Follow along with the video below to see how to install our site as a web app on your home screen.
Anmerkung: this_feature_currently_requires_accessing_site_using_safari
ping 192.168.0.100
PING 192.168.0.100 (192.168.0.100) 56(84) bytes of data.
64 bytes from 192.168.0.100: icmp_seq=9 ttl=64 time=0.780 ms
64 bytes from 192.168.0.100: icmp_seq=10 ttl=64 time=0.168 ms
64 bytes from 192.168.0.100: icmp_seq=14 ttl=64 time=0.178 ms
64 bytes from 192.168.0.100: icmp_seq=15 ttl=64 time=0.157 ms
64 bytes from 192.168.0.100: icmp_seq=24 ttl=64 time=0.499 ms
64 bytes from 192.168.0.100: icmp_seq=25 ttl=64 time=0.159 ms
64 bytes from 192.168.0.100: icmp_seq=34 ttl=64 time=0.278 ms
64 bytes from 192.168.0.100: icmp_seq=35 ttl=64 time=0.204 ms
64 bytes from 192.168.0.100: icmp_seq=44 ttl=64 time=0.230 ms
64 bytes from 192.168.0.100: icmp_seq=45 ttl=64 time=0.153 ms
64 bytes from 192.168.0.100: icmp_seq=49 ttl=64 time=0.148 ms
64 bytes from 192.168.0.100: icmp_seq=50 ttl=64 time=0.158 ms
^C
--- 192.168.0.100 ping statistics ---
58 packets transmitted, 12 received, 79.3103% packet loss, time 432ms
rtt min/avg/max/mdev = 0.148/0.259/0.780/0.183 ms
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; accept established,related,untracked
chain=input action=accept
connection-state=established,related,untracked
1 ;;; drop invalid
chain=input action=drop connection-state=invalid
2 ;;; accept ICMP
chain=input action=accept protocol=icmp
3 ;;; drop all not coming from LAN
chain=input action=drop in-interface-list=!LAN
4 ;;; accept established,related, untracked
chain=forward action=accept
connection-state=established,related,untracked
5 ;;; drop invalid
chain=forward action=drop connection-state=invalid
6 ;;; accept in ipsec policy
chain=forward action=accept ipsec-policy=in,ipsec
--- 192.168.0.100 ping statistics ---
53 packets transmitted, 44 received, 16.9811% packet loss, time 298ms
rtt min/avg/max/mdev = 0.151/0.196/0.340/0.031 ms
[admin@MikroTik] > /export hide-sensitive
# feb/17/2020 22:20:27 by RouterOS 6.46.3
# software id = 61IA-B1YA
#
# model = CRS326-24G-2S+
# serial number = 763C08BXXXX
/interface bridge
add name=bridge1
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp ranges=192.168.0.20-192.168.0.80
/ip dhcp-server
add add-arp=yes address-pool=dhcp disabled=no interface=bridge1 lease-script=dhcp-lease-script lease-time=1h name=dhcp1
/interface bridge port
add bridge=bridge1 interface=ether2
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether5
add bridge=bridge1 interface=ether6
add bridge=bridge1 interface=ether7
add bridge=bridge1 interface=ether8
add bridge=bridge1 interface=ether9
add bridge=bridge1 interface=ether10
add bridge=bridge1 interface=ether11
add bridge=bridge1 interface=ether12
add bridge=bridge1 interface=ether13
add bridge=bridge1 interface=ether14
add bridge=bridge1 interface=ether15
add bridge=bridge1 interface=ether16
add bridge=bridge1 interface=ether17
add bridge=bridge1 interface=ether18
add bridge=bridge1 interface=ether19
add bridge=bridge1 interface=ether20
add bridge=bridge1 interface=ether21
add bridge=bridge1 interface=ether22
add bridge=bridge1 interface=ether23
add bridge=bridge1 interface=ether24
add bridge=bridge1 interface=sfp-sfpplus1
add bridge=bridge1 interface=sfp-sfpplus2
/interface detect-internet
set detect-interface-list=all
/interface list member
add interface=ether1 list=WAN
add interface=bridge1 list=LAN
/ip address
add address=192.168.0.100/24 interface=ether2 network=192.168.0.0
/ip dhcp-client
add disabled=no interface=ether1 use-peer-dns=no
/ip dhcp-server lease
add address=192.168.0.201 client-id=ff:6f:7f:f6:2c:0:1:0:1:25:21:2b:49:2a:4e:6f:7f:f6:2c mac-address=2A:4E:6F:7F:F6:2C server=dhcp1
/ip dhcp-server network
add address=192.168.0.0/24 dns-server=192.168.0.101,192.168.0.100 domain=lan gateway=192.168.0.100 netmask=24
/ip dns
set allow-remote-requests=yes max-concurrent-queries=250 max-concurrent-tcp-sessions=100 servers=192.168.0.100,192.168.0.101
/ip dns static
add address=192.168.0.20 comment=#DHCP name=amazon-56e883494.lan ttl=1h
add address=192.168.0.21 comment=#DHCP name=AP-Flur.lan ttl=1h
add address=192.168.0.150 comment="nuc1 - PVE Server" name=nuc1.lan
add address=192.168.0.99 comment="tx1320 - PVE server" name=tx1320.lan
add address=192.168.0.175 comment="Freenas Virtual Storage Server" name=storea.lan
add address=192.168.0.37 comment=#DHCP name=android-d4bf70c8faee77cf.lan ttl=1h
add address=192.168.0.24 comment=#DHCP name=Carl.lan ttl=1h
add address=192.168.0.22 comment=#DHCP name=Carl.lan ttl=1h
add address=192.168.0.31 comment=#DHCP name=unifi.lan ttl=1h
add address=192.168.0.30 comment=#DHCP name=tv.lan ttl=1h
add address=192.168.0.27 comment=#DHCP name=freenas.lan ttl=1h
add address=192.168.0.32 comment=#DHCP name=freenas.lan ttl=1h
add address=192.168.0.29 comment=#DHCP name=x240.lan ttl=1h
add address=192.168.0.23 comment=#DHCP name=DESKTOP-SNBGK43.lan ttl=1h
add address=192.168.0.26 comment=#DHCP name=DESKTOP-SNBGK43.lan ttl=1h
add address=192.168.0.201 comment=#DHCP name=nextcloud.lan ttl=1h
/ip firewall address-list
add address=carlschiller.dyn.ch list=DDNS
/ip firewall filter
add action=accept chain=input comment="accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="drop invalid" connection-state=invalid
add action=accept chain=input comment="accept ICMP" protocol=icmp
add action=drop chain=input comment="drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="drop invalid" connection-state=invalid
add action=accept chain=forward comment="accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="accept out ipsec policy" ipsec-policy=out,ipsec
add action=drop chain=forward comment="drop all from WAN not DSTNATed" connection-nat-state=!dstnat in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat out-interface-list=WAN
/system clock
set time-zone-name=Europe/Berlin
/system routerboard settings
set boot-os=router-os
/system scheduler
add interval=10m name=ddns on-event=update-ddns policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon start-time=startup
/system script
add dont-require-permissions=no name=dhcp-lease-script owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
source=":local DHCPtag\r\
\n:set DHCPtag \"#DHCP\"\r\
\n\r\
\n:if ( [ :len \$leaseActIP ] <= 0 ) do={ :error \"empty lease address\" }\r\
\n\r\
\n:if ( \$leaseBound = 1 ) do=\\\r\
\n{\r\
\n :local ttl\r\
\n :local domain\r\
\n :local hostname\r\
\n :local fqdn\r\
\n :local leaseId\r\
\n :local comment\r\
\n\r\
\n /ip dhcp-server\r\
\n :set ttl [ get [ find name=\$leaseServerName ] lease-time ]\r\
\n network \r\
\n :set domain [ get [ find \$leaseActIP in address ] domain ]\r\
\n\r\
\n .. lease\r\
\n :set leaseId [ find address=\$leaseActIP ]\r\
\n\r\
\n # Check for multiple active leases for the same IP address. It's weird and it shouldn't be, but just in case.\r\
\n\r\
\n :if ( [ :len \$leaseId ] != 1) do={\r\
\n :log info \"DHCP2DNS: not registering domain name for address \$leaseActIP because of multiple active leases for \$leaseActIP\"\r\
\n :error \"multiple active leases for \$leaseActIP\"\r\
\n } \r\
\n\r\
\n :set hostname [ get \$leaseId host-name ]\r\
\n :set comment [ get \$leaseId comment ]\r\
\n /\r\
\n\r\
\n :if ( [ :len \$hostname ] <= 0 ) do={ :set hostname \$comment }\r\
\n\r\
\n :if ( [ :len \$hostname ] <= 0 ) do={\r\
\n :log error \"DHCP2DNS: not registering domain name for address \$leaseActIP because of empty lease host-name or comment\"\r\
\n :error \"empty lease host-name or comment\"\r\
\n }\r\
\n :if ( [ :len \$domain ] <= 0 ) do={\r\
\n :log error \"DHCP2DNS: not registering domain name for address \$leaseActIP because of empty network domain name\"\r\
\n :error \"empty network domain name\"\r\
\n }\r\
\n\r\
\n :set fqdn \"\$hostname.\$domain\"\r\
\n\r\
\n /ip dns static\r\
\n :if ( [ :len [ find name=\$fqdn and address=\$leaseActIP and disabled=no ] ] = 0 ) do={\r\
\n :log info \"DHCP2DNS: registering static domain name \$fqdn for address \$leaseActIP with ttl \$ttl\"\r\
\n add address=\$leaseActIP name=\$fqdn ttl=\$ttl comment=\$DHCPtag disabled=no\r\
\n } else={\r\
\n :log error \"DHCP2DNS: not registering domain name \$fqdn for address \$leaseActIP because of existing active static DNS entry with\
\_this name or address\"\r\
\n }\r\
\n /\r\
\n} else={\r\
\n /ip dns static\r\
\n :local dnsDhcpId\r\
\n :set dnsDhcpId [ find address=\$leaseActIP and comment=\$DHCPtag ]\r\
\n :if ( [ :len \$dnsDhcpId ] > 0 ) do={\r\
\n :log info \"DHCP2DNS: removing static domain name(s) for address \$leaseActIP\"\r\
\n remove \$dnsDhcpId\r\
\n }\r\
\n /\r\
\n}"
add dont-require-permissions=no name=update-ddns owner=admin policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=\
"freedns.afraid.org\" url=https://freedns.afraid.org/dynamic/update.php\?SkhXXXXXXXXXXXXX"
/system swos
set address-acquisition-mode=static allow-from-ports=\
p1,p2,p3,p4,p5,p6,p7,p8,p9,p10,p11,p12,p13,p14,p15,p16,p17,p18,p19,p20,p21,p22,p23,p24,p25,p26 identity=CRS326 static-ip-address=\
192.168.0.254
Du darfst die IP nicht auf ein Slave-Interface legen, die muss auf den Master (bridge1):
/ip address
add address=192.168.0.100/24 interface=ether2 network=192.168.0.0
Ja, hatte mich da auch schon gewundert. Das ist halt die Einstellung die ja so im wiki steht. Habe das mal auf bridge1 geändert und neugestartet, leider ohne Erfolg.
Auch alles nur über 1G abschießen bzw. nur freenas oder PVE bringt nix :-/
Trotzdem Danke, werde mein Glück vll nochmal im MT Forum probieren.
Sonst geht der HexS auf OpenWrt und der CRS auf SwOS.
Done, hat leider nix gebracht.außer der IP auf ether2 statt bridge -> danach mal Switch und ggf. Server neu gestartet, um falsche ARP Einträge loszuwerden?
CRS: 192.168.0.100
Port 1: WAN - Cabel Modem
Port 2: WLAN - Unifi AP 192.168.0.21: Div. Clients
Port 10: Nuc1 - PVE Host 192.168.0.150
- Pihole (CT) 192.168.0.101
- tv (CT) 192.168.0.30
Port 24: TX1320(BMC) 192.1 68.0.253
Port SFP+1: Freenas 192.168.0.22
Port SFP+2: TX1320 PVE Host 192.168.0.99
- storea (freenas VM) 192.168.0.175 192.168.0.174 ( 10.0.10.2/30 hängt aber an einer seperaten Bridge)
- unifi (CT) 192.168.0.20
- nextcloud (VM) 192.168.0.201
root@freenas[~]# ping 192.168.0.100
PING 192.168.0.100 (192.168.0.100): 56 data bytes
64 bytes from 192.168.0.100: icmp_seq=69 ttl=64 time=0.228 ms
^C
--- 192.168.0.100 ping statistics ---
547 packets transmitted, 1 packets received, 99.8% packet loss
round-trip min/avg/max/stddev = 0.22
Jo, ist für die Ferienbutze und Kabel geht wirklich nicht.@hominidae:
Du kannst die Interfaces alle einzeln konfigurieren und virtuelle Interfaces aufbauen.
Du bist also äußerst flexibel damit, dein Vorhaben mit Mikrotik APs umzusetzen.
Aber martingo hats ja schon geschrieben: Kabel bleibt Kabel. =)