Mon Feb 26, 2018 12:15 pm
I created a test configuration like this:
Router1
# feb/26/2018 10:43:17 by RouterOS 6.41.2
# software id = 0J1H-G60E
#
# model = 2011UiAS
[admin@TEST1] /interface> print
Flags: D - dynamic, X - disabled, R - running, S - slave
# NAME TYPE ACTUAL-MTU L2MTU MAX-L2MTU MAC-ADDRESS
0 R ;;; LAN
ether1 ether 1500 2000 4074 4C:5E:0C:37:B3:BB
1 R ;;; To Test2 Router
ether2 ether 1500 2000 4074 4C:5E:0C:37:B3:BC
2 ether3 ether 1500 1598 4074 4C:5E:0C:37:B3:BD
3 ether4 ether 1500 1598 4074 4C:5E:0C:37:B3:BE
4 ether5 ether 1500 1598 4074 4C:5E:0C:37:B3:BF
5 ether6 ether 1500 1598 2028 4C:5E:0C:37:B3:C0
6 ether7 ether 1500 1598 2028 4C:5E:0C:37:B3:C1
7 ether8 ether 1500 1598 2028 4C:5E:0C:37:B3:C2
8 ether9 ether 1500 1598 2028 4C:5E:0C:37:B3:C3
9 X ether10 ether 1500 1598 2028 4C:5E:0C:37:B3:C4
10 sfp1 ether 1500 1598 4074 4C:5E:0C:37:B3:BA
11 R eoip-tunnel1 eoip 1458 65535 02:9A:7A:EB:49:E7
12 R vlan10 vlan 1500 65531 02:9A:7A:EB:49:E7
[admin@TEST1] /ip address> print
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK INTERFACE
0 X 10.10.1.30/24 10.10.1.0 ether1
1 192.168.20.1/24 192.168.20.0 ether2
2 192.168.22.1/24 192.168.22.0 eoip-tunnel1
3 D 10.10.1.92/24 10.10.1.0 ether1
4 10.20.30.1/24 10.20.30.0 vlan10
[admin@TEST1] /ip firewall filter> print
Flags: X - disabled, I - invalid, D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 chain=forward action=fasttrack-connection log=no log-prefix=""
[admin@TEST1] /ip route> print
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 ADS 0.0.0.0/0 10.10.1.1 1
1 ADC 10.10.1.0/24 10.10.1.92 ether1 0
2 ADC 10.20.30.0/24 10.20.30.1 vlan10 0
3 ADC 192.168.20.0/24 192.168.20.1 ether2 0
4 ADC 192.168.22.0/24 192.168.22.1 eoip-tunnel1 0
[admin@TEST1] /ip firewall nat> print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=masquerade out-interface=ether1 log=no log-prefix=""
[admin@TEST1] /interface eoip> print
国旗:X -禁用,R -运行
0 R name="eoip-tunnel1" mtu=auto actual-mtu=1458 l2mtu=65535 mac-address=02:9A:7A:EB:49:E7 arp=enabled arp-timeout=auto loop-protect=default loop-protect-status=off loop-protect-send-interval=5s loop-protect-disable-time=5m local-address=0.0.0.0
remote-address=192.168.20.2 tunnel-id=0 dscp=inherit clamp-tcp-mss=yes dont-fragment=no allow-fast-path=yes
Router2
# feb/26/2018 10:42:47 by RouterOS 6.41.2
# software id = B215-M847
#
# model = 951G-2HnD
[admin@TEST2] /interface> print
Flags: D - dynamic, X - disabled, R - running, S - slave
# NAME TYPE ACTUAL-MTU L2MTU MAX-L2MTU MAC-ADDRESS
0 ether1 ether 1500 1598 4074 4C:5E:0C:B6:4E:2A
1 R ;;; To test1 router
ether2 ether 1500 2000 4074 4C:5E:0C:B6:4E:2B
2 ;;; PC test
ether3 ether 1500 2000 4074 4C:5E:0C:B6:4E:2C
3 ether4 ether 1500 1598 4074 4C:5E:0C:B6:4E:2D
4 ether5 ether 1500 1598 4074 4C:5E:0C:B6:4E:2E
5 X wlan1 wlan 1500 1600 2290 4C:5E:0C:B6:4E:2F
6 R eoip-tunnel1 eoip 1458 65535 02:82:9B:9C:20:3E
7 R vlan10 vlan 1500 65531 02:82:9B:9C:20:3E
[admin@TEST2] /interface> eoip
[admin@TEST2] /interface eoip> print
国旗:X -禁用,R -运行
0 R name="eoip-tunnel1" mtu=auto actual-mtu=1458 l2mtu=65535 mac-address=02:82:9B:9C:20:3E arp=enabled arp-timeout=auto loop-protect=default loop-protect-status=off loop-protect-send-interval=5s loop-protect-disable-time=5m local-address=0.0.0.0
remote-address=192.168.20.1 tunnel-id=0 dscp=inherit clamp-tcp-mss=yes dont-fragment=no allow-fast-path=yes
[admin@TEST2] /interface eoip> /ip address
[admin@TEST2] / ipaddress> print
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK INTERFACE
0 192.168.20.2/24 192.168.20.0 ether2
1 192.168.21.254/24 192.168.21.0 ether3
2 192.168.22.2/24 192.168.22.0 eoip-tunnel1
3 10.20.30.2/24 10.20.30.0 vlan10
[admin@TEST2] / ipaddress> /ip firewall filter
[admin@TEST2] / ipfirewall filter> print
Flags: X - disabled, I - invalid, D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 chain=forward action=fasttrack-connection log=no log-prefix=""
[admin@TEST2] / ipfirewall filter> /ip firewall nat
[admin@TEST2] / ipfirewall nat> print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=masquerade out-interface=vlan10 log=no log-prefix=""
[admin@TEST2] / ipfirewall nat> /ip route print
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 10.20.30.1 1
1 ADC 10.20.30.0/24 10.20.30.2 vlan10 0
2 ADC 192.168.20.0/24 192.168.20.2 ether2 0
3 DC 192.168.21.0/24 192.168.21.254 ether3 255
4 ADC 192.168.22.0/24 192.168.22.2 eoip-tunnel1 0
When I test a connection between PC connected to TEST2 on ether3 and PC connected to LAN on TEST1 on ether1 I get results like: 234 Mbits/sec
In the same config but over EOIP not VLAN I get 787 Mbits/sec and without VLAN and EOIP only routing - 849 Mbits/sec
is it possible that VLAN causes such a performance loss? am I doing something wrong?