I guess you need to add screenshots of what you have done.
The correct gateway id = hardware id was used?
The correct channel plan was used?
Did you add the server you are using to the lora device?
And did you enable the lora device?
You can check inside the WAP LR9 config (http/winbox) if you are receiving LoRa packets and/or via log if your outgoing UDP to TTN is working.
LoRa > Traffic: Shows your incoming LoRa packets.
Log: lora-dl: [server_name] Keepalive timed out, could show a possible connection issue (for example)
Also not sure if picking the wrong TTN server is geo-blocked, so be sure to pick the correct server for your region.
Hmm, maybe try:
a) an US TTN network server? You are using an EU TTN network server now.
b) check if your isp/modem/router doesn’t block the ports (udp 1700).
c) maybe read more info here: Mikrotik Gateway - Offline - not reconnecting
And try enable: Forward: Error for now, a lot more data gets forwarded then, to test.
Never ever forward error packets. That puts unnecessary load on the backend shared by the entire community.
It is not.
First change your network servers setting to ttn-router-us-west. Then read existing forum messages with regards to gateway status at the console and gateways (not) being displayed on maps. The short cut: the console status is not reliable and it takes time before a gateway shows on the map even when you have the privacy settings in the console set right.
You can provide the updates. At the top of the page there is an “edit index.md” button, feel free to hit it and create the update (with a pull request).
Don’t forget this is the community network so the community can(/is expected to) contribute.
actually I setup my lora wap kit with external antenna 6.5 dB behind my mikrotik rb3011 and rules are ok … simulate with udp client/src … more below.
i did a lot of tests … same bug … but i give you more informations with pictures
I want to know if my ISP denied udp 1700, so I used a udp client / srv between 2 computers from deferent ISP, no problem I can receive both side and I can a have a status with bytes
now time to use my udp software to capture the data from my mikrotik wap lora9 kit to my udp listener from another pc …
I put the good srv (US) and put everything like doc from this site and still have the same bug
only one side data not bith side, I know is a forwarder but is it normal ?
what’s wrong ?? i dont know ??
I can send/rx data with my Reyax Rylr896 by arduino com port to another Reyax but i dont have the arduino module to create my iot for now (still waiting my order)
I dont have a lot experience with lora, but with mikrotik it’s not the first one …
I configure the new RB2011 for you, easier for me.
I hope thet info can help you, if you need more let me know,
I keep this setup intact for next tests
Thank you for your help
my setup :
mikrotik RB2011 firmware 6.47.2 (new from box and basic firewall rules !)
mikrotik wap lora9 kit firmware 6.47.2 (new from box and basic firewall rules)
servers=ttn-router-us-west
I can’t post my RB3011 in production security reason.
print screen :
code from lora9:
Blockquote
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX
country=canada disabled=no distance=indoors frequency=auto hide-ssid=yes
installation=outdoor mode=ap-bridge radio-name=hello ssid=testtest
station-roaming=enabled wireless-protocol=802.11
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=
wpa-psk,wpa2-psk,wpa-eap,wpa2-eap mode=dynamic-keys supplicant-identity=
MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=dhcp ranges=192.168.80.10-192.168.90.254
/ip dhcp-server
add address-pool=dhcp disabled=no interface=wlan1 name=wifi
/lora servers
add address=eu.mikrotik.thethings.industries down-port=1700 name=TTN-EU
up-port=1700
add address=us.mikrotik.thethings.industries down-port=1700 name=TTN-US
up-port=1700
add address=us-west.thethings.network down-port=1700 name=ttn-router-us-west
up-port=1700
add address=ttn.thingsconnected.net down-port=1700 name=
digitalcatapult-uk-router up-port=1700
add address=thethings.meshed.com.au down-port=1700 name=meshed-router
up-port=1700
add address=ttn.opennetworkinfrastructure.org down-port=1700 name=
switch-router up-port=1700
add address=asia-se.thethings.network down-port=1700 name=ttn-router-asia-se
up-port=1700
add address=brazil.thethings.network down-port=1700 name=ttn-router-brazil
up-port=1700
add address=eu.thethings.network down-port=1700 name=ttn-router-eu up-port=
1700
add address=asia-se.thethings.network down-port=1700 name=ttn-router-jp
up-port=1700
add address=router.us.thethings.network down-port=1700 name=
router.us.thethings.network up-port=1700
/user group
set full policy=“local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,pas
sword,web,sniff,sensitive,api,romon,dude,tikapp”
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/interface list member
add comment=defconf interface=wlan1 list=LAN
add comment=defconf interface=ether1 list=WAN
/interface wireless cap
set discovery-interfaces=*3 interfaces=wlan1
/ip address
add address=192.168.90.1/24 interface=wlan1 network=192.168.90.0
/ip dhcp-client
add disabled=no interface=ether1
/ip dhcp-server network
add address=192.168.90.0/24 comment=defconf dns-server=8.8.8.8 gateway=
192.168.90.1 netmask=24
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input comment=“broadcast off” dst-address-type=
broadcast
add action=accept chain=input dst-port=8291 in-interface=ether1 protocol=tcp
add action=accept chain=output out-interface=ether1 protocol=tcp src-port=
8291
add action=accept chain=input dst-port=8291 in-interface=wlan1 protocol=tcp
add action=accept chain=output out-interface=wlan1 protocol=tcp src-port=8291
add action=accept chain=forward in-interface=ether1
add action=accept chain=forward out-interface=ether1
add action=accept chain=input in-interface=ether1 log=yes log-prefix="IN - "
add action=accept chain=output log=yes log-prefix="OUT - " out-interface=
ether1
/ip firewall nat
add action=masquerade chain=srcnat comment=“WIFI NAT for Internet”
out-interface=ether1 src-address=192.168.90.0/24
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set irc disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
set udplite disabled=yes
set dccp disabled=yes
set sctp disabled=yes
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=192.168.88.0/24,192.168.90.0/24
set ssh disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/lora
set 0 antenna-gain=6dB channel-plan=us-915-1 disabled=no forward=crc-valid
servers=ttn-router-us-west
/system clock
set time-zone-name=America/Toronto
/system logging
set 0 prefix="Debug - " topics=debug
add topics=lora
add topics=firewall
Blockquote
code RB2011:
Blockquote
/interface bridge
add admin-mac=D4:CA:6D:0A:C8:91 auto-mac=no comment=defconf name=bridge
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
/tool user-manager customer
set admin access=
own-routers,own-users,own-profiles,own-limits,config-payment-gw
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=ether6
add bridge=bridge comment=defconf interface=ether7
add bridge=bridge comment=defconf interface=ether8
add bridge=bridge comment=defconf interface=ether9
add bridge=bridge comment=defconf interface=ether10
add bridge=bridge comment=defconf interface=sfp1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=
192.168.88.0
/ip dhcp-client
add comment=defconf disabled=no interface=ether1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf dns-server=8.8.8.8 gateway=
192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 comment=defconf name=router.lan type=A
/ip firewall filter
add action=accept chain=input dst-port=8291 protocol=tcp
add action=accept chain=output protocol=tcp src-port=8291
add action=accept chain=forward in-interface=ether1 log=yes log-prefix=
"FW IN- "
add action=accept chain=forward log=yes log-prefix="FW OUT- " out-interface=
ether1
add action=accept chain=input in-interface=ether1 log=yes log-prefix=
"ICMP IN - " protocol=icmp
add action=accept chain=output log=yes log-prefix="ICMP OUT - "
out-interface=ether1 protocol=icmp
add action=accept chain=output dst-port=1700 log=yes log-prefix="udp OUT - "
out-interface=ether1 protocol=udp
add action=drop chain=forward in-interface=ether1 log=yes log-prefix=
"FW IN- "
add action=drop chain=forward log=yes log-prefix="FW OUT- " out-interface=
ether1
add action=drop chain=input in-interface=ether1 log=yes log-prefix=
"IN drop- "
add action=drop chain=output log=yes log-prefix="OUT drop- " out-interface=
ether1
/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade”
ipsec-policy=out,none out-interface=ether1
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set irc disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
set udplite disabled=yes
set dccp disabled=yes
set sctp disabled=yes
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=192.168.88.0/24
set ssh disabled=yes
set api disabled=yes
set winbox address=192.168.88.0/24
set api-ssl disabled=yes
/system clock
set time-zone-name=America/Toronto
/system lcd
set contrast=0 enabled=no port=parallel type=24x4
/system lcd page
set time disabled=yes display-time=5s
set resources disabled=yes display-time=5s
set uptime disabled=yes display-time=5s
set packets disabled=yes display-time=5s
set bits disabled=yes display-time=5s
set version disabled=yes display-time=5s
set identity disabled=yes display-time=5s
set bridge disabled=yes display-time=5s
set sfp1 disabled=yes display-time=5s
set ether1 disabled=yes display-time=5s
set ether2 disabled=yes display-time=5s
set ether3 disabled=yes display-time=5s
set ether4 disabled=yes display-time=5s
set ether5 disabled=yes display-time=5s
set ether6 disabled=yes display-time=5s
set ether7 disabled=yes display-time=5s
set ether8 disabled=yes display-time=5s
set ether9 disabled=yes display-time=5s
set ether10 disabled=yes display-time=5s
/system logging
set 0 topics=firewall
add disabled=yes topics=debug
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
/tool user-manager database
set db-path=user-manager
That is nothing to worry about. It might be Lora, not LoRaWAN, transmissions or random noise received by the gateway. Every gateway receives packets with crc errors.
The important thing is to not forward those packets to TTN as that will only cause unnecessary load on the shared infrastructure.