Indice   FAQ  
Iscriviti  Login
Indice RouterOS RouterOS

crs125 24g

Tutto su questo sistema operativo linux based - Configurazioni, dubbi, problematiche &....

crs125 24g

Messaggioda marcotre80 » lun 12 mar 2018, 19:30

Salve a tutti, avrei bisogno del vostro aiuto per configurare questo switch, di cui allego file di configurazione attuale.

Premetto che è stato configurato da un amico, per 3wan e 1 lan, con load balance e failover.

Questa configurazione ha funzionato bene per alcuni mesi, poi giorni fa ho collegato un xvr con 4 ip cam e improvvisamente dai pc non riuscivo più a navigare, la connessione era lentissima.
Ho subito pensato ad una congestione dello switch ed ho quindi staccato l'nvr ma.....la connessione era sempre lentissima anche dopo aver riavviato switch e modems.

Ho dovuto rimettere router cisco x gestire le wan ed uno switch netgear a 24 porte per riavere tutto prestante ma devo rimettere il mikrotik e quindi spero in un vs aiuto.

# mar/06/2018 16:57:06 by RouterOS 6.41.2
# software id =
#
# model = CRS125-24G-1S
# serial number =
/interface bridge
add admin-mac=xx:xx:xx:xx:xx:xx auto-mac=no comment=\
"created from master port" name=bridge1 protocol-mode=none
/interface ethernet
set [ find default-name=ether4 ] comment="Non disabilitare mai" name=Local
set [ find default-name=ether1 ] comment="xxx.xx.0.1 Tiscali" name=WAN1
set [ find default-name=ether2 ] comment="xxx.xx.1.1 Infostrada" name=WAN2
set [ find default-name=ether3 ] comment="xxx.xxx.1.1 Huawei" name=WAN3
set [ find default-name=ether9 ] comment=xxx.168.0.99 name="eth9 Server HP"
set [ find default-name=ether21 ] comment=xxx.168.0.92 name=\
"ether21 Qnap 253a"
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=ADSL-Coupler3
/ip pool
add name=dhcp_pool1 ranges=192.168.0.11-192.168.0.254
/ip dhcp-server
add address-pool=dhcp_pool1 authoritative=after-2sec-delay disabled=no \
interface=bridge1 name=dhcp1
/snmp community
set [ find default=yes ] addresses=0.0.0.0/0
/interface bridge port
add bridge=bridge1 interface=ether5
add bridge=bridge1 interface=ether6
add bridge=bridge1 interface=ether7
add bridge=bridge1 interface=ether8
add bridge=bridge1 interface="eth9 Server HP"
add bridge=bridge1 interface=ether10
add bridge=bridge1 interface=ether11
add bridge=bridge1 interface=ether12
add bridge=bridge1 interface=ether13
add bridge=bridge1 interface=ether14
add bridge=bridge1 interface=ether15
add bridge=bridge1 interface=ether16
add bridge=bridge1 interface=ether17
add bridge=bridge1 interface=ether18
add bridge=bridge1 interface=ether19
add bridge=bridge1 interface=ether20
add bridge=bridge1 interface="ether21 Qnap 253a"
add bridge=bridge1 interface=ether22
add bridge=bridge1 interface=ether23
add bridge=bridge1 interface=ether24
add bridge=bridge1 interface=Local
/ip address
add address=xxx.xxx.0.10/24 interface=bridge1 network=192.168.0.0
add address=xxx.xxx.0.65/24 interface=WAN1 network=xxx.xx.0.0
add address=xxx.xxx.1.65/24 interface=WAN2 network=xxx.xx.1.0
add address=192.168.1.65/24 interface=WAN3 network=xxx.xxx.1.0
/ip dhcp-server network
add address=xxx.xxx.0.0/24 gateway=xxx.xxx.0.10
/ip dns
set allow-remote-requests=yes cache-size=5000KiB max-udp-packet-size=512 \
servers=221.132.112.8,8.8.8.8
/ip firewall filter
add action=accept chain=input comment="winbox Wan1" dst-port=xxxx \
in-interface=WAN1 protocol=tcp
add action=accept chain=input comment="winbox wan2" dst-port=xxxx \
in-interface=WAN2 protocol=tcp
add action=accept chain=input comment="winbox wan3" dst-port=xxxx \
in-interface=WAN3 protocol=tcp

/ip firewall mangle
add action=mark-connection chain=input in-interface=WAN1 new-connection-mark=\
WAN1_conn passthrough=yes
add action=mark-connection chain=input in-interface=WAN2 new-connection-mark=\
WAN2_conn passthrough=yes
add action=mark-connection chain=input in-interface=WAN3 new-connection-mark=\
WAN3_conn passthrough=yes

add action=mark-routing chain=output connection-mark=WAN1_conn \
new-routing-mark=to_WAN1 passthrough=yes
add action=mark-routing chain=output connection-mark=WAN2_conn \
new-routing-mark=to_WAN2 passthrough=yes
add action=mark-routing chain=output connection-mark=WAN3_conn \
new-routing-mark=to_WAN3 passthrough=yes

add action=mark-connection chain=forward connection-state=new in-interface=\
WAN1 new-connection-mark=WAN1_conn passthrough=yes
add action=mark-connection chain=forward connection-state=new in-interface=\
WAN2 new-connection-mark=WAN2_conn passthrough=yes
add action=mark-connection chain=forward connection-state=new in-interface=\
WAN3 new-connection-mark=WAN3_conn passthrough=yes

add chain=forward connection-mark=WAN1_conn action=mark-packet new-packet-mark=WAN1_conn passthrough=no

add action=mark-routing chain=prerouting connection-mark=WAN1_conn \
in-interface=bridge1 new-routing-mark=to_WAN1 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=WAN2_conn \
in-interface=bridge1 new-routing-mark=to_WAN2 passthrough=yes
add action=mark-routing chain=prerouting connection-mark=WAN3_conn \
in-interface=bridge1 new-routing-mark=to_WAN3 passthrough=yes

/ip firewall nat
add action=masquerade chain=srcnat out-interface=WAN1
add action=masquerade chain=srcnat out-interface=WAN2
add action=masquerade chain=srcnat out-interface=WAN3
add action=dst-nat chain=dstnat dst-port=18600 in-interface=WAN2 \
in-interface-list=all protocol=tcp to-addresses=xxx.xxx.0.11 to-ports=\
xxxxx
add action=dst-nat chain=dstnat dst-port=18600 in-interface=WAN1 \
in-interface-list=all protocol=tcp to-addresses=xxx.xxx.0.11 to-ports=\
xxxxx
/ip route
add check-gateway=ping distance=1 gateway=xxx.xxx.0.1 routing-mark=to_WAN1
add check-gateway=ping distance=1 gateway=xxx.xxx.1.1 routing-mark=to_WAN2
add check-gateway=ping distance=1 gateway=xxx.xxx.1.1 routing-mark=to_WAN3
add comment="Script Testing Default Route" distance=2 gateway=\
xxx.xxx.0.1,xxx.xxx.1.1,xxx.xxx.1.1 routing-mark=TEST
add comment="Default Route - Script Checked" distance=1 gateway=\
xxx.xxx.0.1,xxx.xxx.1.1,xxx.xxx.1.1
add check-gateway=ping comment="Check ECMP Gateway WAN3" distance=1 \
dst-address=255.255.255.252/32 gateway=xxx.xxx.1.1
add check-gateway=ping comment="Check ECMP Gateway WAN2" distance=1 \
dst-address=255.255.255.253/32 gateway=xxx.xxx.1.1
add check-gateway=ping comment="Check ECMP Gateway WAN1" distance=1 \
dst-address=255.255.255.254/32 gateway=xxx.xxx.0.1
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=WAN2 type=internal
/lcd interface
add interface=bridge1
/lcd interface pages
set 2 interfaces=sfp1
/system clock
set time-zone-name=Europe/Rome
/system identity
set name=ADSL-Coupler3
/system ntp client
set enabled=yes primary-ntp=193.204.114.232 secondary-ntp=8.8.8.8
/system scheduler
add interval=5s name=ECMPDefaultRouteCheck on-event=ECMPDefaultRouteCheck \
policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \
start-time=startup
/system script
add name=ECMPDefaultRouteCheck owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="\
\n# ------------------- header -------------------\
\n# Script by Mattia Siviero, version 1.0.0\
\n# If you use this script, or edit and\
\n# re-use it, please keep the header intact.\
\n\
\n# This script is intended to be used in an ECMP \
\n# environment, with a maximum of three \
\n# default gateways.\
\n# It will check if the gateways are online\
\n# and it will modify the ECMP default route\
\n# accordingly.\
\n# ------------------- header -------------------\
\n\
\n\
\n# ------------- start editing here -------------\
\n# Edit the variables below to suit your needs\
\n\
\n# Please fill the WAN interface names\
\n:local InterfaceISP1 WAN1\
\n:local InterfaceISP2 WAN2\
\n:local InterfaceISP3 WAN3\
\n\
\n# Please fill the gateway IPs (or interface names in case of PPP)\
\n:local GatewayISP1 xxx.xxx.0.1\
\n:local GatewayISP2 xxx.xxx.1.1\
\n:local GatewayISP3 xxx.xxx.1.1\
\n\
\n# Please fill the ping check host - currently: resolver1.opendns.com\
\n:local PingTarget 208.67.222.222\
\n\
\n# Please fill how many ping failures are allowed before fail-over happen\
ds\
\n:local FailTreshold 3\
\n\
\n# Text used in this variable MUST be used as comment on Default Route\
\n:local DRComment \"Default Route - Script Checked\"\
\n\
\n# Editing the script after this point may break it\
\n# -------------- stop editing here --------------\
\n\
\n# Declare the global variables\
\n:global PingFailCountISP1\
\n:global PingFailCountISP2\
\n:global PingFailCountISP3\
\n:global FailResult\
\n\
\n# This inicializes the global variables, in case this is the 1st time th\
e script has ran\
\n:if ([:typeof \$PingFailCountISP1] = \"nothing\") do={:set PingFailCount\
ISP1 0}\
\n:if ([:typeof \$PingFailCountISP2] = \"nothing\") do={:set PingFailCount\
ISP2 0}\
\n:if ([:typeof \$PingFailCountISP3] = \"nothing\") do={:set PingFailCount\
ISP3 0}\
\n:if ([:typeof \$FailResult] = \"nothing\") do={:set FailResult 0}\
\n\
\n# These variables will be used to keep results of individual ping attemp\
ts\
\n:local PingResult1\
\n:local PingResult2\
\n:local PingResult3\
\n\
\n:local Fail1\
\n:local Fail2\
\n:local Fail3\
\n\
\n:local ScriptFailResult\
\n\
\n# Local variables with actions in the event of failure\
\n# Case0 - Everything Online\
\n:local ISPCase0 (\$GatewayISP1,\$GatewayISP2,\$GatewayISP3)\
\n# Case1 - ISP1 Failure\
\n:local ISPCase1 (\$GatewayISP2,\$GatewayISP3)\
\n# Case2 - ISP2 Failure\
\n:local ISPCase2 (\$GatewayISP1,\$GatewayISP3)\
\n# Case4 - ISP3 Failure\
\n:local ISPCase4 (\$GatewayISP1,\$GatewayISP2)\
\n# Case3 - ISP1 + ISP2 Failure\
\n:local ISPCase3 (\$GatewayISP3)\
\n# Case5 - ISP1 + ISP3 Failure\
\n:local ISPCase5 (\$GatewayISP2)\
\n# Case6 - ISP2 + ISP3 Failure\
\n:local ISPCase6 (\$GatewayISP1)\
\n# Case7 - Global Failure\
\n:local ISPCase7 (\$GatewayISP1,\$GatewayISP2,\$GatewayISP3)\
\n\
\n# Local variables with log entries in the event of failure\
\n# Case0 - Everything Online\
\n:local LogCase0 \"No more problems on Default Gateways - Everything Onli\
ne!\"\
\n# Case1 - ISP1 Failure\
\n:local LogCase1 \"Ouch! ISP1 seems to be down. Check it out!\"\
\n# Case2 - ISP2 Failure\
\n:local LogCase2 \"Ouch! ISP2 seems to be down. Check it out!\"\
\n# Case4 - ISP3 Failure\
\n:local LogCase4 \"Ouch! ISP3 seems to be down. Check it out!\"\
\n# Case3 - ISP1 + ISP2 Failure\
\n:local LogCase3 \"Ouch! ISP1 and ISP2 seems to be down. Check it out!\"\
\n# Case5 - ISP1 + ISP3 Failure\
\n:local LogCase5 \"Ouch! ISP1 and ISP3 seems to be down. Check it out!\"\
\n# Case6 - ISP2 + ISP3 Failure\
\n:local LogCase6 \"Ouch! ISP2 and ISP3 seems to be down. Check it out!\"\
\n# Case7 - Global Failure\
\n:local LogCase7 \"Critical! ISP1, ISP2 and ISP3 seems to be down. You ar\
e offline. Check it out!\"\
\n\
\n\
\n# Check ISPs - default route with \"TEST\" routing-mark must be present!\
!!\
\n:set PingResult1 [ping \$PingTarget count=1 interface=\$InterfaceISP1 ro\
uting-table=TEST]\
\n:set PingResult2 [ping \$PingTarget count=1 interface=\$InterfaceISP2 ro\
uting-table=TEST]\
\n:set PingResult3 [ping \$PingTarget count=1 interface=\$InterfaceISP3 ro\
uting-table=TEST]\
\n\
\n:if (\$PingResult1 = 0) do={\
\n:if (\$PingFailCountISP1 < (\$FailTreshold+2)) do={\
\n:set PingFailCountISP1 (\$PingFailCountISP1 + 1)\
\n}\
\n}\
\n\
\n:if (\$PingResult2 = 0) do={\
\n:if (\$PingFailCountISP2 < (\$FailTreshold+2)) do={\
\n:set PingFailCountISP2 (\$PingFailCountISP2 + 1)\
\n}\
\n}\
\n\
\n:if (\$PingResult3 = 0) do={\
\n:if (\$PingFailCountISP3 < (\$FailTreshold+2)) do={\
\n:set PingFailCountISP3 (\$PingFailCountISP3 + 1)\
\n}\
\n}\
\n\
\n:if (\$PingResult1 = 1) do={\
\n:if (\$PingFailCountISP1 > 0) do={\
\n:set PingFailCountISP1 (\$PingFailCountISP1 - 1)\
\n}\
\n}\
\n\
\n:if (\$PingResult2 = 1) do={\
\n:if (\$PingFailCountISP2 > 0) do={\
\n:set PingFailCountISP2 (\$PingFailCountISP2 - 1)\
\n}\
\n}\
\n\
\n:if (\$PingResult3 = 1) do={\
\n:if (\$PingFailCountISP3 > 0) do={\
\n:set PingFailCountISP3 (\$PingFailCountISP3 - 1)\
\n}\
\n}\
\n\
\n:if (\$PingFailCountISP1 >= \$FailTreshold) do={\
\n:set \$Fail1 1\
\n} else={\
\n:set \$Fail1 0\
\n}\
\n\
\n:if (\$PingFailCountISP2 >= \$FailTreshold) do={\
\n:set \$Fail2 2\
\n} else={\
\n:set \$Fail2 0\
\n}\
\n\
\n:if (\$PingFailCountISP3 >= \$FailTreshold) do={\
\n:set \$Fail3 4\
\n} else={\
\n:set \$Fail3 0\
\n}\
\n\
\n:set \$ScriptFailResult (\$Fail1 + \$Fail2 + \$Fail3)\
\n\
\n:foreach k,i in={\$ISPCase0;\$ISPCase1;\$ISPCase2;\$ISPCase3;\$ISPCase4;\
\$ISPCase5;\$ISPCase6;\$ISPCase7} do={\
\n:if (\$k = \$ScriptFailResult && \$ScriptFailResult != \$FailResult) do=\
{\
\n/ip route set [find comment=\$DRComment] gateway=\$i\
\n}\
\n}\
\n\
\n:foreach k,l in={\$LogCase0;\$LogCase1;\$LogCase2;\$LogCase3;\$LogCase4;\
\$LogCase5;\$LogCase6;\$LogCase7} do={\
\n:if (\$k = \$ScriptFailResult && \$ScriptFailResult != \$FailResult) do=\
{\
\n:log warning \$l\
\n}\
\n}\
\n\
\n:set \$FailResult \$ScriptFailResult"
marcotre80
Mikrotik-User 10° Liv
Mikrotik-User 10° Liv
 
Messaggi: 12
Iscritto il: sab 20 mag 2017, 10:43
Uso routerOS dalla Versione: v5.x

Re: crs125 24g

Messaggioda radiation » mer 14 mar 2018, 18:56

Appena riesco provo a caricare la conf per capire meglio; di primo acchitto non vedo problemi. Anzi.....mi sembra anche ben strutturata come regolamentazione.

Hai provato a verificare nei log se c'è qualcosa di strano? Magari un loop...
Andrea
Avatar utente
radiation
Staff rosIT
Staff rosIT
 
Messaggi: 486
Iscritto il: mer 11 dic 2013, 20:00
Uso routerOS dalla Versione: v3.x
Certificazioni Mikrotik: MTCNA, MTCWE
Preferred Training Centre: Nimwave

Re: crs125 24g

Messaggioda marcotre80 » mer 14 mar 2018, 19:16

radiation ha scritto:Appena riesco provo a caricare la conf per capire meglio; di primo acchitto non vedo problemi. Anzi.....mi sembra anche ben strutturata come regolamentazione.

Hai provato a verificare nei log se c'è qualcosa di strano? Magari un loop...


Ti ringrazio anticipatamente.
Ma se da questa config volessi eliminare il loading balance lasciando solo il failover, cosa dovrei eliminare come regola?

Grazie
marcotre80
Mikrotik-User 10° Liv
Mikrotik-User 10° Liv
 
Messaggi: 12
Iscritto il: sab 20 mag 2017, 10:43
Uso routerOS dalla Versione: v5.x

Re: crs125 24g

Messaggioda marcotre80 » gio 15 mar 2018, 19:26

ho disattivato tutte le mangle, funzionava bene ma ad un tratto internet lentissima quasi 0, ho risolto lasciando da winbox attiva una sola wan e tutto ha iniziato a funzionare benissimo
marcotre80
Mikrotik-User 10° Liv
Mikrotik-User 10° Liv
 
Messaggi: 12
Iscritto il: sab 20 mag 2017, 10:43
Uso routerOS dalla Versione: v5.x

Re: crs125 24g

Messaggioda marcotre80 » gio 15 mar 2018, 20:32

marcotre80 ha scritto:ho disattivato tutte le mangle, funzionava bene ma ad un tratto internet lentissima quasi 0, ho risolto lasciando da winbox attiva una sola wan e tutto ha iniziato a funzionare benissimo



Credo che il problema risieda proprio nel failover e suo script ma non so come riconfigurare il tutto :doh: :doh:
marcotre80
Mikrotik-User 10° Liv
Mikrotik-User 10° Liv
 
Messaggi: 12
Iscritto il: sab 20 mag 2017, 10:43
Uso routerOS dalla Versione: v5.x

Re: crs125 24g

Messaggioda marcotre80 » ven 16 mar 2018, 10:06

Alla fine ho semplificato lo script eliminando il load balance e impostando un semplice failover su 3 wan e attivato un forward sulle wan del mio nvr per renderlo trasparente al mk:

# mar/16/2018 09:00:09 by RouterOS 6.41.3
# software id = 7Q76-Q29J
#
# model = CRS125-24G-1S
# serial number = xxx
/interface bridge
add admin-mac=xxx auto-mac=no comment=\
"NO OFF per nessun motivo" name=bridge1 protocol-mode=none
/interface ethernet
set [ find default-name=ether1 ] comment="xxx.xxx.0.1 Tiscali" name=WAN1
set [ find default-name=ether2 ] comment="xxx.xxx.1.1 Infostrada" name=WAN2
set [ find default-name=ether3 ] comment="xxx.xxx.1.1 Huawei" name=WAN3
set [ find default-name=ether5 ] comment="Nas 2 xxx.xxx.xxx.xxx"
set [ find default-name=ether6 ] comment="Nas 1 xxx.xxx.xxx.xxx"
set [ find default-name=ether10 ] comment="d-link tx"
set [ find default-name=ether12 ] comment="7390 xxx.xxx.xxx.xxx"
set [ find default-name=ether14 ] comment="banco 1 MSI xxx.xxx.xxx.xxx"
set [ find default-name=ether15 ] comment="banco 1 lenovo xxx.xxx.xxx.xxx"
set [ find default-name=ether18 ] comment="banco nuovo msi asus custom pos"
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=ADSL-Coupler3
/ip pool
add name=dhcp_pool1 ranges=xxx.xxx.xxx.xxx-xxx.xxx.xxx.xxx
/ip dhcp-server
add address-pool=dhcp_pool1 authoritative=after-2sec-delay disabled=no \
interface=bridge1 name=dhcp1
/snmp community
set [ find default=yes ] addresses=0.0.0.0/0
/interface bridge port
add bridge=bridge1 interface=ether5
add bridge=bridge1 interface=ether6
add bridge=bridge1 interface=ether7
add bridge=bridge1 interface=ether8
add bridge=bridge1 interface=ether9
add bridge=bridge1 interface=ether10
add bridge=bridge1 interface=ether11
add bridge=bridge1 interface=ether12
add bridge=bridge1 interface=ether13
add bridge=bridge1 interface=ether14
add bridge=bridge1 interface=ether15
add bridge=bridge1 interface=ether16
add bridge=bridge1 interface=ether17
add bridge=bridge1 interface=ether18
add bridge=bridge1 interface=ether19
add bridge=bridge1 interface=ether20
add bridge=bridge1 interface=ether21
add bridge=bridge1 interface=ether22
add bridge=bridge1 interface=ether23
add bridge=bridge1 interface=ether24
add bridge=bridge1 interface=ether4
/ip address
add address=xxx.xxx.xxx.xxx/24 interface=bridge1 network=xxx.xxx.xxx.xxx
add address=xxx.xxx.xxx.xxx/24 interface=WAN1 network=xxx.xxx.xxx.xxx
add address=xxx.xxx.xxx.xxx/24 interface=WAN2 network=xxx.xxx.xxx.xxx
add address=xxx.xxx.xxx.xxx/24 interface=WAN3 network=xxx.xxx.xxx.xxx
/ip dhcp-server network
add address=xxx.xxx.xxx.xxx/24 gateway=xxx.xxx.xxx.xxx
/ip dns
set allow-remote-requests=yes cache-size=5000KiB max-udp-packet-size=512 \
servers=8.8.8.8,8.8.4.4
/ip firewall filter
add action=accept chain=input comment="winbox Wan1" dst-port=xxxx \
in-interface=WAN1 protocol=tcp
add action=accept chain=input comment="winbox wan2" dst-port=xxxx \
in-interface=WAN2 protocol=tcp
add action=accept chain=input comment="winbox wan3" dst-port=xxxx \
in-interface=WAN3 protocol=tcp
/ip firewall nat
add action=masquerade chain=srcnat out-interface=WAN1
add action=masquerade chain=srcnat out-interface=WAN2
add action=masquerade chain=srcnat out-interface=WAN3
add action=dst-nat chain=dstnat in-interface=WAN1 protocol=tcp to-addresses=\
xxx.xxx.xxx.xxx
add action=dst-nat chain=dstnat in-interface=WAN2 protocol=tcp to-addresses=\
xxx.xxx.xxx.xxx
add action=dst-nat chain=dstnat in-interface=WAN3 protocol=tcp to-addresses=\
xxx.xxx.xxx.xxx
/ip route
add check-gateway=ping distance=1 gateway=xxx.xxx.xxx.xxx
add distance=2 gateway=xxx.xxx.xxx.xxx
add distance=3 gateway=xxx.xxx.xxx.xxx
add distance=3 gateway=xxx.xxx.xxx.xxx
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=WAN2 type=internal
/lcd interface
add interface=bridge1
/lcd interface pages
set 2 interfaces=sfp1
/system clock
set time-zone-name=Europe/Rome
/system identity
set name=ADSL-Coupler3
/system ntp client
set enabled=yes primary-ntp=193.204.114.232 secondary-ntp=8.8.8.8
marcotre80
Mikrotik-User 10° Liv
Mikrotik-User 10° Liv
 
Messaggi: 12
Iscritto il: sab 20 mag 2017, 10:43
Uso routerOS dalla Versione: v5.x



Torna a RouterOS

Chi c’è in linea

Visitano il forum: Nessuno e 7 ospiti