thảo luận Cộng đồng người dùng MikroTik Router

Đang nghi do MTU nên mới chụp mỗi 2 cái ảnh đấy để hỏi.
Export cấu hình cả con này ra kiểu gì bạn?
Zô terminal, gõ export file=<tên file>, xong qua menu file, sẽ thấy file có đuôi src với tên như trên. Kéo file ra desktop, mở lên copy, xoá hết thông tin nhạy cảm rồi quăng lên đây ae chém cho nó đúng
 
Zô terminal, gõ export file=<tên file>, xong qua menu file, sẽ thấy file có đuôi src với tên như trên. Kéo file ra desktop, mở lên copy, xoá hết thông tin nhạy cảm rồi quăng lên đây ae chém cho nó đúng
Đây xem giúp m nhé
Code:
# may/20/2021 09:03:19 by RouterOS 6.48.2
# software id = 5Z18-6CDI
#
# model = 750GL
# serial number = xxxxx
/interface bridge
add admin-mac=D4:CA:6D:16:94:80 auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether2 ] name="ether2 - to 3rd floor"
set [ find default-name=ether3 ] name="ether3 - to 1st floor"
set [ find default-name=ether4 ] name="ether4 - wifi 2nd floor"
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 max-mru=1480 max-mtu=\
    1480 name=VNPT password=xxxxxxxx service-name=VNPT use-peer-dns=yes user=\
    tuthanhxx
/interface vlan
add interface=bridge name=iot vlan-id=68
add interface=bridge name=mgmt vlan-id=50
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=dhcp ranges=192.168.100.10-192.168.100.254
add name=vpn ranges=192.168.89.2-192.168.89.255
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/ppp profile
set *FFFFFFFE local-address=192.168.89.1 remote-address=vpn
/interface bridge port
add bridge=bridge comment=defconf interface="ether2 - to 3rd floor"
add bridge=bridge comment=defconf interface="ether3 - to 1st floor"
add bridge=bridge comment=defconf interface="ether4 - wifi t2"
add bridge=bridge comment=defconf interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface l2tp-server server
set enabled=yes ipsec-secret=xxxxx use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=VNPT list=WAN
/interface pptp-server server
set enabled=yes
/interface sstp-server server
set default-profile=default-encryption enabled=yes
/ip address
add address=192.168.100.1/24 comment=defconf interface=bridge network=\
    192.168.100.0
add address=192.168.50.1/24 interface=mgmt network=192.168.50.0
add address=192.168.68.1/24 interface=iot network=192.168.68.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server lease
add address=192.168.100.21 client-id=1:94:b4:f:c7:33:88 mac-address=\
    94:B4:0F:C7:33:88 server=defconf
add address=192.168.100.29 client-id=1:48:2:2e:1:4c:65 mac-address=\
    48:02:2E:01:4C:65 server=defconf
add address=192.168.100.58 client-id=1:fc:6b:f0:56:d3:5c mac-address=\
    FC:6B:F0:56:D3:5C server=defconf
add address=192.168.100.22 client-id=1:ec:35:86:c9:dc:e0 mac-address=\
    EC:35:86:C9:DC:E0 server=defconf
/ip dhcp-server network
add address=192.168.100.0/24 comment=defconf dns-server=8.8.8.8 gateway=\
    192.168.100.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip dns static
add address=192.168.100.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 \
    protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="allow pptp" dst-port=1723 protocol=tcp
add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-port=5001 in-interface=VNPT log=yes \
    protocol=tcp to-addresses=192.168.100.16 to-ports=5001
add action=dst-nat chain=dstnat dst-port=5000 in-interface=VNPT protocol=tcp \
    to-addresses=192.168.100.16 to-ports=5000
add action=dst-nat chain=dstnat dst-port=6690 in-interface=VNPT protocol=tcp \
    to-addresses=192.168.100.16 to-ports=6690
add action=dst-nat chain=dstnat dst-port=80 protocol=tcp to-addresses=\
    192.168.100.16 to-ports=80
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=\
    192.168.89.0/24
/ip service
set www port=8080
/ppp secret
add name=vpn password=xxxxxx
/system clock
set time-zone-name=Asia/Bangkok
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
 
Đây xem giúp m nhé
Code:
# may/20/2021 09:03:19 by RouterOS 6.48.2
# software id = 5Z18-6CDI
#
# model = 750GL
# serial number = xxxxx
/interface bridge
add admin-mac=D4:CA:6D:16:94:80 auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether2 ] name="ether2 - to 3rd floor"
set [ find default-name=ether3 ] name="ether3 - to 1st floor"
set [ find default-name=ether4 ] name="ether4 - wifi 2nd floor"
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 max-mru=1480 max-mtu=\
    1480 name=VNPT password=xxxxxxxx service-name=VNPT use-peer-dns=yes user=\
    tuthanhxx
/interface vlan
add interface=bridge name=iot vlan-id=68
add interface=bridge name=mgmt vlan-id=50
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/ip pool
add name=dhcp ranges=192.168.100.10-192.168.100.254
add name=vpn ranges=192.168.89.2-192.168.89.255
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/ppp profile
set *FFFFFFFE local-address=192.168.89.1 remote-address=vpn
/interface bridge port
add bridge=bridge comment=defconf interface="ether2 - to 3rd floor"
add bridge=bridge comment=defconf interface="ether3 - to 1st floor"
add bridge=bridge comment=defconf interface="ether4 - wifi t2"
add bridge=bridge comment=defconf interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface l2tp-server server
set enabled=yes ipsec-secret=xxxxx use-ipsec=yes
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
add interface=VNPT list=WAN
/interface pptp-server server
set enabled=yes
/interface sstp-server server
set default-profile=default-encryption enabled=yes
/ip address
add address=192.168.100.1/24 comment=defconf interface=bridge network=\
    192.168.100.0
add address=192.168.50.1/24 interface=mgmt network=192.168.50.0
add address=192.168.68.1/24 interface=iot network=192.168.68.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf interface=ether1
/ip dhcp-server lease
add address=192.168.100.21 client-id=1:94:b4:f:c7:33:88 mac-address=\
    94:B4:0F:C7:33:88 server=defconf
add address=192.168.100.29 client-id=1:48:2:2e:1:4c:65 mac-address=\
    48:02:2E:01:4C:65 server=defconf
add address=192.168.100.58 client-id=1:fc:6b:f0:56:d3:5c mac-address=\
    FC:6B:F0:56:D3:5C server=defconf
add address=192.168.100.22 client-id=1:ec:35:86:c9:dc:e0 mac-address=\
    EC:35:86:C9:DC:E0 server=defconf
/ip dhcp-server network
add address=192.168.100.0/24 comment=defconf dns-server=8.8.8.8 gateway=\
    192.168.100.1 netmask=24
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip dns static
add address=192.168.100.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 \
    protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 protocol=udp
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="allow pptp" dst-port=1723 protocol=tcp
add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat dst-port=5001 in-interface=VNPT log=yes \
    protocol=tcp to-addresses=192.168.100.16 to-ports=5001
add action=dst-nat chain=dstnat dst-port=5000 in-interface=VNPT protocol=tcp \
    to-addresses=192.168.100.16 to-ports=5000
add action=dst-nat chain=dstnat dst-port=6690 in-interface=VNPT protocol=tcp \
    to-addresses=192.168.100.16 to-ports=6690
add action=dst-nat chain=dstnat dst-port=80 protocol=tcp to-addresses=\
    192.168.100.16 to-ports=80
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=\
    192.168.89.0/24
/ip service
set www port=8080
/ppp secret
add name=vpn password=xxxxxx
/system clock
set time-zone-name=Asia/Bangkok
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
Xin tự gạch.
do cấu hình lỗi đoạn NAT port 80.
Thanks ae
 
1621524023356.png

Mấy bác cho em hỏi xíu, sao ở con modem nhà mạng e bridge mode để untag rồi, mà qua con Mik e tag vlan 35 quay PPPoE nó đách nhận nhỉ :(
 
Vì 750gr3 có throughput cho NAT có 450mbps thôi. 500 là nhiều rồi đó 😂🤣🤣😅
Cái e quan tâm là download còn upload thì kệ
Cơ mà test upload có lúc lên đc 550 600Mbps mà bác
Download thì không qua đc 300Mbps có lúc còn thọt xuống dưới 300Mbps
Chạy từng đường một down toàn 320 330 Mbps
 
Cái e quan tâm là download còn upload thì kệ
Cơ mà test upload có lúc lên đc 550 600Mbps mà bác
Download thì không qua đc 300Mbps có lúc còn thọt xuống dưới 300Mbps
Chạy từng đường một down toàn 320 330 Mbps
Lâu lâu nó thọt lên thôi chứ k lên hoài dc đâu. Con Hex nó có nhiêu đó hà. Upload hay download thì như nhau. Muốn lên full thì lên rb4011 nhé 🤣🤣🤣
 
ủa vậy là speed tối đa con 750gr3 này hỗ trợ có 450Mbps thôi hả bác?

muốn hơn thì bật fasttrack

Code:
/ip firewall filter add chain=forward action=fasttrack-connection connection-state=established,related
/ip firewall filter add chain=forward action=accept connection-state=established,related
 
muốn hơn thì bật fasttrack

Code:
/ip firewall filter add chain=forward action=fasttrack-connection connection-state=established,related
/ip firewall filter add chain=forward action=accept connection-state=established,related
Con đấy chip cùi, ít xèng quất AC2, nhìu xèng lên hẳn 4011 cho nó ngon :sexy_girl:
 
Back
Top