There is no hardware MPLS support in RouterOS v7 at this point.There is hardware offload support for label switching in RouterOS for now.
It's strange, isn't it? The Marvell ASICs that MikroTik uses supports MPLS/VXLAN/EVPN in hardware, but MikroTik decided it was a terrible idea to support these three on the ASICs.There is no hardware MPLS support in RouterOS v7 at this point.
Hate to tell you, but your "inside source" is not trustworthy.but MikroTik decided it was a terrible idea to support these three on the ASICs.
I am pretty sure it's just a case of "Good things take time" rather than any decision not to support them.but MikroTik decided it was a terrible idea to support these three on the ASICs.
Ha, what inside source? The last company, I'd want an “inside source” from is MikroTik. I was poking sarcasm at the obvious fact that MikroTik ROSv7 has been a mess, and you're all very slow in bringing the hardware offloading that your hardware actually supports, to the table. But there's a lot of focus on containers, storage features etc. But where's EVPN/MPLS/VXLAN on the ASICs? Nope, nothing, nada, only unicorns and rainbow.Hate to tell you, but your "inside source" is not trustworthy.
Explain to me, how Cumulus, SONiC, OcNOS supports hardware offloading for most of this stuff in 2023 and MikroTik (a company that started in 1996), doesn't?I am pretty sure it's just a case of "Good things take time" rather than any decision not to support them.
Each of those OS is quite focused on service providers and cloud providers... RouterOS is a universal networking operating system trying to meet the needs of customers from home users through SMB's right up into enterprise and ISP's.Explain to me, how Cumulus, SONiC, OcNOS supports hardware offloading for most of this stuff in 2023 and MikroTik (a company that started in 1996), doesn't?
IPArchitechs are an independent consulting company, they can use/sell/promote whatever they want. Right tool for the job, Horses for coursesHeck MikroTik's own (potentially) largest partner IPArchitechs have been touting OcNOS in the public domain:
https://iparchitechs.com/ecosystem/ipinfusion/
I think this would be a much better idea than antagonizing Mikrotik and it's customers.Hm, maybe some participants here should start their own networking equipment company, if they know so much better? Good luck.
Meanwhile, MT will continue to deliver a surprisingly robust and versatile platform.
I have quite a complex test lab running and it is stable. However, my main focus has been on RSVP-TE and VPNv4Is anyone running a production network with MPLS/LDP and VPLS already under 7.12? MT testlab ???
Is this ChatGPT? What the hell are you talking about? An ISP should never put any kind of data plane firewall in an MPLS core. MPLS core P and PE routers only have firewall rules for the control plane of the P and PE routers. What dumb approach is this?Don`t use MPLS VPN4 ROS 7 because you CPE will be completely open for remote side of tunnel.
Firewall fail to detect inbound interface and mark it as unknown and if you filter something using :
add action=drop chain=input in-interface=<mpls interface> traffic will reach you CPE without any limitation.
This firewall rule will not work. Same will happens with forward. Mikrotik firewall on PE just blind for transit VPN4 traffic.
VPN4 in ROS 7 completely not secure due to blindness of firewall. Bug was reported to mkt and confirmed but they prefer to fix docker containers.
Most probably you is ChatGPT guy and not understand how VPN4 MPLS works. I suggest for you to learn at 1st what is PE router in MPLS VPN. Have a nice day. Please don`t answer to me.
Is this ChatGPT? What the hell are you talking about? An ISP should never put any kind of data plane firewall in an MPLS core. MPLS core P and PE routers only have firewall rules for the control plane of the P and PE routers. What dumb approach is this?
CE devices should have localised firewall as any other normal CE router in the world. The CE doesn't run MPLS, you either sell L3VPN or L2VPN services to the CE, the CE only either sends a tagged/untagged VLAN or it configures a direct IP addressing on the port connected to the PE.
@mrz, if you could be so kind could you please confirm if MP-BGP/EVPN + VXLAN is now on horizon since IS-IS was in too? just a nugget please because this will be very critical to us in near feature
But why use LAC/LNS/L2TP/PPPoE in modern day fibre (or even wireless) networks though? Migrate to MPLS/VPLS (on MikroTik) or MPLS/EVPN/Pseudowire (on other vendors) and run DHCP directly on the BNG.Yeah, Q3 next year if MT can't still produce a decent implementation for all of this critical technologies in ISP space we are going to re-think our strategies, If only LAC mode not just LNS is readily available today we can duct tape our network and still can still wait for another 3 years more, even this was not availableselavi
I don't just understand why ROSv7 is lacking a lot of the generic features dating back to the early 2000s that we can see on other vendors, not only Cisco....or inter-VRF route leaking via RD with import/export on ROSv7 like it was useable in v6 or since xx-years on cisco ios (yeah that one, which also powered 2800 and 1800 routers...)
neither do iI don't just understand why ROSv7 is lacking a lot of the generic features dating back to the early 2000s that we can see on other vendors, not only Cisco....or inter-VRF route leaking via RD with import/export on ROSv7 like it was useable in v6 or since xx-years on cisco ios (yeah that one, which also powered 2800 and 1800 routers...)
I thought with the new routing engine in RouterOS v7 that they would be able to add missing functionality rapidly. However we are still not at a point where we have feature parity with RouterOS v6.I don't just understand why ROSv7 is lacking a lot of the generic features dating back to the early 2000s that we can see on other vendors, not only Cisco....or inter-VRF route leaking via RD with import/export on ROSv7 like it was useable in v6 or since xx-years on cisco ios (yeah that one, which also powered 2800 and 1800 routers...)
That never existed in v6 either. There was just a workaround where you could establish bgp session between vrfs on a single router and then redistribute. In theory you already can do the same in v7 too.inter-VRF route leaking via RD with import/export on ROSv7 like it was useable in v6
that is the point in vrf route leaking. same on cisco in the internal, underlying structureThat never existed in v6 either. There was just a workaround where you could establish bgp session between vrfs on a single router and then redistribute. In theory you already can do the same in v7 too.inter-VRF route leaking via RD with import/export on ROSv7 like it was useable in v6
I learnt this mistake early on. Currently, for all new business operations, that's just starting, I ensure to design the network in a way to avoid relying on MikroTik-specific features or implementations, making it easy to migrate to Juniper, once we have a revenue stream and large number of customers.@DarkNate
As a band aid solution whilst we are still waiting for proper EVPN/VXLAN to come in Mikrotik, our tech stack revolves around mikrotik for 3 years now lots of investment already from hardware to people training and we don't want to go back to pure Juniper shop if we can fight for it for cost reasons.
I guess you're in the engineering team and not management, in my case, I'm in management and I take final decisions on these type of issues, I've seen too many businesses whining about their MikroTik-only stack and increased OpEx due to hacks/workarounds and bs over time.@Darknate
I can feel you and I can clearly see your point and that was really obvious, but I don't need reasons to ditch MT because the company I work for already accept that fact that MT as a company is not perfect, my personal only sour grape with them is they don't layout their roadmap on what they want to be and this really affect us in direct way because every fiscal year we have to make a budget For X equipment with X Feature and every year as far as MT is concern are heads is spinning because they don't have clear roadmap.
Care to share how much MPLS traffic you have at peak and is it in tile arch?, we have a pilot MPLS implementation base on v6 (mpls atom/pseudowire) in one of our PoP and just running < 500mb at peak
I upgraded my RB951G-2HnD to 7.14 beta and gave a try to VPLS again. Now It is little better, the router is stable for hours with VPLS, but still have kernel faults and reboots.I tried VPLS between RB951G-2HnD and cAP AC, it works but every 5-10 minutes the RB951G-2HnD had kernel failure and reboot. Between two reboot I can reach bridged devices trough VPLS but would be better to rise this time to infinity![]()
Is there any known issue with MIPSBE and LDP/VPLS?
PS: I tried with 7.13beta3, and no problems with EoIPV6 tunnel.
Do a fresh netinstall of 7.13, with no-default-config, ensure RouterBOARD firmware is also on 7.13.I upgraded my RB951G-2HnD to 7.14 beta and gave a try to VPLS again. Now It is little better, the router is stable for hours with VPLS, but still have kernel faults and reboots.
bump.that is the point in vrf route leaking. same on cisco in the internal, underlying structure
That never existed in v6 either. There was just a workaround where you could establish bgp session between vrfs on a single router and then redistribute. In theory you already can do the same in v7 too.
and how is it done in ros7? i tested it in v6 and v7
6 worked
7 didn't
this particular issue has its own thread yetThat never existed in v6 either. There was just a workaround where you could establish bgp session between vrfs on a single router and then redistribute. In theory you already can do the same in v7 too.inter-VRF route leaking via RD with import/export on ROSv7 like it was useable in v6
How you got it ? I cannot pass 1gb/s . Can you please share your conf and traffic profile(avg size of packets )?Care to share how much MPLS traffic you have at peak and is it in tile arch?, we have a pilot MPLS implementation base on v6 (mpls atom/pseudowire) in one of our PoP and just running < 500mb at peak
In excess of 20Gbit worth of L3VPN traffic per CCR1072 router.
Follow the MTU section from the Edge/BNG guide. I use jumbo frames network-wide:How you got it ? I cannot pass 1gb/s . Can you please share your conf and traffic profile(avg size of packets )?
Easy! 9136 MTU on backbone, traffic profile is extremely mixed and the key thing is that this was tens of thousands of sessions in L3VPN.
How you got it ? I cannot pass 1gb/s . Can you please share your conf and traffic profile(avg size of packets )?
Can Tilera CCRs distribute L3VPN traffic between multiple cores? I have found it impossible to achieve on ARM and ARM64 devices.the key thing is that this was tens of thousands of sessions in L3VPN
Probably not. In 2024, you're better off with hardware that has ASICs.Can Tilera CCRs distribute L3VPN traffic between multiple cores? I have found it impossible to achieve on ARM and ARM64 devices.
What about silent firewall ignore on CPE for traffic which came from VPN4 to VRF (SUP-141699) ?
- There are no known problems with VPNv4 and route reflectors. There is a known/not yet fixed problem with VPLS and route reflectors.
do you consider not being able to leak routes properly between local VRFs (bgp-vpnv4 local) "no known problems"?- There are no known problems with VPNv4 and route reflectors. There is a known/not yet fixed problem with VPLS and route reflectors.
I have the same behaviour for VPLS terminating at the same endpoints.Now... here are the strange effects:
- When I disable PW12 then also PW10 and PW11 go down for about a second, before they come back.
- When I wait until PW10 and PW11 are back up, and then enable PW12, then PW12 comes up (and works)
Currently, dynamic VPLS interfaces added to the vlan-filtering bridge do not support any VLAN settings, so you cannot place these interfaces on certain untagged VLAN. The only available solution is to bridge "/interface vlan" with VPLS interfaces.
by "no known problem with VPNv4 and RR" should I understand that my ticket SUP-134760 is not understood / processed ;- There are no known problems with VPNv4 and route reflectors. There is a known/not yet fixed problem with VPLS and route reflectors.
DNAT to local interface(bridge assigned to vrf works) "works" is too loud word in that case, at least it reach PREROUTING, FORWARD in mangle and filter but not reach POSTROUTING. so not possible to do snat. It is weird that possible to do DNAT for bridge allocated to vrf but not possible to do SNAT for dnatted traffic which after such conversion quite far from MPLS.It is not entirely true, PE can still be protected and client behind PE as well. Only thing that you cannot do is destination nat on traffic from MPLS cloud to CE.
1 111.13.0.2/24 111.13.0.0 sfp-sfpplus2
;;; router-test
3 111.16.0.1/24 111.16.0.0 vrf-dummy
/ip vrf
add interfaces=sfp-sfpplus2,vrf-dummy name=vrfTest
DAc dst-address=111.13.0.0/24 routing-table=vrfTest gateway=sfp-sfpplus2@vrfTest immediate-gw=sfp-sfpplus2 distance=0 scope=10 suppress-hw-offload=no
local-address=111.13.0.2%sfp-sfpplus2@vrfTest
DAy dst-address=111.15.0.0/24 routing-table=vrfTest gateway=203.0.113.2 immediate-gw=111.11.0.1%sfp-sfpplus1 distance=200 scope=40 target-scope=30 suppress-hw-offload=no
DAc dst-address=111.16.0.0/24 routing-table=vrfTest gateway=vrf-dummy@vrfTest immediate-gw=vrf-dummy distance=0 scope=10 suppress-hw-offload=no
local-address=111.16.0.1%vrf-dummy@vrfTest
/ip firewall nat
add action=src-nat chain=srcnat disabled=yes src-address=111.13.0.1 to-addresses=111.16.0.1
[admin@RB5009] /log> /ping 111.15.0.1 src-address=111.13.0.1
SEQ HOST SIZE TTL TIME STATUS
0 111.15.0.1 56 63 327us
1 111.15.0.1 56 63 343us
10:58:14 firewall,info prerouting: in:sfp-sfpplus2 out:(unknown 0), connection-state:established,snat src-mac dc:2c:6e:46:f8:93, proto ICMP (type 8, code 0), 111.13.0.1->111.15.0.1, NAT (111.13.0.1->111.16.0.1)->111.15.0.1, len 56
10:58:14 firewall,info forward: in:sfp-sfpplus2 out:sfp-sfpplus1, connection-state:established,snat src-mac dc:2c:6e:46:f8:93, proto ICMP (type 8, code 0), 111.13.0.1->111.15.0.1, NAT (111.13.0.1->111.16.0.1)->111.15.0.1, len 56
10:58:14 firewall,info postrouting: in:sfp-sfpplus2 out:sfp-sfpplus1, connection-state:established,snat src-mac dc:2c:6e:46:f8:93, proto ICMP (type 8, code 0), 111.13.0.1->111.15.0.1, NAT (111.13.0.1->111.16.0.1)->111.15.0.1, len 56
10:58:14 firewall,info prerouting: in:vrfTest out:(unknown 0), connection-state:established,snat src-mac d2:03:6d:b0:44:be, proto ICMP (type 0, code 0), 111.15.0.1->111.16.0.1, NAT 111.15.0.1->(111.16.0.1->111.13.0.1), len 56
10:58:14 firewall,info forward: in:vrfTest out:sfp-sfpplus2, connection-state:established,snat src-mac d2:03:6d:b0:44:be, proto ICMP (type 0, code 0), 111.15.0.1->111.13.0.1, NAT 111.15.0.1->(111.16.0.1->111.13.0.1), len 56
10:58:14 firewall,info postrouting: in:vrfTest out:sfp-sfpplus2, connection-state:established,snat src-mac d2:03:6d:b0:44:be, proto ICMP (type 0, code 0), 111.15.0.1->111.13.0.1, NAT 111.15.0.1->(111.16.0.1->111.13.0.1), len 56
/ip firewall nat
add action=dst-nat chain=dstnat disabled=yes dst-address=111.16.0.1 to-addresses=111.13.0.1
[admin@CCR2004_2S+] /ip/address> /ping 111.16.0.1 src-address=111.15.0.1
SEQ HOST SIZE TTL TIME STATUS
0 111.16.0.1 56 62 336us
1 111.16.0.1 56 62 290us
11:04:15 firewall,info prerouting: in:vrfTest out:(unknown 0), connection-state:established,dnat src-mac d2:03:6d:b0:44:be, proto ICMP (type 8, code 0), 111.15.0.1->111.16.0.1, NAT 111.15.0.1->(111.16.0.1->111.13.0.1), len 56
11:04:15 firewall,info forward: in:vrfTest out:sfp-sfpplus2, connection-state:established,dnat src-mac d2:03:6d:b0:44:be, proto ICMP (type 8, code 0), 111.15.0.1->111.13.0.1, NAT 111.15.0.1->(111.16.0.1->111.13.0.1), len 56
11:04:15 firewall,info postrouting: in:vrfTest out:sfp-sfpplus2, connection-state:established,dnat src-mac d2:03:6d:b0:44:be, proto ICMP (type 8, code 0), 111.15.0.1->111.13.0.1, NAT 111.15.0.1->(111.16.0.1->111.13.0.1), len 56
11:04:15 firewall,info prerouting: in:sfp-sfpplus2 out:(unknown 0), connection-state:established,dnat src-mac dc:2c:6e:46:f8:93, proto ICMP (type 0, code 0), 111.13.0.1->111.15.0.1, NAT (111.13.0.1->111.16.0.1)->111.15.0.1, len 56
11:04:15 firewall,info forward: in:sfp-sfpplus2 out:sfp-sfpplus1, connection-state:established,dnat src-mac dc:2c:6e:46:f8:93, proto ICMP (type 0, code 0), 111.13.0.1->111.15.0.1, NAT (111.13.0.1->111.16.0.1)->111.15.0.1, len 56
11:04:15 firewall,info postrouting: in:sfp-sfpplus2 out:sfp-sfpplus1, connection-state:established,dnat src-mac dc:2c:6e:46:f8:93, proto ICMP (type 0, code 0), 111.13.0.1->111.15.0.1, NAT (111.13.0.1->111.16.0.1)->111.15.0.1, len 56
/ip firewall nat
add action=src-nat chain=srcnat src-address=111.15.0.1 to-addresses=111.16.0.1
[admin@CCR2004_2S+] /ip/address> /ping 111.13.0.1 src-address=111.15.0.1
SEQ HOST SIZE TTL TIME STATUS
0 111.13.0.1 56 62 294us
1 111.13.0.1 56 62 282us
11:11:50 firewall,info output: in:(unknown 0) out:sfp-sfpplus2, connection-state:established,snat src-mac d2:03:6d:b0:44:be, proto ICMP (type 8, code 0), 111.15.0.1->111.13.0.1, NAT (111.15.0.1->111.16.0.1)->111.13.0.1, len 56
11:11:50 firewall,info postrouting: in:vrfTest out:sfp-sfpplus2, connection-state:established,snat src-mac d2:03:6d:b0:44:be, proto ICMP (type 8, code 0), 111.15.0.1->111.13.0.1, NAT (111.15.0.1->111.16.0.1)->111.13.0.1, len 56
11:11:50 firewall,info prerouting: in:sfp-sfpplus2 out:(unknown 0), connection-state:established,snat src-mac dc:2c:6e:46:f8:93, proto ICMP (type 0, code 0), 111.13.0.1->111.15.0.1, NAT 111.13.0.1->(111.16.0.1->111.15.0.1), len 56
11:11:50 firewall,info forward: in:sfp-sfpplus2 out:sfp-sfpplus1, connection-state:established,snat src-mac dc:2c:6e:46:f8:93, proto ICMP (type 0, code 0), 111.13.0.1->111.15.0.1, NAT 111.13.0.1->(111.16.0.1->111.15.0.1), len 56
11:11:50 firewall,info postrouting: in:sfp-sfpplus2 out:sfp-sfpplus1, connection-state:established,snat src-mac dc:2c:6e:46:f8:93, proto ICMP (type 0, code 0), 111.13.0.1->111.15.0.1, NAT 111.13.0.1->(111.16.0.1->111.15.0.1), len 56
As it was mentioned already in your other topic on this problem, it is linux implementation, and yes documentation will be updated to reflect that.And yes when you got ticket which describe that PE to VRF traffic does not follow packet flow diagram you just updated Packet flow diagram wiki and told that such packets is just an exclusion instead of real bug fix.