You can try and put that 192.168 ip on a loopback and then traceroute to it. If you cant see were it goes because your bridged all the way then set up a ping and then torch each port along the way till you find where it’s at.
Justin Miller VA SkyWire, LLC 1707 E Main St Richmond, VA 23223 Office: (804) 521-4212 Desk: (804) 591-0500 ext 101 Fax: (804) 591-1559 [email protected] <mailto:[email protected]> > On Dec 18, 2014, at 11:31 AM, RickG <[email protected]> wrote: > > Thats what I thought until I realized the connections are to google's ip > space. > > On Thu, Dec 18, 2014 at 3:02 AM, Christian Palecek <[email protected] > <mailto:[email protected]>> wrote: > Canon software looking for printer? If their internal network isn't on the > same subnet 192.168.1.0/24 <http://192.168.1.0/24> then it'll pass on to the > default route. > > > Christian Palecek > Network Administrator > Cybernet Inc. > Hamilton, MT > > > -------- Original message -------- > From: RickG <[email protected] <mailto:[email protected]>> > Date:12/18/2014 12:06 AM (GMT-07:00) > To: Mikrotik Users <[email protected] > <mailto:[email protected]>> > Subject: Re: [Mikrotik Users] non-routable ip connection > > Scott, Not to argue but if that is the case why, with hundreds of customers > don't I see a lot more 192.1.x.x caught by the script? I'm only seeing one > address caught in the SPAM script and only 4 addys on the connection list. > Also, I'd love to know how I can recreate this scenario on the bench? > > On Wed, Dec 17, 2014 at 6:51 PM, Scott Reed <[email protected] > <mailto:[email protected]>> wrote: > Customer router sends packet from 192.1.x.x to your CPE. Default route sends > it on until it got caught by Butch's script. > Being in router mode ends broadcast domain, not what unicast packets get sent > on. > > > On 12/17/2014 6:23 PM, RickG wrote: >> My CPE are in router mode in order to prevent that. >> >> On Wed, Dec 17, 2014 at 5:27 PM, Scott Reed <[email protected] >> <mailto:[email protected]>> wrote: >> Customer connected router incorrectly? >> >> On 12/17/2014 5:06 PM, RickG wrote: >>> Hey folks! I'm running Butch's QOS & Firewall. I noticed an several >>> 192.168.1.x IP addresses being caught by the SPAM filter (see attached >>> screen captures). I'm not routing that subnet. Any ideas how it getting >>> through to the firewall? >>> >>> -RickG KyWiFi >>> >>> >>> _______________________________________________ >>> Mikrotik-users mailing list >>> [email protected] <mailto:[email protected]> >>> http://lists.wispa.org/mailman/listinfo/mikrotik-users >>> <http://lists.wispa.org/mailman/listinfo/mikrotik-users> >>> >>> >>> No virus found in this message. >>> Checked by AVG - www.avg.com <http://www.avg.com/> >>> Version: 2015.0.5577 / Virus Database: 4253/8753 - Release Date: 12/17/14 >>> >> >> -- >> Scott Reed >> Owner >> NewWays Networking, LLC >> Wireless Networking >> Network Design, Installation and Administration >> Mikrotik Advanced Certified >> www.nwwnet.net <http://www.nwwnet.net/> >> (765) 855-1060 (765) 439-4253 Toll-free (855) 231-6239 >> >> _______________________________________________ >> Mikrotik-users mailing list >> [email protected] <mailto:[email protected]> >> http://lists.wispa.org/mailman/listinfo/mikrotik-users >> <http://lists.wispa.org/mailman/listinfo/mikrotik-users> >> >> >> >> -- >> -RickG KyWiFi >> >> >> _______________________________________________ >> Mikrotik-users mailing list >> [email protected] <mailto:[email protected]> >> http://lists.wispa.org/mailman/listinfo/mikrotik-users >> <http://lists.wispa.org/mailman/listinfo/mikrotik-users> >> >> >> No virus found in this message. >> Checked by AVG - www.avg.com <http://www.avg.com/> >> Version: 2015.0.5577 / Virus Database: 4253/8753 - Release Date: 12/17/14 >> > > -- > Scott Reed > Owner > NewWays Networking, LLC > Wireless Networking > Network Design, Installation and Administration > Mikrotik Advanced Certified > www.nwwnet.net <http://www.nwwnet.net/> > (765) 855-1060 (765) 439-4253 Toll-free (855) 231-6239 > > _______________________________________________ > Mikrotik-users mailing list > [email protected] <mailto:[email protected]> > http://lists.wispa.org/mailman/listinfo/mikrotik-users > <http://lists.wispa.org/mailman/listinfo/mikrotik-users> > > > > -- > -RickG KyWiFi > > _______________________________________________ > Mikrotik-users mailing list > [email protected] <mailto:[email protected]> > http://lists.wispa.org/mailman/listinfo/mikrotik-users > <http://lists.wispa.org/mailman/listinfo/mikrotik-users> > > > > -- > -RickG KyWiFi > _______________________________________________ > Mikrotik-users mailing list > [email protected] > http://lists.wispa.org/mailman/listinfo/mikrotik-users
_______________________________________________ Mikrotik-users mailing list [email protected] http://lists.wispa.org/mailman/listinfo/mikrotik-users
