Because only one customer has the router plugged in incorrectly.

Setup a SOHO router and a CPE. Plug the CPE into port 1, not the WAN/Internet port, port 1. Plug a PC into port 2. Try getting a web site. Normally, you are correct, you won't see it on the other side of the CPE, but occasionally we see the Unicast traffic get passed through.

On 12/18/2014 2:06 AM, RickG wrote:
Scott, Not to argue but if that is the case why, with hundreds of customers don't I see a lot more 192.1.x.x caught by the script? I'm only seeing one address caught in the SPAM script and only 4 addys on the connection list. Also, I'd love to know how I can recreate this scenario on the bench?

On Wed, Dec 17, 2014 at 6:51 PM, Scott Reed <[email protected] <mailto:[email protected]>> wrote:

    Customer router sends packet from 192.1.x.x to your CPE.  Default
    route sends it on until it got caught by Butch's script.
    Being in router mode ends broadcast domain, not what unicast
    packets get sent on.


    On 12/17/2014 6:23 PM, RickG wrote:
    My CPE are in router mode in order to prevent that.

    On Wed, Dec 17, 2014 at 5:27 PM, Scott Reed <[email protected]
    <mailto:[email protected]>> wrote:

        Customer connected router incorrectly?

        On 12/17/2014 5:06 PM, RickG wrote:
        Hey folks! I'm running Butch's QOS & Firewall. I noticed an
        several 192.168.1.x IP addresses being caught by the SPAM
        filter (see attached screen captures). I'm not routing that
        subnet. Any ideas how it getting through to the firewall?

        -RickG KyWiFi


        _______________________________________________
        Mikrotik-users mailing list
        [email protected]  <mailto:[email protected]>
        http://lists.wispa.org/mailman/listinfo/mikrotik-users


        No virus found in this message.
        Checked by AVG - www.avg.com <http://www.avg.com>
        Version: 2015.0.5577 / Virus Database: 4253/8753 - Release
        Date: 12/17/14


-- Scott Reed
        Owner
        NewWays Networking, LLC
        Wireless Networking
        Network Design, Installation and Administration
        Mikrotik Advanced Certified
        www.nwwnet.net  <http://www.nwwnet.net>
        (765) 855-1060  (765) 439-4253  Toll-free (855) 231-6239


        _______________________________________________
        Mikrotik-users mailing list
        [email protected] <mailto:[email protected]>
        http://lists.wispa.org/mailman/listinfo/mikrotik-users



-- -RickG KyWiFi


    _______________________________________________
    Mikrotik-users mailing list
    [email protected]  <mailto:[email protected]>
    http://lists.wispa.org/mailman/listinfo/mikrotik-users


    No virus found in this message.
    Checked by AVG - www.avg.com <http://www.avg.com>
    Version: 2015.0.5577 / Virus Database: 4253/8753 - Release Date:
    12/17/14


-- Scott Reed
    Owner
    NewWays Networking, LLC
    Wireless Networking
    Network Design, Installation and Administration
    Mikrotik Advanced Certified
    www.nwwnet.net  <http://www.nwwnet.net>
    (765) 855-1060  (765) 439-4253  Toll-free (855) 231-6239


    _______________________________________________
    Mikrotik-users mailing list
    [email protected] <mailto:[email protected]>
    http://lists.wispa.org/mailman/listinfo/mikrotik-users



--
-RickG KyWiFi


_______________________________________________
Mikrotik-users mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/mikrotik-users


No virus found in this message.
Checked by AVG - www.avg.com <http://www.avg.com>
Version: 2015.0.5577 / Virus Database: 4253/8756 - Release Date: 12/17/14


--
Scott Reed
Owner
NewWays Networking, LLC
Wireless Networking
Network Design, Installation and Administration
Mikrotik Advanced Certified
www.nwwnet.net
(765) 855-1060  (765) 439-4253  Toll-free (855) 231-6239

_______________________________________________
Mikrotik-users mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/mikrotik-users

Reply via email to