I have 6.19 certified in my network (and I run my SIP through it)

However 6.12 is also popular.

Regards
Alexander

Alexander Neilson
Neilson Productions Limited

[email protected]
021 329 681
022 456 2326

> On 30/01/2015, at 1:39 pm, Scott Reed <[email protected]> wrote:
> 
> I don't remember if 6.5 is stable.  I would move to 6.12.
> I don't think that will fix the problem, but should make a more stable router.
> 
> On 1/29/2015 7:25 PM, Casey Mills wrote:
>> Running version 6.5 on a RB2011.
>> 
>> I did reboot just a few minutes ago, no change.
>> 
>> The connection table should clear on a reboot right?
>> 
>> I really appreciate your suggestions! It is great to have someone to bounce
>> idea off of.
>> 
>> Casey
>> 
>> 
>> 
>> 
>> *********** Firewall Rules ****************
>> /ip firewall connection tracking
>> set enabled=yes
>> /ip firewall filter
>> add chain=input comment="Allow all local traffic in"
>> in-interface=bridge-local
>> add chain=input comment="Allow all pings" protocol=icmp
>> add chain=input comment="default configuration" connection-state=established
>> add chain=input comment="default configuration" connection-state=related
>> add action=drop chain=input comment="SSH Brute Force Rule01" dst-port=22
>> protocol=tcp src-address-list=ssh_blacklist
>> add action=add-src-to-address-list address-list=ssh_blacklist
>> address-list-timeout=8w4d chain=input comment="SSH Brute Force Rule02"
>> connection-state=new dst-port=22 protocol=tcp src-address-list=ssh_stage3
>> add action=add-src-to-address-list address-list=ssh_stage3
>> address-list-timeout=1m chain=input comment="SSH Brute Force Rule03"
>> connection-state=new dst-port=22 protocol=tcp src-address-list=ssh_stage2
>> add action=add-src-to-address-list address-list=ssh_stage2
>> address-list-timeout=1m chain=input comment="SSH Brute Force Rule04"
>> connection-state=new dst-port=22 protocol=tcp src-address-list=ssh_stage1
>> add action=add-src-to-address-list address-list=ssh_stage1
>> address-list-timeout=1m chain=input comment="SSH Brute Force Rule05"
>> connection-state=new dst-port=22 protocol=tcp
>> add chain=input comment="Open SSH Port" dst-port=22
>> in-interface=ether1-gateway protocol=tcp
>> add action=drop chain=input comment="Drop all other traffic coming from
>> Internet" in-interface=ether1-gateway
>> add chain=forward comment="default configuration"
>> connection-state=established
>> add chain=forward comment="default configuration" connection-state=related
>> add action=drop chain=forward comment="default configuration"
>> connection-state=invalid
>> /ip firewall nat
>> add action=masquerade chain=srcnat comment=Hairpin-Test src-address=
>> 192.168.55.0/24
>> add action=dst-nat chain=dstnat comment=Foscam-1 dst-port=8080 protocol=tcp
>> to-addresses=192.168.55.200 to-ports=8080
>> add action=dst-nat chain=dstnat comment=Foscam-2 dst-port=8081 protocol=tcp
>> to-addresses=192.168.55.201 to-ports=8081
>> add action=dst-nat chain=dstnat comment=IX2 dst-port=80
>> in-interface=ether1-gateway protocol=tcp to-addresses=192.168.55.54
>> to-ports=80
>> add action=dst-nat chain=dstnat comment=IX2 dst-port=443
>> in-interface=ether1-gateway protocol=tcp to-addresses=192.168.55.54
>> to-ports=443
>> add action=dst-nat chain=dstnat comment=IX2 dst-port=50500 protocol=tcp
>> to-addresses=192.168.55.54 to-ports=50500
>> add action=dst-nat chain=dstnat comment="IX2 FTP" dst-port=21 protocol=tcp
>> to-addresses=192.168.55.54 to-ports=21
>> add action=dst-nat chain=dstnat comment=Casey7-RDP dst-port=3389
>> protocol=tcp to-addresses=192.168.55.52 to-ports=3389
>> add action=dst-nat chain=dstnat comment=HTPC7-Plex dst-port=32400
>> protocol=tcp to-addresses=192.168.55.50 to-ports=32400
>> add action=dst-nat chain=dstnat comment=HTPC7-CetonApp dst-port=5832
>> protocol=tcp to-addresses=192.168.55.50 to-ports=5832
>> add action=dst-nat chain=dstnat comment=VOIP dst-port=5060 protocol=tcp
>> to-addresses=192.168.55.55 to-ports=5060
>> add action=dst-nat chain=dstnat comment=VOIP dst-port=5060 protocol=udp
>> to-addresses=192.168.55.55 to-ports=5060
>> add action=dst-nat chain=dstnat comment=VOIP dst-port=5061 protocol=udp
>> to-addresses=192.168.55.55 to-ports=5061
>> add action=dst-nat chain=dstnat comment=VOIP dst-port=5061 protocol=tcp
>> to-addresses=192.168.55.55 to-ports=5061
>> add action=dst-nat chain=dstnat comment=VOIP dst-port=10000-20000
>> protocol=udp to-addresses=192.168.55.55 to-ports=10000-20000
>> /ip firewall service-port
>> set sip disabled=yes
>> ***********************************************************************
>> 
>> On Thu, Jan 29, 2015 at 7:07 PM, Alexander Neilson <[email protected]
>>> wrote:
>>> You would still see it leaving your interface if the upstream was blocking
>>> it.
>>> 
>>> Can you post privatised firewall rules etc so we can see what you have in
>>> place?
>>> 
>>> What software version are you running?
>>> 
>>> Have you rebooted after changes? Cleared your connections table? There is
>>> a bug where firewall rule changes don't take effect until a reboot. Also if
>>> an existing connection in the contrac table then no matter the change it
>>> won't be reflected until that connection has cleared.
>>> 
>>> Like others I run asterisk sip servers through mikrotiks so I know it
>>> works. Just trying to find issues.
>>> 
>>> Regards
>>> 
>>> Alexander
>>> 
>>> Alexander Neilson
>>> Neilson Productions Ltd
>>> [email protected]
>>> 021 329 681
>>> 
>>>> On 30/01/2015, at 12:48 pm, Casey Mills <[email protected]> wrote:
>>>> 
>>>> I'm using my Android phone as one of the extensions. This works from
>>> inside
>>>> and outside my network. But connecting to the SIP trunk with the FreePBX
>>>> box is not working. In torch I can see the traffic getting to the local
>>>> bridge. But that traffic is not making it out the WAN port. I am able to
>>>> ping both SIP provider servers.
>>>> 
>>>> I have watched the counters in my filter rules and NAT, I can't find
>>> where
>>>> the traffic is stopping.
>>>> 
>>>> Comcast is my upstream, they could be blocking it but they are minding
>>>> their Ps and Qs trying to get the Time Warner merger approved.
>>>> 
>>>> Casey
>>>> 
>>>>> On Thu, Jan 29, 2015 at 6:34 PM, Scott Reed <[email protected]> wrote:
>>>>> 
>>>>> All of our phones are FreePBX through Mikrotiks ( several to get out to
>>>>> the Internet and I don't recall doing anything special to get them to
>>> work.
>>>>> Do the normal network stuff, traceroute, etc.  Make sure you have
>>>>> connectivity.
>>>>> Any chance your upstream is blocking SIP traffic?
>>>>> 
>>>>> 
>>>>>> On 1/29/2015 5:21 PM, Casey Mills wrote:
>>>>>> 
>>>>>> I setup a FreePBX server and wanted to test a few SIP trunking
>>> services.
>>>>>> The SIP packets are not making it through the router from the inside
>>> of my
>>>>>> network. I thought it might be a fluke with the first provider, so I
>>>>>> signed
>>>>>> up with a second. Same result.
>>>>>> 
>>>>>> I simply can not figure out why they aren't making it through. My
>>> leading
>>>>>> theory is FreePBX/Asterisk is changing the packet IP address, somehow
>>>>>> making it invalid. But I have tried setting the IP of the server to the
>>>>>> internal and external IP.
>>>>>> 
>>>>>> I am able to use an app on my phone and connect to the server from
>>> outside
>>>>>> of the network. Utilizing the dst-nat forwarding.
>>>>>> 
>>>>>> Any ideas on where to start?
>>>>>> 
>>>>>> Casey
>>>>>> -------------- next part --------------
>>>>>> An HTML attachment was scrubbed...
>>>>>> URL: <http://mail.butchevans.com/pipermail/mikrotik/
>>>>>> attachments/20150129/f155ae1c/attachment.html>
>>>>>> _______________________________________________
>>>>>> Mikrotik mailing list
>>>>>> [email protected]
>>>>>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>>>>>> 
>>>>>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
>>>>>> RouterOS
>>>>>> 
>>>>>> 
>>>>>> -----
>>>>>> No virus found in this message.
>>>>>> Checked by AVG - www.avg.com
>>>>>> Version: 2015.0.5646 / Virus Database: 4273/9019 - Release Date:
>>> 01/29/15
>>>>> --
>>>>> Scott Reed
>>>>> Owner
>>>>> NewWays Networking, LLC
>>>>> Wireless Networking
>>>>> Network Design, Installation and Administration
>>>>> Mikrotik Advanced Certified
>>>>> www.nwwnet.net
>>>>> (765) 855-1060  (765) 439-4253  Toll-free (855) 231-6239
>>>>> 
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> Mikrotik mailing list
>>>>> [email protected]
>>>>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>>>>> 
>>>>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
>>>>> RouterOS
>>>> -------------- next part --------------
>>>> An HTML attachment was scrubbed...
>>>> URL: <
>>> http://mail.butchevans.com/pipermail/mikrotik/attachments/20150129/81f51003/attachment.html
>>>> _______________________________________________
>>>> Mikrotik mailing list
>>>> [email protected]
>>>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>>>> 
>>>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
>>> RouterOS
>>> _______________________________________________
>>> Mikrotik mailing list
>>> [email protected]
>>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>>> 
>>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
>>> RouterOS
>>> 
>> -------------- next part --------------
>> An HTML attachment was scrubbed...
>> URL: 
>> <http://mail.butchevans.com/pipermail/mikrotik/attachments/20150129/37050877/attachment.html>
>> _______________________________________________
>> Mikrotik mailing list
>> [email protected]
>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>> 
>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS
>> 
>> 
>> -----
>> No virus found in this message.
>> Checked by AVG - www.avg.com
>> Version: 2015.0.5646 / Virus Database: 4273/9022 - Release Date: 01/29/15
>> 
>> 
> 
> -- 
> Scott Reed
> Owner
> NewWays Networking, LLC
> Wireless Networking
> Network Design, Installation and Administration
> Mikrotik Advanced Certified
> www.nwwnet.net
> (765) 855-1060  (765) 439-4253  Toll-free (855) 231-6239
> 
> 
> _______________________________________________
> Mikrotik mailing list
> [email protected]
> http://mail.butchevans.com/mailman/listinfo/mikrotik
> 
> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

_______________________________________________
Mikrotik mailing list
[email protected]
http://mail.butchevans.com/mailman/listinfo/mikrotik

Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

Reply via email to