Thanks for the fallow and the idear packet caputure
I did check packet capture
thie only thing going throu right now are ping to 8.8.8.8 and response but there are a lot of them (every second about 2 or 3 ping ) I have put some result bellow
25.135.225.168 is the ip assing by the cell phone provider
But what is weird I think is the IP 192.48.236.3 This IP is refer to by ARIN as own by mobup.com whitch is a Twitter service of mobile advertising
and the IP 198.246.30.1 is the WAN1 gateway IP of the MX behind the MG21E So I guest that this is what you were saying about the MX adding bandwith on all WAN ports
I there anyway to block answering to ping on the MG21E, at least that could help for the Twitter service
Thanks
Daniel
21:22:27.482620 IP 8.8.8.8 > 25.135.225.168: ICMP echo reply, id 54227, seq 282, length 64
21:22:27.498597 IP 198.246.30.1 > 25.135.225.168: ICMP echo reply, id 54483, seq 282, length 64
21:22:27.524590 IP 192.48.236.3.443 > 25.135.225.168.50689: Flags [F.], seq 1339843958, ack 482278337, win 271, options [nop,nop,TS val 335117731 ecr 81616114], length 0
21:22:27.544577 IP 192.48.236.3.443 > 25.135.225.168.51020: Flags [F.], seq 4001798523, ack 846653120, win 271, options [nop,nop,TS val 2747332167 ecr 81616094], length 0
21:22:27.842600 IP 192.48.236.3.443 > 25.135.225.168.50689: Flags [FP.], seq 4294967265:0, ack 1, win 271, options [nop,nop,TS val 335118035 ecr 81616114], length 31
21:22:28.260598 IP 192.48.236.3.443 > 25.135.225.168.51020: Flags [FP.], seq 4294967265:0, ack 1, win 271, options [nop,nop,TS val 2747332871 ecr 81616094], length 31
21:22:28.420693 IP 25.135.225.168 > 8.8.8.8: ICMP echo request, id 54227, seq 283, length 64
21:22:28.420705 IP 25.135.225.168 > 198.246.30.1: ICMP echo request, id 54483, seq 283, length 64
21:22:28.460660 IP 192.48.236.3.443 > 25.135.225.168.50689: Flags [FP.], seq 4294967265:0, ack 1, win 271, options [nop,nop,TS val 335118668 ecr 81616114], length 31
21:22:28.482682 IP 8.8.8.8 > 25.135.225.168: ICMP echo reply, id 54227, seq 283, length 64
21:22:28.500563 IP 198.246.30.1 > 25.135.225.168: ICMP echo reply, id 54483, seq 283, length 64
21:22:29.424395 IP 25.135.225.168 > 8.8.8.8: ICMP echo request, id 54227, seq 284, length 64
21:22:29.424409 IP 25.135.225.168 > 198.246.30.1: ICMP echo request, id 54483, seq 284, length 64
21:22:29.522695 IP 8.8.8.8 > 25.135.225.168: ICMP echo reply, id 54227, seq 284, length 64
21:22:29.538561 IP 198.246.30.1 > 25.135.225.168: ICMP echo reply, id 54483, seq 284, length 64
21:22:29.656689 IP 192.48.236.3.443 > 25.135.225.168.51020: Flags [FP.], seq 4294967265:0, ack 1, win 271, options [nop,nop,TS val 2747334279 ecr 81616094], length 31
21:22:29.678548 IP 192.48.236.3.443 > 25.135.225.168.50689: Flags [FP.], seq 4294967265:0, ack 1, win 271, options [nop,nop,TS val 335119884 ecr 81616114], length 31
21:22:30.471500 IP 25.135.225.168 > 8.8.8.8: ICMP echo request, id 54227, seq 285, length 64
21:22:30.471515 IP 25.135.225.168 > 198.246.30.1: ICMP echo request, id 54483, seq 285, length 64