So, 216.168.46.0/24 is masqueraded and 209.90.234.1/28 is NOT masqueraded
by the rule with "src-address=10.0.1.0/24"? Isn't that a kind of magic?..

Have you tried the rules from my first answer?

--
Подпись:
(добавляется в конце всех исходящих писем)

2015-07-04 4:44 GMT+03:00 D. Ryan Spott <[email protected]>:

> That is correct. It is disabled. When this is enabled then
> 216.168.46.0/24 and 10.0.1.0/24 are BOTH masqueraded via 209.90.234.1.
>
> The behavior I want is:
> 10.0.1.0/24 to masquerade via 209.90.234.1.
> 216.168.46.0/24 to simply route as usual.
>
> ryan
>
>
> On 7/3/15 6:34 PM, Chupaka wrote:
>
>> "disabled=yes" huh?..
>> 4 Июл 2015 г. 2:04 пользователь "D. Ryan Spott" <[email protected]>
>> написал:
>>
>>> This might help:
>>>
>>> A diagram
>>>
>>>
>>>
>>> The export of the config:
>>>
>>> ...
>>>
>>> /interface bridge port
>>> add bridge=LAN interface=ether2
>>> add bridge=LAN interface=ether3
>>> add bridge=LAN interface=ether4
>>> add bridge=WAN interface=ether1
>>>
>>> /ip address
>>> add address=209.90.234.1/28 interface=WAN network=209.90.234.0
>>> add address=216.168.46.1/28 interface=LAN network=216.168.46.0
>>> add address=10.0.1.1/28 interface=LAN network=10.0.1.0
>>>
>>> ...
>>>
>>> /ip firewall nat
>>> add action=masquerade chain=srcnat disabled=yes out-interface=WAN \
>>>      src-address=10.0.1.0/24
>>> /ip route
>>>
>>> No DHCP server, no hotspot, no crazy firewall filters.
>>>
>>>
>>> ryan
>>>
>>> On 7/3/15 2:05 PM, Scott Lambert wrote:
>>>
>>>> That rule is not natting your 216.168.46.0/24 <http://216.168.46.0/24>
>>>>
>>> traffic, barring a major bug in RouterOS. Something else may be, but not
>> that rule as shown here.
>>
>>>
>>>> "/ip firewall nat export" and show the command you typed all the way
>>>>
>>> through the next command prompt.
>>
>>> Also let us know your RouterOS version.
>>>>
>>>> On July 3, 2015 11:49:33 AM CDT, "D. Ryan Spott" <[email protected]>
>>>>
>>> wrote:
>>
>>>      I have the following network:
>>>>
>>>>      <internet>-<router>-<ISP Network>
>>>>
>>>>      The router has a WAN IP of 209.90.234.1/28
>>>>      The router has a LAN IP of 216.168.46.0/24
>>>>      The router has a LAN IP of 10.0.1.0/24
>>>>
>>>>      When I enable this:
>>>>      /ip firewall nat
>>>>      add action=masquerade chain=srcnat out-interface=WAN
>>>>      src-address=10.0.1.0/24
>>>>
>>>>      The result is ALL of the LAN clients 10. and 216. are all
>>>>      masqueraded to 209.90.234.1.
>>>>
>>>>
>>>>
>>>>
>>>>      How can I limit the masquerade to the 10.0.1.0/24 network ONLY and
>>>>      let the 216.168.46.0 addresses do the normal internet routing
>>>> thing?
>>>>
>>>>      It is something obvious. Need more coffee.. or Scotch.
>>>>
>>>>
>>>>      ryan
>>>>
>>>>      --     D. Ryan Spott | NGC457, llc
>>>>      broadband | telco | colo | communities
>>>>      PO Box 1734 Sultan, WA 98294
>>>>      425-939-0047
>>>>
>>>>
>>>>
>> ------------------------------------------------------------------------
>>
>>>      Mikrotik-users mailing list
>>>>      [email protected]
>>>>      http://lists.wispa.org/mailman/listinfo/mikrotik-users
>>>>
>>>> -- Sent from my Android device with K-9 Mail. Please excuse my brevity.
>>>>
>>> --
>>> D. Ryan Spott | NGC457, llc
>>> broadband | telco | colo | communities
>>> PO Box 1734 Sultan, WA 98294
>>> 425-939-0047
>>> -------------- next part --------------
>>> An HTML attachment was scrubbed...
>>> URL: <
>>>
>>
>> http://mail.butchevans.com/pipermail/mikrotik/attachments/20150703/34e9a2ed/attachment.html
>>
>>> -------------- next part --------------
>>> A non-text attachment was scrubbed...
>>> Name: iccdibgf.png
>>> Type: image/png
>>> Size: 78948 bytes
>>> Desc: not available
>>> URL: <
>>>
>>
>> http://mail.butchevans.com/pipermail/mikrotik/attachments/20150703/34e9a2ed/attachment.png
>>
>>>
>>> _______________________________________________
>>> Mikrotik mailing list
>>> [email protected]
>>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>>>
>>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
>>>
>> RouterOS
>> -------------- next part --------------
>> An HTML attachment was scrubbed...
>> URL: <
>> http://mail.butchevans.com/pipermail/mikrotik/attachments/20150704/6b03656e/attachment.html
>> >
>> _______________________________________________
>> Mikrotik mailing list
>> [email protected]
>> http://mail.butchevans.com/mailman/listinfo/mikrotik
>>
>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
>> RouterOS
>>
>
>
> --
> D. Ryan Spott | NGC457, llc
> broadband | telco | colo | communities
> PO Box 1734 Sultan, WA 98294
> 425-939-0047
>
> _______________________________________________
> Mikrotik mailing list
> [email protected]
> http://mail.butchevans.com/mailman/listinfo/mikrotik
>
> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik
> RouterOS
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.butchevans.com/pipermail/mikrotik/attachments/20150704/41ab7b99/attachment.html>
_______________________________________________
Mikrotik mailing list
[email protected]
http://mail.butchevans.com/mailman/listinfo/mikrotik

Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

Reply via email to