BandaAncha

  • 🔍 en 📰 artículos ⏎
  • 🔍 en 💬 foros ⏎
  • 🔍 en 👇 este 💬 foro ⏎
  • 🔍 en 👇 este 💬 tema ⏎
Regístrate Regístrate Identifícate Identifícate

Mikrotik no me deja acceder a mi NAS

Solospam

Recurro a vosotros para que me ayudéis con un problema que tengo en mi red de casa, Windows no puede acceder a mi NAS

imagen.png

En cambio si aparece en el apartado "red" del explorador de windows

imagen.png

Cuando hago doble click en vez de entrar en el NAS con el explorer lo hace mediante web.

Creo que el Mikrotik está limitando de alguna forma el acceso a este recurso.

Quedo a la espera de vuestras noticias

Saludos

dserarols

¿Nos puedes hacer llegar la configuración del Mikrotik y como lo tienes conectado todo? De otra forma es muy complicado saber qué pasa.

🗨️ 2
Solospam

La configuración es la siguiente, ya he probado a deshabilitar todo el firewall/mangle/raw y sigo sin poder ver el NAS ni imprimir en red

# mar/27/2020 16:49:45 by RouterOS 6.46.3
# software id = 
#
# model = 
# serial number = 
/interface bridge
add name=bridge1
/interface wireless
set [ find default-name=wlan2 ] antenna-gain=0 band=2ghz-b/g/n channel-width=\
    20/40mhz-XX country=no_country_set default-authentication=no disabled=no \
    frequency=auto mode=ap-bridge name=wlan1 ssid=nolink wds-ignore-ssid=yes
set [ find default-name=wlan1 ] antenna-gain=0 band=5ghz-a/n/ac \
    channel-width=20/40/80/160mhz-XXXXXXXX country=no_country_set \
    frequency-mode=superchannel hide-ssid=yes mac-address=:D6 \
    mode=bridge multicast-helper=disabled name=wlan2 radio-name=D6 \
    ssid=Hot_Spot wps-mode=disabled
/interface ethernet
set [ find default-name=ether1 ] mac-address=74:4D:28:
set [ find default-name=ether2 ] mac-address=74:4D:28:
set [ find default-name=ether3 ] mac-address=74:4D:28:
set [ find default-name=ether4 ] mac-address=74:4D:28:
set [ find default-name=ether5 ] mac-address=74:4D:28:
set [ find default-name=ether6 ] mac-address=74:4D:28:
set [ find default-name=ether7 ] mac-address=74:4D:28:
set [ find default-name=ether8 ] mac-address=74:4D:28:
set [ find default-name=ether9 ] mac-address=74:4D:28:
set [ find default-name=ether10 ] mac-address=74:4D:28:
set [ find default-name=sfp-sfpplus1 ] mac-address=74:4D:28:
/interface vlan
add interface=ether1 name=vlan6 vlan-id=6
/interface pppoe-client
add add-default-route=yes disabled=no interface=vlan6 name=internet user=\
    adslppp@telefonicanetpa
/interface ethernet switch port
set 0 default-vlan-id=0
set 1 default-vlan-id=0
set 2 default-vlan-id=0
set 3 default-vlan-id=0
set 4 default-vlan-id=0
set 5 default-vlan-id=0
set 6 default-vlan-id=0
set 7 default-vlan-id=0
set 8 default-vlan-id=0
set 9 default-vlan-id=0
set 10 default-vlan-id=0
set 11 default-vlan-id=0
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa-psk,wpa2-psk eap-methods="" group-ciphers=\
    tkip,aes-ccm mode=dynamic-keys name=xx supplicant-identity=\
    xx unicast-ciphers=tkip,aes-ccm
/interface wireless
add disabled=no keepalive-frames=disabled mac-address=76:4D:28: \
    master-interface=wlan1 multicast-buffering=disabled name=hp \
    security-profile=xx ssid="HP" \
    wds-cost-range=0 wds-default-cost=0 wps-mode=disabled
/ip pool
add name=dchp_pool2 ranges=192.168.1.2-192.168.1.5
add name=dhcp_pool1 ranges=192.168.10.2-192.168.10.5
/ip dhcp-server
add address-pool=dchp_pool2 disabled=no insert-queue-before=bottom interface=\
    bridge1 name=dchp2
add address-pool=dhcp_pool1 disabled=no insert-queue-before=bottom interface=\
    hp-print name=dhcp1
/system logging action
set 0 memory-lines=10000
set 1 disk-lines-per-file=10000
/caps-man manager
set enabled=yes
/interface bridge port
add bridge=bridge1 comment=defconf interface=ether2
add bridge=bridge1 comment=defconf interface=ether3
add bridge=bridge1 comment=defconf interface=ether4
add bridge=bridge1 comment=defconf interface=ether5
add bridge=bridge1 comment=defconf interface=ether6
add bridge=bridge1 comment=defconf interface=ether7
add bridge=bridge1 comment=defconf interface=ether8
add bridge=bridge1 comment=defconf interface=ether9
add interface=*D
add bridge=bridge1 interface=ether10
add interface=*14
add interface=ether1
add interface=sfp-sfpplus1
add interface=*C
add bridge=bridge1 disabled=yes interface=hp
/interface bridge settings
set use-ip-firewall=yes
/ip neighbor discovery-settings
set discover-interface-list=LAN
/ip settings
set tcp-syncookies=yes
/interface list member
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
add interface=ether5 list=LAN
add interface=ether6 list=LAN
add interface=ether7 list=LAN
add interface=ether8 list=LAN
add interface=ether9 list=LAN
add interface=ether10 list=LAN
add interface=sfp-sfpplus1 list=LAN
add list=LAN
add disabled=yes list=WAN
add interface=ether1 list=LAN
add interface=internet list=WAN
/interface ovpn-server server
set auth=sha1 cipher=aes256 enabled=yes require-client-certificate=yes
/interface wireless cap
set interfaces=*C,*D
/ip address
add address=192.168.10.1/24 interface=hp network=192.168.10.0
add address=192.168.1.1/24 interface=bridge1 network=192.168.1.0
/ip dhcp-server network
add address=192.168.1.0/24 dns-server=1.1.1.1 gateway=192.168.1.1 netmask=24
add address=192.168.10.0/24 dns-server=1.1.1.1 gateway=192.168.10.1
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1
/ip dns static
add address=192.168.11.1 name=router.lan
/ip firewall address-list

/ip firewall filter
add action=drop chain=virus dst-port=\
    135-139,445,593,4000,4444,995-999,8998,2745,4751,1434 protocol=tcp
add action=drop chain=virus dst-port=\
    135-139,445,593,4000,4444,995-999,8998,2745,4751,1434 protocol=udp
add action=jump chain=forward comment="Virus Flood Protect" connection-state=\
    new jump-target=virus protocol=tcp tcp-flags=syn
add action=jump chain=forward comment="jump to the virus chain" jump-target=\
    virus
add action=accept chain=virus connection-state=new limit=400,5:packet \
    protocol=tcp tcp-flags=syn
add action=drop chain=virus connection-state=new protocol=tcp tcp-flags=syn
add action=drop chain=input dst-port=22 protocol=tcp
add action=drop chain=known_viruses comment=" windows  not EXACTLY a virus" \
    dst-port=135-139,445,593,4444,4000,995-999,8998,2745,4751,1434 protocol=\
    tcp
add action=drop chain=known_viruses comment=" windows  not EXACTLY a virus" \
    dst-port=135-139,445,593,4444,4000,995-999,8998,2745,4751,1434 protocol=\
    udp
add action=jump chain=forward comment="SYN Flood Protect" connection-state=\
    new jump-target=SYN-Protect protocol=tcp tcp-flags=syn
add action=accept chain=SYN-Protect connection-state=new limit=400,5 \
    protocol=tcp tcp-flags=syn
add action=drop chain=SYN-Protect connection-state=new protocol=tcp \
    tcp-flags=syn
add action=add-src-to-address-list address-list=acceso-winbox chain=input \
    dst-port=8291 protocol=tcp
add action=drop chain=forward comment="drop MAC" src-mac-address=\
    38:4F:49:88:B9:BF
add action=drop chain=ICMP comment=" 0:0 and limit for 5pac/s" icmp-options=\
    0:0-255 limit=5,5:packet protocol=icmp
add action=drop chain=ICMP comment="3:3 and limit for 5pac/s" icmp-options=\
    3:3 limit=5,5:packet protocol=icmp
add action=drop chain=ICMP comment="3:4  and  limit  for  5pac/s" \
    icmp-options=3:4 limit=5,5:packet protocol=icmp
add action=drop chain=ICMP comment="8:0 and limit for 5pac/s" icmp-options=\
    8:0-255 limit=5,5:packet protocol=icmp
add action=drop chain=ICMP comment=" 11:0 and limit for 5pac/s" icmp-options=\
    11:0-255 limit=5,5:packet protocol=icmp
add action=drop chain=ICMP comment="Drop everything else" protocol=icmp
add action=add-src-to-address-list address-list="Lista Negra" \
    address-list-timeout=1d chain=input comment="Deteccion de DOS" \
    connection-limit=100,32
add action=drop chain=forward comment="Block Atakante DOS" protocol=tcp \
    src-address-list="Lista Negra"
add action=tarpit chain=input comment=\
    "*************Impedir Atacante DOS genere nuevas conecxiones" protocol=\
    tcp src-address-list="Lista Negra"
add action=drop chain=forward comment=\
    "*************BLOCK SPAMMERS OR INFECTED USERS" dst-port=25 protocol=tcp \
    src-address-list=spammer
add action=add-src-to-address-list address-list=spammer address-list-timeout=\
    1d chain=forward comment="Detect and add-list SMTP virus or spammers" \
    connection-limit=30,32 dst-port=25 limit=50,5 protocol=tcp
add action=accept chain=ICMP comment="0:0 and limit for 5pac/s" icmp-options=\
    0:0-255 limit=5,5 protocol=icmp
add action=accept chain=ICMP comment="3:3 and limit for 5pac/s" icmp-options=\
    3:3 limit=5,5 protocol=icmp
add action=accept chain=ICMP comment="3:4 and limit for 5pac/s" icmp-options=\
    3:4 limit=5,5 protocol=icmp
add action=accept chain=ICMP comment="8:0 and limit for 5pac/s" icmp-options=\
    8:0-255 limit=5,5 protocol=icmp
add action=accept chain=ICMP comment="11:0 and limit for 5pac/s" \
    icmp-options=11:0-255 limit=5,5 protocol=icmp
add action=drop chain=ICMP comment="Drop everything else" protocol=icmp
add action=drop chain=forward comment="no ping" log=yes protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept established,related,untracked" connection-state=\
    established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
    invalid
add action=drop chain=input comment="defconf: accept ICMP" log=yes protocol=\
    icmp
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
    in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
    connection-state=established,related
add action=accept chain=forward comment=\
    "defconf: accept established,related, untracked" connection-state=\
    established,related,untracked
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=drop chain=forward comment="defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "defconf:  drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
    connection-state=new in-interface-list=WAN
add action=drop chain=input comment="drop ssh brute forcers" dst-port=22 \
    protocol=tcp src-address-list=ssh_blacklist
add action=add-src-to-address-list address-list=ssh_blacklist \
    address-list-timeout=1w3d chain=input connection-state=new dst-port=22 \
    protocol=tcp src-address-list=ssh_stage3
add action=add-src-to-address-list address-list=ssh_stage3 \
    address-list-timeout=1m chain=input connection-state=new dst-port=22 \
    protocol=tcp src-address-list=ssh_stage2
add action=add-src-to-address-list address-list=ssh_stage2 \
    address-list-timeout=1m chain=input connection-state=new dst-port=22 \
    protocol=tcp src-address-list=ssh_stage1
add action=add-src-to-address-list address-list=ssh_stage1 \
    address-list-timeout=1m chain=input connection-state=new dst-port=22 \
    protocol=tcp
/ip firewall mangle
add action=mark-connection chain=prerouting comment=DNS connection-state=new \
    new-connection-mark=DNS port=53 protocol=udp
add action=mark-packet chain=prerouting connection-mark=DNS new-packet-mark=\
    DNS passthrough=no
add action=mark-connection chain=postrouting connection-state=new \
    new-connection-mark=DNS port=53 protocol=udp
add action=mark-packet chain=postrouting connection-mark=DNS new-packet-mark=\
    DNS passthrough=no
add action=mark-connection chain=prerouting comment=VOIP new-connection-mark=\
    VOIP port=5060,5061,10000-20000 protocol=udp
add action=mark-packet chain=prerouting connection-mark=VOIP new-packet-mark=\
    VOIP passthrough=no
add action=mark-connection chain=prerouting comment=UDP connection-state=new \
    new-connection-mark=UDP protocol=udp
add action=mark-packet chain=prerouting connection-mark=UDP new-packet-mark=\
    UDP passthrough=no
add action=mark-connection chain=prerouting comment=ICMP connection-state=new \
    new-connection-mark=ICMP protocol=icmp
add action=mark-packet chain=prerouting connection-mark=ICMP new-packet-mark=\
    ICMP passthrough=no
add action=mark-connection chain=postrouting connection-state=new \
    new-connection-mark=ICMP protocol=icmp
add action=mark-packet chain=postrouting connection-mark=ICMP \
    new-packet-mark=ICMP passthrough=no
add action=mark-packet chain=postrouting comment=ACK new-packet-mark=ACK \
    packet-size=0-123 passthrough=no protocol=tcp tcp-flags=ack
add action=mark-packet chain=prerouting new-packet-mark=ACK packet-size=0-123 \
    passthrough=no protocol=tcp tcp-flags=ack
add action=mark-connection chain=prerouting comment=HTTP connection-mark=\
    !HTTP_BIG connection-state=new new-connection-mark=HTTP port=80,443 \
    protocol=tcp
add action=mark-connection chain=prerouting connection-bytes=500000-0 \
    connection-mark=HTTP connection-rate=200k-100M new-connection-mark=\
    HTTP_BIG protocol=tcp
add action=mark-packet chain=prerouting connection-mark=HTTP_BIG \
    new-packet-mark=HTTP_BIG passthrough=no
add action=mark-packet chain=prerouting connection-mark=HTTP new-packet-mark=\
    HTTP passthrough=no
add action=mark-connection chain=prerouting comment=OTHER connection-mark=\
    no-mark new-connection-mark=OTHER
add action=mark-packet chain=prerouting connection-mark=OTHER \
    new-packet-mark=OTHER passthrough=no
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
    ipsec-policy=out,none out-interface=internet out-interface-list=WAN
/ip firewall raw
add action=drop chain=prerouting protocol=tcp src-port=\
    135-139,445,593,4000,4444,995-999,8998,2745,4751,1434
add action=drop chain=prerouting protocol=udp src-port=\
    135-139,445,593,4000,4444,995-999,8998,2745,4751,1434
add action=drop chain=prerouting dst-address-list="Lista Negra" in-interface=\
    bridge1 log=yes src-address-list=blocklistde_ftp_list
add action=drop chain=prerouting dst-address-list="Lista Negra" in-interface=\
    bridge1 log=yes src-address-list=malwaredomainlist_list
add action=drop chain=prerouting dst-address-list="Lista Negra" in-interface=\
    bridge1 log=yes src-address-list=ads_list
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set irc disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
set udplite disabled=yes
set dccp disabled=yes
set sctp disabled=yes
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes
set ssh disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/ip ssh
set allow-none-crypto=yes forwarding-enabled=remote
/system clock
set time-zone-name=Europe/Madrid
/system leds
add disabled=yes leds="wlan1_signal1-led,wlan1_signal2-led,wlan1_signal3-led,w\
    lan1_signal4-led,wlan1_signal5-led" type=wireless-signal-strength
add leds=wlan1_tx-led type=interface-transmit
add leds=wlan1_rx-led type=interface-receive
/system scheduler
add interval=4w2d name=reiniciar on-event="/system reboot" policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
    start-date=nov/04/2019 start-time=05:00:00
add interval=5m name=ddns on-event=no-ip policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
    start-date=nov/14/2019 start-time=10:14:35
add interval=2d name="blaklist update" on-event=blaklist policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
    start-date=nov/27/2019 start-time=22:18:58
/system script
add dont-require-permissions=no name=ddns owner=xx policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="#\
    

add dont-require-permissions=no name=blaklist owner=xx policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\
    tool fetch url=\"https://blocklister.gefoo.org/blocklistde_ftp\" dst-path=\
    \"ftp_list.rsc\"; import file-name=\"ftp_list.rsc\";\r\
    \n\r\
    \n/tool fetch url=\"https://blocklister.gefoo.org/ads\" dst-path=\"ads.rsc\
    \";/import file-name=\"ads.rsc\";\r\
    \n\r\
    \n\r\
    \n/tool fetch url=\"https://blocklister.gefoo.org/malwaredomainlist\" dst-\
    path=\"malware_list.rsc\";/import file-name=\"malware_list.rsc\";\r\
    \n"
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
🗨️ 1
Solospam

@sysadmin alguna idea de lo que está ocurriendo?

Gracias