Community discussions

MikroTik App
 
EdPa
MikroTik Support
MikroTik Support
Topic Author
Posts: 340
Joined: Fri Sep 15, 2017 10:05 am
Location: Riga
Contact:

v7.12rc is released!

Fri Oct 06, 2023 11:59 am

RouterOS version 7.12rc has been released on the "v7 testing" channel!

Before an upgrade:
1) Remember to make backup/export files before an upgrade and save them on another storage device;
2) Make sure the device will not lose power during the upgrade process;
3) Device has enough free storage space to download all RouterOS packages.

What's new in 7.12rc7 (2023-Nov-08 10:18):

*) sfp - fixed occasional bad EEPROM data reading for L009 devices;
*) webfig - fixed authentication for branded login page (introduced in v7.12beta7);

What's new in 7.12rc6 (2023-Nov-06 14:54):

*) mqtt - fixed service startup on boot (introduced in v7.12rc4);

What's new in 7.12rc5 (2023-Nov-02 15:17):

*) bth - added "Back To Home" VPN service for ARM, ARM64, and TILE devices;
*) console - display "End-User License Agreement" prompt after configuration reset;
*) ethernet - fixed default "advertise" property for CRS310-8G+2S+ device (introduced in v7.12beta3);
*) sfp - fixed 1Gbps advertise for L009 devices (introduced in v7.12beta3);
*) sfp - fixed 1Gbps advertise using SFP+ or SFP28 modules in SFP interface (introduced in v7.12beta3);
*) sfp - improved system stability with certain modules for 98DX224S, 98DX226S, 98DX3236, 98DX8216 and 98DX8208 switch chips;

What's new in 7.12rc4 (2023-Oct-27 11:51):

*) lte - fixed FG621-EA possible timeouts during firmware upgrade;
*) netinstall-cli - fixed "-k" key option (introduced in v7.12beta7);
*) poe-out - removed "auto" mode support for L009 devices;
*) routerboard - fixed "reset-button" support for wAP ac and wAP R ac devices;
*) sfp - fixed incorrect link speed when changing link modes (introduced in v7.12beta3);
*) system - fixed process multithreading (introduced in v7.9);
*) system - improved system stability during booting for L009 devices;

What's new in 7.12rc2 (2023-Oct-16 17:50):

*) bridge - fixed bridge host ageing timeout behaviour (introduced in 7.12beta8);
*) led - fixed CRS312 Ethernet port LED functionality (introduced in 7.12rc1);
*) led - fixed 5G modem mobile network category LED colours;
*) ospf - fixed OSPFv3 authentication header length calculation;
*) pimsm - fixed BSR update process;
*) pimsm - fixed UIB update process;
*) qsfp - fixed incorrect QSFP temperature readings in negative temperature;
*) route - fixed VRF functionality on devices where "single-process" routing process mode is enabled (introduced in 7.12rc1);
*) sfp - fixed link establishment after forced speed changes for RB4011 and CCR2004-16G-2S+ devices (introduced in 7.12rc1);
*) sfp - fixed link establishment with passive copper cables for RB4011 and CCR2004-16G-2S+ devices (introduced in 7.12rc1);

What's new in 7.12rc1 (2023-Oct-05 08:46):

!) ethernet - changed "advertise" and "speed" arguments, and removed "half-duplex" setting under "/interface ethernet" menu;
!) sfp - convert configuration to support new link modes for SFP and QSFP type of interfaces;
*) bfd - fixed sessions when setting VRF;
*) bfd - improved system stability;
*) console - improved system stability;
*) email - rename "address" property to "server";
*) flash - show more accurate "total-hdd-space" resource property;
*) gps - expose GPS port for Quectel EM12-G (vendor-id="0x2c7c", device-id="0x0512");
*) ike1 - fixed invalid key length on phase1 negotiation;
*) interface - added "macvlan" interface support;
*) l3hw - prioritize local IP addresses over the respective /32 and /128 routes;
*) leds - fixed "wireless-status" and "wireless-signal-strength" for wireless interfaces (introduced in v7.12beta7);
*) netinstall-cli - updated configuration option description;
*) pimsm - improved system stability;
*) poe-out - improved "auto" mode for devices with single PoE-out port;
*) qsfp - improved auto link detection for AOC cables;
*) route - added "single-process" configuration setting, enabled by default on devices with 64MB or less RAM memory;
*) route - added "suppress-hw-offload" setting for IPv6 routes;
*) sfp - added 5Gbps rate for SFP+ interface on 98DX224S, 98DX226S, and 98DX3236 switch chips;
*) sfp - fixed failed auto-negotiation for RB5009 devices (introduced in v7.12beta3);
*) sfp - improved system stability with certain modules for 98DX224S, 98DX226S, 98DX3236, 98DX8216 and 98DX8208 switch chips;
*) tftp - fixed empty file name matching;
*) webfig - fixed interface addition (introduced in v7.12beta7);
*) wifiwave2 - added an alternative QoS priority assignment mechanism based on IP DSCP;
*) wifiwave2 - added station-bridge interface mode;
*) wifiwave2 - implemented an option to transmit IP multicast packets as unicasts;
*) wifiwave2 - use CAPsMAN's "datapath.vlan-id" on CAP for bridge port "pvid";
*) winbox - added "Addresses" property under "Routing/BFD/Configuration" menu;
*) winbox - added "BUS" property for USB Power Reset button for LtAP-2HnD and CCR1072;
*) winbox - added "USB" button under "System/RouterBOARD" menu for LtAP-2HnD;
*) winbox - added Enable/Disable button under "Routing/RIP/Static Neighbors" menu;
*) winbox - added missing properties under "WifiWave2" menu;
*) winbox - do not show "F" flag for disabled entries under "IP/Routes" menu;
*) winbox - fixed "Do" property under "Routing/Filters/Select Rule" menu;
*) winbox - fixed "Range" property under "Routing/Filters/Num Set" menu;
*) winbox - fixed "Switch" menu for CCR2004-16G-2S+;
*) winbox - improved support for certain properties under "WifiWave2/Interworking Profiles" menu;
*) winbox - show "unknown" value for "FS" property under "System/Disks" menu if the data is not available;
*) wireguard - added "auto" and "none" parameter for "private-key" and "presharde-key" parameters;
*) wireguard - allow to specify client settings under peer menu which will be included in configuration file and QR code;

Other changes since v7.11:

!) health - removed "temperature" health entry from boards, where it was the same as "sfp-temperature";
*) api - fixed fetching objects with warning option from REST API;
*) bgp - fixed "atomic-aggregate" always set in output;
*) bgp - fixed "input.filter-chain" argument selection in VPN configuration;
*) bgp - fixed local and remote port settings for BGP connections;
*) bgp - fixed typos and missing spaces in log messages;
*) bgp - implemented IGP metric sending in BGP messages;
*) bgp - improved logging;
*) bgp - increase "hold-time" limit to 65000;
*) bluetooth - added basic support for connecting to BLE peripheral devices;
*) bluetooth - use "g" units when decoding MikroTik beacon acceleration on peripheral devices menu;
*) bridge - fixed fast-path forwarding with HW offloaded vlan-filtering (introduced in v7.11);
*) bridge - fixed untagged VLAN entry disable;
*) bridge - fixed vlan-filtering stability with HW and non-HW offloaded ports (introduced in v7.10);
*) bridge - improved system stability;
*) bridge - improved vlan-filtering bridge stability with CAPsMAN (introduced in v7.11);
*) calea - improved system stability when trying to add rules without the CALEA package;
*) certificate - allow to get and maintain Let's Encrypt certificate in IPv6 environment;
*) certificate - allow to remove issued certificates when CRL is not used;
*) certificate - fixed "subject-alt-name" duplicating itself when SCEP is used;
*) certificate - fixed certificate auto renewal via SCEP;
*) certificate - improved certificate validation logging error messages;
*) certificate - log CRL HTTP errors under the "error" logging topic;
*) chr - iavf updated driver to 4.9.1 version;
*) chr - increased OVA default RAM amount from 160MB to 256MB;
*) console - added ":jobname" command;
*) console - added "as-string" and "as-string-value" properties for "get" command;
*) console - added "terminal/ask" command;
*) console - added "transform" property for ":convert" command;
*) console - export required properties with default values;
*) console - fixed scheduler "on-event" script highlighting when editing;
*) console - improved ":totime" and ":tonum" commands and added ":tonsec" command for time value manipulation;
*) console - improved multi-argument property parsing into array;
*) console - improved randomness for ":rndstr" and ":rndnum" commands;
*) console - improved stability and responsiveness;
*) console - improved stability when editing long scripts;
*) console - improved stability when using "special-login";
*) console - improved system stability through RoMON session;
*) console - improved system stability when using autocomplete;
*) console - restrict permissions to "read,write,reboot,ftp,romon,test" for scripts executed by DHCP, Hotspot, PPP and Traffic-Monitor services;
*) console - show full date and time in scheduler "next-run" property;
*) dhcp - fixed DHCP server "authoritative" and "delay-threshold" settings (introduced in v7.12beta3);
*) dhcp - fixed DHCP server and relay related response delays;
*) ethernet - added "supported" and "sfp-supported" values for "monitor" command;
*) firewall - added "ein-snat" and "ein-dnat" connection NAT state matchers for filter and mangle rules;
*) ike1 - log an error when non-RSA keys are being used;
*) ike2 - improved rekey collision handling;
*) iot - fixed an issue where applying a script to GPIO pin caused GPIO to stop working;
*) iot - fixed behavior where GPIO output state would change on boot;
*) ipsec - fixed Diffie-Hellman public value encoding size;
*) ipsec - fixed IPSec policy when using modp3072;
*) ipsec - fixed minor typo in logs;
*) ipsec - reduce disk writes when started without active configuration;
*) ipv6 - fixed IPv6 RA delay time from 5s to 500ms according to RFC;
*) ipv6 - send RA and RA deprecate messages out three times instead of just once;
*) l3hw - fixed IPv6 route suppression;
*) l3hw - improved system stability during IPv6 route offloading;
*) led - fixed "interface-status" configuration for virtual interfaces;
*) leds - added "dark-mode" functionality for RBwAPG-5HacD2HnD;
*) leds - added "wireless-status" and "wireless-signal-strength" configuration types for wifiwave2 interfaces;
*) log - improved logging for user actions;
*) lora - added LNS protocol support;
*) lte - added at-chat support and increased wait time on modem at-chat for Dell DW5821e, DW5821e-eSIM, DW5829e and DW5829e-eSIM;
*) lte - added SINR reporting for FG621-EA modem;
*) lte - changed R11e-LTE ARP behavior to NoArp;
*) lte - fixed 5G data-class reporting for Chateau 5G;
*) lte - fixed APN authentification in multi APN setup for R11e-LTE6;
*) lte - fixed IPv6 prefix for MBIM modems in multi-apn setup when IPv6 APN used as not first APN;
*) lte - fixed RSSI for FG621-EA modem to show the correct value;
*) lte - fixed Sierra modem detection for modems with vendor-specific USB descriptors;
*) lte - fixed Sierra modem initialization;
*) lte - fixed startup race condition when SIM card is in "up" slot for LtAP mini;
*) lte - fixed sub-interface auto-removal in multiple APN setups;
*) lte - show correct data class when connected to 5G SA network;
*) lte - use more compact logging messages;
*) modbus - added additional security settings for Modbus TCP;
*) mpls - added option to match and set MPLS EXP with bridge and mangle rules;
*) mpls - fixed "propagate-ttl=no" setting;
*) mpls - improved FastPath next-hop selection hash algorithm;
*) mqtt - added on-message feature for subscribed topics;
*) mqtt - added parallel-scripts-limit parameter to set maximum allowed number of scripts executed at the same time;
*) mqtt - added wildcard topic subscription support;
*) netinstall - added option to discard branding package;
*) netinstall - display package filename in GUI Description column if package description is not specified;
*) netinstall-cli - added empty configuration option "-e";
*) netinstall-cli - added option to discard branding package;
*) netinstall-cli - allow ".rsc" script filenames;
*) netinstall-cli - prioritise interface option over address option;
*) netwatch - decreased "thr-tcp-conn-time" maximum limit to 30 seconds;
*) ospf - fixed adding ECMP routes;
*) ospf - fixed BFD on virtual-link with configured VRF;
*) ospf - fixed OSPFv3 not working with NSSA areas;
*) ospf - fixed parsing of opaque LSAs used by TE;
*) ospf - fixed translated NSSA routes not showing in backbone;
*) ovpn - added "tls-auth" option support for imported .ovpn profiles;
*) ovpn - improved system stability;
*) poe-out - driver optimization for AF/AT controlled boards;
*) poe-out - fixed rare CRS328 poe-out menu and poe-out port config loss after reboot;
*) port - add support for Huawei MS237h-517;
*) port - expose NMEA/DIAG ports for Dell DW5821e and DW5821e-eSIM;
*) qsfp - added 50Gbps rate support for QSFP28 interfaces;
*) qsfp - fixed sub-interface EEPROM monitor data output (introduced in v7.12beta3);
*) qsfp - improved auto link detection for 100G CWDM4 modules and AOC cables (introduced in v7.12beta3);
*) qsfp - use sub-interface configuration for establishing link (for 40Gbps and 100Gbps links, all sub-interfaces must be enabled);
*) quickset - fixed "LAN" interface list members if configuration does not contain bridge;
*) rip - added BFD support;
*) rip - fixed session not working in VRF;
*) route - fixed gateway after link restart;
*) route - removed deprecated "received-from" property;
*) route - reverse community "delete" and "filter" command behavior;
*) routerboard - added "reset-button" support for RB800, RB1100 and RB1100AHx2 devices;
*) sfp - fixed 25Gbps link with FEC91 (introduced in v7.12beta7);
*) sfp - fixed missing "rx-power" monitor with certain modules (introduced in v7.10);
*) sfp - improved interface stability for SFP and QSFP types of interfaces;
*) snmp - changed "mtxrGaugeValue" type to integer;
*) ssh - added support for user ed25519 public keys;
*) ssh - allow to specify key owner on import;
*) ssh - fixed SSH tunnel performance (introduced in v7.10);
*) ssh - improved connection stability when pasting large chunks of text into console;
*) supout - added interface list members section;
*) supout - added LLDP power to supout.rif;
*) supout - fixed BFD section;
*) switch - fixed packet forwarding between Ethernet ports for CRS354 switches (introduced in v7.12beta7);
*) switch - improved resource allocation for 98DX224S, 98DX226S, and 98DX3236 switch chips;
*) switch - improved switch chip stability for CCR2004-16g-2s+ devices;
*) system - improved system stability when MD5 checksums are used;
*) tile - improved system stability when using queues;
*) traffic-generator - added "priority" property for "inject" command;
*) traffic-generator - fixed traffic-generator on CHR and x86;
*) usb - added support for RTL8153 USB ethernet on ARM, ARM64 and x86;
*) vrf - limit maximum VRFs to 1024;
*) vxlan - improved system stability for Tile devices;
*) webfig - fixed "Days" property configuration change under "IP/Firewall" menu;
*) webfig - fixed timezone for interface "Last Link Down/Up Time";
*) webfig - improved Webfig performance and responsiveness;
*) webfig - try to re-establish connection after disconnect;
*) wifiwave2 - added comment property for registration-table;
*) wifiwave2 - correctly add interface to specified "datapath.interface-list";
*) wifiwave2 - do not show default "l2mtu" on compact export;
*) wifiwave2 - enable changing interface MTU and L2MTU;
*) wifiwave2 - fixed malformed Interworking packet elements;
*) wifiwave2 - fixed PTK renewal for interfaces in station mode;
*) wifiwave2 - fixed re-connection failures for 802.11ax interfaces in station mode;
*) wifiwave2 - fixed sniffer command not receiving any QoS null function frames when using 802.11ax radios;
*) wifiwave2 - fixed untagged VLAN 1 entry when using "vlan-id" setting together with vlan-filtering bridge;
*) wifiwave2 - fixed warning on CAP devices when radar detected;
*) wifiwave2 - improved compliance with regulatory requirements;
*) wifiwave2 - limit L2MTU to 1560 until a fix is available for a bug causing interfaces to fail transmitting larger frames than that;
*) wifiwave2 - list APs with a higher maximum data rate as more preferable roaming candidates;
*) wifiwave2 - log more information regarding authentication failures;
*) wifiwave2 - make 4-way handshake procedure more robust when acting as supplicant (client);
*) winbox - added "Comment" under "Routing/BFD/Configuration" menu;
*) winbox - added "g" flag under "IPv6/Routes" menu;
*) winbox - added "Host Key Type" setting under "IP/SSH" menu;
*) winbox - added "Key Owner" setting under "System/User/SSH Keys" and "System/User/SSH Private Keys" menus;
*) winbox - added "Name Format" property under "WifiWave2/Provisioning" menu;
*) winbox - added "Remote Min Tx" parameter under "Routing/BFD/Session" menu;
*) winbox - added "Startup Delay" setting under "Tools/Netwatch" menu;
*) winbox - added "Use BFD" setting under "Routing/RIP/Interface-Template" menu;
*) winbox - added MQTT subscription menu;
*) winbox - allow to change port numbers for SCTP, DCCP, and UDP-LITE protocols under "IP/Firewall" menus;
*) winbox - allow to set multiple addresses and added IPv6 support under "Interface/VETH" menu;
*) winbox - allow to specify server as DNS name under "Tools/Email" menu;
*) winbox - changed "MBR Partition Table" checkbox to unchecked by default under "System/Disks/Format-Drive" menu;
*) winbox - fixed "Address" property under "WifiWave2/Remote-CAP" menu;
*) winbox - fixed "Group Key Update" maximum value under "WifiWave2/Security" menu;
*) winbox - fixed entry numbering and ordering under "WifiWave2/Provisioning" menu;
*) winbox - fixed minor typos;
*) winbox - rename "DSCP" setting to "DSCP (+ECN)" under "Tools/Traffic-Generator/Packet-Templates" menu;
*) winbox - rename "Name" setting to "List" under "IP,IPv6/Firewall/Address-List" menu;
*) winbox - rename "Password" button to "Change Now" under "System/Password" menu;
*) wireguard - added "wg-export" and "wg-import" functionality (CLI only);
*) wireguard - request public or private key to be specified in order to create peer;
*) wireless - added more "radius-mac-format" options (CLI only);
*) wireless - fixed malformed Interworking packet elements;
*) www - fixed allowed address setting for REST API users;
*) www - fixed fragmented POST data for SCEP service;
*) x86 - added support for Mellanox ConnectX-6 Dx NIC;
*) x86 - i40e updated driver to 2.23.17 version;
*) x86 - igb updated driver to 5.14.16 version;
*) x86 - igbvf updated driver from in-tree Linux kernel;
*) x86 - igc updated driver to 5.10.194 version;
*) x86 - ixgbe updated driver to 5.19.6 version;
*) x86 - Realtek r8169 updated driver;
*) x86 - updated latest available pci.ids;

To upgrade, click "Check for updates" at /system package in your RouterOS configuration interface, or head to our download page: http://www.mikrotik.com/download

If you experience version related issues, please send a supout file from your router to support@mikrotik.com. File must be generated while a router is not working as suspected or after some problem has appeared on the device

Please keep this forum topic strictly related to this particular RouterOS release.
 
User avatar
loloski
Member
Member
Posts: 420
Joined: Mon Mar 15, 2021 9:10 pm

Re: v7.12rc is released!

Fri Oct 06, 2023 12:23 pm

Does it mean ISIS will slide to 7.13? normally when RC was release there's no other feature will come in
 
Rox169
Member
Member
Posts: 467
Joined: Sat Sep 04, 2021 1:47 am

Re: v7.12rc is released!

Fri Oct 06, 2023 12:58 pm

yes, in RC release there's no other feature will come in
 
User avatar
petardo
newbie
Posts: 30
Joined: Fri Sep 25, 2015 4:06 pm

Re: v7.12rc is released!

Fri Oct 06, 2023 1:11 pm

No BTH option in IP/CLOUD
 
User avatar
TeWe
Frequent Visitor
Frequent Visitor
Posts: 56
Joined: Tue Sep 12, 2023 1:27 pm

Re: v7.12rc is released!

Fri Oct 06, 2023 1:34 pm

BTH is still in BETA stadium - hence only in BETA versions available and not in RC's or STABLE's
 
holvoetn
Forum Guru
Forum Guru
Posts: 6760
Joined: Tue Apr 13, 2021 2:14 am
Location: Belgium

Re: v7.12rc is released!

Fri Oct 06, 2023 1:36 pm

No BTH option in IP/CLOUD
Probably not yet ready for general release.
Stay with latest 7.12 beta or wait for 7.13 beta, I 'm sure it will reappear there (was also the case with 7.11, it was removed when it got to stable but came back in 7.12 beta).
 
EdPa
MikroTik Support
MikroTik Support
Topic Author
Posts: 340
Joined: Fri Sep 15, 2017 10:05 am
Location: Riga
Contact:

Re: v7.12rc is released!

Fri Oct 06, 2023 1:46 pm

Correct, just like in 7.11rc release, BTH was also removed from 7.12rc. It will return in 7.13beta versions!

Edit:
Added back in 7.12rc5.
 
llamajaja
Member Candidate
Member Candidate
Posts: 275
Joined: Sat Sep 30, 2023 3:11 pm

Re: v7.12rc is released!

Fri Oct 06, 2023 2:08 pm

Will the wireguard creation file capability get moved to winbox or will stay only with CLI, if so can some CLI examples be added to the docs....
There are some hints for Back to Home, but that should be moved to under the wireguard documenation section, and with more meat on the bone (IMHO).
 
User avatar
TeWe
Frequent Visitor
Frequent Visitor
Posts: 56
Joined: Tue Sep 12, 2023 1:27 pm

Re: v7.12rc is released!

Fri Oct 06, 2023 2:48 pm

BTH topics should be discussed here I guess:
viewtopic.php?p=1026991
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Fri Oct 06, 2023 4:52 pm

This time I manually rebooted the router before trying to install the update, and the reboot was hanging. Just like the update is hanging when I try it after some uptime.
Could it be caused by rose-storage? I have an NFS mount (the router mounts a share from an NFS server). I could imagine that this is not unmounted before the interfaces go down, and then it takes a long time to unmount the NFS share in the reboot procedure (I don't have much patience, after a minute or two I just powercycle the router).
Are there others who use NFS mount that experience problems rebooting?
 
effitall
just joined
Posts: 8
Joined: Wed May 17, 2023 7:46 pm

Re: v7.12rc is released!

Fri Oct 06, 2023 10:26 pm

I see lots of "bridge" updates....But still haven't seen anything about fixing MLAG? It's been broken since 7.7.

Any plans to fix this?
 
kreb
just joined
Posts: 10
Joined: Fri Mar 10, 2023 8:35 pm

Re: v7.12rc is released!

Sat Oct 07, 2023 12:42 am

CCR2116, problem with IPv6 routing with OSPFv3, going back to the stable version fixed the issue.
 
dakobg
Member Candidate
Member Candidate
Posts: 120
Joined: Mon Nov 06, 2017 8:58 am

Re: v7.12rc is released!

Sat Oct 07, 2023 12:48 am

wifiwave2 - use CAPsMAN's "datapath.vlan-id" on CAP for bridge port "pvid"; << Thank you!
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Sat Oct 07, 2023 1:32 am

wifiwave2 - use CAPsMAN's "datapath.vlan-id" on CAP for bridge port "pvid"; << Thank you!
Yeah, does this do what I think it does???
 
User avatar
Ullinator
just joined
Posts: 17
Joined: Tue Jun 08, 2021 12:53 pm
Location: North-West Germany

Re: v7.12rc is released!

Sat Oct 07, 2023 1:46 am

wifiwave2 - use CAPsMAN's "datapath.vlan-id" on CAP for bridge port "pvid"; << Thank you!
Yeah, does this do what I think it does???
Yes it does:
[attachment=0]Screenshot_20231007-004343.png[/attachment
💪😁
You do not have the required permissions to view the files attached to this post.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Sat Oct 07, 2023 2:13 am



Yeah, does this do what I think it does???
Yes it does:
[attachment=0]Screenshot_20231007-004343.png[/attachment
💪😁
Does it also add the interface to the VLANs tab in the bridge as tagged? My VLANs for WiFi work fine regardless of the PVID setting on the port but they don't work at all unless the WiFi interface is added to the VLAN as "tagged". This happens automatically on legacy CAPsMAN.
 
User avatar
Ullinator
just joined
Posts: 17
Joined: Tue Jun 08, 2021 12:53 pm
Location: North-West Germany

Re: v7.12rc is released!

Sat Oct 07, 2023 9:53 am


Yes it does:
Screenshot_20231007-004343.png[/attachment 💪😁 [/quote] Does it also add the interface to the VLANs tab in the bridge as tagged? My VLANs for WiFi work fine regardless of the PVID setting on the port but they don't work at all unless the WiFi interface is added to the VLAN as "tagged". This happens automatically on legacy CAPsMAN. [/quote] Yes, it does it also. It´s now the same behaviour as with the "old" CAPsMAN for AC devices. [attachment=0]hc_159.jpg
Does it also add the interface to the VLANs tab in the bridge as tagged? My VLANs for WiFi work fine regardless of the PVID setting on the port but they don't work at all unless the WiFi interface is added to the VLAN as "tagged". This happens automatically on legacy CAPsMAN.
Yes, it does it also. It´s now the same behaviour as with the "old" CAPsMAN for AC devices.
hc_159.jpg
You do not have the required permissions to view the files attached to this post.
 
jhbarrantes
Frequent Visitor
Frequent Visitor
Posts: 56
Joined: Wed Aug 21, 2019 2:56 pm

Re: v7.12rc is released!

Sat Oct 07, 2023 10:16 am



Does it also add the interface to the VLANs tab in the bridge as tagged? My VLANs for WiFi work fine regardless of the PVID setting on the port but they don't work at all unless the WiFi interface is added to the VLAN as "tagged". This happens automatically on legacy CAPsMAN.
Yes, it does it also. It´s now the same behaviour as with the "old" CAPsMAN for AC devices.
hc_159.jpg
Nothing about forwarding mode yet, right? I mean, you still need to declare and filter the VLANs on the CAP itself, rather than forwarding everything back to CAPsMAN tunneled, as in previous version.

Thx!
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Sat Oct 07, 2023 11:06 am

And can you assign the VLAN to each client separately using RADIUS (via user-manager)? That was possible in the old WiFi.
 
gigabyte091
Forum Guru
Forum Guru
Posts: 1522
Joined: Fri Dec 31, 2021 11:44 am
Location: Croatia

Re: v7.12rc is released!

Sat Oct 07, 2023 1:28 pm

I don't know for 7.12rc1 but on 7.12beta9 it's possible, I tested that few days ago, I removed datapaths, tag VLANs that i want to use on CAP and that's it, no configuration was done on CAP itself. User manager assign VLAN to wireless clients as defined in user groups.

viewtopic.php?t=200209
 
seriquiti
newbie
Posts: 25
Joined: Wed May 11, 2022 12:55 pm

Re: v7.12rc is released!

Sat Oct 07, 2023 3:27 pm

On RB750GR3 I'm getting random link downs for 10-30 seconds on ethernet ports. Downgrading back to Beta version fixes problem.
 
jd603
Frequent Visitor
Frequent Visitor
Posts: 54
Joined: Tue Dec 23, 2014 4:41 am

Re: v7.12rc is released!

Sat Oct 07, 2023 4:36 pm

Since this 7.12rc1 upgrade from 7.10 x86 i'm seeing rx-errors on interfaces that previously had none. Other side shows no errors. It's not a lot of errors and doesn't seem to be impacting performance yet but it's something new. I'm assuming this was driver changes that may have induced it. Anyone else seeing this. Just standard intel 10gbit nics and it happens with both dac cables and SFPs and it is happening on two different NICs so it is not the NIC itself.
 
kravemir
Frequent Visitor
Frequent Visitor
Posts: 97
Joined: Sun Aug 13, 2023 10:55 am
Location: Slovakia
Contact:

Re: v7.12rc is released!

Sat Oct 07, 2023 4:37 pm

*) wifiwave2 - use CAPsMAN's "datapath.vlan-id" on CAP for bridge port "pvid";
*) bridge - fixed fast-path forwarding with HW offloaded vlan-filtering (introduced in v7.11);
*) bridge - fixed vlan-filtering stability with HW and non-HW offloaded ports (introduced in v7.10);
*) bridge - improved vlan-filtering bridge stability with CAPsMAN (introduced in v7.11);

Is the issue with VLAN tagging on hAP ac³ fixed now?

From docs WifiWave2 datapath docs, description of vlan-id property:

802.11n/ac interfaces do not support this type of VLAN tagging under the wifiwave2 package, but they can be configured as VLAN access ports in bridge settings.

(not just from docs, I've found it in docs, after I experienced the issue - just that it's known issue by MikroTik - present in docs)
 
colin
Frequent Visitor
Frequent Visitor
Posts: 90
Joined: Mon May 11, 2015 11:11 am

Re: v7.12rc is released!

Sat Oct 07, 2023 7:11 pm

*) interface - added "macvlan" interface support;
I've been waiting for years, and now we finally have macvlan, thanks.
macvlan.PNG
You do not have the required permissions to view the files attached to this post.
 
itrack
just joined
Posts: 17
Joined: Sun Oct 08, 2023 10:57 am
Location: Localhost
Contact:

7.12rc1 bug?

Sun Oct 08, 2023 11:07 am

Hello!
I have a CCR2116-12G-4S+ , after installing version 7.12rc1 I noticed a strange behavior, the coolets start and stop quickly. The red LED for FAULT also lit up. The interface was still working but it was loading very slowly, I went into the logs and it seems that the power supply had failed "PSU2 entered state FAIL".

I restarted the router and used the other power supply, after a while "PSU1 entered state FAIL".
I should mention that all this time routing, NAT is working.

Can you investigate this problem?
Thank you!
 
holvoetn
Forum Guru
Forum Guru
Posts: 6760
Joined: Tue Apr 13, 2021 2:14 am
Location: Belgium

Re: 7.12rc1 bug?

Sun Oct 08, 2023 1:06 pm

Best to report directly to support.
 
Guscht
Member Candidate
Member Candidate
Posts: 263
Joined: Thu Jul 01, 2010 5:32 pm

Re: v7.12rc is released!

Sun Oct 08, 2023 1:12 pm

Please explain this, Mikrotik:
!) ethernet - changed "advertise" and "speed" arguments, and removed "half-duplex" setting under "/interface ethernet" menu;

I read this, you remove half-duplex capabilities?! And if yes, WHY on earth do you do this? AFAIK HDX is required by IEEE 802.3?
 
holvoetn
Forum Guru
Forum Guru
Posts: 6760
Joined: Tue Apr 13, 2021 2:14 am
Location: Belgium

Re: v7.12rc is released!

Sun Oct 08, 2023 1:17 pm

Something from beta7.
See here

viewtopic.php?p=1027223#p1027223
 
User avatar
mivsek
just joined
Posts: 3
Joined: Mon Jul 23, 2018 10:31 am
Location: Slovenia

Re: v7.12rc is released!

Sun Oct 08, 2023 1:44 pm

*) pimsm - improved system stability;
Thank you MikroTik to care about Multicast protocols too!
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Sun Oct 08, 2023 2:37 pm

Does it also add the interface to the VLANs tab in the bridge as tagged? My VLANs for WiFi work fine regardless of the PVID setting on the port but they don't work at all unless the WiFi interface is added to the VLAN as "tagged". This happens automatically on legacy CAPsMAN.
Yes, it does it also. It´s now the same behaviour as with the "old" CAPsMAN for AC devices.
OK so now the real questions.
  • Does any of this apply if I have "slaves static" applied?
  • Does 7.12rc1 have to be on both the cap and the capsman device?
As you can probably guess, none of this dynamic stuff mentioned in 7.12rc1 is working for me at all. That is, I see no change in behaviour.
 
User avatar
Ullinator
just joined
Posts: 17
Joined: Tue Jun 08, 2021 12:53 pm
Location: North-West Germany

Re: v7.12rc is released!

Sun Oct 08, 2023 6:46 pm


Yes, it does it also. It´s now the same behaviour as with the "old" CAPsMAN for AC devices.
OK so now the real questions.
  • Does any of this apply if I have "slaves static" applied?
  • Does 7.12rc1 have to be on both the cap and the capsman device?
As you can probably guess, none of this dynamic stuff mentioned in 7.12rc1 is working for me at all. That is, I see no change in behaviour.
I don´t know what you mean with "slaves static", but to enable the dynamic add of virtual wifi interfaces to the bridge it´s nessesary to enable the "Slaves Datapath"
in the CAP menu on the CAP itself.
hc_161.jpg
This is the trick, without this setting nothing happens in the bridge or the VLANs on the CAP.
You have to configure the right local bridge of the CAP:
hc_162.jpg
You do not have the required permissions to view the files attached to this post.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Mon Oct 09, 2023 2:06 am

I don´t know what you mean with "slaves static", but to enable the dynamic add of virtual wifi interfaces to the bridge it´s nessesary to enable the "Slaves Datapath" in the CAP menu on the CAP itself.

This is the trick, without this setting nothing happens in the bridge or the VLANs on the CAP.
I already do that. Let me turn of Slaves Static. For reference, this was enabled because on earlier revisions of 7.X, any change to the WiFi configuration would cause the wifi slave interfaces to renumber and NOT get added to the bridge ports list.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Mon Oct 09, 2023 2:18 am

OK, turning off slaves static seems to fix it. Thanks for the assist; this has been a real pain for the last 6 months or so.

I can only assume that the fact my setup worked even though the PVID of the slave WiFi interface bridge ports was set to "1" rather than 10 (the VLAN id that I use), it's because the devices were receiving frames with a VLAN tag but ignoring the tag. Now with the PVID set to 10, which matches the VLAN tagging setting in the bridge, the different must be that the frames are not being sent out to clients with the tag applied.

I should probably go and prove this via Wireshark.

P.S. I don't suppose if you know whether wifi1 and wifi2 should also be dynamically added to the bridge or if it only applies to slave interfaces? I tested it just now and it only seems to apply to the slaves. That is, I need to manually add wifi1 and wifi2 to the bridge with PVID 1.
Last edited by BartoszP on Mon Oct 09, 2023 9:39 am, edited 1 time in total.
Reason: remove selfquote of own preceding post
 
hooyao
newbie
Posts: 44
Joined: Mon Feb 20, 2017 6:11 pm

Re: intel i211 tx-rx queues have regression on x86

Mon Oct 09, 2023 9:56 am

I have a x86 box(with 2 intel i211) with Mikrtok v7(L4) installed. The tx and rx irqs are assigned to 1 cpu on 7.12rc, as a result, the CPU usage is not even distributed to all 4 cores.

The same x86
On 7.12rc
7.12-irq.png
Speedtest.net
7.12-cpu.png
On 7.11.2
7.11.2-irq.png
Speedtest.net
7.11.2-cpu.png
You do not have the required permissions to view the files attached to this post.
 
User avatar
Ullinator
just joined
Posts: 17
Joined: Tue Jun 08, 2021 12:53 pm
Location: North-West Germany

Re: v7.12rc is released!

Mon Oct 09, 2023 10:09 am

P.S. I don't suppose if you know whether wifi1 and wifi2 should also be dynamically added to the bridge or if it only applies to slave interfaces? I tested it just now and it only seems to apply to the slaves. That is, I need to manually add wifi1 and wifi2 to the bridge with PVID 1.
They are added dynamically to the bridge:
hc_661.jpg
You do not have the required permissions to view the files attached to this post.
 
Kindis
Member
Member
Posts: 441
Joined: Tue Nov 01, 2011 6:54 pm
Location: Sweden

Re: v7.12rc is released!

Mon Oct 09, 2023 11:28 am

@Kaldek, I moved all my Cap AX to be managed by CapsMAN a few weeks ago and have no issues. Running 7.11.2 right now and all interfaces, both main and slaves are added to bridge and correct VLAN, even if there is a bug that add PVID 1 right now, fixed in 7.12, everything works great and I LOVE that roaming works!! Now I can finally move around while having a teams call.
Have a look at the VLAN example here: https://help.mikrotik.com/docs/display/ ... ionexample:
Works great for as as long as you do not miss configuring slaves-datapath as I did first!
 
gigabyte091
Forum Guru
Forum Guru
Posts: 1522
Joined: Fri Dec 31, 2021 11:44 am
Location: Croatia

Re: v7.12rc is released!

Mon Oct 09, 2023 12:56 pm

Does anybody know where I can download 7.12beta9 for arm64 ? Main and extra packages. Can't find it on Mikrotik web site... Can't update to 7.12RC1 because I need BTH.
 
holvoetn
Forum Guru
Forum Guru
Posts: 6760
Joined: Tue Apr 13, 2021 2:14 am
Location: Belgium

Re: v7.12rc is released!

Mon Oct 09, 2023 12:57 pm

Use URL for rc package and modify as needed.
 
 
gigabyte091
Forum Guru
Forum Guru
Posts: 1522
Joined: Fri Dec 31, 2021 11:44 am
Location: Croatia

Re: v7.12rc is released!

Mon Oct 09, 2023 1:40 pm

Thank you both
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Mon Oct 09, 2023 3:10 pm

P.S. I don't suppose if you know whether wifi1 and wifi2 should also be dynamically added to the bridge or if it only applies to slave interfaces? I tested it just now and it only seems to apply to the slaves. That is, I need to manually add wifi1 and wifi2 to the bridge with PVID 1.
They are added dynamically to the bridge:
hc_661.jpg
Well bugger me, looks like I also need to work out why that isn't happening.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Mon Oct 09, 2023 3:12 pm

@Kaldek, I moved all my Cap AX to be managed by CapsMAN a few weeks ago and have no issues. Running 7.11.2 right now and all interfaces, both main and slaves are added to bridge and correct VLAN, even if there is a bug that add PVID 1 right now, fixed in 7.12, everything works great and I LOVE that roaming works!! Now I can finally move around while having a teams call.
Have a look at the VLAN example here: https://help.mikrotik.com/docs/display/ ... ionexample:
Works great for as as long as you do not miss configuring slaves-datapath as I did first!
Cheers mate, I've had working vlans for ages, it's just the dynamic bridge port stuff I never had working on wifiwave2.
 
txfz
Frequent Visitor
Frequent Visitor
Posts: 66
Joined: Tue Mar 10, 2020 9:02 am

Re: v7.12rc is released!

Mon Oct 09, 2023 3:13 pm

Automatically generating a private key for WireGuard peers is convenient, but it should not be permanently stored after the fact as that entirely defeats the purpose of the asymmetric cryptography. It also does not appear to be possible to remove a stored private key from a peer configuration once generated.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Tue Oct 10, 2023 1:44 am

They are added dynamically to the bridge
Can I ask you for an export of your Datapath settings for the wifi1 and wifi2 interfaces? There's something you're doing which makes the dynamic assignment work, and there's something I'm doing which is stopping it from working.

Update: The only way I can get the wifi1 and wifi2 interfaces dynamically into the bridge is to put the follow command on the cAP ax itself:
/interface/wifiwave2/set wifi1 configuration.manager=capsman .mode=ap datapath.bridge=bridge
/interface/wifiwave2/set wifi2 configuration.manager=capsman .mode=ap datapath.bridge=bridge
If I don't manually add the "datapath.bridge=bridge" to the cAP itself, the interface will not by dynamically added to the bridge ports.

I fail to see how this is any more helpful or "better" than the following commands, which is how I'm doing it currently:
/interface bridge port add bridge=bridge interface=wifi1
/interface bridge port add bridge=bridge interface=wifi2
It's still two lines of commands, entered on the cAP. Nothing at the CAPsMAN side seems to be able to implement this.
 
jhbarrantes
Frequent Visitor
Frequent Visitor
Posts: 56
Joined: Wed Aug 21, 2019 2:56 pm

Re: v7.12rc is released!

Tue Oct 10, 2023 9:44 am

Did anyone testing 7.12rc1in a wifiwave2 device (hAP-ax3 in my case) notice some kind of stickiness to 2,4GHz frecuency? Previously roaming to 5GHz works flawlesly in 7.11, but now it seems some devices are kind of lazy to roam, even when they are quite close to the AP (2m away, literaly), unless you remove that from registration list. 5GHz is operating in 5180MHz, so DFS radar issue is discarded.

Thanks!
 
uCZBpmK6pwoZg7LR
Frequent Visitor
Frequent Visitor
Posts: 58
Joined: Mon Jun 15, 2015 12:23 pm

Re: v7.12rc is released!

Tue Oct 10, 2023 10:30 am

Fix at last firewall problem with interface unknown to interface unknown. Due to this issue mikrotik firewall does not work at all for MPLS VPN4 traffic. You have critical security issue but continue to fix useless docker containers.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Tue Oct 10, 2023 1:51 pm

Did anyone testing 7.12rc1in a wifiwave2 device (hAP-ax3 in my case) notice some kind of stickiness to 2,4GHz frecuency? Previously roaming to 5GHz works flawlesly in 7.11, but now it seems some devices are kind of lazy to roam, even when they are quite close to the AP (2m away, literaly), unless you remove that from registration list. 5GHz is operating in 5180MHz, so DFS radar issue is discarded.
I've found that some intel AX cards get weird preference for 2.4ghz. I really need to capture the 802.11k and 802.11v data and see if there is anything in there which is confusing clients.
 
User avatar
Ullinator
just joined
Posts: 17
Joined: Tue Jun 08, 2021 12:53 pm
Location: North-West Germany

Re: v7.12rc is released!

Tue Oct 10, 2023 2:28 pm

They are added dynamically to the bridge
Can I ask you for an export of your Datapath settings for the wifi1 and wifi2 interfaces? There's something you're doing which makes the dynamic assignment work, and there's something I'm doing which is stopping it from working.

Update: The only way I can get the wifi1 and wifi2 interfaces dynamically into the bridge is to put the follow command on the cAP ax itself:
/interface/wifiwave2/set wifi1 configuration.manager=capsman .mode=ap datapath.bridge=bridge
/interface/wifiwave2/set wifi2 configuration.manager=capsman .mode=ap datapath.bridge=bridge
If I don't manually add the "datapath.bridge=bridge" to the cAP itself, the interface will not by dynamically added to the bridge ports.

I fail to see how this is any more helpful or "better" than the following commands, which is how I'm doing it currently:
/interface bridge port add bridge=bridge interface=wifi1
/interface bridge port add bridge=bridge interface=wifi2
It's still two lines of commands, entered on the cAP. Nothing at the CAPsMAN side seems to be able to implement this.
Yes, you´re right, you have to configure the "Datapath" on the CAP itself in the Wifiwave2 menu.
But this ist the way like MT mentioned it has to be. It was the answer even in one of my support tickets from the MT-support (SUP-115988)
I totally agree that you have to configure much more locally on the CAPs as it was before in the "old" CAPsMAN for AC devices and I´m not totally happy with this. But it works.
Hopefully MT will enhance this in the upcomming ROS versions.
Here are the most important configs on the CAP:
/interface wifiwave2 datapath
add bridge=bridge1-Hausnetz disabled=no name=Hausnetz
/interface bridge port
add bridge=bridge1-Hausnetz interface=ether1 trusted=yes
add bridge=bridge1-Hausnetz interface=ether2
/interface bridge vlan
add bridge=bridge1-Hausnetz tagged=ether1,ether2 vlan-ids=99
add bridge=bridge1-Hausnetz tagged=ether1,ether2 vlan-ids=98
/interface wifiwave2 cap
set certificate=request discovery-interfaces=bridge1-Hausnetz enabled=yes lock-to-caps-man=yes slaves-datapath=Hausnetz
 
rzirzi
Member
Member
Posts: 393
Joined: Mon Oct 09, 2006 2:33 pm

Re: intel i211 tx-rx queues have regression on x86

Wed Oct 11, 2023 9:48 am

I have a x86 box(with 2 intel i211) with Mikrtok v7(L4) installed. The tx and rx irqs are assigned to 1 cpu on 7.12rc, as a result, the CPU usage is not even distributed to all 4 cores.
Can anyone else confirm that problem witx x86 machines and RouterOS 7.x ?
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Wed Oct 11, 2023 12:48 pm

Yes, you´re right, you have to configure the "Datapath" on the CAP itself in the Wifiwave2 menu.
But this ist the way like MT mentioned it has to be. It was the answer even in one of my support tickets from the MT-support (SUP-115988)
I totally agree that you have to configure much more locally on the CAPs as it was before in the "old" CAPsMAN for AC devices and I´m not totally happy with this. But it works.
Thanks, I'm glad we clarified this. A big part of the problem with annoucements about Wifiwave2 and CAPsMAN is it's never really clear where commands need to be entered: the manager or the access point.
 
User avatar
CoMMyz
Frequent Visitor
Frequent Visitor
Posts: 64
Joined: Fri Dec 04, 2015 10:56 pm

Re: intel i211 tx-rx queues have regression on x86

Wed Oct 11, 2023 6:38 pm

I have a x86 box(with 2 intel i211) with Mikrtok v7(L4) installed. The tx and rx irqs are assigned to 1 cpu on 7.12rc, as a result, the CPU usage is not even distributed to all 4 cores.
Can anyone else confirm that problem witx x86 machines and RouterOS 7.x ?
We just manually set the cores and it works fine.
 
jhbarrantes
Frequent Visitor
Frequent Visitor
Posts: 56
Joined: Wed Aug 21, 2019 2:56 pm

Re: v7.12rc is released!

Wed Oct 11, 2023 8:31 pm

Did anyone testing 7.12rc1in a wifiwave2 device (hAP-ax3 in my case) notice some kind of stickiness to 2,4GHz frecuency? Previously roaming to 5GHz works flawlesly in 7.11, but now it seems some devices are kind of lazy to roam, even when they are quite close to the AP (2m away, literaly), unless you remove that from registration list. 5GHz is operating in 5180MHz, so DFS radar issue is discarded.
I've found that some intel AX cards get weird preference for 2.4ghz. I really need to capture the 802.11k and 802.11v data and see if there is anything in there which is confusing clients.
Thanks a lot for confirming this Kaldek. Same behavior here.

Kind regards!
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Thu Oct 12, 2023 12:12 pm



I've found that some intel AX cards get weird preference for 2.4ghz. I really need to capture the 802.11k and 802.11v data and see if there is anything in there which is confusing clients.
Thanks a lot for confirming this Kaldek. Same behavior here.

Kind regards!
Have a play with the adapter options for "preferred band" and "Roaming aggressiveness". They seem to help on these Intel cards.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Thu Oct 12, 2023 12:25 pm

Yes, you´re right, you have to configure the "Datapath" on the CAP itself in the Wifiwave2 menu.
I guess this makes sense, when viewed (on the cAP) from the perspective of the CLI rather than the GUI:
/interface wifiwave2 datapath add bridge=bridge name="Local Bridge"
/interface wifiwave2 set [ find default-name=wifi1 ] configuration.manager=capsman .mode=ap datapath="Local Bridge"
/interface wifiwave2 set [ find default-name=wifi2 ] configuration.manager=capsman .mode=ap datapath="Local Bridge"
/interface wifiwave2 cap set discovery-interfaces=bridge enabled=yes slaves-datapath="Local Bridge" slaves-static=no
The above code creates the datapath, then sets that datapth for the default/primary interfaces and any slaves.
 
Rox169
Member
Member
Posts: 467
Joined: Sat Sep 04, 2021 1:47 am

Re: v7.12rc is released!

Fri Oct 13, 2023 2:07 pm

unfortunately no RC this week :/
 
User avatar
TeWe
Frequent Visitor
Frequent Visitor
Posts: 56
Joined: Tue Sep 12, 2023 1:27 pm

Re: v7.12rc is released!

Fri Oct 13, 2023 5:53 pm

It is very very quiet recently - in both beta and stable threads.
Not sure - it might be a good sign?
Maybe even a v7 long-term on the way?
 
gigabyte091
Forum Guru
Forum Guru
Posts: 1522
Joined: Fri Dec 31, 2021 11:44 am
Location: Croatia

Re: v7.12rc is released!

Fri Oct 13, 2023 7:30 pm

Well, there is no point in releasing something that isn't tested just to release it. I'm sure there is version ready to be released.
 
kreb
just joined
Posts: 10
Joined: Fri Mar 10, 2023 8:35 pm

Re: v7.12rc is released!

Sat Oct 14, 2023 2:51 pm

It is very very quiet recently - in both beta and stable threads.
Not sure - it might be a good sign?
Maybe even a v7 long-term on the way?
it's not as frequent as before, maybe vacation time?
 
buset1974
Frequent Visitor
Frequent Visitor
Posts: 86
Joined: Wed Sep 13, 2006 12:12 pm
Location: Jakarta

Re: v7.12rc is released!

Sun Oct 15, 2023 5:44 am

They must doing more frequently, so many unanswer tickets
 
User avatar
strods
MikroTik Support
MikroTik Support
Posts: 1658
Joined: Wed Jul 16, 2014 7:22 am
Location: Riga, Latvia

Re: v7.12rc is released!

Sun Oct 15, 2023 11:08 am

Do not worry, rc2 is coming soon. No need for intrigues. Simply we do release the next rc usually when all the known regressions are resolved. We are not there yet but will be soon.
 
killersoft
Member Candidate
Member Candidate
Posts: 263
Joined: Mon Apr 11, 2011 2:34 pm
Location: Victoria, Australia

Re: v7.12rc is released!

Sun Oct 15, 2023 11:16 am

Just trialed 7.12rc to try and get WAVE2-Capsman-Controller ( on a RB5009 ) to properly set VLAN datapath on a cap unit ( in my case a cAP ax ) set as a cap with the manager set to capsman.
I run a campus of older MT wireless and use a separate controller which is its ONLY task(not routing traffic via it), and have wifi units use local unit VLAN distribution to connect capsman controlled units to use vlans within the units bridge/vlan system, old capsman works great from that perspective. Anyhow I'v been trying to add ax into the mix and working on the new WAVE2 controller to do the same vlan-filtering bridge hand off.. I know this rc1 release is the first one to get close to actually working..
Anyhow the crux of the 7.12rc1 issue is that the allocated VLAN for each wireless-radio is being put into "Current Tagged" and should be going into "Current untagged" in the bridge/vlan.. This needs to be fixed, so clients get attached to correct vlans. At the moment, technically speaking clients would have to have tagged wifi!!

See attached pic's.
THIS IS THE CONTROLLER
WAVE2_CAP_CONTROLLER__7.12rc1.png
THIS IS THE CAP (Showing that the wifi radios are being put in the tagged, when they should be going into the untagged area when the unit is brought up )
WAVE2_CAP_CONTROLLER__7.12rc1.png
You do not have the required permissions to view the files attached to this post.
 
Kindis
Member
Member
Posts: 441
Joined: Tue Nov 01, 2011 6:54 pm
Location: Sweden

Re: v7.12rc is released!

Sun Oct 15, 2023 1:41 pm

Why do you have a VLAN interface under the Bridge?
In my setup they all report as tagged into the Bridge which is what I want. Then the bridge has a trunk port to the switches to manage the VLAN so it finds it's way back to the firewall/router to be processed.
I can be wrong here but if they where untagged in that case they would end up on the VLAN that you set on the bridge, which in my case is my management VLAN, everything else runs as tagged.
 
killersoft
Member Candidate
Member Candidate
Posts: 263
Joined: Mon Apr 11, 2011 2:34 pm
Location: Victoria, Australia

Re: v7.12rc is released!

Sun Oct 15, 2023 2:06 pm

Why do you have a VLAN interface under the Bridge?
In my setup they all report as tagged into the Bridge which is what I want. Then the bridge has a trunk port to the switches to manage the VLAN so it finds it's way back to the firewall/router to be processed.
I can be wrong here but if they where untagged in that case they would end up on the VLAN that you set on the bridge, which in my case is my management VLAN, everything else runs as tagged.
Because putting VLANs under the bridge is the correct method for Trunk and Access Ports in Mikrotik.
See: https://help.mikrotik.com/docs/display/ ... ccessPorts
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 12980
Joined: Thu Mar 03, 2016 10:23 pm

Re: v7.12rc is released!

Sun Oct 15, 2023 5:01 pm

I can be wrong here ...

You are wrong. The untagged ports end up in VLAN according to PVID setting (which is per port).
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Mon Oct 16, 2023 4:51 am

Just trialed 7.12rc to try and get WAVE2-Capsman-Controller ( on a RB5009 ) to properly set VLAN datapath on a cap unit ( in my case a cAP ax ) set as a cap with the manager set to capsman.
..
Anyhow the crux of the 7.12rc1 issue is that the allocated VLAN for each wireless-radio is being put into "Current Tagged" and should be going into "Current untagged" in the bridge/vlan..
I seem to recall I also had this issue on my cAP ax units. Unfortunately I don't recall what I did exactly to resolve that particular issue but from the basics the first step was to make sure that the bridge configuration on the cAP ax units is correct as per Mikrotik documentation, and let CAPsMAN perform all the rest of the work automatically.

On the cAP, and in consideration of your desire for your default VLAN ID to be 1000:
/interface bridge
add name=bridge vlan-filtering=yes pvid=1000
/interface wifiwave2 datapath add bridge=bridge name="Local Bridge" vlan-id=1000
/interface wifiwave2 set [ find default-name=wifi1 ] configuration.manager=capsman .mode=ap datapath="Local Bridge"
/interface wifiwave2 set [ find default-name=wifi2 ] configuration.manager=capsman .mode=ap datapath="Local Bridge"
/interface wifiwave2 cap set discovery-interfaces=bridge enabled=yes slaves-datapath="Local Bridge" slaves-static=no
The above will add the wifi1 and wifi2 interfaces to the bridge with PVID 1000. Un-tagged.

Don't rely on the CAPsMAN for assigning what the PVID is for the wifi1 and wifi2 interfaces, nor should you rely on CAPsMAN to assign those interfaces as bridge ports. It has to be done locally on the cAP.

CAPsMAN will happily do all of the subsequent work for slave interfaces automatically.

As for the VLAN interface, you don't need it. If the bridge's own PVID is 1000 (and why wouldn't it be if that's your un-tagged VLAN), just assign IP addresses to the bridge itself.
 
killersoft
Member Candidate
Member Candidate
Posts: 263
Joined: Mon Apr 11, 2011 2:34 pm
Location: Victoria, Australia

Re: v7.12rc is released!

Mon Oct 16, 2023 2:03 pm

I run a CAMPUS mikrotik wifi network ~60 Radio's worth using legacy CAPsMAN. I can tell you it dynamically add's wireless access points & slave-ap's interfaces properly using VLAN's that are dynamically added to the bridge ( Yes I need to make sure that the required VLANs are on the bridge of the AP which helps ! ), but I can generally sit back at just 1 capsman console and make changes to the whole campus without needing to log into any 1 device.
I run a variety of slave AP's per radio each with a different VLAN/SSID/PW/ETC without issue..

These wifi wave2's capsmans is not yet as fully functional as the legacy CAPsMAN, and I'm just pointing out where this vlan/datapath/ tagging function needs to be fixed.. My example I'm using is not in the production environment. I have 10 new cAP AX's on the shelf, and waiting to install once this gets fixed.
 
mducharme
Trainer
Trainer
Posts: 1777
Joined: Tue Jul 19, 2016 6:45 pm
Location: Vancouver, BC, Canada

Re: v7.12rc is released!

Tue Oct 17, 2023 12:17 am

These wifi wave2's capsmans is not yet as fully functional as the legacy CAPsMAN, and I'm just pointing out where this vlan/datapath/ tagging function needs to be fixed.. My example I'm using is not in the production environment. I have 10 new cAP AX's on the shelf, and waiting to install once this gets fixed.
I'm afraid I don't quite follow what you still need fixed to make use of the cAP ax's in this way. With this RC version I would think everything is there that you now need.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Tue Oct 17, 2023 2:33 am

These wifi wave2's capsmans is not yet as fully functional as the legacy CAPsMAN, and I'm just pointing out where this vlan/datapath/ tagging function needs to be fixed.. My example I'm using is not in the production environment. I have 10 new cAP AX's on the shelf, and waiting to install once this gets fixed.
I think it's time you uploaded your configs mate. What you're saying doesn't match my own experience with the exact same setup I have (minus about 56 APs). That is, I have an RB5009 acting as the CAPsMAN, and four cAP ax units, all running 7.12rc1.

It's easy for me to say this, and I certainly could be wrong, but I suspect you're still trying to shoehorn a legacy configuration approach into the WifiWave2 way of doing things. Seeing your CAPsMAN code and cAP code will help validate that.
 
Kindis
Member
Member
Posts: 441
Joined: Tue Nov 01, 2011 6:54 pm
Location: Sweden

Re: v7.12rc is released!

Tue Oct 17, 2023 9:10 am

I do not get your config either and do not understand the untagged thing nor the VLAN interface you have but as I started I do not fully understand what you are trying to do either.
I have 3 cAP AX and untagged on them is the management VLAN to which they access the CapsMAN server and, and there are no clients, and all other SSID are connected to a VLAN and is tagged and this work great. I miss the ability to send all traffic to the CaposMAN router but patching VLAN for 3 ap's is not that bad. So the setup works and it is all based on new config in new CapsMAN, not pushing legacy settings into CapsMAN V2 from V1. Since 7.11.2 this works great with the issue that VLAN 1 pops up in bridge config on each AP but for me this is only a cosmetic issue and will be resolved with 7.12. So for me and several other this works. No critic on your setup just curios what you want to accomplice.
 
mducharme
Trainer
Trainer
Posts: 1777
Joined: Tue Jul 19, 2016 6:45 pm
Location: Vancouver, BC, Canada

Re: v7.12rc is released!

Tue Oct 17, 2023 9:17 am

I suspect there are some misunderstandings here regarding VLANs with the wifiwave2 CAPsMAN. I currently don't have access to any MikroTik wifi6 devices and only set them up once a few months back, so this is from memory, but unless I'm remembering wrong, and I could be, I believe this is accurate:
- VLANs should work even without bridge filtering turned on for the cAP ax units as the interface itself tags the packet (as though the client itself was tagging it)
- In the case of bridge vlan filtering being turned on (again should not be necessary), the setting shown by killersoft in the screenshots should be correct as packets that are already tagged with vlan 1000 would be coming out of the wifi interface and entering the bridge port, so vlan 1000 should be tagged for that port and not untagged. Again, this is because the wifi interface is tagging the packet and so if it is as though the client itself is sending the packet with the 1000 tag already present.
- If the bridge port was showing as "untagged" for VLAN 1000 like killersoft wants, I would think the result would likely be packets being double tagged, vlan 1000 tagged going into a bridge port with pvid 1000 resulting in two vlan tags of 1000, an inner 1000 tag and an outer 1000 tag

It seems like people have this same misunderstanding these days even with the old MikroTik wireless stack - they seem to forget that the wireless interface itself tags the packet from the client and so the tag still works even with bridge vlan filtering off. It's as if the release of the bridge vlan filtering feature has made multitudes of people suddenly think you need to use bridge vlan filtering to have working vlans with MikroTik wireless. The only use for bridge vlan filtering on an AP is if you really need to configure the tagging configuration of the ethernet port(s) on the device.
 
uCZBpmK6pwoZg7LR
Frequent Visitor
Frequent Visitor
Posts: 58
Joined: Mon Jun 15, 2015 12:23 pm

Re: v7.12rc is released!

Tue Oct 17, 2023 9:54 am

Please fix SUP-130540 and SUP-130672
 
User avatar
infabo
Forum Guru
Forum Guru
Posts: 1465
Joined: Thu Nov 12, 2020 12:07 pm

Re: v7.12rc is released!

Tue Oct 17, 2023 9:58 am

You better ask for a status/feedback on your support tickets directly using the service desk. Instead of posting these support ticket numbers here. I have no clue what your problems are, as the service desk is not a public issue tracker. It just adds noise here.
 
Kindis
Member
Member
Posts: 441
Joined: Tue Nov 01, 2011 6:54 pm
Location: Sweden

Re: v7.12rc is released!

Tue Oct 17, 2023 10:03 am

As there is no forward mode anymore in V2, which I used before, I had to change my setup. Before all VLAN management was done in CapsMAN and the APs only had an access port without any tagging etc. This has changed now so I need to have VLAN on each AP, I hope this change in the future, and for this reason I adopted the example that Mikrotik has on their wiki in regards to CapsMAN and Wifiwave 2 with VLAN and this uses a bridge on the CAP itself.
https://help.mikrotik.com/docs/display/ ... ionexample:

I get that the each wifi interface do tag the traffic and then the bridge also have to add (dynamically) that port with the same tagged VLAN, on the bridge, to get the traffic of the AP, which now works.
What I do not get is how this is backward thinking as I'm using the recommended config from Mikrotik.
Please note I do not say anyone is wrong here I'm just stating that using the bridge in the mikrotik example works and that I do not get what Kaldek wants to do but that is me being curios not critical.
 
mducharme
Trainer
Trainer
Posts: 1777
Joined: Tue Jul 19, 2016 6:45 pm
Location: Vancouver, BC, Canada

Re: v7.12rc is released!

Tue Oct 17, 2023 10:11 am

What I do not get is how this is backward thinking as I'm using the recommended config from Mikrotik.
I didn't specifically mean *you* here, but in general, what I mean is on the CAP devices people shouldn't need bridge VLAN filtering at all. The official MikroTik config you linked to has bridge VLAN filtering turned off for the APs (it is only on for the CAPsMAN itself). The only reason it is included in MikroTik's CAPsMAN config example is that it is assumed that you might want tagging control over the ethernet ports on the CAPsMAN device as the CAPsMAN is more likely to double as a switch as it is probably an RB5009 or something.

The only reason you would want bridge vlan filtering turned on for something like a cAP ax device is if you wanted to use the second ethernet port on the device as an access port to plug something else into like a camera and you wanted to put that port on a certain untagged VLAN. Otherwise, for the most part, all enabling bridge vlan filtering is doing is making it so that whenever you want to add a new wireless VLAN you have to reconfigure all APs individually, and therefore making more work for you. With bridge vlan filtering turned off on the CAPs, you can add new wireless VLANs to your CAPs without logging into them at all.
 
Njumaen
Frequent Visitor
Frequent Visitor
Posts: 96
Joined: Wed Feb 24, 2016 8:41 pm
Location: Bielefeld, Germany
Contact:

Re: v7.12rc is released!

Tue Oct 17, 2023 10:58 am

Had two times the issue that capsman2 stopped working in 24 hours. No wifi interfaces! Needed to reboot via VPN ;)

Downgraded to latest stable.
 
killersoft
Member Candidate
Member Candidate
Posts: 263
Joined: Mon Apr 11, 2011 2:34 pm
Location: Victoria, Australia

Re: v7.12rc is released!

Tue Oct 17, 2023 1:39 pm

I think it's time you uploaded your configs mate.
HERE IS A VIDEO SHOWING THE ISSUE
https://www.youtube.com/watch?v=PLI-1Qm1Lp4

HERE IS THE CONTROLLER
/interface wifiwave2 channel
add band=5ghz-ac disabled=no frequency=5200 name=5GHZ_CHANNEL40_20_AC width=20mhz
add band=2ghz-n disabled=no frequency=2437 name=2GHZ_CHANNEL6_20_N width=20mhz
/interface wifiwave2 datapath
add disabled=no name=datapath10 vlan-id=10
add disabled=no name=datapath20 vlan-id=20
add disabled=no name=datapath30 vlan-id=30
/interface wifiwave2 security
add authentication-types=wpa2-psk disabled=no name=VLAN10_GUEST_INTERNET
add authentication-types=wpa2-psk disabled=no name=VLAN20_CORP_INTERNET
add authentication-types=wpa2-psk disabled=no name=VLAN30_INTERNAL_SYSTEMS
/interface wifiwave2 configuration
add channel=5GHZ_CHANNEL40_20_AC country=Australia datapath=datapath10 disabled=no mode=ap name=5GHZ_VLAN10_GUEST_INTERNET security=VLAN10_GUEST_INTERNET ssid=GUESTINTERNET
add datapath=datapath30 disabled=no name=5GHZ_VLAN30_INTERNALSYSTEMS security=VLAN30_INTERNAL_SYSTEMS ssid=INTERNALSYSTEMS
add datapath=datapath20 disabled=no name=5GHZ_VLAN20_CORP_INTERNET security=VLAN20_CORP_INTERNET ssid=CORPINTERNET
add channel=2GHZ_CHANNEL6_20_N country=Australia datapath=datapath10 disabled=no mode=ap name=2.4GHZ_VLAN10_GUEST_INTERNET security=VLAN10_GUEST_INTERNET ssid=GUESTINTERNET
add datapath=datapath20 disabled=no name=2.4GHZ_VLAN20_CORP_INTERNET security=VLAN20_CORP_INTERNET ssid=CORPINTERNET
add datapath=datapath30 disabled=no name=2.4GHz_VLAN30_INTERNALSYSTEMS security=VLAN30_INTERNAL_SYSTEMS ssid=INTERNALSYSTEMS
/interface wifiwave2
add channel=2GHZ_CHANNEL6_20_N channel.frequency=2437 configuration=2.4GHZ_VLAN10_GUEST_INTERNET configuration.mode=ap disabled=no name=2.4GHZ_MASTER_VLAN10 radio-mac=48:A9:8A:CC:77:E5
add channel.frequency=2437 configuration=2.4GHZ_VLAN20_CORP_INTERNET configuration.mode=ap disabled=no mac-address=4A:A9:8A:CC:77:E5 master-interface=2.4GHZ_MASTER_VLAN10 name=2.4GHZ_SLAVE_VLAN20
add channel.frequency=2437 configuration=2.4GHz_VLAN30_INTERNALSYSTEMS configuration.mode=ap disabled=no mac-address=4A:A9:8A:CC:77:E6 master-interface=2.4GHZ_MASTER_VLAN10 name=2.4GHZ_SLAVE_VLAN30
add channel=5GHZ_CHANNEL40_20_AC channel.frequency=5200 configuration=5GHZ_VLAN10_GUEST_INTERNET configuration.mode=ap datapath=datapath10 disabled=no name=5GHZ_MASTER_VLAN10 radio-mac=48:A9:8A:CC:77:E4 security=VLAN10_GUEST_INTERNET
add configuration=5GHZ_VLAN20_CORP_INTERNET configuration.mode=ap disabled=no mac-address=4A:A9:8A:CC:77:E4 master-interface=5GHZ_MASTER_VLAN10 name=5GHZ_SLAVE_VLAN20
add configuration=5GHZ_VLAN30_INTERNALSYSTEMS configuration.mode=ap disabled=no mac-address=4A:A9:8A:CC:77:E7 master-interface=5GHZ_MASTER_VLAN10 name=5GHZ_SLAVE_VLAN30
/interface wifiwave2 capsman
set enabled=yes interfaces=vlan100 package-path="" require-peer-certificate=no upgrade-policy=none
HERE IS THE EXAMPLE CAP AX UNIT
/interface bridge
add admin-mac=AA:BB:CC:DD:EE:FF auto-mac=no frame-types=admit-only-vlan-tagged name=bridge1 vlan-filtering=yes
/interface vlan
add interface=bridge1 name=vlan100-MANAGEMENT vlan-id=100
/interface wifiwave2 datapath
add bridge=bridge1 comment=defconf disabled=no name=capdp
/interface wifiwave2
# managed by CAPsMAN
# mode: AP, SSID: GUESTINTERNET, channel: 5200/ac
set [ find default-name=wifi1 ] configuration.manager=capsman .mode=ap datapath=capdp disabled=no name=wifi1-5GHZ
# managed by CAPsMAN
# mode: AP, SSID: GUESTINTERNET, channel: 2437/n
set [ find default-name=wifi2 ] configuration.manager=capsman .mode=ap datapath=capdp disabled=no name=wifi2-2.4GHz
/interface bridge port
add bridge=bridge1 frame-types=admit-only-vlan-tagged interface=ether1
/ip neighbor discovery-settings
set discover-interface-list=all
/interface bridge vlan
add bridge=bridge1 tagged=ether1,bridge1 vlan-ids=100
add bridge=bridge1 tagged=ether1 vlan-ids=10
add bridge=bridge1 tagged=ether1 vlan-ids=20
add bridge=bridge1 tagged=ether1 vlan-ids=30
/interface wifiwave2 cap
set discovery-interfaces=vlan100-MANAGEMENT enabled=yes slaves-datapath=capdp
/ip address
add address=192.168.100.2/24 interface=vlan100-MANAGEMENT network=192.168.100.0
/ip cloud
set update-time=no
/ip dhcp-client
add interface=bridge1
/system identity
set name=ExampleUnit1
/system note
set show-at-login=no
/tool romon
set enabled=yes
 
User avatar
strods
MikroTik Support
MikroTik Support
Posts: 1658
Joined: Wed Jul 16, 2014 7:22 am
Location: Riga, Latvia

Re: v7.12rc is released!

Tue Oct 17, 2023 1:41 pm

What's new in 7.12rc2 (2023-Oct-16 17:50):

*) bridge - fixed bridge host ageing timeout behaviour (introduced in 7.12beta8);
*) led - fixed CRS312 Ethernet port LED functionality (introduced in 7.12rc1);
*) led - fixed 5G modem mobile network category LED colours;
*) ospf - fixed OSPFv3 authentication header length calculation;
*) pimsm - fixed BSR update process;
*) pimsm - fixed UIB update process;
*) qsfp - fixed incorrect QSFP temperature readings in negative temperature;
*) route - fixed VRF functionality on devices where "single-process" routing process mode is enabled (introduced in 7.12rc1);
*) sfp - fixed link establishment after forced speed changes for RB4011 and CCR2004-16G-2S+ devices (introduced in 7.12rc1);
*) sfp - fixed link establishment with passive copper cables for RB4011 and CCR2004-16G-2S+ devices (introduced in 7.12rc1);
 
User avatar
Ullinator
just joined
Posts: 17
Joined: Tue Jun 08, 2021 12:53 pm
Location: North-West Germany

Re: v7.12rc is released!

Tue Oct 17, 2023 3:13 pm

Installation without any problems, until now everything is working :-)
hc_063.jpg
You do not have the required permissions to view the files attached to this post.
 
marekm
Member
Member
Posts: 416
Joined: Tue Feb 01, 2011 11:27 pm

Re: v7.12rc is released!

Tue Oct 17, 2023 4:19 pm

KNOT Modbus TCP/RTU gateway bug (TCP response one byte too short, triggered if second byte of RTU CRC is 0) not fixed in 7.12rc2 yet.
#[SUP-130404]
Unit ID 2, two reads of 2 holding registers starting from 40033, between the reads register 40034 has changed from 0x0004 to 0x0000.
Second TCP response is one byte too short (bug triggered because last byte of RTU frame, second byte of CRC, happens to be 0).

On the RTU (RS485) side the frames look like this:

02 03 00 20 00 02 c5 f2
02 03 04 00 f0 00 04 c8 c3

02 03 00 20 00 02 c5 f2
02 03 04 00 f0 00 00 c9 00
 
User avatar
own3r1138
Forum Veteran
Forum Veteran
Posts: 727
Joined: Sun Feb 14, 2021 12:33 am
Location: Pleiades
Contact:

Re: v7.12rc is released!

Tue Oct 17, 2023 4:20 pm

On iOS 17 devices, established IKE2 peers will disconnect after 24 minutes of being connected.
The disconnect happened after rekeying sent by the responder and then rejected by the initiator.
ROS = 7.11.2, 7.12rc1
Responder PFS= none
 14:13:28 ipsec --->IPSEC: -> ike2 request, exchange: CREATE_CHILD_SA:44 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec --->IPSEC: payload seen: ENC (292 bytes)
 14:13:28 ipsec --->IPSEC: processing payload: ENC
 14:13:28 ipsec,debug --->IPSEC: => iv (size 0x10)
 14:13:28 ipsec --->IPSEC: payload seen: NOTIFY (12 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: SA (92 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: NONCE (20 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: KE (72 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: TS_I (24 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: TS_R (24 bytes)
 14:13:28 ipsec --->IPSEC: create child: respond
 14:13:28 ipsec --->IPSEC: processing payloads: NOTIFY
 14:13:28 ipsec --->IPSEC:   notify: REKEY_SA
 14:13:28 ipsec --->IPSEC: rekeying child SA 0xd1dabae
 14:13:28 ipsec --->IPSEC: peer wants tunnel mode
 14:13:28 ipsec --->IPSEC: processing payload: TS_R
 14:13:28 ipsec --->IPSEC: 0.0.0.0/0
 14:13:28 ipsec --->IPSEC: processing payload: TS_I
 14:13:28 ipsec --->IPSEC: 172.18.2.200
 14:13:28 ipsec --->IPSEC: checking: 0.0.0.0/0 <=> 172.18.2.200
 14:13:28 ipsec --->IPSEC: processing payload: SA
 14:13:28 ipsec --->IPSEC: IKE Protocol: ESP
 14:13:28 ipsec --->IPSEC:  proposal #1
 14:13:28 ipsec --->IPSEC:   enc: aes256-cbc
 14:13:28 ipsec --->IPSEC:   auth: sha256
 14:13:28 ipsec --->IPSEC:   dh: ecp256
 14:13:28 ipsec --->IPSEC:  proposal #2
 14:13:28 ipsec --->IPSEC:   enc: aes256-cbc
 14:13:28 ipsec --->IPSEC:   auth: sha256
 14:13:28 ipsec --->IPSEC: matched proposal:
 14:13:28 ipsec --->IPSEC:  proposal #2
 14:13:28 ipsec --->IPSEC:   enc: aes256-cbc
 14:13:28 ipsec --->IPSEC:   auth: sha256
 14:13:28 ipsec --->IPSEC: processing payload: NONCE
 14:13:28 ipsec --->IPSEC: create child: finish
 14:13:28 ipsec --->IPSEC: adding payload: NONCE
 14:13:28 ipsec,debug --->IPSEC: => (size 0x1c)
 14:13:28 ipsec --->IPSEC: initiator selector: 172.18.2.200 
 14:13:28 ipsec --->IPSEC: adding payload: TS_I
 14:13:28 ipsec,debug --->IPSEC: => (size 0x18)
 14:13:28 ipsec --->IPSEC: responder selector: 0.0.0.0/0 
 14:13:28 ipsec --->IPSEC: adding payload: TS_R
 14:13:28 ipsec,debug --->IPSEC: => (size 0x18)
 14:13:28 ipsec --->IPSEC: adding payload: SA
 14:13:28 ipsec,debug --->IPSEC: => (size 0x2c)
 14:13:28 ipsec --->IPSEC: <- ike2 reply, exchange: CREATE_CHILD_SA:44 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec,debug --->IPSEC: ===== sending 256 bytes from responder-ip[4500] to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: 1 times of 260 bytes message will be sent to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: => child keymat (size 0x80)
 14:13:28 ipsec --->IPSEC: IPsec-SA established: initiator-ip[4500]->responder-ip[4500] spi=0xb39e1af
 14:13:28 ipsec,debug --->IPSEC: ===== received 80 bytes from initiator-ip[4500] to responder-ip[4500]
 14:13:28 ipsec --->IPSEC: -> ike2 request, exchange: INFORMATIONAL:45 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec --->IPSEC: payload seen: ENC (52 bytes)
 14:13:28 ipsec --->IPSEC: processing payload: ENC
 14:13:28 ipsec,debug --->IPSEC: => iv (size 0x10)
 14:13:28 ipsec,debug --->IPSEC: decrypted packet
 14:13:28 ipsec --->IPSEC: payload seen: DELETE (12 bytes)
 14:13:28 ipsec --->IPSEC: respond: info
 14:13:28 ipsec --->IPSEC: processing payloads: NOTIFY (none found)
 14:13:28 ipsec --->IPSEC: processing payloads: DELETE
 14:13:28 ipsec --->IPSEC: delete ESP SA
 14:13:28 ipsec --->IPSEC: delete spi: 0xd1dabae
 14:13:28 ipsec --->IPSEC: IPsec-SA established: responder-ip[4500]->initiator-ip[4500] spi=0xde365b1
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: initiator-ip[4500]->responder-ip[4500] spi=0xe8c243e
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: responder-ip[4500]->initiator-ip[4500] spi=0xd1dabae
 14:13:28 ipsec,debug --->IPSEC: sending empty reply
 14:13:28 ipsec --->IPSEC: <- ike2 reply, exchange: INFORMATIONAL:45 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec,debug --->IPSEC: ===== sending 160 bytes from responder-ip[4500] to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: 1 times of 164 bytes message will be sent to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: ===== received 80 bytes from initiator-ip[4500] to responder-ip[4500]
 14:13:28 ipsec --->IPSEC: -> ike2 request, exchange: INFORMATIONAL:46 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec --->IPSEC: payload seen: ENC (52 bytes)
 14:13:28 ipsec --->IPSEC: processing payload: ENC
 14:13:28 ipsec,debug --->IPSEC: => iv (size 0x10)
 14:13:28 ipsec,debug --->IPSEC: decrypted packet
 14:13:28 ipsec --->IPSEC: payload seen: DELETE (8 bytes)
 14:13:28 ipsec --->IPSEC: respond: info
 14:13:28 ipsec --->IPSEC: processing payloads: NOTIFY (none found)
 14:13:28 ipsec --->IPSEC: processing payloads: DELETE
 14:13:28 ipsec --->IPSEC: delete IKE SA
 14:13:28 ipsec --->IPSEC: <- ike2 reply, exchange: INFORMATIONAL:46 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec,debug --->IPSEC: ===== sending 128 bytes from responder-ip[4500] to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: 1 times of 132 bytes message will be sent to initiator-ip[4500]
 14:13:28 ipsec,info killing ike2 SA: IKE2 responder-ip[4500]-initiator-ip[4500] spi:016061474fafcdab:c6d3a55dca1d4567
 14:13:28 ipsec,info --->IPSEC: killing ike2 SA: IKE2 responder-ip[4500]-initiator-ip[4500] spi:016061474fafcdab:c6d3a55dca1d4567
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: initiator-ip[4500]->responder-ip[4500] spi=0xb39e1af
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: responder-ip[4500]->initiator-ip[4500] spi=0xde365b1
 14:13:28 ipsec --->IPSEC: removing generated policy
 14:13:28 ipsec --->IPSEC: KA remove: responder-ip[4500]->initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: KA tree dump: responder-ip[4500]->initiator-ip[4500] (in_use=1)
 14:13:28 ipsec,debug --->IPSEC: KA removing this one...
 14:13:28 ipsec,info releasing address 172.18.2.200
 14:13:28 ipsec,info --->IPSEC: releasing address 172.18.2.200
 
erlinden
Forum Guru
Forum Guru
Posts: 2627
Joined: Wed Jun 12, 2013 1:59 pm
Location: Netherlands

Re: v7.12rc is released!

Tue Oct 17, 2023 4:46 pm

Can't upgrade through the MikroTik App, and in Winbox I'm missing the "Donwload and Install" button.

After switching channels, I was able to install. Works perfectly (as it did before on the RC1 as well).
 
ormandj
just joined
Posts: 18
Joined: Tue Jun 15, 2021 12:25 am

Re: v7.12rc is released!

Tue Oct 17, 2023 6:24 pm

On iOS 17 devices, established IKE2 peers will disconnect after 24 minutes of being connected.
The disconnect happened after rekeying sent by the responder and then rejected by the initiator.
ROS = 7.11.2, 7.12rc1
Responder PFS= none
 14:13:28 ipsec --->IPSEC: -> ike2 request, exchange: CREATE_CHILD_SA:44 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec --->IPSEC: payload seen: ENC (292 bytes)
 14:13:28 ipsec --->IPSEC: processing payload: ENC
 14:13:28 ipsec,debug --->IPSEC: => iv (size 0x10)
 14:13:28 ipsec --->IPSEC: payload seen: NOTIFY (12 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: SA (92 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: NONCE (20 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: KE (72 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: TS_I (24 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: TS_R (24 bytes)
 14:13:28 ipsec --->IPSEC: create child: respond
 14:13:28 ipsec --->IPSEC: processing payloads: NOTIFY
 14:13:28 ipsec --->IPSEC:   notify: REKEY_SA
 14:13:28 ipsec --->IPSEC: rekeying child SA 0xd1dabae
 14:13:28 ipsec --->IPSEC: peer wants tunnel mode
 14:13:28 ipsec --->IPSEC: processing payload: TS_R
 14:13:28 ipsec --->IPSEC: 0.0.0.0/0
 14:13:28 ipsec --->IPSEC: processing payload: TS_I
 14:13:28 ipsec --->IPSEC: 172.18.2.200
 14:13:28 ipsec --->IPSEC: checking: 0.0.0.0/0 <=> 172.18.2.200
 14:13:28 ipsec --->IPSEC: processing payload: SA
 14:13:28 ipsec --->IPSEC: IKE Protocol: ESP
 14:13:28 ipsec --->IPSEC:  proposal #1
 14:13:28 ipsec --->IPSEC:   enc: aes256-cbc
 14:13:28 ipsec --->IPSEC:   auth: sha256
 14:13:28 ipsec --->IPSEC:   dh: ecp256
 14:13:28 ipsec --->IPSEC:  proposal #2
 14:13:28 ipsec --->IPSEC:   enc: aes256-cbc
 14:13:28 ipsec --->IPSEC:   auth: sha256
 14:13:28 ipsec --->IPSEC: matched proposal:
 14:13:28 ipsec --->IPSEC:  proposal #2
 14:13:28 ipsec --->IPSEC:   enc: aes256-cbc
 14:13:28 ipsec --->IPSEC:   auth: sha256
 14:13:28 ipsec --->IPSEC: processing payload: NONCE
 14:13:28 ipsec --->IPSEC: create child: finish
 14:13:28 ipsec --->IPSEC: adding payload: NONCE
 14:13:28 ipsec,debug --->IPSEC: => (size 0x1c)
 14:13:28 ipsec --->IPSEC: initiator selector: 172.18.2.200 
 14:13:28 ipsec --->IPSEC: adding payload: TS_I
 14:13:28 ipsec,debug --->IPSEC: => (size 0x18)
 14:13:28 ipsec --->IPSEC: responder selector: 0.0.0.0/0 
 14:13:28 ipsec --->IPSEC: adding payload: TS_R
 14:13:28 ipsec,debug --->IPSEC: => (size 0x18)
 14:13:28 ipsec --->IPSEC: adding payload: SA
 14:13:28 ipsec,debug --->IPSEC: => (size 0x2c)
 14:13:28 ipsec --->IPSEC: <- ike2 reply, exchange: CREATE_CHILD_SA:44 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec,debug --->IPSEC: ===== sending 256 bytes from responder-ip[4500] to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: 1 times of 260 bytes message will be sent to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: => child keymat (size 0x80)
 14:13:28 ipsec --->IPSEC: IPsec-SA established: initiator-ip[4500]->responder-ip[4500] spi=0xb39e1af
 14:13:28 ipsec,debug --->IPSEC: ===== received 80 bytes from initiator-ip[4500] to responder-ip[4500]
 14:13:28 ipsec --->IPSEC: -> ike2 request, exchange: INFORMATIONAL:45 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec --->IPSEC: payload seen: ENC (52 bytes)
 14:13:28 ipsec --->IPSEC: processing payload: ENC
 14:13:28 ipsec,debug --->IPSEC: => iv (size 0x10)
 14:13:28 ipsec,debug --->IPSEC: decrypted packet
 14:13:28 ipsec --->IPSEC: payload seen: DELETE (12 bytes)
 14:13:28 ipsec --->IPSEC: respond: info
 14:13:28 ipsec --->IPSEC: processing payloads: NOTIFY (none found)
 14:13:28 ipsec --->IPSEC: processing payloads: DELETE
 14:13:28 ipsec --->IPSEC: delete ESP SA
 14:13:28 ipsec --->IPSEC: delete spi: 0xd1dabae
 14:13:28 ipsec --->IPSEC: IPsec-SA established: responder-ip[4500]->initiator-ip[4500] spi=0xde365b1
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: initiator-ip[4500]->responder-ip[4500] spi=0xe8c243e
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: responder-ip[4500]->initiator-ip[4500] spi=0xd1dabae
 14:13:28 ipsec,debug --->IPSEC: sending empty reply
 14:13:28 ipsec --->IPSEC: <- ike2 reply, exchange: INFORMATIONAL:45 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec,debug --->IPSEC: ===== sending 160 bytes from responder-ip[4500] to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: 1 times of 164 bytes message will be sent to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: ===== received 80 bytes from initiator-ip[4500] to responder-ip[4500]
 14:13:28 ipsec --->IPSEC: -> ike2 request, exchange: INFORMATIONAL:46 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec --->IPSEC: payload seen: ENC (52 bytes)
 14:13:28 ipsec --->IPSEC: processing payload: ENC
 14:13:28 ipsec,debug --->IPSEC: => iv (size 0x10)
 14:13:28 ipsec,debug --->IPSEC: decrypted packet
 14:13:28 ipsec --->IPSEC: payload seen: DELETE (8 bytes)
 14:13:28 ipsec --->IPSEC: respond: info
 14:13:28 ipsec --->IPSEC: processing payloads: NOTIFY (none found)
 14:13:28 ipsec --->IPSEC: processing payloads: DELETE
 14:13:28 ipsec --->IPSEC: delete IKE SA
 14:13:28 ipsec --->IPSEC: <- ike2 reply, exchange: INFORMATIONAL:46 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec,debug --->IPSEC: ===== sending 128 bytes from responder-ip[4500] to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: 1 times of 132 bytes message will be sent to initiator-ip[4500]
 14:13:28 ipsec,info killing ike2 SA: IKE2 responder-ip[4500]-initiator-ip[4500] spi:016061474fafcdab:c6d3a55dca1d4567
 14:13:28 ipsec,info --->IPSEC: killing ike2 SA: IKE2 responder-ip[4500]-initiator-ip[4500] spi:016061474fafcdab:c6d3a55dca1d4567
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: initiator-ip[4500]->responder-ip[4500] spi=0xb39e1af
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: responder-ip[4500]->initiator-ip[4500] spi=0xde365b1
 14:13:28 ipsec --->IPSEC: removing generated policy
 14:13:28 ipsec --->IPSEC: KA remove: responder-ip[4500]->initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: KA tree dump: responder-ip[4500]->initiator-ip[4500] (in_use=1)
 14:13:28 ipsec,debug --->IPSEC: KA removing this one...
 14:13:28 ipsec,info releasing address 172.18.2.200
 14:13:28 ipsec,info --->IPSEC: releasing address 172.18.2.200
Do you have a SUP ticket to reference for this? Thank you!
 
User avatar
diamuxin
Member
Member
Posts: 340
Joined: Thu Sep 09, 2021 5:46 pm

Re: v7.12rc is released!

Tue Oct 17, 2023 6:54 pm

In the following link (which I use in my scripts) the correct content of the Changelog is not updated, it only reports the previous version 7.12rc1

https://upgrade.mikrotik.com/routeros/7.12rc2/CHANGELOG

Please, can you check it?

result code

What's new in 7.12rc1 (2023-Oct-05 08:46):

Changes in this release:

!) ethernet - changed "advertise" and "speed" arguments, and removed "half-duplex" setting under "/interface ethernet" menu;
!) sfp - convert configuration to support new link modes for SFP and QSFP type of interfaces;
*) bfd - fixed sessions when setting VRF;
*) bfd - improved system stability;
*) console - improved system stability;
*) email - rename "address" property to "server";
*) flash - show more accurate "total-hdd-space" resource property;
*) gps - expose GPS port for Quectel EM12-G (vendor-id="0x2c7c", device-id="0x0512");
*) ike1 - fixed invalid key length on phase1 negotiation;
*) interface - added "macvlan" interface support;
*) l3hw - prioritize local IP addresses over the respective /32 and /128 routes;
*) leds - fixed "wireless-status" and "wireless-signal-strength" for wireless interfaces (introduced in v7.12beta7);
*) netinstall-cli - updated configuration option description;
*) pimsm - improved system stability;
*) poe-out - improved "auto" mode for devices with single PoE-out port;
*) qsfp - improved auto link detection for AOC cables;
*) route - added "single-process" configuration setting, enabled by default on devices with 64MB or less RAM memory;
*) route - added "suppress-hw-offload" setting for IPv6 routes;
*) sfp - added 5Gbps rate for SFP+ interface on 98DX224S, 98DX226S, and 98DX3236 switch chips;
*) sfp - fixed failed auto-negotiation for RB5009 devices (introduced in v7.12beta3);
*) sfp - improved system stability with certain modules for 98DX224S, 98DX226S, 98DX3236, 98DX8216 and 98DX8208 switch chips;
*) tftp - fixed empty file name matching;
*) webfig - fixed interface addition (introduced in v7.12beta7);
*) wifiwave2 - added an alternative QoS priority assignment mechanism based on IP DSCP;
*) wifiwave2 - added station-bridge interface mode;
*) wifiwave2 - implemented an option to transmit IP multicast packets as unicasts;
*) wifiwave2 - use CAPsMAN's "datapath.vlan-id" on CAP for bridge port "pvid";
*) winbox - added "Addresses" property under "Routing/BFD/Configuration" menu;
*) winbox - added "BUS" property for USB Power Reset button for LtAP-2HnD and CCR1072;
*) winbox - added "USB" button under "System/RouterBOARD" menu for LtAP-2HnD;
*) winbox - added Enable/Disable button under "Routing/RIP/Static Neighbors" menu;
*) winbox - added missing properties under "WifiWave2" menu;
*) winbox - do not show "F" flag for disabled entries under "IP/Routes" menu;
*) winbox - fixed "Do" property under "Routing/Filters/Select Rule" menu;
*) winbox - fixed "Range" property under "Routing/Filters/Num Set" menu;
*) winbox - fixed "Switch" menu for CCR2004-16G-2S+;
*) winbox - improved support for certain properties under "WifiWave2/Interworking Profiles" menu;
*) winbox - show "unknown" value for "FS" property under "System/Disks" menu if the data is not available;
*) wireguard - added "auto" and "none" parameter for "private-key" and "presharde-key" parameters;
*) wireguard - allow to specify client settings under peer menu which will be included in configuration file and QR code;

Other changes since v7.11:

!) health - removed "temperature" health entry from boards, where it was the same as "sfp-temperature";
*) api - fixed fetching objects with warning option from REST API;
*) bgp - fixed "atomic-aggregate" always set in output;
*) bgp - fixed "input.filter-chain" argument selection in VPN configuration;
*) bgp - fixed local and remote port settings for BGP connections;
*) bgp - fixed typos and missing spaces in log messages;
*) bgp - implemented IGP metric sending in BGP messages;
*) bgp - improved logging;
*) bgp - increase "hold-time" limit to 65000;
*) bluetooth - added basic support for connecting to BLE peripheral devices;
*) bluetooth - use "g" units when decoding MikroTik beacon acceleration on peripheral devices menu;
*) bridge - fixed fast-path forwarding with HW offloaded vlan-filtering (introduced in v7.11);
*) bridge - fixed untagged VLAN entry disable;
*) bridge - fixed vlan-filtering stability with HW and non-HW offloaded ports (introduced in v7.10);
*) bridge - improved system stability;
*) bridge - improved vlan-filtering bridge stability with CAPsMAN (introduced in v7.11);
*) calea - improved system stability when trying to add rules without the CALEA package;
*) certificate - allow to get and maintain Let's Encrypt certificate in IPv6 environment;
*) certificate - allow to remove issued certificates when CRL is not used;
*) certificate - fixed "subject-alt-name" duplicating itself when SCEP is used;
*) certificate - fixed certificate auto renewal via SCEP;
*) certificate - improved certificate validation logging error messages;
*) certificate - log CRL HTTP errors under the "error" logging topic;
*) chr - iavf updated driver to 4.9.1 version;
*) chr - increased OVA default RAM amount from 160MB to 256MB;
*) console - added ":jobname" command;
*) console - added "as-string" and "as-string-value" properties for "get" command;
*) console - added "terminal/ask" command;
*) console - added "transform" property for ":convert" command;
*) console - export required properties with default values;
*) console - fixed scheduler "on-event" script highlighting when editing;
*) console - improved ":totime" and ":tonum" commands and added ":tonsec" command for time value manipulation;
*) console - improved multi-argument property parsing into array;
*) console - improved randomness for ":rndstr" and ":rndnum" commands;
*) console - improved stability and responsiveness;
*) console - improved stability when editing long scripts;
*) console - improved stability when using "special-login";
*) console - improved system stability through RoMON session;
*) console - improved system stability when using autocomplete;
*) console - restrict permissions to "read,write,reboot,ftp,romon,test" for scripts executed by DHCP, Hotspot, PPP and Traffic-Monitor services;
*) console - show full date and time in scheduler "next-run" property;
*) dhcp - fixed DHCP server "authoritative" and "delay-threshold" settings (introduced in v7.12beta3);
*) dhcp - fixed DHCP server and relay related response delays;
*) ethernet - added "supported" and "sfp-supported" values for "monitor" command;
*) firewall - added "ein-snat" and "ein-dnat" connection NAT state matchers for filter and mangle rules;
*) ike1 - log an error when non-RSA keys are being used;
*) ike2 - improved rekey collision handling;
*) iot - fixed an issue where applying a script to GPIO pin caused GPIO to stop working;
*) iot - fixed behavior where GPIO output state would change on boot;
*) ipsec - fixed Diffie-Hellman public value encoding size;
*) ipsec - fixed IPSec policy when using modp3072;
*) ipsec - fixed minor typo in logs;
*) ipsec - reduce disk writes when started without active configuration;
*) ipv6 - fixed IPv6 RA delay time from 5s to 500ms according to RFC;
*) ipv6 - send RA and RA deprecate messages out three times instead of just once;
*) l3hw - fixed IPv6 route suppression;
*) l3hw - improved system stability during IPv6 route offloading;
*) led - fixed "interface-status" configuration for virtual interfaces;
*) leds - added "dark-mode" functionality for RBwAPG-5HacD2HnD;
*) leds - added "wireless-status" and "wireless-signal-strength" configuration types for wifiwave2 interfaces;
*) log - improved logging for user actions;
*) lora - added LNS protocol support;
*) lte - added at-chat support and increased wait time on modem at-chat for Dell DW5821e, DW5821e-eSIM, DW5829e and DW5829e-eSIM;
*) lte - added SINR reporting for FG621-EA modem;
*) lte - changed R11e-LTE ARP behavior to NoArp;
*) lte - fixed 5G data-class reporting for Chateau 5G;
*) lte - fixed APN authentification in multi APN setup for R11e-LTE6;
*) lte - fixed IPv6 prefix for MBIM modems in multi-apn setup when IPv6 APN used as not first APN;
*) lte - fixed RSSI for FG621-EA modem to show the correct value;
*) lte - fixed Sierra modem detection for modems with vendor-specific USB descriptors;
*) lte - fixed Sierra modem initialization;
*) lte - fixed startup race condition when SIM card is in "up" slot for LtAP mini;
*) lte - fixed sub-interface auto-removal in multiple APN setups;
*) lte - show correct data class when connected to 5G SA network;
*) lte - use more compact logging messages;
*) modbus - added additional security settings for Modbus TCP;
*) mpls - added option to match and set MPLS EXP with bridge and mangle rules;
*) mpls - fixed "propagate-ttl=no" setting;
*) mpls - improved FastPath next-hop selection hash algorithm;
*) mqtt - added on-message feature for subscribed topics;
*) mqtt - added parallel-scripts-limit parameter to set maximum allowed number of scripts executed at the same time;
*) mqtt - added wildcard topic subscription support;
*) netinstall - added option to discard branding package;
*) netinstall - display package filename in GUI Description column if package description is not specified;
*) netinstall-cli - added empty configuration option "-e";
*) netinstall-cli - added option to discard branding package;
*) netinstall-cli - allow ".rsc" script filenames;
*) netinstall-cli - prioritise interface option over address option;
*) netwatch - decreased "thr-tcp-conn-time" maximum limit to 30 seconds;
*) ospf - fixed adding ECMP routes;
*) ospf - fixed BFD on virtual-link with configured VRF;
*) ospf - fixed OSPFv3 not working with NSSA areas;
*) ospf - fixed parsing of opaque LSAs used by TE;
*) ospf - fixed translated NSSA routes not showing in backbone;
*) ovpn - added "tls-auth" option support for imported .ovpn profiles;
*) ovpn - improved system stability;
*) poe-out - driver optimization for AF/AT controlled boards;
*) poe-out - fixed rare CRS328 poe-out menu and poe-out port config loss after reboot;
*) port - add support for Huawei MS237h-517;
*) port - expose NMEA/DIAG ports for Dell DW5821e and DW5821e-eSIM;
*) qsfp - added 50Gbps rate support for QSFP28 interfaces;
*) qsfp - fixed sub-interface EEPROM monitor data output (introduced in v7.12beta3);
*) qsfp - improved auto link detection for 100G CWDM4 modules and AOC cables (introduced in v7.12beta3);
*) qsfp - use sub-interface configuration for establishing link (for 40Gbps and 100Gbps links, all sub-interfaces must be enabled);
*) quickset - fixed "LAN" interface list members if configuration does not contain bridge;
*) rip - added BFD support;
*) rip - fixed session not working in VRF;
*) route - fixed gateway after link restart;
*) route - removed deprecated "received-from" property;
*) route - reverse community "delete" and "filter" command behavior;
*) routerboard - added "reset-button" support for RB800, RB1100 and RB1100AHx2 devices;
*) sfp - fixed 25Gbps link with FEC91 (introduced in v7.12beta7);
*) sfp - fixed missing "rx-power" monitor with certain modules (introduced in v7.10);
*) sfp - improved interface stability for SFP and QSFP types of interfaces;
*) snmp - changed "mtxrGaugeValue" type to integer;
*) ssh - added support for user ed25519 public keys;
*) ssh - allow to specify key owner on import;
*) ssh - fixed SSH tunnel performance (introduced in v7.10);
*) ssh - improved connection stability when pasting large chunks of text into console;
*) supout - added interface list members section;
*) supout - added LLDP power to supout.rif;
*) supout - fixed BFD section;
*) switch - fixed packet forwarding between Ethernet ports for CRS354 switches (introduced in v7.12beta7);
*) switch - improved resource allocation for 98DX224S, 98DX226S, and 98DX3236 switch chips;
*) switch - improved switch chip stability for CCR2004-16g-2s+ devices;
*) system - improved system stability when MD5 checksums are used;
*) tile - improved system stability when using queues;
*) traffic-generator - added "priority" property for "inject" command;
*) traffic-generator - fixed traffic-generator on CHR and x86;
*) usb - added support for RTL8153 USB ethernet on ARM, ARM64 and x86;
*) vrf - limit maximum VRFs to 1024;
*) vxlan - improved system stability for Tile devices;
*) webfig - fixed "Days" property configuration change under "IP/Firewall" menu;
*) webfig - fixed timezone for interface "Last Link Down/Up Time";
*) webfig - improved Webfig performance and responsiveness;
*) webfig - try to re-establish connection after disconnect;
*) wifiwave2 - added comment property for registration-table;
*) wifiwave2 - correctly add interface to specified "datapath.interface-list";
*) wifiwave2 - do not show default "l2mtu" on compact export;
*) wifiwave2 - enable changing interface MTU and L2MTU;
*) wifiwave2 - fixed malformed Interworking packet elements;
*) wifiwave2 - fixed PTK renewal for interfaces in station mode;
*) wifiwave2 - fixed re-connection failures for 802.11ax interfaces in station mode;
*) wifiwave2 - fixed sniffer command not receiving any QoS null function frames when using 802.11ax radios;
*) wifiwave2 - fixed untagged VLAN 1 entry when using "vlan-id" setting together with vlan-filtering bridge;
*) wifiwave2 - fixed warning on CAP devices when radar detected;
*) wifiwave2 - improved compliance with regulatory requirements;
*) wifiwave2 - limit L2MTU to 1560 until a fix is available for a bug causing interfaces to fail transmitting larger frames than that;
*) wifiwave2 - list APs with a higher maximum data rate as more preferable roaming candidates;
*) wifiwave2 - log more information regarding authentication failures;
*) wifiwave2 - make 4-way handshake procedure more robust when acting as supplicant (client);
*) winbox - added "Comment" under "Routing/BFD/Configuration" menu;
*) winbox - added "g" flag under "IPv6/Routes" menu;
*) winbox - added "Host Key Type" setting under "IP/SSH" menu;
*) winbox - added "Key Owner" setting under "System/User/SSH Keys" and "System/User/SSH Private Keys" menus;
*) winbox - added "Name Format" property under "WifiWave2/Provisioning" menu;
*) winbox - added "Remote Min Tx" parameter under "Routing/BFD/Session" menu;
*) winbox - added "Startup Delay" setting under "Tools/Netwatch" menu;
*) winbox - added "Use BFD" setting under "Routing/RIP/Interface-Template" menu;
*) winbox - added MQTT subscription menu;
*) winbox - allow to change port numbers for SCTP, DCCP, and UDP-LITE protocols under "IP/Firewall" menus;
*) winbox - allow to set multiple addresses and added IPv6 support under "Interface/VETH" menu;
*) winbox - allow to specify server as DNS name under "Tools/Email" menu;
*) winbox - changed "MBR Partition Table" checkbox to unchecked by default under "System/Disks/Format-Drive" menu;
*) winbox - fixed "Address" property under "WifiWave2/Remote-CAP" menu;
*) winbox - fixed "Group Key Update" maximum value under "WifiWave2/Security" menu;
*) winbox - fixed entry numbering and ordering under "WifiWave2/Provisioning" menu;
*) winbox - fixed minor typos;
*) winbox - rename "DSCP" setting to "DSCP (+ECN)" under "Tools/Traffic-Generator/Packet-Templates" menu;
*) winbox - rename "Name" setting to "List" under "IP,IPv6/Firewall/Address-List" menu;
*) winbox - rename "Password" button to "Change Now" under "System/Password" menu;
*) wireguard - added "wg-export" and "wg-import" functionality (CLI only);
*) wireguard - request public or private key to be specified in order to create peer;
*) wireless - added more "radius-mac-format" options (CLI only);
*) wireless - fixed malformed Interworking packet elements;
*) www - fixed allowed address setting for REST API users;
*) www - fixed fragmented POST data for SCEP service;
*) x86 - added support for Mellanox ConnectX-6 Dx NIC;
*) x86 - i40e updated driver to 2.23.17 version;
*) x86 - igb updated driver to 5.14.16 version;
*) x86 - igbvf updated driver from in-tree Linux kernel;
*) x86 - igc updated driver to 5.10.194 version;
*) x86 - ixgbe updated driver to 5.19.6 version;
*) x86 - Realtek r8169 updated driver;
*) x86 - updated latest available pci.ids;
 
User avatar
rextended
Forum Guru
Forum Guru
Posts: 12557
Joined: Tue Feb 25, 2014 12:49 pm
Location: Italy
Contact:

Re: v7.12rc is released!

Tue Oct 17, 2023 7:11 pm

In the following link (which I use in my scripts) the correct content of the Changelog is not updated, it only reports the previous version 7.12rc1
Use the correct URLs...
viewtopic.php?t=200103#p1030161

https://upgrade.mikrotik.com//routeros/NEWEST7.testing

file content code

7.12rc2 1697467828\n
 
User avatar
diamuxin
Member
Member
Posts: 340
Joined: Thu Sep 09, 2021 5:46 pm

Re: v7.12rc is released!

Tue Oct 17, 2023 7:40 pm

In the following link (which I use in my scripts) the correct content of the Changelog is not updated, it only reports the previous version 7.12rc1
Use the correct URLs...
viewtopic.php?t=200103#p1030161

https://upgrade.mikrotik.com//routeros/NEWEST7.testing

file content code

7.12rc2 1697467828\n

No, it is not to get the version or date in epoch format (I have that already clear) that URL is used to extract the content of the changelog testing and send it by email.

It has always worked fine, it seems that MikroTik has not updated that link yet.

example code

{
:local sysname    [/system identity get name]
:local latestVer  7.12rc2
:local changeLog  ([/tool fetch "https://upgrade.mikrotik.com/routeros/$ ... /CHANGELOG" output=user as-value] -> "data")
/tool e-mail send to="admin@email.com" subject="[Router $sysname] New testing version!" body="New: $latestVer\n\n$changeLog"
}


 
User avatar
strods
MikroTik Support
MikroTik Support
Posts: 1658
Joined: Wed Jul 16, 2014 7:22 am
Location: Riga, Latvia

Re: v7.12rc is released!

Tue Oct 17, 2023 8:36 pm

Sorry about that. Changelogs are fixed now.
 
User avatar
diamuxin
Member
Member
Posts: 340
Joined: Thu Sep 09, 2021 5:46 pm

Re: v7.12rc is released!

Tue Oct 17, 2023 9:20 pm

Sorry about that. Changelogs are fixed now.
It's perfect now, thank you very much.

BR.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Tue Oct 17, 2023 11:51 pm

Is the router ever going to do downloads (for upgrade) over IPv6?? The download server has an IPv6 record but RouterOS does not request it...
 
mducharme
Trainer
Trainer
Posts: 1777
Joined: Tue Jul 19, 2016 6:45 pm
Location: Vancouver, BC, Canada

Re: v7.12rc is released!

Wed Oct 18, 2023 1:17 am

HERE IS A VIDEO SHOWING THE ISSUE
https://www.youtube.com/watch?v=PLI-1Qm1Lp4
I'm not sure why the vlan appears twice in the list in your video, but the interface appearing under "tagged" should not be a problem and is correct. If it was untagged then your packets would likely have two tags on them instead of one. See my post above in this thread for more details.

Based on your config you also shouldn't need bridge VLAN filtering turned on at all on the cAP ax for this to work. All that bridge VLAN filtering is doing for you is making it so that you have to do manual work to add VLANs to APs that you normally would not have to do.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Wed Oct 18, 2023 3:41 am

HERE IS A VIDEO SHOWING THE ISSUE
https://www.youtube.com/watch?v=PLI-1Qm1Lp4
My view is that you need to first define the datapath for the primary wifi interfaces on the cAP ax. This is the conversation I had earlier in this thread about my own issues with dynamic bridge port and vlan behaviour on wifiwave2.

Add something like this to each cAP ax:
/interface bridge add name=bridge1 vlan-filtering=yes pvid=10
/interface wifiwave2 datapath add bridge=bridge1 name="Local Bridge" vlan-id=10
/interface wifiwave2 set [ find default-name=wifi1 ] configuration.manager=capsman .mode=ap datapath="Local Bridge"
/interface wifiwave2 set [ find default-name=wifi2 ] configuration.manager=capsman .mode=ap datapath="Local Bridge"
At the very least, one thing I did notice was your cAP config was not setting PVID 10 for the bridge on the cAP. Maybe start with that one line change to your bridge and see if everything else works?
 
killersoft
Member Candidate
Member Candidate
Posts: 263
Joined: Mon Apr 11, 2011 2:34 pm
Location: Victoria, Australia

Re: v7.12rc is released!

Wed Oct 18, 2023 5:16 am

HERE IS A VIDEO SHOWING THE ISSUE
https://www.youtube.com/watch?v=PLI-1Qm1Lp4
I'm not sure why the vlan appears twice in the list in your video, but the interface appearing under "tagged" should not be a problem and is correct. If it was untagged then your packets would likely have two tags on them instead of one. See my post above in this thread for more details.

Based on your config you also shouldn't need bridge VLAN filtering turned on at all on the cAP ax for this to work. All that bridge VLAN filtering is doing for you is making it so that you have to do manual work to add VLANs to APs that you normally would not have to do.
#1. The VLAN should never appear as a secondary entry when its already added to the bridge vlan table when a wireless client connects ( Thats a bug )

#2. BRIDGE/VLAN interface "TAGGED" ports are expected to carry vlan traffic, and should not be applied to an access port weather its physical or wireless( unless your expecting a client to be using tagged vlan traffic ), there are 2x entries in bridge->vlan entries tagged, and untagged, they are both there for a reason!, meaning that a port will be carrying a VLAN, and in my case a wireless port where the traffic egress needs to be sent out as untagged. If you look at bridge ports the PVID is an INGRESS entry ( as per mikrotik doco : "PVID - The Port VLAN ID is used for access ports to tag all ingress traffic with a specific VLAN ID." )

#3. Never trust what a clients are doing, especially an unsecure campus. ALWAYS filter... and it is clearly stated in the Mikrotik documentation for this exact configuration I use: https://help.mikrotik.com/docs/display/ ... agStacking
-> And as stated in highlighted red background on that link.. " Always try to use ingress-filtering wherever it is possible, it adds a significant layer of security.". There is whole paragraphs explaining it on that link..

#4 That bridge port when it dynamically adds the wireless radios, should ideally set the frame type to "frame-types=admit-only-untagged-and-priority-tagged" rather than admit all, but should be select-able depending on expected operations and should be added to wave2 capsman in my opinion as part of port security.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Wed Oct 18, 2023 6:04 am

#2. BRIDGE/VLAN interface "TAGGED" ports are expected to carry vlan traffic, and should not be applied to an access port weather its physical or wireless( unless your expecting a client to be using tagged vlan traffic ), there are 2x entries in bridge->vlan entries tagged, and untagged, they are both there for a reason!, meaning that a port will be carrying a VLAN, and in my case a wireless port where the traffic egress needs to be sent out as untagged. If you look at bridge ports the PVID is an INGRESS entry ( as per mikrotik doco : "PVID - The Port VLAN ID is used for access ports to tag all ingress traffic with a specific VLAN ID." )

#3. Never trust what a clients are doing, especially an unsecure campus. ALWAYS filter... and it is clearly stated in the Mikrotik documentation for this exact configuration I use: https://help.mikrotik.com/docs/display/ ... agStacking
-> And as stated in highlighted red background on that link.. " Always try to use ingress-filtering wherever it is possible, it adds a significant layer of security.". There is whole paragraphs explaining it on that link..

#4 That bridge port when it dynamically adds the wireless radios, should ideally set the frame type to "frame-types=admit-only-untagged-and-priority-tagged" rather than admit all, but should be select-able depending on expected operations and should be added to wave2 capsman in my opinion as part of port security.
I dunno mate, mducharme knows his stuff. Not sure I would give him the Passive Aggressive treatment.
 
mducharme
Trainer
Trainer
Posts: 1777
Joined: Tue Jul 19, 2016 6:45 pm
Location: Vancouver, BC, Canada

Re: v7.12rc is released!

Wed Oct 18, 2023 6:31 am

#1. The VLAN should never appear as a secondary entry when its already added to the bridge vlan table when a wireless client connects ( Thats a bug )
I would agree with this, it seems to be a bug.
#2. BRIDGE/VLAN interface "TAGGED" ports are expected to carry vlan traffic, and should not be applied to an access port weather its physical or wireless( unless your expecting a client to be using tagged vlan traffic )
I agree with this, which is why it is good in this case that the wireless port is a trunk port and the setup behaves as though the client itself is tagging the VLAN. You shouldn't set this port as tagged *if it were an access port*, but it's not an access port.
#3. Never trust what a clients are doing, especially an unsecure campus. ALWAYS filter
I agree with this too, but the filtering is likely being done on the switch port connected to the AP as well, so it is not like nothing is filtering.
#4 That bridge port when it dynamically adds the wireless radios, should ideally set the frame type to "frame-types=admit-only-untagged-and-priority-tagged" rather than admit all
If it did have this behavior in this particular situation, you would end up with no packets at all entering the bridge port from the wireless radio, because all of them would have the 1000 tag and all of them would be dropped by setting the admit-only-untagged-and-priority-tagged.

The way VLAN tags work with wifiwave2 in my understanding is it is like a per-client VLAN, but you are setting a default per-client VLAN of 1000. So when the client sends a packet, the 1000 tag is added by the wireless interface itself to the packet, and then the packet leaves the wireless interface and travels through the bridge port to the bridge, with the 1000 tag already there before it hits the bridge port. The resulting behavior is similar to if the client itself was tagging the packet, even though the client is not applying a tag - this is being applied by the wireless as one of the first things after it receives the packet from the client, before it leaves the wireless interface and goes through the bridge port to the bridge.

It's also possible to use access lists or RADIUS attributes to give a different user or device a different VLAN ID on the same wireless interface. The packets from these special users or devices will then be tagged differently than the interface default, which in your case, you have set to 1000.
 
User avatar
FToms
MikroTik Support
MikroTik Support
Posts: 90
Joined: Fri Jul 24, 2020 3:28 pm

Re: v7.12rc is released!

Wed Oct 18, 2023 7:52 am

BRIDGE/VLAN interface "TAGGED" ports are expected to carry vlan traffic, and should not be applied to an access port weather its physical or wireless( unless your expecting a client to be using tagged vlan traffic )
You're assuming that datapath.vlan-id only affects bridge port settings.
In fact, the primary function of datapath.vlan-id is to make the wireless driver tag packets from clients with the appropriate VLAN ID and filter outgoing traffic to clients so that only packets with a tag are transmitted to clients, while stripping the tag.
So, wifi interfaces should in fact be among the tagged ports for the respective bridge VLAN, when VLAN filtering is enabled on the bridge.
 
User avatar
FToms
MikroTik Support
MikroTik Support
Posts: 90
Joined: Fri Jul 24, 2020 3:28 pm

Re: v7.12rc is released!

Wed Oct 18, 2023 8:29 am

The VLAN should never appear as a secondary entry when its already added to the bridge vlan table when a wireless client connects
If it can be called a bug, then it's a cosmetic one.
The datapath.vlan-id interface property sets the default VLAN ID to assign to client devices, but an interface may have a mixture of clients with different VLAN IDs, individually assigned by the access list, or the RADIUS server.
To accomodate such situations, each wifi client connection with a new VLAN ID, results in an addition of a bridge VLAN entry.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Wed Oct 18, 2023 2:46 pm

I confirm that (on 7.12rc1) the Bridge VLAN "Current tagged" column incorrectly lists the wlan interfaces. I have added them both to Tagged for several VLANs, but wlan2 does not appear correctly in "Current tagged" even when a client is connected that uses the VLAN (RADIUS assigned).
 
leonardogyn
just joined
Posts: 18
Joined: Wed Dec 04, 2019 4:47 pm

Re: v7.12rc is released!

Wed Oct 18, 2023 3:04 pm

Minor webfig error with RC2 (not sure if it happened on RC1, screenshot is from RC2), there's an erroneous TX/RX rates (that keeps updating) on the header, no matter which "page" I'm in. It's not supposed to be there.
.
EDIT: disabled my skin and the information is still there, so not skin related.
.
RC2.png
You do not have the required permissions to view the files attached to this post.
 
User avatar
FToms
MikroTik Support
MikroTik Support
Posts: 90
Joined: Fri Jul 24, 2020 3:28 pm

Re: v7.12rc is released!

Wed Oct 18, 2023 3:13 pm

I confirm that (on 7.12rc1) the Bridge VLAN "Current tagged" column incorrectly lists the wlan interfaces. I have added them both to Tagged for several VLANs, but wlan2 does not appear correctly in "Current tagged" even when a client is connected that uses the VLAN (RADIUS assigned).
Updating bridge VLAN information depeding on VLAN IDs of connected wireless clients is not implemented in the older 'wireless' package.
 
marekm
Member
Member
Posts: 416
Joined: Tue Feb 01, 2011 11:27 pm

Re: v7.12rc is released!

Wed Oct 18, 2023 7:02 pm

*) sfp - fixed link establishment with passive copper cables for RB4011 and CCR2004-16G-2S+ devices (introduced in 7.12rc1);
https://mikrotik.com/product/rb4011igs_rm says "Note: Passive DAC (MikroTik S+DA0001/S+DA0003) are not supported." - are they supported now?
Or is this a mistake in the changelog and only applies to CCR2004-16G-2S+?
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Thu Oct 19, 2023 2:30 am

So, wifi interfaces should in fact be among the tagged ports for the respective bridge VLAN, when VLAN filtering is enabled on the bridge.

Except if the VLAN of the datapth is the same as the bridge's PVID, right? Because that's how mine behaves.

Screenshot 2023-10-19 103340.png
Screenshot 2023-10-19 102314.png
Screenshot 2023-10-19 102607.png
You do not have the required permissions to view the files attached to this post.
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 12980
Joined: Thu Mar 03, 2016 10:23 pm

Re: v7.12rc is released!

Thu Oct 19, 2023 8:18 am

So, wifi interfaces should in fact be among the tagged ports for the respective bridge VLAN, when VLAN filtering is enabled on the bridge.

Except if the VLAN of the datapth is the same as the bridge's PVID, right? Because that's how mine behaves.

Not exactly the same as with vlan-id set to 1. wifiwave2 datapath propertiy vlan-id can be unset (as per your example) ... and in that case VLAN tagging is not done by wifiwave2 driver at all (the same as with legacy wlan driver setting of vlan-mode=no-tag). So yes. in this case bridge port implicit pvid setting does the trick (or in case of manual wifiwave2 provisioning, one can set PVID on wireless bridge port explicitly). However, if wifiwave2 datapath vlan-id is set to 1, then wifiwave2 driver will do the tagging in direction towards the rest of network (e.g. bridge, so wireless device will be tagged bridge port and tagged member of VLAN 1).
 
andriys
Forum Guru
Forum Guru
Posts: 1543
Joined: Thu Nov 24, 2011 1:59 pm
Location: Kharkiv, Ukraine

Re: v7.12rc is released!

Thu Oct 19, 2023 12:11 pm

I don't really get all this tagged/untagged discussion. The 802.11 frame header has no place for a VLAN ID, so, technically, wifi interfaces are never tagged.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Thu Oct 19, 2023 12:16 pm

Not exactly the same as with vlan-id set to 1. wifiwave2 datapath propertiy vlan-id can be unset (as per your example) ... and in that case VLAN tagging is not done by wifiwave2 driver at all (the same as with legacy wlan driver setting of vlan-mode=no-tag). So yes. in this case bridge port implicit pvid setting does the trick (or in case of manual wifiwave2 provisioning, one can set PVID on wireless bridge port explicitly). However, if wifiwave2 datapath vlan-id is set to 1, then wifiwave2 driver will do the tagging in direction towards the rest of network (e.g. bridge, so wireless device will be tagged bridge port and tagged member of VLAN 1).
I just verified what you wrote. Ooof, that's a bit confusing.

It does seem to answer all the questions about tagging raised earlier though.
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Thu Oct 19, 2023 12:18 pm

I don't really get all this tagged/untagged discussion. The 802.11 frame header has no place for a VLAN ID, so, technically, wifi interfaces are never tagged.
It's more about what happens on the access point once packets from clients come in from the radio, and yeah the way it's described is a bit confusing. But, in the context of the Mikrotik ecosystem, I do get it.
 
killersoft
Member Candidate
Member Candidate
Posts: 263
Joined: Mon Apr 11, 2011 2:34 pm
Location: Victoria, Australia

Re: v7.12rc is released!

Thu Oct 19, 2023 1:14 pm

If we were to wind back a bit regarding tagging/vlan and go back to documented basics

Follow me here : https://wiki.mikrotik.com/wiki/Manual:B ... _switching

Image

What is the VLAN config DIFFERENCE, between using a physical interface VS a wireless interface ??

The MANUAL version of achieving what's in the picture above is : ( Just think of the PC's are wireless clients ! )
https://wiki.mikrotik.com/wiki/Manual:B ... witch_chip
/interface bridge
add name=bridge1
/interface bridge port
add bridge=bridge1 interface=ether1 hw=no
add bridge=bridge1 interface=ether2 hw=no pvid=20
add bridge=bridge1 interface=ether3 hw=no pvid=30
/interface bridge vlan
add bridge=bridge1 tagged=ether1 untagged=ether2 vlan-ids=20
add bridge=bridge1 tagged=ether1 untagged=ether3 vlan-ids=30
add bridge=bridge1 tagged=ether1,bridge1 vlan-ids=99
/interface vlan
add interface=bridge1 vlan-id=99 name=MGMT
/ip address
add address=192.168.99.1/24 interface=MGMT
/interface bridge
set bridge1 vlan-filtering=yes
So in some peoples arguments above they are effectively saying
/interface bridge vlan
add bridge=bridge1 tagged=ether1,ether2 vlan-ids=20
add bridge=bridge1 tagged=ether1,ether3 vlan-ids=30

I still think it is wrong, the documentation states you put put the bridge-vlan end clients as untagged...


https://help.mikrotik.com/docs/display/ ... NFiltering
Also as stated on mikrotik documentation page regarding bridge filtering :
Sub-menu: /interface bridge

pvid (integer: 1..4094; Default: 1) Port VLAN ID (pvid) specifies which VLAN the untagged ingress traffic is assigned to. It applies e.g. to frames sent from bridge IP and destined to a bridge port. This property only has an effect when vlan-filtering is set to yes.
Sub-menu: /interface bridge vlan

tagged (interfaces; Default: none) Interface list with a VLAN tag adding action in egress.
untagged (interfaces; Default: none) Interface list with a VLAN tag removing action in egress.
Last edited by killersoft on Fri Oct 20, 2023 12:03 am, edited 1 time in total.
 
User avatar
strods
MikroTik Support
MikroTik Support
Posts: 1658
Joined: Wed Jul 16, 2014 7:22 am
Location: Riga, Latvia

Re: v7.12rc is released!

Thu Oct 19, 2023 2:32 pm

On iOS 17 devices, established IKE2 peers will disconnect after 24 minutes of being connected.
The disconnect happened after rekeying sent by the responder and then rejected by the initiator.
ROS = 7.11.2, 7.12rc1
Responder PFS= none
 14:13:28 ipsec --->IPSEC: -> ike2 request, exchange: CREATE_CHILD_SA:44 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec --->IPSEC: payload seen: ENC (292 bytes)
 14:13:28 ipsec --->IPSEC: processing payload: ENC
 14:13:28 ipsec,debug --->IPSEC: => iv (size 0x10)
 14:13:28 ipsec --->IPSEC: payload seen: NOTIFY (12 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: SA (92 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: NONCE (20 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: KE (72 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: TS_I (24 bytes)
 14:13:28 ipsec --->IPSEC: payload seen: TS_R (24 bytes)
 14:13:28 ipsec --->IPSEC: create child: respond
 14:13:28 ipsec --->IPSEC: processing payloads: NOTIFY
 14:13:28 ipsec --->IPSEC:   notify: REKEY_SA
 14:13:28 ipsec --->IPSEC: rekeying child SA 0xd1dabae
 14:13:28 ipsec --->IPSEC: peer wants tunnel mode
 14:13:28 ipsec --->IPSEC: processing payload: TS_R
 14:13:28 ipsec --->IPSEC: 0.0.0.0/0
 14:13:28 ipsec --->IPSEC: processing payload: TS_I
 14:13:28 ipsec --->IPSEC: 172.18.2.200
 14:13:28 ipsec --->IPSEC: checking: 0.0.0.0/0 <=> 172.18.2.200
 14:13:28 ipsec --->IPSEC: processing payload: SA
 14:13:28 ipsec --->IPSEC: IKE Protocol: ESP
 14:13:28 ipsec --->IPSEC:  proposal #1
 14:13:28 ipsec --->IPSEC:   enc: aes256-cbc
 14:13:28 ipsec --->IPSEC:   auth: sha256
 14:13:28 ipsec --->IPSEC:   dh: ecp256
 14:13:28 ipsec --->IPSEC:  proposal #2
 14:13:28 ipsec --->IPSEC:   enc: aes256-cbc
 14:13:28 ipsec --->IPSEC:   auth: sha256
 14:13:28 ipsec --->IPSEC: matched proposal:
 14:13:28 ipsec --->IPSEC:  proposal #2
 14:13:28 ipsec --->IPSEC:   enc: aes256-cbc
 14:13:28 ipsec --->IPSEC:   auth: sha256
 14:13:28 ipsec --->IPSEC: processing payload: NONCE
 14:13:28 ipsec --->IPSEC: create child: finish
 14:13:28 ipsec --->IPSEC: adding payload: NONCE
 14:13:28 ipsec,debug --->IPSEC: => (size 0x1c)
 14:13:28 ipsec --->IPSEC: initiator selector: 172.18.2.200 
 14:13:28 ipsec --->IPSEC: adding payload: TS_I
 14:13:28 ipsec,debug --->IPSEC: => (size 0x18)
 14:13:28 ipsec --->IPSEC: responder selector: 0.0.0.0/0 
 14:13:28 ipsec --->IPSEC: adding payload: TS_R
 14:13:28 ipsec,debug --->IPSEC: => (size 0x18)
 14:13:28 ipsec --->IPSEC: adding payload: SA
 14:13:28 ipsec,debug --->IPSEC: => (size 0x2c)
 14:13:28 ipsec --->IPSEC: <- ike2 reply, exchange: CREATE_CHILD_SA:44 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec,debug --->IPSEC: ===== sending 256 bytes from responder-ip[4500] to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: 1 times of 260 bytes message will be sent to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: => child keymat (size 0x80)
 14:13:28 ipsec --->IPSEC: IPsec-SA established: initiator-ip[4500]->responder-ip[4500] spi=0xb39e1af
 14:13:28 ipsec,debug --->IPSEC: ===== received 80 bytes from initiator-ip[4500] to responder-ip[4500]
 14:13:28 ipsec --->IPSEC: -> ike2 request, exchange: INFORMATIONAL:45 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec --->IPSEC: payload seen: ENC (52 bytes)
 14:13:28 ipsec --->IPSEC: processing payload: ENC
 14:13:28 ipsec,debug --->IPSEC: => iv (size 0x10)
 14:13:28 ipsec,debug --->IPSEC: decrypted packet
 14:13:28 ipsec --->IPSEC: payload seen: DELETE (12 bytes)
 14:13:28 ipsec --->IPSEC: respond: info
 14:13:28 ipsec --->IPSEC: processing payloads: NOTIFY (none found)
 14:13:28 ipsec --->IPSEC: processing payloads: DELETE
 14:13:28 ipsec --->IPSEC: delete ESP SA
 14:13:28 ipsec --->IPSEC: delete spi: 0xd1dabae
 14:13:28 ipsec --->IPSEC: IPsec-SA established: responder-ip[4500]->initiator-ip[4500] spi=0xde365b1
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: initiator-ip[4500]->responder-ip[4500] spi=0xe8c243e
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: responder-ip[4500]->initiator-ip[4500] spi=0xd1dabae
 14:13:28 ipsec,debug --->IPSEC: sending empty reply
 14:13:28 ipsec --->IPSEC: <- ike2 reply, exchange: INFORMATIONAL:45 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec,debug --->IPSEC: ===== sending 160 bytes from responder-ip[4500] to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: 1 times of 164 bytes message will be sent to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: ===== received 80 bytes from initiator-ip[4500] to responder-ip[4500]
 14:13:28 ipsec --->IPSEC: -> ike2 request, exchange: INFORMATIONAL:46 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec --->IPSEC: payload seen: ENC (52 bytes)
 14:13:28 ipsec --->IPSEC: processing payload: ENC
 14:13:28 ipsec,debug --->IPSEC: => iv (size 0x10)
 14:13:28 ipsec,debug --->IPSEC: decrypted packet
 14:13:28 ipsec --->IPSEC: payload seen: DELETE (8 bytes)
 14:13:28 ipsec --->IPSEC: respond: info
 14:13:28 ipsec --->IPSEC: processing payloads: NOTIFY (none found)
 14:13:28 ipsec --->IPSEC: processing payloads: DELETE
 14:13:28 ipsec --->IPSEC: delete IKE SA
 14:13:28 ipsec --->IPSEC: <- ike2 reply, exchange: INFORMATIONAL:46 initiator-ip[4500] c6d3a55dca1d4567:016061474fafcdab
 14:13:28 ipsec,debug --->IPSEC: ===== sending 128 bytes from responder-ip[4500] to initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: 1 times of 132 bytes message will be sent to initiator-ip[4500]
 14:13:28 ipsec,info killing ike2 SA: IKE2 responder-ip[4500]-initiator-ip[4500] spi:016061474fafcdab:c6d3a55dca1d4567
 14:13:28 ipsec,info --->IPSEC: killing ike2 SA: IKE2 responder-ip[4500]-initiator-ip[4500] spi:016061474fafcdab:c6d3a55dca1d4567
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: initiator-ip[4500]->responder-ip[4500] spi=0xb39e1af
 14:13:28 ipsec --->IPSEC: IPsec-SA killing: responder-ip[4500]->initiator-ip[4500] spi=0xde365b1
 14:13:28 ipsec --->IPSEC: removing generated policy
 14:13:28 ipsec --->IPSEC: KA remove: responder-ip[4500]->initiator-ip[4500]
 14:13:28 ipsec,debug --->IPSEC: KA tree dump: responder-ip[4500]->initiator-ip[4500] (in_use=1)
 14:13:28 ipsec,debug --->IPSEC: KA removing this one...
 14:13:28 ipsec,info releasing address 172.18.2.200
 14:13:28 ipsec,info --->IPSEC: releasing address 172.18.2.200
Could you please generate a supout file on your router after IPsec has experienced unexpected disconnect and send it to support@mikrotik.com?

Without any evidence we can not be sure about that, but seems that the problem might not be caused by the RouterOS:
https://forums.macrumors.com/threads/so ... s.2406029/
 
nmt1900
Frequent Visitor
Frequent Visitor
Posts: 85
Joined: Wed Feb 01, 2017 12:36 am

Re: v7.12rc is released!

Thu Oct 19, 2023 3:21 pm

That thing with PFS can grow into big headache where mixed-environment interoperability is concerned as all client platforms (Apple, Microsoft and Android) have defaulted to PFS=none thus far and there's no way to accommodate both with same ipsec proposal...
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Thu Oct 19, 2023 3:49 pm

Yes, that is a common issue with IPsec. People configure "more secure" IPsec settings (PFS, 256 bits, DH with long keys) and then it only works between routers but not with commonly used client devices...
Worst is that it requires ongoing research to know what settings are supported in each version of the client operating systems.
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 12980
Joined: Thu Mar 03, 2016 10:23 pm

Re: v7.12rc is released!

Thu Oct 19, 2023 4:05 pm

If we were to wind back a bit regarding tagging/vlan and go back to documented basics

I think that we'd better understand the tag/untag stuff around wave2 interfaces if we would consider the built-in wireless interface as if it was external ... then bridge would have several ports (etherX) and wifiY ... the later would connect (figuratively) external access points. So when talking about wifi interface being tagged ... we are talking about the (figuratively) external AP doing the tagging and hence the bridge port wifiY has to be tagged. (and let's forget for a moment that ROS configures also bridge wifiY port implicitly from datapath settings).

So when we're talking about wifiwave2 interface being tagged, we're talking about the bridge-facing interconnect, we're not talking about radio interface.
(I'm not saying that radio interface can not handle tagged frames, but that's different story).
 
felixka
Frequent Visitor
Frequent Visitor
Posts: 60
Joined: Mon Oct 19, 2020 4:12 am
Location: Canada

Re: v7.12rc is released!

Thu Oct 19, 2023 4:48 pm

*) sfp - fixed link establishment with passive copper cables for RB4011 and CCR2004-16G-2S+ devices (introduced in 7.12rc1);
https://mikrotik.com/product/rb4011igs_rm says "Note: Passive DAC (MikroTik S+DA0001/S+DA0003) are not supported." - are they supported now?
Or is this a mistake in the changelog and only applies to CCR2004-16G-2S+?
Not sure, but my passive DAC cable hasn't been working without disabling auto-negotiation on a CCR2004-16G-2S+ since 7.9 (which had a ton of SFP related changes). It works fine on older releases. But this change may actually be unrelated to that issue. The changelog is too unspecific to tell.
 
User avatar
own3r1138
Forum Veteran
Forum Veteran
Posts: 727
Joined: Sun Feb 14, 2021 12:33 am
Location: Pleiades
Contact:

Re: v7.12rc is released!

Thu Oct 19, 2023 8:19 pm

Yes, that is a common issue with IPsec. People configure "more secure" IPsec settings (PFS, 256 bits, DH with long keys) and then it only works between routers but not with commonly used client devices...
The worst is that it requires ongoing research to know what settings are supported in each version of the client operating systems.
I was happy with my SHA1 config. Unfortunately, iOS 17 requires SHA256.
 
User avatar
own3r1138
Forum Veteran
Forum Veteran
Posts: 727
Joined: Sun Feb 14, 2021 12:33 am
Location: Pleiades
Contact:

Re: v7.12rc is released!

Thu Oct 19, 2023 8:46 pm

Could you please generate a supout file on your router after IPsec has experienced unexpected disconnect and send it to support@mikrotik.com?

Without any evidence we can not be sure about that, but seems that the problem might not be caused by the RouterOS:
https://forums.macrumors.com/threads/so ... s.2406029/
Thank you for your reply. I will test with the SA lifetime value set to 1440 seconds. I will send a supout file if I am unsuccessful. In the meantime, the Apple configurator looks promising.
 
Rox169
Member
Member
Posts: 467
Joined: Sat Sep 04, 2021 1:47 am

Re: v7.12rc is released!

Thu Oct 19, 2023 10:22 pm

ROS 7.12RC2 on AX3 all working....
 
buset1974
Frequent Visitor
Frequent Visitor
Posts: 86
Joined: Wed Sep 13, 2006 12:12 pm
Location: Jakarta

Re: v7.12rc is released!

Fri Oct 20, 2023 1:42 am

Upgrading from v6.9x to 7.12rc2 all bgp, mpls, ospf settimg all missing.

Thx
 
Kaldek
Member Candidate
Member Candidate
Posts: 113
Joined: Sat Jul 11, 2015 2:40 pm

Re: v7.12rc is released!

Fri Oct 20, 2023 2:09 am

If we were to wind back a bit regarding tagging/vlan and go back to documented basics
At this point, you should move this part of the discussion to the WiFi channel. On topic for 7.12rc1 though, was your problem resolved by using the guidance from the post by Ftoms in MT support?
 
UpRunTech
Member Candidate
Member Candidate
Posts: 238
Joined: Fri Jul 27, 2012 12:11 pm

Re: v7.12rc is released!

Fri Oct 20, 2023 9:48 am

Just upgraded an RB4011 to 7.12RC2 can confirm a MikroTik S+DA0001 is working with a CRS354 as it did on ROS6.
 
erlinden
Forum Guru
Forum Guru
Posts: 2627
Joined: Wed Jun 12, 2013 1:59 pm
Location: Netherlands

Re: v7.12rc is released!

Fri Oct 20, 2023 10:39 am

Upgrading from v6.9x to 7.12rc2 all bgp, mpls, ospf settimg all missing.

Thx
What did you expect...just upgrade and continue? You just moved to a new major version!
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Fri Oct 20, 2023 10:46 am

Upgrading from v6.9x to 7.12rc2 all bgp, mpls, ospf settimg all missing.

Thx
What did you expect...just upgrade and continue? You just moved to a new major version!
Well, in normal situations it would convert them during the upgrade. If that happened and if it works correctly depends on details of the configuration and earlier experiments with the device.
(e.g. it is a BAD idea to try a v7 upgrade, decide not to go forward with it, downgrade to v6 and then much later try the upgrade again to a different v7 release. when you do that you need to set some option to force v6->v7 conversion to happen again, see the docs)

For BGP I have given some attention points before, there is no seamless conversion, it is best to prepare (in v6), then convert, and then do manual checks and adjustments.
 
DudeBeFishing
just joined
Posts: 9
Joined: Tue Nov 01, 2022 1:57 am

Re: v7.12rc is released!

Fri Oct 20, 2023 11:34 am

One of my DAC's had connectivity issues after upgrading from 7.11.2 to 7.12rc2. Re-plugging it on the server did not fix it, but replugging it on the router seems to have fixed the issue. Figured I'd mention it in case it's a wider spread issue. The router assigned an IP address through DHCP, but the Windows server did not get an IP address.

Router: CCR2004-16G-2S+PC
ROS: 7.12rc2
DAC: Curvature SFP-H10GB-CU2M-CURV(V2)
Server NIC: Mellanox ConnectX-2
 
User avatar
rextended
Forum Guru
Forum Guru
Posts: 12557
Joined: Tue Feb 25, 2014 12:49 pm
Location: Italy
Contact:

Re: v7.12rc is released!

Fri Oct 20, 2023 11:53 am

One of my DAC's […]
All useless info on users forum, you open a support ticket with supout.rif included?
 
mducharme
Trainer
Trainer
Posts: 1777
Joined: Tue Jul 19, 2016 6:45 pm
Location: Vancouver, BC, Canada

Re: v7.12rc is released!

Fri Oct 20, 2023 10:15 pm

I think it's generally not a good idea to upgrade from anything that isn't the latest 6.49.x to begin with, and better to upgrade to some recent stable 7.x like 7.11.2 instead of to a release candidate. If you want to go to a release candidate, it would be much safer after going to 7.11.2 first.
 
User avatar
own3r1138
Forum Veteran
Forum Veteran
Posts: 727
Joined: Sun Feb 14, 2021 12:33 am
Location: Pleiades
Contact:

Re: v7.12rc is released!

Sat Oct 21, 2023 2:53 am

Do you have a SUP ticket to reference for this? Thank you!
MikroTik support #[SUP-131841]
 
User avatar
patrikg
Member
Member
Posts: 362
Joined: Thu Feb 07, 2013 6:38 pm
Location: Stockholm, Sweden

Re: v7.12rc is released!

Sat Oct 21, 2023 7:30 pm

I think netinstall-cli is broken with the -k option.
Getting Invalid file path: (null)
./netinstall-cli -e -k Y7SR-Z6EA.key -i eth0 routeros-7.12rc2-mipsbe.npk 
Version: 7.12rc2(2023-10-16 15:36:38)
Will apply empty config
Invalid file path: (null)
Also tested with.
./netinstall-cli -e -k ./Y7SR-Z6EA.key -i eth0 routeros-7.12rc2-mipsbe.npk 
Version: 7.12rc2(2023-10-16 15:36:38)
Will apply empty config
Invalid file path: (null)
 
ffries
Member Candidate
Member Candidate
Posts: 178
Joined: Wed Aug 25, 2021 6:07 pm

Re: v7.12rc is released!

Mon Oct 23, 2023 12:35 pm

netinstall-cli 7.x is broken under Linux and I was never able to use a recent cli older than 6.x.
 
holvoetn
Forum Guru
Forum Guru
Posts: 6760
Joined: Tue Apr 13, 2021 2:14 am
Location: Belgium

Re: v7.12rc is released!

Mon Oct 23, 2023 2:23 pm

While there have been reports left and right about problems in 7.11 chain, I've successfully used netinstall on multiple devices with 7.10
So broken in 7.x is not correct.
 
tafkamax
newbie
Posts: 44
Joined: Tue Sep 19, 2023 1:04 pm

Re: v7.12rc is released!

Mon Oct 23, 2023 3:02 pm

I've used netinstall to update multiple CAP AX to 7.11.2 from 7.8(factory firmware) with linux netinstall-cli.

The important part was, that I needed to disable all other networking. E.g computer WiFi.
 
User avatar
rextended
Forum Guru
Forum Guru
Posts: 12557
Joined: Tue Feb 25, 2014 12:49 pm
Location: Italy
Contact:

Re: v7.12rc is released!

Mon Oct 23, 2023 3:37 pm

While there have been reports left and right about problems in 7.11 chain, I've successfully used netinstall on multiple devices with 7.10
So broken in 7.x is not correct.
It's always the same story, it's those arrogant users who if they aren't good at using it, everything is broken...
It doesn't matter if it works for others, they don't even want to consider the idea that they're doing something wrong,
so if there's a mistake, it's always all MikroTik's fault...

Then there's the part that MikroTik hasn't yet fixed NetInstall for windows, from 6.48.3, to be able to netinstall x86 machines...
Why last netinstall [6.48.3 at the epoc, N.d.R.] can't boot any x86 devices (deep dive)
viewtopic.php?t=176162
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Mon Oct 23, 2023 3:49 pm

Well, in general I agree with that, but not in the case of netinstall. That is just a badly designed/implemented program.
 
User avatar
eworm
Forum Guru
Forum Guru
Posts: 1092
Joined: Wed Oct 22, 2014 9:23 am
Location: Oberhausen, Germany
Contact:

Re: v7.12rc is released!

Mon Oct 23, 2023 4:16 pm

You can run netinstall in a network namespace... Makes it easy and reliable. This is the wrapper I use:
https://aur.archlinux.org/cgit/aur.git/ ... netinstall

Most important are the calls from ip at the end. Feel free to modify for your needs.
 
forteller
just joined
Posts: 20
Joined: Tue Jun 13, 2023 9:58 am

Re: v7.12rc is released!

Tue Oct 24, 2023 12:02 pm

The same problem for LXT-010S-H which existed in beta, still exists in rc2:
viewtopic.php?t=198723#p1028216

This time I sent supout files to the support. Let's hope it gets fixed before the official release.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Tue Oct 24, 2023 1:51 pm

This time I manually rebooted the router before trying to install the update, and the reboot was hanging. Just like the update is hanging when I try it after some uptime.
Could it be caused by rose-storage? I have an NFS mount (the router mounts a share from an NFS server). I could imagine that this is not unmounted before the interfaces go down, and then it takes a long time to unmount the NFS share in the reboot procedure (I don't have much patience, after a minute or two I just powercycle the router).
Are there others who use NFS mount that experience problems rebooting?
I have confirmed that the NFS mount is the problem. When an NFS mount is present like this:
/disk
add nfs-address=192.168.1.3 nfs-share=/local/mikrotik slot=nfs type=nfs
and files have been opened and closed on the nfs share, the router hangs at the next reboot.
When the disk is disabled before trying the reboot, everything is fine.
The server is just on a bridge with an ethernet port, nothing special.
It seems that the bridge and/or the ethernet port is taken down before the NFS share is unmounted?
 
User avatar
Kentzo
Long time Member
Long time Member
Posts: 619
Joined: Mon Jan 27, 2014 3:35 pm
Location: California

Re: v7.12rc is released!

Wed Oct 25, 2023 6:57 am

On iOS 17 devices, established IKE2 peers will disconnect after 24 minutes of being connected.

It might be helpful to analyze iOS perspective. Search device's logs for the "NEIKEv2Provider" process.
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 12980
Joined: Thu Mar 03, 2016 10:23 pm

Re: v7.12rc is released!

Wed Oct 25, 2023 7:43 am

It seems that the bridge and/or the ethernet port is taken down before the NFS share is unmounted?

In "normal" linux servers, when NFS server is stopped, it doesn't communicate with clients, it simply drops dead. (After that, NFS clients might hang waiting for NFS server to get alive again, but that's their problem.)
So what seems to be the problem in ROS is that on shutdown/reboot sequence, NFS server doesn't get stopped. Hence exported disk partition still shows usage and unmounting it hangs.
But then I might be wrong and the problem is in duration of some infinite loops ;-)
 
Network5
newbie
Posts: 30
Joined: Sat Mar 22, 2014 11:42 pm

Re: v7.12rc is released!

Wed Oct 25, 2023 7:46 am

Happened to do some work for a client, setting up a IPsec/IKEv2. With the increased security in iOS the incompatibility between the various configurations is huge. The main problem for Mac clients tends to be the LifeTime parameter. As far as I know, the only way to set up a common security profile that fits both Windows and Mac clients is to install the VPN trough .mobileconfig profile with the correct parameters (for Mac) and install/modify the security parameters with PowerShell in Windows env. Once done no disconnects any more, and cross compatibility is guaranteed.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Wed Oct 25, 2023 12:21 pm

So what seems to be the problem in ROS is that on shutdown/reboot sequence, NFS server doesn't get stopped. Hence exported disk partition still shows usage and unmounting it hangs.
Yes, that is what I wrote is my guess as well. In this case it seems the NFS client won't stop because it gets no reply from the server, and it does not get a reply from the server because the bridge or ethernet port has already been brought down at that time.
When I manually bring down the mount by disabling it before I do the reboot, all is fine.
So I think the shutdown (unmount) of the NFS client should be moved more towards the beginning of the shutdown sequence.

And then I do not even have open files on my NFS mount! At first I added this mount because I wanted to put containers on my RB4011 and that device lacks enough storage (and expandability) for it. But although I have the container package installed I never did anything with it. I guess when I put a container on NFS mounted storage, the situation will become even worse.
 
Rox169
Member
Member
Posts: 467
Joined: Sat Sep 04, 2021 1:47 am

Re: v7.12rc is released!

Fri Oct 27, 2023 12:45 pm

no RC this week? :/
 
User avatar
msilcher
just joined
Posts: 7
Joined: Mon Mar 09, 2009 9:39 pm
Location: Argentina

Re: v7.12rc is released!

Fri Oct 27, 2023 3:06 pm

When are you releasing 7.12? I need those IKEv2 rekey fixes in the stable version :)
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Fri Oct 27, 2023 3:16 pm

When you need fixes you can just as well install an RC version. At some point in time the version will change to 7.12 and it is still the same software.
 
Rox169
Member
Member
Posts: 467
Joined: Sat Sep 04, 2021 1:47 am

Re: v7.12rc is released!

Fri Oct 27, 2023 3:19 pm

When are you releasing 7.12? I need those IKEv2 rekey fixes in the stable version :)
when its done :)
 
oskarsk
MikroTik Support
MikroTik Support
Posts: 64
Joined: Mon May 13, 2019 9:41 am

Re: v7.12rc is released!

Fri Oct 27, 2023 4:17 pm

You can use just fine rc version. Next one coming soon.
When are you releasing 7.12? I need those IKEv2 rekey fixes in the stable version :)
 
felixka
Frequent Visitor
Frequent Visitor
Posts: 60
Joined: Mon Oct 19, 2020 4:12 am
Location: Canada

Re: v7.12rc is released!

Fri Oct 27, 2023 4:17 pm

When are you releasing 7.12? I need those IKEv2 rekey fixes in the stable version :)
when its done :)
We all know (and Mikrotik lives by it): Done is better than perfect 😉
 
User avatar
bpwl
Forum Guru
Forum Guru
Posts: 3124
Joined: Mon Apr 08, 2019 1:16 am

Re: v7.12rc is released!

Fri Oct 27, 2023 7:15 pm

I don't really get all this tagged/untagged discussion. The 802.11 frame header has no place for a VLAN ID, so, technically, wifi interfaces are never tagged.
Well 802.11 standard frame has no space for a VLAN tag, and only has space for 3 MAC addresses.
But MT with WLAN driver "AP bridge"-"station bridge" connection, not only passes the 4th MAC address (sender-transmitter-receiver-destination) , but also the VLAN tags work as expected on a bridged ethernet connection.
Access, trunk, hybrid ... it all works over that wifi link. (And I see the same on CUBE's 60GHz wireless-wire links.)
Maybe it comes also in WLAN-WDS interfaces. ??? viewtopic.php?t=14300 ?????????????????
 
User avatar
jbl42
Member Candidate
Member Candidate
Posts: 225
Joined: Sun Jun 21, 2020 12:58 pm

Re: v7.12rc is released!

Fri Oct 27, 2023 10:48 pm

When are you releasing 7.12? I need those IKEv2 rekey fixes in the stable version :)
After the buggy 7.10.0 (breaking OpenVPN on all devices) and 7.11.0 (breaking VLAN filtering on many devices) releases, taking their time to release 7.12 without major regressions and earning the "stable" tag is appreciated.
 
User avatar
pekr
Member Candidate
Member Candidate
Posts: 170
Joined: Tue Feb 22, 2005 9:05 pm
Location: Czech Republic
Contact:

Re: v7.12rc is released!

Sat Oct 28, 2023 10:36 am

I don't really get all this tagged/untagged discussion. The 802.11 frame header has no place for a VLAN ID, so, technically, wifi interfaces are never tagged.
Well 802.11 standard frame has no space for a VLAN tag, and only has space for 3 MAC addresses.
But MT with WLAN driver "AP bridge"-"station bridge" connection, not only passes the 4th MAC address (sender-transmitter-receiver-destination) , but also the VLAN tags work as expected on a bridged ethernet connection.
Access, trunk, hybrid ... it all works over that wifi link. (And I see the same on CUBE's 60GHz wireless-wire links.)
Maybe it comes also in WLAN-WDS interfaces. ??? viewtopic.php?t=14300 ?????????????????
Does it mean I can already dismantle my temporary bridged solution using vxlan and replace it by setting the repeater using a station-bridge mode?
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Sat Oct 28, 2023 11:02 am

I don't really get all this tagged/untagged discussion. The 802.11 frame header has no place for a VLAN ID, so, technically, wifi interfaces are never tagged.
Well 802.11 standard frame has no space for a VLAN tag, and only has space for 3 MAC addresses.
But MT with WLAN driver "AP bridge"-"station bridge" connection, not only passes the 4th MAC address (sender-transmitter-receiver-destination) , but also the VLAN tags work as expected on a bridged ethernet connection.
Unfortunately each manufacturer has a separate solution for that (just like they have a different solution for PtMP connections with some polling mode).
But it is not relevant to the discussion above. In that, the protocol over radio does not use VLAN tags, but different clients connected to the same radio SSID get VLAN tagged on the internal side of the WiFi interface, that is connected to a VLAN-filtered bridge.
So client 1 can be on VLAN 10, client 2 can be on VLAN 20, etc. Each is in a different network although they all have the same untagged radio packet format. Which VLAN tag is used is determined by an access list or by a RADIUS server.

It causes issues with multicasting. But that can be worked around with multicast-to-unicast conversion as is done by the multicast helper.
 
User avatar
bpwl
Forum Guru
Forum Guru
Posts: 3124
Joined: Mon Apr 08, 2019 1:16 am

Re: v7.12rc is released!

Sat Oct 28, 2023 12:57 pm

Maybe getting far off topic , as maybe nothing changed in ROS 7.12rc, or the change is between ROS6 and ROS7.

But I do distribute multiple VLAN over MT legacy WLAN interfaces, eg. via CUBE-CUBE, SXTsa5 and SXTsq, and further downstream between hAP ac2 and other small MT AP, which are used as wifi-ethernet converters (wifi for the uplink, ethernet for the downstream links, MT avoiding pseudobridge) for printers, TV and home automation devices on ethernet.
Never looked deep into the working, as it just worked as expected/hoped for. It works the same with NV2 as 802.11, with MT only wifi devices.
The small AP, hAPac2, SXTsa5 or CUBE can all stop/untag the VLAN at a certain point in the chain, before it reaches the non-MT wifi devices. Tagging/Untagging can be done in a bridge or in the WLAN driver.

Maybe all this stops working with ROS7 and/or wifiwave2. Now with ROS7 we have other extra options like VXLAN? Would that have any advantage? Or (ab)use local Zerotier?
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 12980
Joined: Thu Mar 03, 2016 10:23 pm

Re: v7.12rc is released!

Sat Oct 28, 2023 1:40 pm

In theory every 802.11 device should be able to pass 802.1Q tagged packet if it fits the MTU of wireless interface. After all, the 802.1Q header comes after usual ethernet headers and from ethernet point of view only payload type differs (from e.g. IPv4 or IPv6 payload type). And that doesn't affect delivery of those frames over radio interface where only MAC addresses matter.
However, different wireless drivers do interact with passing frames beyond basic MAC addressing and some drivers might burp on frames they don't recognize. And, not the least concern, it's wireless drivers that communicate with bridges. So it's the whole chain (bridge-driver-radio) which has to cooperate to pass VLAN-tagged frames end-to-end. And I'm guessing that wifiwave2 driver and radio would pass 802.1Q tagged frames just fine if bridge and bridge-facing part of wireless were configured appropriately (i.e. bridge wlan-facing port configured as tagged or hybrid and wifiwave2 bridge-facing part not to bother with vlan tags).
 
User avatar
bpwl
Forum Guru
Forum Guru
Posts: 3124
Joined: Mon Apr 08, 2019 1:16 am

Re: v7.12rc is released!

Sat Oct 28, 2023 5:17 pm

Thx @MKX for this clarifying information. With all the posts on the internet forums like https://superuser.com/questions/870450/ ... nsparently , even here, "wifi interfaces are never tagged", started to worry, even as my MT experience was that it just works. By the way used the bridge with no VLAN filtering enabled (dumb switch mode). I think this is the same kind of confusion about VLAN in bridge and wifi.
 
volkirik
Member Candidate
Member Candidate
Posts: 212
Joined: Sat Jul 23, 2016 2:03 pm

Re: v7.12rc is released!

Sun Oct 29, 2023 1:55 am

rc3 is available for testing. if you get support ticket response indicating that your bug-report is FIXED, you may try this experimental testing release

https://box.mikrotik.com/d/c1ce5f170ea1467db0d2/

no changelog. no warranty. experimental.
Last edited by volkirik on Sun Oct 29, 2023 2:57 am, edited 2 times in total.
 
UpRunTech
Member Candidate
Member Candidate
Posts: 238
Joined: Fri Jul 27, 2012 12:11 pm

Re: v7.12rc is released!

Sun Oct 29, 2023 2:41 am

>> *) wifiwave2 - added station-bridge interface mode;

I have tested an Audience in Station-Bridge mode connected to a HAPAX2 CAPSMAN system and it works as a proper bridged system!

A PC on the Audiences ethernet2 port gets a DHCP lease and can see the whole LAN as usual.

This is fantastic and something I always wanted from the original CAPSMAN.

All devices are using 7.12rc2.
 
kalamaja
Member Candidate
Member Candidate
Posts: 114
Joined: Wed May 23, 2018 3:13 pm

Re: v7.12rc is released!

Sun Oct 29, 2023 11:50 am

hAP AX LTE6 aka L41G-2axD&FG621-EA has an annoying glitch:

- Although I have entered 0000 as PIN for LTE card, after reboot ROS 7.8, 7.11.2 and 7.12rc2 all say "SIM locked" and no LTE traffic. Log says: LTE:: lte1 mbim: state 7=>9
- problem gets fixed after doing disable+enable to the lte1 interface: now interface knows the PIN and goes up correctly
- LTE firmware 16121.1034.00.01.01.04
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Sun Oct 29, 2023 12:42 pm

However, different wireless drivers do interact with passing frames beyond basic MAC addressing and some drivers might burp on frames they don't recognize.
I think the problem is that the drivers have to do some kind of workaround to replace ARP. The WiFi has the same MAC for all clients, but they still need to send the appropriate packets to the correct MAC. To do that, the driver assumes the packet is IP and peeks into the header to see the destination IP. But that fails when the next header is VLAN.
 
volkirik
Member Candidate
Member Candidate
Posts: 212
Joined: Sat Jul 23, 2016 2:03 pm

Re: v7.12rc is released!

Sun Oct 29, 2023 12:46 pm

However, different wireless drivers do interact with passing frames beyond basic MAC addressing and some drivers might burp on frames they don't recognize.
I think the problem is that the drivers have to do some kind of workaround to replace ARP. The WiFi has the same MAC for all clients, but they still need to send the appropriate packets to the correct MAC. To do that, the driver assumes the packet is IP and peeks into the header to see the destination IP. But that fails when the next header is VLAN.
mac conflict on interfaces? delete mac-address on virtual interfaces using winbox, then they will get different mac-address.
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 12980
Joined: Thu Mar 03, 2016 10:23 pm

Re: v7.12rc is released!

Sun Oct 29, 2023 1:03 pm

However, different wireless drivers do interact with passing frames beyond basic MAC addressing and some drivers might burp on frames they don't recognize.
I think the problem is that the drivers have to do some kind of workaround to replace ARP. The WiFi has the same MAC for all clients, but they still need to send the appropriate packets to the correct MAC. To do that, the driver assumes the packet is IP and peeks into the header to see the destination IP. But that fails when the next header is VLAN.
I think it's different: when wireless device communicates with wired interface, that wired device sees wireless device's MAC (I just verified), so AP doesn't have to replace any MAC (it only adds its own MAC address as the transmitting station address in a standard 802.11 radio frame). So what AP does is it puts its wired interface into promiscuous mode and then filters ingress frames according to registration table. And that has nothing to do with IP (or any other L3 protocol).
The only case when wireless device[*] needs to look into ethernet frame payload (e.g. for IPv4 headers) is if it's running as "station-pseudobridge" ([*] which is not AP mode and hence I used term "wireless device").
 
holvoetn
Forum Guru
Forum Guru
Posts: 6760
Joined: Tue Apr 13, 2021 2:14 am
Location: Belgium

Re: v7.12rc is released!

Sun Oct 29, 2023 1:03 pm

hAP AX LTE6 aka L41G-2axD&FG621-EA has an annoying glitch:

- Although I have entered 0000 as PIN for LTE card, after reboot ROS 7.8, 7.11.2 and 7.12rc2 all say "SIM locked" and no LTE traffic. Log says: LTE:: lte1 mbim: state 7=>9
- problem gets fixed after doing disable+enable to the lte1 interface: now interface knows the PIN and goes up correctly
- LTE firmware 16121.1034.00.01.01.04
This is an old problem.
I solved it on my ax lte disabling pin on the used SIM ( you need to put it in a smartphone to do that).

You could also use a script on startup to disable and enable lte.
 
kalamaja
Member Candidate
Member Candidate
Posts: 114
Joined: Wed May 23, 2018 3:13 pm

Re: v7.12rc is released!

Sun Oct 29, 2023 10:30 pm

Another annoying bug in 7.12rc2 with hAP AX lite LTE6: in "webfig -> Interfaces -> LTE interface properties" there are little black triangles in front of sections General/Cellular/Status/Traffic. Normal would be "to the right"=closed, "down"=opened, but they change their meaning depending on clicking other sections, so it's easy to get "all sections closed" with triangles pointing to different directions.
 
User avatar
braveheartleo
newbie
Posts: 45
Joined: Thu Apr 16, 2020 8:10 pm
Location: /dev/console

Re: v7.12rc is released!

Sun Oct 29, 2023 11:16 pm

hAP AX LTE6 aka L41G-2axD&FG621-EA has an annoying glitch:

- Although I have entered 0000 as PIN for LTE card, after reboot ROS 7.8, 7.11.2 and 7.12rc2 all say "SIM locked" and no LTE traffic. Log says: LTE:: lte1 mbim: state 7=>9
- problem gets fixed after doing disable+enable to the lte1 interface: now interface knows the PIN and goes up correctly
- LTE firmware 16121.1034.00.01.01.04
This is an old problem.
I solved it on my ax lte disabling pin on the used SIM ( you need to put it in a smartphone to do that).

You could also use a script on startup to disable and enable lte.
To disable SIM PIN code on the router:
/interface/lte at-chat lte1 input="AT+CLCK=\"SC\",0,<pin>"
To change SIM PIN, first you need to enable it:
/interface/lte at-chat lte1 input="AT+CLCK=\"SC\",1,<pin>"
Then change it:
/interface/lte at-chat lte1 input="AT+CPWD=\"SC\",<oldPIN>,<newPIN>"
To check if SIM PIN is enabled:
/interface/lte at-chat lte1 input="AT+CLCK=\"SC\",2"
A return value of "+CLCK: 1" means it is enabled. "+CLCK: 0" means it is disabled. Replace ”<pin>” with relevant values.
 
EdPa
MikroTik Support
MikroTik Support
Topic Author
Posts: 340
Joined: Fri Sep 15, 2017 10:05 am
Location: Riga
Contact:

Re: v7.12rc is released!

Mon Oct 30, 2023 9:34 am

What's new in 7.12rc4 (2023-Oct-27 11:51):

*) lte - fixed FG621-EA possible timeouts during firmware upgrade;
*) netinstall-cli - fixed "-k" key option (introduced in v7.12beta7);
*) poe-out - removed "auto" mode support for L009 devices;
*) routerboard - fixed "reset-button" support for wAP ac and wAP R ac devices;
*) sfp - fixed incorrect link speed when changing link modes (introduced in v7.12beta3);
*) system - fixed process multithreading (introduced in v7.9);
*) system - improved system stability during booting for L009 devices;
 
User avatar
rextended
Forum Guru
Forum Guru
Posts: 12557
Joined: Tue Feb 25, 2014 12:49 pm
Location: Italy
Contact:

Re: v7.12rc is released!

Mon Oct 30, 2023 10:18 am

*) poe-out - removed "auto" mode support for L009 devices;

Please?
 
User avatar
loloski
Member
Member
Posts: 420
Joined: Mon Mar 15, 2021 9:10 pm

Re: v7.12rc is released!

Mon Oct 30, 2023 11:43 am

system - fixed process multithreading (introduced in v7.9);
care to elaborate please?
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Mon Oct 30, 2023 11:52 am

Noted after installation (do no know how long it exists as I just changed IPv6 settings) that when you have IPv6 enabled but IPv6 routing disabled, the IPv6 forward chain gets hit with multicast packets from the local network, as if it wants to forward them.
/ipv6 settings
set forward=no
/ipv6 firewall filter
add action=drop chain=forward log=yes
I would think when forwarding is disabled, no attempts to forward should be made.
 
tim427
just joined
Posts: 6
Joined: Sat Aug 15, 2020 10:10 am

Re: v7.12rc is released!

Mon Oct 30, 2023 12:17 pm

I still see some strange behaviour in the SNMP-BGP Peer Table;

`bgpPeerTable` as defined at https://oidref.com/1.3.6.1.2.1.15.3
Is missing the following properties; Also incorrect values are presented, and not updated over time;
  • `bgpPeerFsmEstablishedTime` (https://oidref.com/1.3.6.1.2.1.15.3.1.16); this one should indicate how long (in seconds) this peer has been in the Established state or how long since this peer was last in the Established state.
These values aren't updated over time, nor after a reboot (and therefore a new Established) and completely inaccurate!

After a reboot, all the BGP-sessions are established at almost the same timestamp (+/- 10 minutes ago), side-by-side the output of snmpwalk '.1.3.6.1.2.1.15.3.1.16' is shown. 10 minutes should result in 600 seconds, these values are far off and quite random;
Screenshot 2023-10-30 at 11.11.46.png
You do not have the required permissions to view the files attached to this post.
 
marekm
Member
Member
Posts: 416
Joined: Tue Feb 01, 2011 11:27 pm

Re: v7.12rc is released!

Mon Oct 30, 2023 4:03 pm

#[SUP-130404] Modbus CRC related bug still in 7.12rc4 - not fixed yet.
Almost sure sign of some string function used where it shouldn't be, as the CRC can be any 16-bit binary value and shouldn't affect frame length.
viewtopic.php?p=1029228
 
ivicask
Member
Member
Posts: 438
Joined: Tue Jul 07, 2015 2:40 pm
Location: Croatia, Zagreb

Re: v7.12rc is released!

Mon Oct 30, 2023 4:17 pm

system - fixed process multithreading (introduced in v7.9);
care to elaborate please?
I would also like to know this.
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 4324
Joined: Sun May 01, 2016 7:12 pm
Location: California
Contact:

Re: v7.12rc is released!

Mon Oct 30, 2023 5:08 pm

system - fixed process multithreading (introduced in v7.9);
care to elaborate please?
Yup that's pretty vague. e.g. What exact services were effected? BGP/routing, container, shell/scripting, IP services, ...?
 
User avatar
strods
MikroTik Support
MikroTik Support
Posts: 1658
Joined: Wed Jul 16, 2014 7:22 am
Location: Riga, Latvia

Re: v7.12rc is released!

Mon Oct 30, 2023 5:28 pm

Since version 7.9 few processes were not working properly and could have caused an extra load on single CPU core, compared to older versions. That was caused due to the fact that parallel processes were not started as separate tasks. For example, this did affect SSL processes, certificate management processes, PPP tunnels, etc.

Kind of a classical "single core stuck on 100%" or "process X is being handled only by a single CPU core" problems.

For example, simple traffic processing was not affected.
 
Kevdevon
just joined
Posts: 13
Joined: Fri Jul 07, 2023 12:55 pm

Re: v7.12rc is released!

Mon Oct 30, 2023 5:33 pm

Noted after installation (do no know how long it exists as I just changed IPv6 settings) that when you have IPv6 enabled but IPv6 routing disabled, the IPv6 forward chain gets hit with multicast packets from the local network, as if it wants to forward them.
/ipv6 settings
set forward=no
/ipv6 firewall filter
add action=drop chain=forward log=yes
I would think when forwarding is disabled, no attempts to forward should be made.
I've put that drop rule with log into 7.12rc2 and I'm not seeing any logged packets.
 
Kevdevon
just joined
Posts: 13
Joined: Fri Jul 07, 2023 12:55 pm

Re: v7.12rc is released!

Mon Oct 30, 2023 5:36 pm

Since version 7.9 few processes were not working properly and could have caused an extra load on single CPU core, compared to older versions. That was caused due to the fact that parallel processes were not started as separate tasks. For example, this did affect SSL processes, certificate management processes, PPP tunnels, etc.

Kind of a classical "single core stuck on 100%" or "process X is being handled only by a single CPU core" problems.

For example, simple traffic processing was not affected.
Do you have a list of processes that were impacted?
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Mon Oct 30, 2023 7:03 pm

Noted after installation (do no know how long it exists as I just changed IPv6 settings) that when you have IPv6 enabled but IPv6 routing disabled, the IPv6 forward chain gets hit with multicast packets from the local network, as if it wants to forward them.
I've put that drop rule with log into 7.12rc2 and I'm not seeing any logged packets.
It could be that it requires 2 or more local interfaces with an IPv6 address.
 
moojp
just joined
Posts: 2
Joined: Wed Sep 01, 2021 3:01 pm

Re: v7.12rc is released!

Tue Oct 31, 2023 5:49 am

For example, this did affect SSL processes, certificate management processes, PPP tunnels, etc.
How about IPIPv6 interface?
 
kiaunel
Member Candidate
Member Candidate
Posts: 219
Joined: Mon Jul 21, 2014 7:59 pm
Location: Germany

Re: v7.12rc is released!

Tue Oct 31, 2023 9:01 am

Openvpn client in udp mode is finally working again. Even if there is no entry in changelog about this
 
rpingar
Long time Member
Long time Member
Posts: 593
Joined: Fri May 28, 2004 2:46 pm
Location: Italy

Re: v7.12rc is released!

Tue Oct 31, 2023 9:43 am

Since version 7.9 few processes were not working properly and could have caused an extra load on single CPU core, compared to older versions. That was caused due to the fact that parallel processes were not started as separate tasks. For example, this did affect SSL processes, certificate management processes, PPP tunnels, etc.

Kind of a classical "single core stuck on 100%" or "process X is being handled only by a single CPU core" problems.

For example, simple traffic processing was not affected.
is rpki check affected? I think yes because a lot of time (not all) we have one cpu at 100% (ccr2216) about routing; and it could happen not just at boot but also on some specific events.

regards
 
User avatar
eworm
Forum Guru
Forum Guru
Posts: 1092
Joined: Wed Oct 22, 2014 9:23 am
Location: Oberhausen, Germany
Contact:

Re: v7.12rc is released!

Tue Oct 31, 2023 9:50 am

I think I am affected with netwatch when monitoring https (type=https-get). I did complain about one core going to 100% in SUP-106133. Crossing fingers it is fixed now...
 
User avatar
herger
Frequent Visitor
Frequent Visitor
Posts: 58
Joined: Tue Aug 18, 2020 2:48 pm

Re: v7.12rc is released!

Tue Oct 31, 2023 11:00 am

I have tried to update my current setup but ran into a problem:
despite the wg tunnel getting established and ospfv2 reaches state full, no routing towards the tunnel happens (is working just fine on 7.11.2; allowed addresses include the remote range).
Does
- anybody uses my (actually not so) wired setup (wg + ospf)?
- anybody experience issues similar to mine with this rc?
- anybody knows of changes in this rc that could lead to my symptoms?

no, i have not yet opened a ticket, i try to rule out the obvious stupidities first (-;

thanks & best
 
User avatar
eworm
Forum Guru
Forum Guru
Posts: 1092
Joined: Wed Oct 22, 2014 9:23 am
Location: Oberhausen, Germany
Contact:

Re: v7.12rc is released!

Tue Oct 31, 2023 11:05 am

Wireguard and OSPF works just fine for me, currently on 7.12rc2.
 
User avatar
eworm
Forum Guru
Forum Guru
Posts: 1092
Joined: Wed Oct 22, 2014 9:23 am
Location: Oberhausen, Germany
Contact:

Re: v7.12rc is released!

Tue Oct 31, 2023 11:33 am

Not quite true... Also running the combination with Wireguard and OSPF on 7.12rc4 already.

To date I could not find any serve issues with recent rc releases. Really happy and waiting for final release. 😜
 
leonardogyn
just joined
Posts: 18
Joined: Wed Dec 04, 2019 4:47 pm

Re: v7.12rc is released!

Tue Oct 31, 2023 2:09 pm

Minor webfig error with RC2 (not sure if it happened on RC1, screenshot is from RC2), there's an erroneous TX/RX rates (that keeps updating) on the header, no matter which "page" I'm in. It's not supposed to be there.
.
EDIT: disabled my skin and the information is still there, so not skin related.
.
RC2.png
.
Still true on rc4
 
User avatar
strods
MikroTik Support
MikroTik Support
Posts: 1658
Joined: Wed Jul 16, 2014 7:22 am
Location: Riga, Latvia

Re: v7.12rc is released!

Wed Nov 01, 2023 7:03 am

These values are there for a purpose. Is there a problem with them?

Came together with - "webfig - improved Webfig performance and responsiveness".
Minor webfig error with RC2 (not sure if it happened on RC1, screenshot is from RC2), there's an erroneous TX/RX rates (that keeps updating) on the header, no matter which "page" I'm in. It's not supposed to be there.
.
EDIT: disabled my skin and the information is still there, so not skin related.
.
RC2.png
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 4324
Joined: Sun May 01, 2016 7:12 pm
Location: California
Contact:

Re: v7.12rc is released!

Wed Nov 01, 2023 7:23 am

I think it's useful – if you mess-up config you'd know sooner if traffic starts dropping.

But webfig TX/RX isn't controllable by a skin, unlike everything else in webfig, which is kinda odd... I'd quibble that units change often so not always quick to visually parse, but that part is consistent with rest of RouterOS/Dude display of bps/kbps/mbps.
 
jeetlal
just joined
Posts: 13
Joined: Mon Oct 08, 2018 8:14 pm

Re: v7.12rc is released!

Wed Nov 01, 2023 11:40 am

webfig dhcp>server>lease all most field ascending descending order not working
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Wed Nov 01, 2023 11:49 am

These values are there for a purpose. Is there a problem with them?
I presume these figures are the TX/RX rate of the connection with webfig. People probably assume these are the global TX/RX rate of the router (same as was on the LCD back in the old days)?
Anyway, how important is that "purpose"? Maybe it is only to indicate that the connection to the router is still alive, and would better be replaced by e.g. a green/red icon?
Or is it for debugging by the developers to see if they are not sending too much data?

In winbox there is no such thing either. I would like it when the connection to winbox gets a much longer timeout time, possibly combined with something like this so that you easily see that the connection is dead. But the winbox client timeout should be increased to e.g. one minute (instead of some seconds) so that a brief network interruption does not immediately kill the connection.
 
giannici
newbie
Posts: 29
Joined: Thu May 11, 2017 4:17 pm

Re: v7.12rc is released!

Wed Nov 01, 2023 11:58 am

These values are there for a purpose. Is there a problem with them?
I presume these figures are the TX/RX rate of the connection with webfig. People probably assume these are the global TX/RX rate of the router (same as was on the LCD back in the old days)?
Me too thought it was the global TX/RX rate, but then noticed it was too little...

SUGGESTION: I'd find it useful to put near there the indication of total CPU usage.
Thanks.
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 4324
Joined: Sun May 01, 2016 7:12 pm
Location: California
Contact:

Re: v7.12rc is released!

Wed Nov 01, 2023 2:35 pm

These values are there for a purpose. Is there a problem with them?
I presume these figures are the TX/RX rate of the connection with webfig.
Hold on, you're right, it is just webfig traffic. I thought it was total traffic, which be okay. But not sure what webfig traffic usage shows...
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Wed Nov 01, 2023 6:01 pm

Hold on, you're right, it is just webfig traffic. I thought it was total traffic, which be okay. But not sure what webfig traffic usage shows...
It shows how much traffic it takes to display and update the page you are viewing in webfig.
For some pages that is almost zero, because they are just static. For other pages (e.g. the interface list) it may be a lot, as there are counters on it that are changing all the time.
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 4324
Joined: Sun May 01, 2016 7:12 pm
Location: California
Contact:

Re: v7.12rc is released!

Wed Nov 01, 2023 7:55 pm

It shows how much traffic it takes to display and update the page you are viewing in webfig.
Oh I got that, once I read your post ;).

I think my point was it that webfig's traffic usage (as opposed to a TOTAL of ALL traffic) is NOT very useful/important. Or at least potentially confusing, since I did think it was total, but never correlated the stats.

But since webfig's traffic is worthless data, IMO, now raises the issue of how to disable it with a skin.
 
killersoft
Member Candidate
Member Candidate
Posts: 263
Joined: Mon Apr 11, 2011 2:34 pm
Location: Victoria, Australia

Re: v7.12rc is released!

Wed Nov 01, 2023 10:53 pm

While we're at it. It would be nice to be able to disable Winbox Graphics Licence and Help for the RouterOS login screen.

And also the note

You have connected to a router. Administrative access only. If this device is not in your possession, please contact your local network administrator.

Plus maybe be able to change it if we like.

TIA
Umm, thats already a thing.
System->Note.

If your also referring to the 'default' configuration you get with a Mikrotik, then SYSTEM->Reset Configuration ( tick No default configuration )->Reset Config button.. Then you wont be getting any splash screen
 
EdPa
MikroTik Support
MikroTik Support
Topic Author
Posts: 340
Joined: Fri Sep 15, 2017 10:05 am
Location: Riga
Contact:

Re: v7.12rc is released!

Fri Nov 03, 2023 8:57 am

What's new in 7.12rc5 (2023-Nov-02 15:17):

*) bth - added "Back To Home" VPN service for ARM, ARM64, and TILE devices;
*) console - display "End-User License Agreement" prompt after configuration reset;
*) ethernet - fixed default "advertise" property for CRS310-8G+2S+ device (introduced in v7.12beta3);
*) sfp - fixed 1Gbps advertise for L009 devices (introduced in v7.12beta3);
*) sfp - fixed 1Gbps advertise using SFP+ or SFP28 modules in SFP interface (introduced in v7.12beta3);
*) sfp - improved system stability with certain modules for 98DX224S, 98DX226S, 98DX3236, 98DX8216 and 98DX8208 switch chips;
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 4324
Joined: Sun May 01, 2016 7:12 pm
Location: California
Contact:

Re: v7.12rc is released!

Fri Nov 03, 2023 9:00 am

Is BTH going to be in the eventual stable?
 
User avatar
braveheartleo
newbie
Posts: 45
Joined: Thu Apr 16, 2020 8:10 pm
Location: /dev/console

Re: v7.12rc is released!

Fri Nov 03, 2023 9:20 am

Is BTH going to be in the eventual stable?
Probably. They disabled it in RCs in the past, but now enabled it in an RC prior to a stable release. So I say they are getting ready to roll this out to everyone in the imminent stable release.
 
User avatar
herger
Frequent Visitor
Frequent Visitor
Posts: 58
Joined: Tue Aug 18, 2020 2:48 pm

Re: v7.12rc is released!

Sat Nov 04, 2023 5:36 pm

Not quite true... Also running the combination with Wireguard and OSPF on 7.12rc4 already.
After a bit more debugging, the problem is that OSPF reaches state full, but on both peers (ROS-7.11.2 and bird2) the routes don't make it into the routing table.
I ask myself if there has been a change to OSPF with 7.12 ;-)

@eworm whats running on your peer? ROS7.12 by accident?
 
marekm
Member
Member
Posts: 416
Joined: Tue Feb 01, 2011 11:27 pm

Re: v7.12rc is released!

Sun Nov 05, 2023 5:09 am

#[SUP-130404] Modbus CRC related bug still in 7.12rc5 - not fixed yet.
Can also reproduce from command line, no need for Modbus TCP client:
[admin@MikroTik] > iot/modbus/transceive address=2 function=3 data=00200002
   address: 2
  function: 3
      data: 02030400F000
    values: 240,0
      time: 2023-11-05 02:14:25
    status: ok

[admin@MikroTik] > iot/modbus/transceive address=3 function=3 data=00200002
   address: 3
  function: 3
      data: 03030400F00000
    values: 240,0
      time: 2023-11-05 02:14:29
    status: ok
First read is one byte too short, because last byte of frame (2nd byte of CRC) happens to be 0.
Second read is correct, because different address causes the CRC to change.
 
User avatar
nichky
Forum Guru
Forum Guru
Posts: 1389
Joined: Tue Jun 23, 2015 2:35 pm

Re: v7.12rc is released!

Tue Nov 07, 2023 7:31 am

i'm using L009UiGS-2HaxD.

Since i have upgraded to 7.12rc5, im not able to use PoE-Out=auto

i'm pretty sure it was on auto on the previous versions
 
User avatar
grusu
Member Candidate
Member Candidate
Posts: 140
Joined: Tue Aug 13, 2013 7:35 am
Location: Bucharest, Romania

Re: v7.12rc is released!

Tue Nov 07, 2023 7:54 am

What's new in 7.12rc4 (2023-Oct-27 11:51):

*) lte - fixed FG621-EA possible timeouts during firmware upgrade;
*) netinstall-cli - fixed "-k" key option (introduced in v7.12beta7);
*) poe-out - removed "auto" mode support for L009 devices;
*) routerboard - fixed "reset-button" support for wAP ac and wAP R ac devices;
*) sfp - fixed incorrect link speed when changing link modes (introduced in v7.12beta3);
*) system - fixed process multithreading (introduced in v7.9);
*) system - improved system stability during booting for L009 devices;
 
EdPa
MikroTik Support
MikroTik Support
Topic Author
Posts: 340
Joined: Fri Sep 15, 2017 10:05 am
Location: Riga
Contact:

Re: v7.12rc is released!

Tue Nov 07, 2023 9:51 am

What's new in 7.12rc6 (2023-Nov-06 14:54):

*) mqtt - fixed service startup on boot (introduced in v7.12rc4);
 
Rox169
Member
Member
Posts: 467
Joined: Sat Sep 04, 2021 1:47 am

Re: v7.12rc is released!

Tue Nov 07, 2023 10:02 am

almost no changes.... :) Stable release is behind corner :)
 
User avatar
nichky
Forum Guru
Forum Guru
Posts: 1389
Joined: Tue Jun 23, 2015 2:35 pm

Re: v7.12rc is released!

Tue Nov 07, 2023 11:07 am

i'm willing to know why MY have done that , but yes thanks @grusu
Last edited by nichky on Tue Nov 07, 2023 11:09 am, edited 1 time in total.
 
User avatar
rextended
Forum Guru
Forum Guru
Posts: 12557
Joined: Tue Feb 25, 2014 12:49 pm
Location: Italy
Contact:

Re: v7.12rc is released!

Tue Nov 07, 2023 11:09 am

@nichky
Sorry but...
Are you part of the group of users who install (perhaps automatically) the update without even reading the changelog?
 
User avatar
nichky
Forum Guru
Forum Guru
Posts: 1389
Joined: Tue Jun 23, 2015 2:35 pm

Re: v7.12rc is released!

Tue Nov 07, 2023 11:11 am

@rextended totally missed that
 
User avatar
rextended
Forum Guru
Forum Guru
Posts: 12557
Joined: Tue Feb 25, 2014 12:49 pm
Location: Italy
Contact:

Re: v7.12rc is released!

Tue Nov 07, 2023 11:12 am

To tell the truth, an oversight can happen even to those who have read it... Pretend I didn't write anything...
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Tue Nov 07, 2023 11:25 am

almost no changes.... :) Stable release is behind corner :)
Are you sure? There definitely is another bug in SFP... it seems that they are doing whack-a-mole there.
 
Rox169
Member
Member
Posts: 467
Joined: Sat Sep 04, 2021 1:47 am

Re: v7.12rc is released!

Tue Nov 07, 2023 11:47 am

oh, ok....thats why the RC takes so long :) One month in RC version...it is good I like...proper test before releasing.
 
marekm
Member
Member
Posts: 416
Joined: Tue Feb 01, 2011 11:27 pm

Re: v7.12rc is released!

Tue Nov 07, 2023 1:30 pm

#[SUP-130404] Modbus CRC bug still in 7.12rc6
 
User avatar
rextended
Forum Guru
Forum Guru
Posts: 12557
Joined: Tue Feb 25, 2014 12:49 pm
Location: Italy
Contact:

Re: v7.12rc is released!

Tue Nov 07, 2023 1:40 pm

#[SUP-130404] Modbus CRC bug still in 7.12rc6
Where you read that previous (or this) version fix it?
 
marekm
Member
Member
Posts: 416
Joined: Tue Feb 01, 2011 11:27 pm

Re: v7.12rc is released!

Tue Nov 07, 2023 2:47 pm

#[SUP-130404] Modbus CRC bug still in 7.12rc6
Where you read that previous (or this) version fix it?
Between the lines :) - testing each new rc, hoping it would be silently fixed without mention in changelog.
Like the mqtt bug silently introduced in rc4 (fixed in rc6), as mqtt is part of the same iot package.
It's really strange - could only reproduce it when reading exactly 2 registers.
Using the property of the Modbus CRC that CRC(data+CRC(data))=0 I've tried different 1/3/4-register reads with register values intentionally made such that CRC of the whole frame is zero, and they worked correctly.
 
User avatar
edielson_atm
Trainer
Trainer
Posts: 34
Joined: Tue May 29, 2007 5:23 am
Location: Brasilia - Brasil
Contact:

Re: v7.12rc is released!

Tue Nov 07, 2023 9:00 pm

What's new in 7.12rc6 (2023-Nov-06 14:54):

*) mqtt - fixed service startup on boot (introduced in v7.12rc4);
When will we have MPLS-TE Bugs fixed?
 
EdPa
MikroTik Support
MikroTik Support
Topic Author
Posts: 340
Joined: Fri Sep 15, 2017 10:05 am
Location: Riga
Contact:

Re: v7.12rc is released!

Wed Nov 08, 2023 1:22 pm

What's new in 7.12rc7 (2023-Nov-08 10:18):

*) sfp - fixed occasional bad EEPROM data reading for L009 devices;
*) webfig - fixed authentication for branded login page (introduced in v7.12beta7);
 
Rox169
Member
Member
Posts: 467
Joined: Sat Sep 04, 2021 1:47 am

Re: v7.12rc is released!

Wed Nov 08, 2023 1:32 pm

small fixes again...so stable version is coming very soooon :)
 
User avatar
eworm
Forum Guru
Forum Guru
Posts: 1092
Joined: Wed Oct 22, 2014 9:23 am
Location: Oberhausen, Germany
Contact:

Re: v7.12rc is released!

Wed Nov 08, 2023 1:35 pm

... unless they continue with small fixes. 😜
 
Rox169
Member
Member
Posts: 467
Joined: Sat Sep 04, 2021 1:47 am

Re: v7.12rc is released!

Wed Nov 08, 2023 2:11 pm

yes, till 7.12rc126 :)
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Wed Nov 08, 2023 2:54 pm

yes, till 7.12rc126 :)
I guess there is more than enough room for SFP fixes :-)
 
User avatar
rextended
Forum Guru
Forum Guru
Posts: 12557
Joined: Tue Feb 25, 2014 12:49 pm
Location: Italy
Contact:

Re: v7.12rc is released!

Wed Nov 08, 2023 3:59 pm

Stable? Everyone has it's own definition...

I'm still waiting for the first 7.23.5 (long-term)...
viewtopic.php?t=102769#p1005275
viewtopic.php?t=197095#p1008753
viewtopic.php?t=194990#p995925
viewtopic.php?t=193001#p1015230
 
User avatar
Amm0
Forum Guru
Forum Guru
Posts: 4324
Joined: Sun May 01, 2016 7:12 pm
Location: California
Contact:

Re: v7.12rc is released!

Wed Nov 08, 2023 6:28 pm

Stable? Everyone has it's own definition...
And if Mikrotik doesn't think it's stable...I'd believe them.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10529
Joined: Mon Jun 08, 2015 12:09 pm

Re: v7.12rc is released!

Wed Nov 08, 2023 6:46 pm

... and of course it will very likely ship with wellknown easy-to-fix bugs.
at some time a release has to be made.
 
buset1974
Frequent Visitor
Frequent Visitor
Posts: 86
Joined: Wed Sep 13, 2006 12:12 pm
Location: Jakarta

Re: v7.12rc is released!

Wed Nov 08, 2023 6:59 pm

Another hardware coming with ampere processor?
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 12980
Joined: Thu Mar 03, 2016 10:23 pm

Re: v7.12rc is released!

Wed Nov 08, 2023 7:00 pm

at some time a release has to be made.

Says who? ;-)
 
dovydas
just joined
Posts: 4
Joined: Thu Mar 14, 2013 3:15 pm

Re: v7.12rc is released!

Wed Nov 08, 2023 7:28 pm

*) poe-out - removed "auto" mode support for L009 devices;
Can someone explain what does this line mean in practice?
I was thinking about buying L009UiGS-RM for home use. POE is essential to me, because my ceiling AP don't have dedicated power.
 
holvoetn
Forum Guru
Forum Guru
Posts: 6760
Joined: Tue Apr 13, 2021 2:14 am
Location: Belgium

Re: v7.12rc is released!

Wed Nov 08, 2023 7:42 pm

You have to enable poe manually.
It will not use auto.
 
massinia
Member Candidate
Member Candidate
Posts: 184
Joined: Thu Jun 09, 2022 7:20 pm

Re: v7.12rc is released!

Wed Nov 08, 2023 8:29 pm

Updated hAP ax3 from 7.11.2 to 7.12rc7 and all VETH interfaces are gone... :(
 
DeviceLocksmith
just joined
Posts: 24
Joined: Sat Jan 15, 2022 8:21 am

Re: v7.12rc is released!

Wed Nov 08, 2023 10:04 pm

The fact that they are releasing RCs fixing small bugs (to show progress) doesn't mean there is not a bigger bug they are aware of that is not fixed yet and is awaiting RC.
 
ckleea
Frequent Visitor
Frequent Visitor
Posts: 69
Joined: Sun Apr 21, 2013 12:19 pm

Re: v7.12rc is released!

Thu Nov 09, 2023 6:52 am

I lost all the containers which are working. As after a reboot, the path to USB stick was changed to USB3 instead USB2. Now all the containers are not able to coming up. Does anyone know how to adjust the settings for the correct path?
 
holvoetn
Forum Guru
Forum Guru
Posts: 6760
Joined: Tue Apr 13, 2021 2:14 am
Location: Belgium

Re: v7.12rc is released!

Thu Nov 09, 2023 7:55 am

Power off. Restart again.
Usb drives will be correct again.

Have a sup ticket opened already for months about this.
Someone else here did the detailed analysis when I came to the same conclusion.
Problem is that at reboot the device does not get properly recognized as usb3 ( not enough time to reset ?) and then it continues with usb2 and other label.
Power off on or usb reset with delay fixes that.

MikroTik support #[SUP-129287]: ROS 7.11.2 - USB name keeps changing after reboot

viewtopic.php?t=196829
 
User avatar
strods
MikroTik Support
MikroTik Support
Posts: 1658
Joined: Wed Jul 16, 2014 7:22 am
Location: Riga, Latvia

Re: v7.12rc is released!

Thu Nov 09, 2023 8:13 am

The issue with USB stick changing its name on RB5009 is a known issue, and we will try to fix it as soon as possible. It is not caused by version 7.12.. Please let us know through support@mikrotik.com if any one of you experience similar issues on a router which is not RB5009. Please make sure that when you experience such issues on "boot", that you are also running the latest bootloader "/system routerboard upgrade".
 
User avatar
sch
Frequent Visitor
Frequent Visitor
Posts: 84
Joined: Tue Feb 26, 2013 1:05 pm

Re: v7.12rc is released!

Thu Nov 09, 2023 8:16 am

Updated hAP ax3 from 7.11.2 to 7.12rc7 and all VETH interfaces are gone... :(
Please downgrade to v7.11.2, generate a supout file, upgrade to 7.12rc7, generate a new supout and send both files to support@mikrotik.com.
 
User avatar
baragoon
Member
Member
Posts: 382
Joined: Thu Jan 05, 2017 10:38 am
Location: Kyiv, UA
Contact:

Re: v7.12rc is released!

Thu Nov 09, 2023 12:29 pm

*) winbox - added "Name Format" property under "WifiWave2/Provisioning" menu;
any documentation for this option, please?
 
EdPa
MikroTik Support
MikroTik Support
Topic Author
Posts: 340
Joined: Fri Sep 15, 2017 10:05 am
Location: Riga
Contact:

Re: v7.12rc is released!

Thu Nov 09, 2023 2:14 pm

RouterOS v7.12rc7 has been promoted to 7.12 stable:
viewtopic.php?t=201345

Who is online

Users browsing this forum: quackyo and 6 guests