You can try and put that 192.168 ip on a loopback and then traceroute to it. If 
you cant see were it goes because your bridged all the way then set up a ping 
and then torch each port along the way till you find where it’s at.

Justin Miller

 VA SkyWire, LLC
 1707 E Main St
 Richmond, VA 23223
 Office: (804) 521-4212
 Desk: (804) 591-0500 ext 101
 Fax: (804) 591-1559
 [email protected] <mailto:[email protected]>
> On Dec 18, 2014, at 11:31 AM, RickG <[email protected]> wrote:
> 
> Thats what I thought until I realized the connections are to google's ip 
> space.
> 
> On Thu, Dec 18, 2014 at 3:02 AM, Christian Palecek <[email protected] 
> <mailto:[email protected]>> wrote:
> Canon software looking for printer?  If their internal network isn't on the 
> same subnet 192.168.1.0/24 <http://192.168.1.0/24> then it'll pass on to the 
> default route.
> 
> 
> Christian Palecek
> Network Administrator
> Cybernet Inc.
> Hamilton, MT
> 
> 
> -------- Original message --------
> From: RickG <[email protected] <mailto:[email protected]>> 
> Date:12/18/2014 12:06 AM (GMT-07:00) 
> To: Mikrotik Users <[email protected] 
> <mailto:[email protected]>> 
> Subject: Re: [Mikrotik Users] non-routable ip connection 
> 
> Scott, Not to argue but if that is the case why, with hundreds of customers 
> don't I see a lot more 192.1.x.x caught by the script? I'm only seeing one 
> address caught in the SPAM script and only 4 addys on the connection list. 
> Also, I'd love to know how I can recreate this scenario on the bench?
> 
> On Wed, Dec 17, 2014 at 6:51 PM, Scott Reed <[email protected] 
> <mailto:[email protected]>> wrote:
> Customer router sends packet from 192.1.x.x to your CPE.  Default route sends 
> it on until it got caught by Butch's script.
> Being in router mode ends broadcast domain, not what unicast packets get sent 
> on.
> 
> 
> On 12/17/2014 6:23 PM, RickG wrote:
>> My CPE are in router mode in order to prevent that.
>> 
>> On Wed, Dec 17, 2014 at 5:27 PM, Scott Reed <[email protected] 
>> <mailto:[email protected]>> wrote:
>> Customer connected router incorrectly?
>> 
>> On 12/17/2014 5:06 PM, RickG wrote:
>>> Hey folks! I'm running Butch's QOS & Firewall. I noticed an several 
>>> 192.168.1.x IP addresses being caught by the SPAM filter (see attached 
>>> screen captures). I'm not routing that subnet. Any ideas how it getting 
>>> through to the firewall? 
>>> 
>>> -RickG KyWiFi
>>> 
>>> 
>>>  _______________________________________________
>>> Mikrotik-users mailing list
>>> [email protected] <mailto:[email protected]>
>>> http://lists.wispa.org/mailman/listinfo/mikrotik-users 
>>> <http://lists.wispa.org/mailman/listinfo/mikrotik-users>
>>> 
>>> 
>>> No virus found in this message.
>>> Checked by AVG - www.avg.com <http://www.avg.com/>
>>> Version: 2015.0.5577 / Virus Database: 4253/8753 - Release Date: 12/17/14
>>> 
>> 
>> -- 
>> Scott Reed
>> Owner
>> NewWays Networking, LLC
>> Wireless Networking
>> Network Design, Installation and Administration
>> Mikrotik Advanced Certified
>> www.nwwnet.net <http://www.nwwnet.net/>
>> (765) 855-1060  (765) 439-4253  Toll-free (855) 231-6239
>> 
>> _______________________________________________
>> Mikrotik-users mailing list
>> [email protected] <mailto:[email protected]>
>> http://lists.wispa.org/mailman/listinfo/mikrotik-users 
>> <http://lists.wispa.org/mailman/listinfo/mikrotik-users>
>> 
>> 
>> 
>> -- 
>> -RickG KyWiFi
>> 
>> 
>> _______________________________________________
>> Mikrotik-users mailing list
>> [email protected] <mailto:[email protected]>
>> http://lists.wispa.org/mailman/listinfo/mikrotik-users 
>> <http://lists.wispa.org/mailman/listinfo/mikrotik-users>
>> 
>> 
>> No virus found in this message.
>> Checked by AVG - www.avg.com <http://www.avg.com/>
>> Version: 2015.0.5577 / Virus Database: 4253/8753 - Release Date: 12/17/14
>> 
> 
> -- 
> Scott Reed
> Owner
> NewWays Networking, LLC
> Wireless Networking
> Network Design, Installation and Administration
> Mikrotik Advanced Certified
> www.nwwnet.net <http://www.nwwnet.net/>
> (765) 855-1060  (765) 439-4253  Toll-free (855) 231-6239
> 
> _______________________________________________
> Mikrotik-users mailing list
> [email protected] <mailto:[email protected]>
> http://lists.wispa.org/mailman/listinfo/mikrotik-users 
> <http://lists.wispa.org/mailman/listinfo/mikrotik-users>
> 
> 
> 
> -- 
> -RickG KyWiFi
> 
> _______________________________________________
> Mikrotik-users mailing list
> [email protected] <mailto:[email protected]>
> http://lists.wispa.org/mailman/listinfo/mikrotik-users 
> <http://lists.wispa.org/mailman/listinfo/mikrotik-users>
> 
> 
> 
> -- 
> -RickG KyWiFi
> _______________________________________________
> Mikrotik-users mailing list
> [email protected]
> http://lists.wispa.org/mailman/listinfo/mikrotik-users

_______________________________________________
Mikrotik-users mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/mikrotik-users

Reply via email to