Страница 1 из 1
Winbox не видит второй микротик
Добавлено: 20 фев 2022, 11:02
pekod
Топология следующая (все устройства расополжены в одной квартире):
RBD52G-5HacD2HnD - маршрутизатор основной, к нему подключен кабель от ISP ("мастер" маршрутизатор);
RB2011UiaS - выполняет функцию свитча ("слейв" маршрутизатор в режиме бридж подключен к "мастеру" по ether3)
Проблема заключается в том, что включенные в основной маршрутизатор (RBD52G-5HacD2HnD) хосты не видят свитч (RB2011UiaS). По мак адресу к RB2011UiaS не подключается (если хост подключен к RBD52G-5HacD2HnD).
При подключении напрямую к RB2011UiaS по ethernet в окне винбокса видны все "соседи" (оба микротика).
Порт винбокса активен, ip adressess включен на LAN (на обоих роутербордах).
Необходимо подключаться к RB2011UiaS с хоста, который подключен к RBD52G-5HacD2HnD.
Пожалуйста подскажите куда копать?
Re: Winbox не видит второй микротик
Добавлено: 20 фев 2022, 12:53
KaNelam
pekod писал(а): ↑20 фев 2022, 11:02
Пожалуйста подскажите куда копать?
показать конфиги
Re: Winbox не видит второй микротик
Добавлено: 20 фев 2022, 16:32
pekod
KaNelam писал(а): ↑20 фев 2022, 12:53
pekod писал(а): ↑20 фев 2022, 11:02
Пожалуйста подскажите куда копать?
показать конфиги
# feb/20/2022 16:23:33 by RouterOS 7.1.2
# software id = W08J-7AGT
#
# model = RBD52G-5HacD2HnD
# serial number = BEEB0AD026F3
/interface bridge
add admin-mac=74:4D:28:E0:87:5F auto-mac=no comment=defconf name=bridge
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-onlyn country=russia4 disabled=no frequency=auto frequency-mode=manual-txpower \
hw-protection-mode=cts-to-self installation=indoor max-station-count=20 mode=ap-bridge ssid=hAP2.4GHZ tx-power=19 \
tx-power-mode=all-rates-fixed wireless-protocol=802.11 wmm-support=enabled wps-mode=disabled
set [ find default-name=wlan2 ] band=5ghz-onlyac channel-width=20/40/80mhz-eeeC country=russia4 disabled=no distance=indoors \
frequency=auto frequency-mode=manual-txpower hw-protection-mode=cts-to-self installation=indoor max-station-count=200 mode=\
ap-bridge ssid=hAP tx-power=15 tx-power-mode=all-rates-fixed wireless-protocol=802.11 wmm-support=enabled wps-mode=disabled
/interface 6to4
add comment="Hurricane Electric IPv6 Tunnel Broker" !keepalive local-address=178.170.198.16 mtu=1280 name=sit1 remote-address=\
216.66.80.162
/interface wireless nstreme
set wlan1 enable-polling=no
set wlan2 enable-polling=no
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik
add name=profile supplicant-identity=MikroTik
/ip pool
add name=dhcp ranges=192.168.88.10-192.168.88.251
/ip dhcp-server
add address-pool=dhcp interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf ingress-filtering=no interface=ether2
add bridge=bridge comment=defconf ingress-filtering=no interface=ether3
add bridge=bridge comment=defconf ingress-filtering=no interface=ether4
add bridge=bridge comment=defconf ingress-filtering=no interface=ether5
add bridge=bridge comment=defconf ingress-filtering=no interface=wlan1
add bridge=bridge comment=defconf ingress-filtering=no interface=wlan2
add bridge=bridge disabled=yes ingress-filtering=no interface=ether1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set max-neighbor-entries=8192
/interface detect-internet
set detect-interface-list=all
/interface list member
add comment=defconf interface=ether1 list=WAN
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
add interface=wlan2 list=LAN
add interface=wlan1 list=LAN
add interface=bridge list=LAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=192.168.88.0
/ip dhcp-client
add interface=bridge
add interface=ether1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1 netmask=24 ntp-server=192.168.88.1
/ip dns
set allow-remote-requests=yes servers=2001:4860:4860::8888,2001:4860:4860::8844,2001:470:20::2
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=\
new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WAN
/ip route
add disabled=yes dst-address=0.0.0.0/0 gateway=178.170.198.1
/ipv6 route
add disabled=no distance=1 dst-address=2000::/3 gateway=2001:470:70:82d::1 scope=30 target-scope=10
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=bridge type=internal
add interface=ether1 type=external
/ipv6 address
add address=2001:470:70:82d::2 advertise=no interface=sit1
add address=2001:470:71:82d:: interface=bridge
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
add address=::224.0.0.0/100 comment="defconf: other" list=bad_ipv6
add address=::127.0.0.0/104 comment="defconf: other" list=bad_ipv6
add address=::/104 comment="defconf: other" list=bad_ipv6
add address=::255.0.0.0/104 comment="defconf: other" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp
add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=\
fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
/system clock
set time-zone-name=Europe/Moscow
/system identity
set name=hAPac2
/system ntp client
set enabled=yes
/system ntp client servers
add address=31.28.161.68
add address=79.142.192.4
/system routerboard settings
set auto-upgrade=yes cpu-frequency=auto
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
# feb/20/2022 16:28:44 by RouterOS 7.1.2
# software id = YM24-MEJR
#
# model = 2011UiAS-2HnD
# serial number = 703A06E16460
/interface bridge
add admin-mac=6C:3B:6B:22:9B:54 auto-mac=no comment=defconf name=bridge
/interface wireless
# managed by CAPsMAN
set [ find default-name=wlan1 ] band=2ghz-onlyn country=russia frequency=auto frequency-mode=manual-txpower hw-protection-mode=\
cts-to-self installation=indoor max-station-count=100 mode=ap-bridge ssid=RB2011_2.4 tx-power=15 tx-power-mode=all-rates-fixed \
wireless-protocol=802.11 wmm-support=enabled wps-mode=disabled
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface lte apn
set [ find default=yes ] ip-type=ipv4
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-psk mode=dynamic-keys supplicant-identity=MikroTik
/ip pool
add name=dhcp ranges=0.0.0.1-0.0.0.254
/ip dhcp-server
add address-pool=dhcp disabled=yes interface=bridge name=defconf
/port
set 0 name=serial0
/interface bridge port
add bridge=bridge ingress-filtering=no interface=ether1
add bridge=bridge ingress-filtering=no interface=sfp1
add bridge=bridge ingress-filtering=no interface=ether2
add bridge=bridge ingress-filtering=no interface=ether3
add bridge=bridge ingress-filtering=no interface=ether4
add bridge=bridge ingress-filtering=no interface=ether5
add bridge=bridge ingress-filtering=no interface=ether6
add bridge=bridge ingress-filtering=no interface=ether7
add bridge=bridge ingress-filtering=no interface=ether8
add bridge=bridge ingress-filtering=no interface=ether9
add bridge=bridge ingress-filtering=no interface=ether10
add bridge=bridge ingress-filtering=no interface=wlan1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set max-neighbor-entries=8192
/interface list member
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
add interface=ether6 list=LAN
add interface=ether7 list=LAN
add interface=ether8 list=LAN
add interface=ether9 list=LAN
add interface=ether10 list=LAN
add interface=sfp1 list=LAN
add interface=ether1 list=WAN
add interface=wlan1 list=LAN
/interface wireless cap
#
set bridge=bridge enabled=yes interfaces=wlan1
/ip address
add address=192.168.89.1/24 disabled=yes interface=ether2 network=192.168.89.0
/ip dhcp-client
add interface=bridge
/ip dhcp-server network
add address=192.168.89.0/24 comment=defconf gateway=192.168.89.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=192.168.88.1
/ip dns static
add address=192.168.89.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new \
in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" disabled=yes ipsec-policy=out,none out-interface-list=WAN
/ip route
add disabled=yes dst-address=0.0.0.0/0 gateway=192.168.88.1
/ip upnp interfaces
add interface=bridge type=internal
add interface=ether1 type=external
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
add address=::224.0.0.0/100 comment="defconf: other" list=bad_ipv6
add address=::127.0.0.0/104 comment="defconf: other" list=bad_ipv6
add address=::/104 comment="defconf: other" list=bad_ipv6
add address=::255.0.0.0/104 comment="defconf: other" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp
add action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN
/lcd
set default-screen=stat-slideshow time-interval=hour
/system clock
set time-zone-name=Europe/Moscow
/system identity
set name=RB2011UiAS
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
Re: Winbox не видит второй микротик
Добавлено: 20 фев 2022, 18:10
KaNelam
Сбросить 2011 в ноль, создать бридж, добавить в него все интерфейсы. Сейчас на 2011 полная каша.
Re: Winbox не видит второй микротик
Добавлено: 20 фев 2022, 19:05
pekod
KaNelam писал(а): ↑20 фев 2022, 18:10
Сбросить 2011 в ноль, создать бридж, добавить в него все интерфейсы. Сейчас на 2011 полная каша.
Благодарю! Помогло!
Теперь на хосте подключенном к основному роутеру видно RB2011, но при попытке чекнуть апдейт прошивки тика получаю "COULD NOT RESOLVE DNS". В ip->dns указал шлюз 192.168.88.1, а ошибка с днс не позволяет проверить обновление.

Re: Winbox не видит второй микротик
Добавлено: 20 фев 2022, 19:12
KaNelam
pekod писал(а): ↑20 фев 2022, 19:05
KaNelam писал(а): ↑20 фев 2022, 18:10
Сбросить 2011 в ноль, создать бридж, добавить в него все интерфейсы. Сейчас на 2011 полная каша.
Благодарю! Помогло!
Теперь на хосте подключенном к основному роутеру видно RB2011, но при попытке чекнуть апдейт прошивки тика получаю "COULD NOT RESOLVE DNS". В ip->dns указал шлюз 192.168.88.1, а ошибка с днс не позволяет проверить обновление.
На бридже включить dhcp-client.
Re: Winbox не видит второй микротик
Добавлено: 20 фев 2022, 19:19
pekod
KaNelam писал(а): ↑20 фев 2022, 19:12
pekod писал(а): ↑20 фев 2022, 19:05
KaNelam писал(а): ↑20 фев 2022, 18:10
Сбросить 2011 в ноль, создать бридж, добавить в него все интерфейсы. Сейчас на 2011 полная каша.
Благодарю! Помогло!
Теперь на хосте подключенном к основному роутеру видно RB2011, но при попытке чекнуть апдейт прошивки тика получаю "COULD NOT RESOLVE DNS". В ip->dns указал шлюз 192.168.88.1, а ошибка с днс не позволяет проверить обновление.
На бридже включить dhcp-client.
РЕСПЕККТИЩЕ!
Все заработало! СПАСИБО ВАМ!