Quantcast
Channel: MikroTik
Viewing all articles
Browse latest Browse all 22537

General • Access to second subnet from mikrotik's net

$
0
0
Hello, I am having problems accessing a server that I have connected to an Archer 6 router.
My configuration scheme is something like this:

Internet -> Mikrotik rb750gr3 -> Switch -> Archer 6 -> Server

The Mikrotik router (dhcp 192.168.0.0/24 is conected also a tp-link AP and I get the ips 192.168.0.149 from it, but I cannot access services exposed after archer 6. The archer generate a net with this dhcp: 192.168.0.1/24. The configuration of the mikrotik rb750gr3 is as follows:
Code:
# jun/03/2024 18:12:03 by RouterOS 6.49.10# software id = 6B5U-98RN## model = RB750Gr3# serial number = HE108RYPKCS/interface bridgeadd admin-mac=48:A9:8A:40:36:93 auto-mac=no comment=defconf name=bridge/interface vlanadd interface=ether1 name=vlan20 vlan-id=20/interface pppoe-clientadd add-default-route=yes disabled=no interface=vlan20 keepalive-timeout=disabled name=pppoe-out1 user=286301565@digi/interface listadd comment=defconf name=WANadd comment=defconf name=LANadd name=listBridge/interface wireless security-profilesset [ find default=yes ] supplicant-identity=MikroTik/ip pooladd name=default-dhcp ranges=192.168.0.128-192.168.0.254/ip dhcp-serveradd address-pool=default-dhcp disabled=no interface=bridge name=defconf/ppp profileset *0 use-upnp=yes/interface bridge portadd bridge=bridge comment=defconf interface=ether2add bridge=bridge comment=defconf interface=ether3add bridge=bridge comment=defconf interface=ether4add bridge=bridge comment=defconf interface=ether5/ip neighbor discovery-settingsset discover-interface-list=listBridge/interface list memberadd comment=defconf interface=bridge list=LANadd comment=defconf interface=ether1 list=WANadd interface=bridge list=listBridge/ip addressadd address=192.168.0.1/24 comment=defconf interface=bridge network=192.168.0.0add address=192.168.1.0/24 interface=bridge network=192.168.1.0/ip dhcp-clientadd comment=defconf disabled=no interface=ether1/ip dhcp-server leaseadd address=192.168.0.248 client-id=1:d8:47:32:15:1f:2c mac-address=D8:47:32:15:1F:2C server=defconfadd address=192.168.0.246 client-id=1:48:22:54:5b:c7:f2 mac-address=48:22:54:5B:C7:F2 server=defconfadd address=192.168.0.150 client-id=1:d8:3a:dd:91:bc:88 mac-address=D8:3A:DD:91:BC:88 server=defconf/ip dhcp-server networkadd address=192.168.0.0/24 comment=defconf dns-server=192.168.0.150 gateway=192.168.0.1/ip dnsset allow-remote-requests=yes servers=192.168.0.150/ip dns staticadd address=192.168.88.1 comment=defconf name=router.lan/ip firewall filteradd action=reject chain=input comment="Reject DNS from WAN" dst-port=53 in-interface-list=WAN protocol=tcp reject-with=icmp-port-unreachableadd action=reject chain=input comment="Reject DNS from WAN" dst-port=53 in-interface-list=WAN protocol=udp reject-with=icmp-port-unreachableadd action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=invalidadd action=accept chain=input comment="defconf: accept ICMP" protocol=icmpadd action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LANadd action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsecadd action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,relatedadd action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" connection-state=invalidadd action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN/ip firewall natadd action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface=pppoe-out1/ip serviceset telnet disabled=yesset ftp disabled=yesset api disabled=yes/ip upnpset allow-disable-external-interface=yes enabled=yes/ip upnp interfacesadd interface=vlan20 type=internaladd interface=pppoe-out1 type=external/system clockset time-zone-name=Europe/Madrid/system identityset name=RouterOS/tool mac-serverset allowed-interface-list=listBridge/tool mac-server mac-winboxset allowed-interface-list=listBridge
What else i am missing?

Statistics: Posted by blabullet — Mon Jun 03, 2024 7:13 pm



Viewing all articles
Browse latest Browse all 22537

Trending Articles