server=ether10 add address=172.22.47.251 client-id=1:0:af:ae:68:9a:d7 comment=\ "windows server (s5)" mac-address=00:AF:AE:68:9A:D7 server=ether9 add address=172.22.47.250 client-id=1:c8:1f:66:f4:d5:ca comment=\ "windows server (s2)" mac-address=C8:1F:66:F4:D5:CA server=ether9 add address=172.22.47.249 client-id=1:9c:5c:8e:7a:5a:eb comment=\ "windows serve (s4)" mac-address=9C:5C:8E:7A:5A:EB server=ether9 add address=172.22.47.253 client-id=\ ff:66:f4:79:5b:0:1:0:1:30:46:0:be:c8:1f:66:f4:79:5b comment=\ "linux server (s3)" mac-address=C8:1F:66:F4:79:5B server=ether9 add address=172.22.55.254 comment="remote rig" mac-address=00:1E:FD:01:AB:61 \ server=ether10 add address=172.22.47.248 client-id=1:c8:1f:66:f9:bd:d4 comment="s1 (linux )" \ mac-address=C8:1F:66:F9:BD:D4 server=ether9 add address=172.22.47.247 client-id=1:c8:1f:66:19:5b:43 comment=\ "s6 linux webserver" mac-address=C8:1F:66:19:5B:43 server=ether9 /ip dhcp-server network add address=172.22.8.0/21 dns-server=172.22.8.1,8.8.8.8,8.8.4.4 domain=\ ethernet5.intern.jenp.net gateway=172.22.8.1 add address=172.22.16.0/21 dns-server=172.22.16.1,8.8.8.8,8.8.4.4 domain=\ ethernet6.intern.jenp.net gateway=172.22.16.1 add address=172.22.24.0/21 dns-server=172.22.24.1,8.8.8.8,8.8.4.4 domain=\ ethernet7.intern.jenp.net gateway=172.22.24.1 add address=172.22.32.0/21 dns-server=172.22.32.1,8.8.8.8,8.8.4.4 domain=\ ethernet8.intern.jenp.net gateway=172.22.32.1 add address=172.22.40.0/21 dns-server=172.22.40.1,8.8.8.8,8.8.4.4 domain=\ ethernet9.intern.jenp.net gateway=172.22.40.1 add address=172.22.48.0/21 dns-server=172.22.48.1,8.8.8.8,8.8.4.4 domain=\ ethernet10.intern.jenp.net gateway=172.22.48.1 add address=172.22.56.0/21 dns-server=172.22.56.1,8.8.8.8,8.8.4.4 domain=\ wlan1.intern.jenp.net gateway=172.22.56.1 add address=172.22.64.0/21 dns-server=172.22.64.1,8.8.8.8,8.8.4.4 domain=\ wlan2.intern.jenp.net gateway=172.22.64.1 add address=172.22.72.0/21 dns-server=172.22.72.1,8.8.8.8,8.8.4.4 domain=\ wlan3.intern.jenp.net gateway=172.22.72.1 add address=172.22.80.0/21 dns-server=172.22.80.1,8.8.8.8,8.8.4.4 domain=\ wlan4.intern.jenp.net gateway=172.22.80.1 add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=\ 192.168.88.1 /ip dns set allow-remote-requests=yes /ip dns static add address=192.168.88.1 comment=defconf name=router.lan type=A /ip firewall filter add action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untracked add action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalid add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp add action=accept chain=input comment=\ "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1 add action=drop chain=input comment="defconf: drop all not coming from LAN" \ in-interface-list=!LAN add action=accept chain=forward comment="defconf: accept in ipsec policy" \ ipsec-policy=in,ipsec add action=accept chain=forward comment="defconf: accept out ipsec policy" \ ipsec-policy=out,ipsec add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \ connection-state=established,related hw-offload=yes add action=accept chain=forward comment=\ "defconf: accept established,related, untracked" connection-state=\ established,related,untracked add action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalid add action=drop chain=forward comment=\ "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \ connection-state=new in-interface-list=WAN /ip firewall mangle add action=mark-routing chain=prerouting in-interface-list=LAN \ new-routing-mark=tabel_eth1 src-address=172.22.0.0/16 add action=mark-routing chain=prerouting in-interface-list=LAN \ new-routing-mark=tabel_eth4 src-address=172.22.0.0/16 add action=mark-routing chain=prerouting in-interface-list=LAN \ new-routing-mark=tabel_eth3 src-address=172.22.0.0/16 add action=mark-routing chain=prerouting in-interface-list=LAN \ new-routing-mark=tabel_eth2 src-address=172.22.0.0/16 add action=mark-routing chain=prerouting in-interface-list=LAN \ new-routing-mark=main src-address=172.22.0.0/16 add action=mark-connection chain=prerouting in-interface=ether1 \ new-connection-mark=ether1_conn add action=mark-connection chain=prerouting in-interface=ether2 \ new-connection-mark=ether2_conn add action=mark-connection chain=prerouting in-interface=ether3 \ new-connection-mark=ether3_conn add action=mark-connection chain=prerouting in-interface=ether4 \ new-connection-mark=ether4_conn add action=mark-routing chain=prerouting connection-mark=ether1_conn \ in-interface-list=WAN new-routing-mark=tabel_eth1 add action=mark-routing chain=prerouting connection-mark=ether2_conn \ in-interface-list=WAN new-routing-mark=tabel_eth2 add action=mark-routing chain=prerouting connection-mark=ether3_conn \ in-interface-list=WAN new-routing-mark=tabel_eth3 add action=mark-routing chain=prerouting connection-mark=ether4_conn \ in-interface-list=WAN new-routing-mark=tabel_eth4 add action=mark-routing chain=output new-routing-mark=main add action=mark-routing chain=output connection-mark=ether1_conn \ new-routing-mark=tabel_eth1 add action=mark-routing chain=output connection-mark=ether2_conn \ new-routing-mark=tabel_eth2 add action=mark-routing chain=output connection-mark=ether3_conn \ new-routing-mark=tabel_eth3 add action=mark-routing chain=output connection-mark=ether4_conn \ new-routing-mark=tabel_eth4 /ip firewall nat add action=masquerade chain=srcnat out-interface-list=WAN add action=masquerade chain=srcnat comment="defconf: masquerade" \ ipsec-policy=out,none out-interface-list=WAN add action=masquerade chain=srcnat out-interface=ether1 add action=masquerade chain=srcnat out-interface=ether2 add action=masquerade chain=srcnat out-interface=ether3 add action=masquerade chain=srcnat out-interface=ether4 /ip proxy set enabled=yes port=8321 /ip proxy access add comment="lan proxy" src-address=172.22.0.0/16 /ip route add disabled=no distance=11 dst-address=0.0.0.0/0 gateway=172.21.1.1 \ routing-table=main scope=30 suppress-hw-offload=no target-scope=10 add check-gateway=ping disabled=no distance=12 dst-address=0.0.0.0/0 gateway=\ 192.168.178.1 routing-table=main scope=30 suppress-hw-offload=no \ target-scope=10 add disabled=no distance=13 dst-address=0.0.0.0/0 gateway=44.137.83.78 \ routing-table=main scope=30 suppress-hw-offload=no target-scope=10 add disabled=no distance=14 dst-address=0.0.0.0/0 gateway=44.137.83.94 \ routing-table=main scope=30 suppress-hw-offload=no target-scope=10 /ip upnp set enabled=yes /ip upnp interfaces add interface=ether1 type=external add interface=ether2 type=external add interface=ether3 type=external add interface=ether4 type=external add interface=ether5 type=internal add interface=ether6 type=internal add interface=ether7 type=internal add interface=ether8 type=internal add interface=ether9 type=internal add interface=ether10 type=internal add interface=wlan1 type=internal add interface=wlan2 type=internal add interface=wlan3 type=internal add interface=wlan4 type=internal /ipv6 address add from-pool=v6pool-ether5 interface=ether5 add from-pool=v6pool-ether6 interface=ether6 add from-pool=v6pool-ether7 interface=ether7 add from-pool=v6pool-ether8 interface=ether8 add from-pool=v6pool-ether9 interface=ether9 add from-pool=v6pool-ether10 interface=ether10 add from-pool=v6pool-wlan1 interface=wlan1 add from-pool=v6pool-wlan2 interface=wlan2 add from-pool=v6pool-wlan3 interface=wlan3 add from-pool=v6pool-wlan4 interface=wlan4 add disabled=yes from-pool=v6pool-ether1 interface=ether10 add disabled=yes from-pool=v6pool-ether2 interface=ether10 /ipv6 dhcp-client add add-default-route=yes interface=ether1 pool-name=v6pool-ether1 request=\ address,prefix add add-default-route=yes interface=ether2 pool-name=v6pool-ether2 request=\ address,prefix /ipv6 firewall address-list add address=::/128 comment="defconf: unspecified address" list=bad_ipv6 add address=::1/128 comment="defconf: lo" list=bad_ipv6 add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6 add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6 add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6 add address=100::/64 comment="defconf: discard only " list=bad_ipv6 add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6 add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6 add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6 /ipv6 firewall filter add action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untracked add action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalid add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\ icmpv6 add action=accept chain=input comment="defconf: accept UDP traceroute" \ dst-port=33434-33534 protocol=udp add action=accept chain=input comment=\ "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\ udp src-address=fe80::/10 add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \ protocol=udp add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\ ipsec-ah add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\ ipsec-esp add action=accept chain=input comment=\ "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec add action=drop chain=input comment=\ "defconf: drop everything else not coming from LAN" in-interface-list=\ !LAN add action=fasttrack-connection chain=forward comment="defconf: fasttrack6" \ connection-state=established,related add action=accept chain=forward comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untracked add action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalid add action=drop chain=forward comment=\ "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6 add action=drop chain=forward comment=\ "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6 add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \ hop-limit=equal:1 protocol=icmpv6 add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\ icmpv6 add action=accept chain=forward comment="defconf: accept HIP" protocol=139 add action=accept chain=forward comment="defconf: accept IKE" dst-port=\ 500,4500 protocol=udp add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\ ipsec-ah add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\ ipsec-esp add action=accept chain=forward comment=\ "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec add action=drop chain=forward comment=\ "defconf: drop everything else not coming from LAN" in-interface-list=\ !LAN /ipv6 firewall mangle add action=mark-connection chain=prerouting in-interface=ether1 \ new-connection-mark=ether1_conn add action=mark-connection chain=prerouting in-interface=ether2 \ new-connection-mark=ether2_conn add action=mark-routing chain=prerouting connection-mark=ether1_conn \ in-interface-list=WAN new-routing-mark=tabel_eth1 add action=mark-routing chain=prerouting connection-mark=ether2_conn \ in-interface-list=WAN new-routing-mark=tabel_eth2 add action=mark-routing chain=output new-routing-mark=main add action=mark-routing chain=output connection-mark=ether1_conn \ new-routing-mark=tabel_eth1 add action=mark-routing chain=output connection-mark=ether2_conn \ new-routing-mark=tabel_eth2 /ipv6 firewall nat add action=masquerade chain=srcnat ipsec-policy=out,none out-interface-list=\ WAN /ipv6 nd add interface=ether5 managed-address-configuration=yes other-configuration=\ yes add interface=ether6 managed-address-configuration=yes other-configuration=\ yes add interface=ether7 managed-address-configuration=yes other-configuration=\ yes add interface=ether8 managed-address-configuration=yes other-configuration=\ yes add interface=ether9 managed-address-configuration=yes other-configuration=\ yes add interface=ether10 managed-address-configuration=yes other-configuration=\ yes add interface=wlan1 managed-address-configuration=yes other-configuration=yes add interface=wlan2 managed-address-configuration=yes other-configuration=yes add interface=wlan3 managed-address-configuration=yes other-configuration=yes add interface=wlan4 managed-address-configuration=yes other-configuration=yes /ipv6 nd prefix add autonomous=no interface=ether5 add autonomous=no interface=ether6 add autonomous=no interface=ether7 add autonomous=no interface=ether8 add autonomous=no interface=ether9 add autonomous=no interface=ether10 add autonomous=no interface=wlan1 add autonomous=no interface=wlan2 add autonomous=no interface=wlan3 add autonomous=no interface=wlan4 /system leds add interface=wlan1 leds="wlan1_signal1-led,wlan1_signal2-led,wlan1_signal3-le\ d,wlan1_signal4-led,wlan1_signal5-led" type=wireless-signal-strength add interface=wlan1 leds=wlan1_tx-led type=interface-transmit add interface=wlan1 leds=wlan1_rx-led type=interface-receive |
ik heb echter op dit momend 2 problemen waar ik tegen aan loop.
probleem 1:
de ip adaressen beginnend met 44.137.83.x (zoas: 44.137.83.66) zijn van buitenaf onberijkbaar.
probleem 2:
als ik:
code:
via de terminal doe dan is in een keer heel internet uitgaand ge blokeerd dus kan dan geen tracert meer doen en ook krijg ik geen website's meer ge laden.1
2
3
| /ip/route/add dst-address=0.0 .0.0/0 gateway=172.21.1.1 routing-table=tabel_et h1 |
ik vermoed dat het gewoon iets klijnst is dat ik over het hoofd zie waardoor de configuratie niet goed werkt.
maar warschijnlijk zie ik zelf dus iets over het hoofd.
hopelijk kan iemand me verder helpen en een oplosing geven voor dit probleem..
alvast heel erg bedankt voor de hulp.
[ Voor 5% gewijzigd door superpeter op 13-09-2025 13:27 ]