Thats what I thought until I realized the connections are to google's ip space.
On Thu, Dec 18, 2014 at 3:02 AM, Christian Palecek <[email protected]> wrote: > > Canon software looking for printer? If their internal network isn't on > the same subnet 192.168.1.0/24 then it'll pass on to the default route. > > > Christian Palecek > Network Administrator > Cybernet Inc. > Hamilton, MT > > > -------- Original message -------- > From: RickG <[email protected]> > Date:12/18/2014 12:06 AM (GMT-07:00) > To: Mikrotik Users <[email protected]> > Subject: Re: [Mikrotik Users] non-routable ip connection > > Scott, Not to argue but if that is the case why, with hundreds of > customers don't I see a lot more 192.1.x.x caught by the script? I'm only > seeing one address caught in the SPAM script and only 4 addys on the > connection list. Also, I'd love to know how I can recreate this scenario on > the bench? > > On Wed, Dec 17, 2014 at 6:51 PM, Scott Reed <[email protected]> wrote: >> >> Customer router sends packet from 192.1.x.x to your CPE. Default route >> sends it on until it got caught by Butch's script. >> Being in router mode ends broadcast domain, not what unicast packets get >> sent on. >> >> >> On 12/17/2014 6:23 PM, RickG wrote: >> >> My CPE are in router mode in order to prevent that. >> >> On Wed, Dec 17, 2014 at 5:27 PM, Scott Reed <[email protected]> wrote: >>> >>> Customer connected router incorrectly? >>> >>> On 12/17/2014 5:06 PM, RickG wrote: >>> >>> Hey folks! I'm running Butch's QOS & Firewall. I noticed an several >>> 192.168.1.x IP addresses being caught by the SPAM filter (see attached >>> screen captures). I'm not routing that subnet. Any ideas how it getting >>> through to the firewall? >>> >>> -RickG KyWiFi >>> >>> >>> _______________________________________________ >>> Mikrotik-users mailing >>> [email protected]http://lists.wispa.org/mailman/listinfo/mikrotik-users >>> >>> >>> >>> No virus found in this message. >>> Checked by AVG - www.avg.com >>> Version: 2015.0.5577 / Virus Database: 4253/8753 - Release Date: 12/17/14 >>> >>> >>> -- >>> Scott Reed >>> Owner >>> NewWays Networking, LLC >>> Wireless Networking >>> Network Design, Installation and Administration >>> Mikrotik Advanced Certifiedwww.nwwnet.net >>> (765) 855-1060 (765) 439-4253 Toll-free (855) 231-6239 >>> >>> >>> _______________________________________________ >>> Mikrotik-users mailing list >>> [email protected] >>> http://lists.wispa.org/mailman/listinfo/mikrotik-users >>> >>> >> >> -- >> -RickG KyWiFi >> >> >> _______________________________________________ >> Mikrotik-users mailing >> [email protected]http://lists.wispa.org/mailman/listinfo/mikrotik-users >> >> >> >> No virus found in this message. >> Checked by AVG - www.avg.com >> Version: 2015.0.5577 / Virus Database: 4253/8753 - Release Date: 12/17/14 >> >> >> -- >> Scott Reed >> Owner >> NewWays Networking, LLC >> Wireless Networking >> Network Design, Installation and Administration >> Mikrotik Advanced Certifiedwww.nwwnet.net >> (765) 855-1060 (765) 439-4253 Toll-free (855) 231-6239 >> >> >> _______________________________________________ >> Mikrotik-users mailing list >> [email protected] >> http://lists.wispa.org/mailman/listinfo/mikrotik-users >> >> > > -- > -RickG KyWiFi > > _______________________________________________ > Mikrotik-users mailing list > [email protected] > http://lists.wispa.org/mailman/listinfo/mikrotik-users > > -- -RickG KyWiFi
_______________________________________________ Mikrotik-users mailing list [email protected] http://lists.wispa.org/mailman/listinfo/mikrotik-users
