Thats what I thought until I realized the connections are to google's ip
space.

On Thu, Dec 18, 2014 at 3:02 AM, Christian Palecek <[email protected]>
wrote:
>
> Canon software looking for printer?  If their internal network isn't on
> the same subnet 192.168.1.0/24 then it'll pass on to the default route.
>
>
> Christian Palecek
> Network Administrator
> Cybernet Inc.
> Hamilton, MT
>
>
> -------- Original message --------
> From: RickG <[email protected]>
> Date:12/18/2014 12:06 AM (GMT-07:00)
> To: Mikrotik Users <[email protected]>
> Subject: Re: [Mikrotik Users] non-routable ip connection
>
> Scott, Not to argue but if that is the case why, with hundreds of
> customers don't I see a lot more 192.1.x.x caught by the script? I'm only
> seeing one address caught in the SPAM script and only 4 addys on the
> connection list. Also, I'd love to know how I can recreate this scenario on
> the bench?
>
> On Wed, Dec 17, 2014 at 6:51 PM, Scott Reed <[email protected]> wrote:
>>
>>  Customer router sends packet from 192.1.x.x to your CPE.  Default route
>> sends it on until it got caught by Butch's script.
>> Being in router mode ends broadcast domain, not what unicast packets get
>> sent on.
>>
>>
>> On 12/17/2014 6:23 PM, RickG wrote:
>>
>> My CPE are in router mode in order to prevent that.
>>
>> On Wed, Dec 17, 2014 at 5:27 PM, Scott Reed <[email protected]> wrote:
>>>
>>>  Customer connected router incorrectly?
>>>
>>> On 12/17/2014 5:06 PM, RickG wrote:
>>>
>>> Hey folks! I'm running Butch's QOS & Firewall. I noticed an several
>>> 192.168.1.x IP addresses being caught by the SPAM filter (see attached
>>> screen captures). I'm not routing that subnet. Any ideas how it getting
>>> through to the firewall?
>>>
>>>  -RickG KyWiFi
>>>
>>>
>>>  _______________________________________________
>>> Mikrotik-users mailing 
>>> [email protected]http://lists.wispa.org/mailman/listinfo/mikrotik-users
>>>
>>>
>>>
>>> No virus found in this message.
>>> Checked by AVG - www.avg.com
>>> Version: 2015.0.5577 / Virus Database: 4253/8753 - Release Date: 12/17/14
>>>
>>>
>>> --
>>> Scott Reed
>>> Owner
>>> NewWays Networking, LLC
>>> Wireless Networking
>>> Network Design, Installation and Administration
>>> Mikrotik Advanced Certifiedwww.nwwnet.net
>>> (765) 855-1060  (765) 439-4253  Toll-free (855) 231-6239
>>>
>>>
>>> _______________________________________________
>>> Mikrotik-users mailing list
>>> [email protected]
>>> http://lists.wispa.org/mailman/listinfo/mikrotik-users
>>>
>>>
>>
>>  --
>> -RickG KyWiFi
>>
>>
>> _______________________________________________
>> Mikrotik-users mailing 
>> [email protected]http://lists.wispa.org/mailman/listinfo/mikrotik-users
>>
>>
>>
>> No virus found in this message.
>> Checked by AVG - www.avg.com
>> Version: 2015.0.5577 / Virus Database: 4253/8753 - Release Date: 12/17/14
>>
>>
>> --
>> Scott Reed
>> Owner
>> NewWays Networking, LLC
>> Wireless Networking
>> Network Design, Installation and Administration
>> Mikrotik Advanced Certifiedwww.nwwnet.net
>> (765) 855-1060  (765) 439-4253  Toll-free (855) 231-6239
>>
>>
>> _______________________________________________
>> Mikrotik-users mailing list
>> [email protected]
>> http://lists.wispa.org/mailman/listinfo/mikrotik-users
>>
>>
>
> --
> -RickG KyWiFi
>
> _______________________________________________
> Mikrotik-users mailing list
> [email protected]
> http://lists.wispa.org/mailman/listinfo/mikrotik-users
>
>

-- 
-RickG KyWiFi
_______________________________________________
Mikrotik-users mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/mikrotik-users

Reply via email to