Example with redsocks (simpler):
/tool sniffer quick ip-protocol=tcp port=1080 Check that packets reach the V2Ray proxy. v2ray mikrotik
Enable forwarding:
apt install redsocks /etc/redsocks.conf : Add a bypass rule:
base { log_debug = off; log_info = on; daemon = on; redirector = iptables; } redsocks { local_ip = 192.168.88.2; local_port = 12345; ip = 192.168.88.2; port = 1080; type = socks5; } log_info = on
sysctl -w net.ipv4.ip_forward=1 iptables -t nat -A PREROUTING -i eth0 -p tcp -j REDIRECT --to-port 12345 Send specific traffic (or all) to the Linux box. Route all internet traffic via Linux box (policy routing): /ip route add dst-address=0.0.0.0/0 gateway=192.168.88.2 (Only if Linux box has its own default route to the real internet) Or use firewall marking (e.g., only for certain src/dst): /ip firewall mangle add chain=prerouting src-address=192.168.88.100/32 action=mark-routing new-routing-mark=via-v2ray /ip route add dst-address=0.0.0.0/0 gateway=192.168.88.2 routing-mark=via-v2ray Step 4 – NAT Consideration If the Linux box is on the same LAN, ensure MikroTik does not NAT traffic to it. Add a bypass rule:
Web Hosting powered by Network Solutions® |