This can be configured in system/routerboard from memory.I want to point out that after the failed update Mikrotik went into netboot mode on its own, and I didn't have to explain to my mom how long she need to hold down the Reset button =)
This can be configured in system/routerboard from memory.I want to point out that after the failed update Mikrotik went into netboot mode on its own, and I didn't have to explain to my mom how long she need to hold down the Reset button =)
I wish for this ever since. Completely non-understandable why there no such command exists. ROS hides the "real" filesystem behind a facade and gives us no option to get rid of crappy tempfiles.or at least some function or way to reclaim bogus used space without needing to netinstall it?
It worked in 7.14?Bug in 7.14.1 on CRS328-24P-4S+: Blink button and blink cli command does not work
Bricked in 7.14.1 also even with this,Ok but that is where you are going wrong. The MikroTik release tag "stable" does not make it a "recommended release".Didn't say Cisco/Juniper don't have tons of bugs but I've never come across a "recommended release" that does not allow the product to boot after upgrade. Especially now in recent years when there's an impact/compability check etc before upgrading.
Even "long-term" doesn't do that. You need extra research to know if a certain release is recommended for installation.
don't know, just wanted to let know it does not work in the current versionIt worked in 7.14?
You need to watch out for changelog entry like:Bricked in 7.14.1 also even with this,
*) sfp - improved system stability for CR2004-1G-2XS-PCIe (introduced in v7.14);
I guess I'm waiting for the "*) We actually mean stable this time. And it really works for CR2004-1G-2XS-PCIe" according to your logic.
What's new in 7.14.1 (2024-Mar-08 14:50):
*) bgp-vpn - use VRF interface as gateway for leaked connected routes;
*) chr - fixed Xen and Vultr missing ethernet (introduced in v7.14);
*) chr - fixed bogus messages printed out while booting up the system (introduced in v7.14);
*) console - fixed do/while implementation not working with variables (introduced in v7.14);
*) ethernet - fixed default names for CRS310-8G+2S+ device (introduced in v7.14);
*) lte - fixed R11e-LTE-US modem dial-up;
*) sfp - improved system stability for CR2004-1G-2XS-PCIe (introduced in v7.14);
*) vrf - fixed VRF interfaces being moved to main table after reboot (introduced in v7.14);
*) wireguard - do not attempt to connect to peer without specified endpoint-address;
Hi,
Access to CHANGELOG information via CLI does not work:
[admin@MikroTik] > :put ([/tool fetch "https://upgrade.mikrotik.com/7.14.1/CHANGELOG" output=user as-value] -> "data")
failure: Fetch failed with status 404
Thx.
Right, sorry!Missing "routeros" directory:
https://upgrade.mikrotik.com/routeros/7.14.1/CHANGELOG
Hi,
Access to CHANGELOG information via CLI does not work:
[admin@MikroTik] > :put ([/tool fetch "https://upgrade.mikrotik.com/7.14.1/CHANGELOG" output=user as-value] -> "data")
failure: Fetch failed with status 404
Thx.
It is really stunning how many lines say "introduced in v7.14". This was already the case in 7.13. Please don't push "major" releases too early. Give your developers time to fix crucial bugs. Improve your internal QA process. So for example now we all know that VRF broke in 7.14. Add this knowledge to your testing process/setup and we will never ever run again in these same issues. Of course this needs automation and not just some additional manpower and 2 more entries in a hand-written checklist.What's new in 7.14.1 (2024-Mar-08 14:50):
*) bgp-vpn - use VRF interface as gateway for leaked connected routes;
*) chr - fixed Xen and Vultr missing ethernet (introduced in v7.14);
*) chr - fixed bogus messages printed out while booting up the system (introduced in v7.14);
*) console - fixed do/while implementation not working with variables (introduced in v7.14);
*) ethernet - fixed default names for CRS310-8G+2S+ device (introduced in v7.14);
*) lte - fixed R11e-LTE-US modem dial-up;
*) sfp - improved system stability for CR2004-1G-2XS-PCIe (introduced in v7.14);
*) vrf - fixed VRF interfaces being moved to main table after reboot (introduced in v7.14);
*) wireguard - do not attempt to connect to peer without specified endpoint-address;
It is never too late to incorporate fixes. I don't know who "pushed" or "urged" you to release 7.14. Wasn't the best idea it seems to me.We have reproduced multiple issues regarding VLAN MTU not applying correctly or resetting to default after reboot. Unfortunately, it is too late to incorporate the fixes into 7.14, so those will be available in the upcoming 7.15beta
Very strange, my pihole works on hap ac3 with 7.14.1. Can you show your config?hap ac3 7.14.1 I have the same problem as on 7.14. Container pihole does not work. Сomplete reinstallation of the container does not help. Downgrade 7.13.5 helps get the container working again
Needs more work. When a peer without endpoint-address connects and then disconnects - RouterOS still floods the log with useless messages (probably because now the peer does have remote address under the hood - the address of the last message from peer)What's new in 7.14.1 (2024-Mar-08 14:50):
*) wireguard - do not attempt to connect to peer without specified endpoint-address;
now 7.13.5 pihole work not problem ( instruction install https://blog.unixhost.pro/ru/2022/10/us ... -routeros/)Very strange, my pihole works on hap ac3 with 7.14.1. Can you show your config?hap ac3 7.14.1 I have the same problem as on 7.14. Container pihole does not work. Сomplete reinstallation of the container does not help. Downgrade 7.13.5 helps get the container working again
How to do it?@hova888,
In any case, we need to check the log.
this is log 7.13.5 not problemsYou need to enable logging in the container settings and then check the log messages to understand what the error is.
The upgrade is done by the installed version, not the new on.Bricked in 7.14.1 also even with this,
*) sfp - improved system stability for CR2004-1G-2XS-PCIe (introduced in v7.14);
log container 7.14.1You need to enable logging in the container settings and then check the log messages to understand what the error is.
What versions of the solution will you have for my problem pihole 7.14.1 log above in the screenshot?You need to enable logging in the container settings and then check the log messages to understand what the error is.
I soldered a push button switch to my lab card now so atleast I'm a bit more ready.You need to watch out for changelog entry like:Bricked in 7.14.1 also even with this,
*) sfp - improved system stability for CR2004-1G-2XS-PCIe (introduced in v7.14);
I guess I'm waiting for the "*) We actually mean stable this time. And it really works for CR2004-1G-2XS-PCIe" according to your logic.
* sfp - improved system stability for CR2004-1G-2XS-PCIe (introduced in v7.14.1)
#notfixed - it's getting ridiculous..*) vrf - fixed VRF interfaces being moved to main table after reboot (introduced in v7.14);
Yes, i have the same issue, that my Wireguard Interface for my Road Warrior Clients go to the main VRF, instead of the dedicated VRF.Tunnel interfaces are still going to the main VRF instead of the configured VRF in 7.14.1.
Try to connect with road-warrior and when you disconnect you will see that the handshak messages start coming out, this started since the first versions of 7.13.Must be something config specific, I do use wireguard for road-warrior setup and I have 0 such logs.
I don't use or have BTH though.
Handshake for peer did not complete after 5 seconds, retrying (try 2)
Handshake for peer did not complete after 20 attempts, giving up
Maybe, let's wait and see if someone from the staff can enlighten us.Nope, I don't...
Just tested, deliberately.
That is why I am actually wondering, maybe some specific config setting is involved.
Yes, it fixed, now the question is why on all my devices I have a loopback interface?What's new in 7.14.1 (2024-Mar-08 14:50):
*) lte - fixed R11e-LTE-US modem dial-up;
It was always there but hidden, now is exposed. Use cases for it are many and discussed plenty in previous page and in other topicsYes, it fixed, now the question is why on all my devices I have a loopback interface?
We can compare the configs, just in case:Maybe, let's wait and see if someone from the staff can enlighten us.Nope, I don't...
Just tested, deliberately.
That is why I am actually wondering, maybe some specific config setting is involved.
Thx.
/interface wireguard
add comment="vpn:wireguard1" listen-port=443 mtu=1420 name=wireguard1
/interface wireguard peers
add allowed-address=<redacted>.10/32,<redacted>:13ff::10/128 client-address=<redacted>.10/32,<redacted>:13ff::10/128 client-dns=\
<redacted>.1,<redacted>:1300::1 client-endpoint=<redacted> comment=vpn:peer1 interface=wireguard1 preshared-key=\
If you enable wireguard logging on other platforms it doesn't behave the same? Because I think it does.Needs more work. When a peer without endpoint-address connects and then disconnects - RouterOS still floods the log with useless messages (probably because now the peer does have remote address under the hood - the address of the last message from peer)What's new in 7.14.1 (2024-Mar-08 14:50):
*) wireguard - do not attempt to connect to peer without specified endpoint-address;
I had to netinstall both of them. Is this normal?setting up elf image... not an elf header, kernel loading failed
Thanks for sharing:We can compare the configs, just in case:
/interface wireguard
add comment="vpn: roadwarrior" listen-port=54321 mtu=1420 name=wg-rw
/interface wireguard peers
add allowed-address=<redacted>.30.2/32 comment="My Mobile" interface=wg-rw public-key="<redacted>XSbE/y0w2x0kVFYCsILdOBkIsk+w0="
*) firewall - increased default "udp-timeout" value from 10s to 30s;
No idea, to be honest, but I have not seen any of those log messages.Thanks for sharing:We can compare the configs, just in case:
My roadwarrior configuration:
How do you see it? It has always worked fine with previous versions.Code: Select all/interface wireguard add comment="vpn: roadwarrior" listen-port=54321 mtu=1420 name=wg-rw /interface wireguard peers add allowed-address=<redacted>.30.2/32 comment="My Mobile" interface=wg-rw public-key="<redacted>XSbE/y0w2x0kVFYCsILdOBkIsk+w0="
I had issues with MS Windows RDP and after changing default 10s to 30s.. problem dissapeared.Any good reasons to increase from 10 to 30 seconds:*) firewall - increased default "udp-timeout" value from 10s to 30s;
All deployed devices - v6 and v7 - are configured for 10 seconds.
But I'd like to stay consistent with new deployments. What are the thoughts/background about this step? There must be s story or at least a good reason to do so.
I'm running into the situation that after enabling and disabling RoadWarrior on a client device (where endpoint is not set on the router), the router is still trying to connect until it reaches 20 times and then it logs:WireGuard fix solves an issue where RouterOS was trying to connect to peers which have not been used yet and there is no known endpoint-address.
But...this line is repeated 5 times (with 2 minutes in between).WG-Interface: [whatever]: Handshake for peer did not complete after 20 attempts, giving up
/interface wireguard
add listen-port=13231 mtu=1420 name=WG-Interface
/interface wireguard peers
add allowed-address=10.0.0.51/32 comment="Mobiel erlinden" interface=WG-Interface public-key="[whatever]"
@strods, thanks for responding.WireGuard fix solves an issue where RouterOS was trying to connect to peers which have not been used yet and there is no known endpoint-address. WireGuard is a bidirectional tunnel. Once you connect peer, it knows "last remote endpoint" information and tries to connect to it. Fix solved the issue just for unused peers. Used peers do behave as expected - bidirectional tunnels trying to reach the remote endpoint - either configured or last used.
of course this is expected behavior. people finally need to stop thinking of wireguard being just another server / client vpn software, which gives up after x unsuccessful connection attempts; it is not! once a peer has learned a peer's remote address, it will try to establish a connection indefinitely, so log messages regarding connection retries / handshake messages will appear indefinitely. In case the remote peer is not reachable for whatever reason (ip address has changed but didn't initialize a new connection, client went offline, blocked by a filter, ...), handshake timeout messages are being generated. If you're all so annoyed by this, just set up your logging correctly.Is this expected behaviour?
Of course, you are right, wireguard does not understand if the connection is fixed (site to site) or road warrior (site to mobile) and checks indefinitely. For this they would have to create a "feature" that allows to select a maximum number of checks (rw) or unlimited (in case of sts).of course this is expected behavior. people finally need to stop thinking of wireguard being just another server / client vpn software, which gives up after x unsuccessful connection attempts; it is not! once a peer has learned a peer's remote address, it will try to establish a connection indefinitely, so log messages regarding connection retries / handshake messages will appear indefinitely. In case the remote peer is not reachable for whatever reason (ip address has changed but didn't initialize a new connection, client went offline, blocked by a filter, ...), handshake timeout messages are being generated. If you're all so annoyed by this, just set up your logging correctly.
Perhaps my question wasn't clear: what is Wireguard "giving up" after 20 attempts?If you're all so annoyed by this, just set up your logging correctly.
10:29:18 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:29:36 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:30:13 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:30:45 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:31:01 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:31:17 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:31:51 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:32:42 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:32:57 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:33:03 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:33:08 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:34:43 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:35:55 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:36:00 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:36:06 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:36:42 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:38:24 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 20 attempts, giving up
10:38:45 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:40:31 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 20 attempts, giving up
10:40:46 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:42:31 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 20 attempts, giving up
10:42:47 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:44:30 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 20 attempts, giving up
10:44:48 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 5 seconds, retrying (try 2)
10:46:35 wireguard,info WG-Interface: [public key]: Handshake for peer did not complete after 20 attempts, giving up
*) sfp - improved system stability for CR2004-1G-2XS-PCIe (introduced in v7.14);
/interface/wireguard/peers
:foreach i in=[find where disabled=no endpoint-address="" current-endpoint-address!=""] do={
:local LastHandshake [get $i last-handshake]
:if ($LastHandshake > [:totime "3m"]) do={
enable $i
}
}
:foreach Peer in=[ /interface/wireguard/peers/find where disabled=no endpoint-address="" current-endpoint-address!="" last-handshake>2m] do={
/interface/wireguard/peers/enable $Peer;
}
its exactly about it, at least for me, it fixed the issue with beta6, but the back port doesn´t*) sfp - improved system stability for CR2004-1G-2XS-PCIe (introduced in v7.14);
You should read the line for what it is: "SFP - improved stability" (on some certain device). You simply should not read it like "improved stability of CCR2004-1G-XS-PCIe" because it's not about it.
Great news!Version 7.15 will include WireGuard peer functionality "responder". Then you will be able to mark your peer as "responder". Then the peer will not spam your log, if you enable this option manually.
Thanks for the reply. Of course, I did something similar to avoid using weak encryption.@pedkoschi - Use PS to update your Windows IKEv2 configuration to the encryption level that suits for both clients:
PS C:\Users\user> Set-VpnConnectionIPsecConfiguration -ConnectionName "xxxx" -AuthenticationTransformConstants SHA256128 -CipherTransformConstants AES256 -EncryptionMethod AES256 -IntegrityCheckMethod SHA256 -PfsGroup PFS2048 -DHGroup Group14 -PassThru -Force
This is also possible for Mac clients with .mobileconfig profiles using Apple Configurator.
Thanks for response.It was always there but hidden, now is exposed. Use cases for it are many and discussed plenty in previous page and in other topicsYes, it fixed, now the question is why on all my devices I have a loopback interface?
Hi, please don't give up easily.Yeah, that is always a problem with IPsec. Some OS requiring settings that other OSes refuse.
@osc86 interesting that you're not seeing issues, I've rolled back to 7.13.5 and issue has gone away. I was short on time so didn't get to look deep into this, I'll have to lab it up later, but what I did see on the broken scenario before I rolled back was the firewall connection table showing the correct 'reply src address' however when I packet capture further north in our network I see the router replying from its linknet address instead of the local address that it should have used per the EOIP tunnel. The linknet isn't routable elsewhere in our network so the traffic is dropped before it hits the destination. Note that the linknet IP that is the incorrect source and the EOIP local address both sit on the same vlan interface which faces elsewhere in the network.@jsadler I'm using eoip + local address without issues in 7.14.1.
When you say that the local address is not being honored, the first thing you should check is the connection table (IP->Firewall->Connections).
Set up a destination address filter that matches the value of dst-addr of the eoip interface. Enable the additional column "Reply Src. Address" and verify, that your connection is not accidentally being snat'ed.
That doesn't help when your goal is to have "road warrior" connectivity (i.e. remote prefix is 0.0.0.0/0)...Hi, please don't give up easily.Yeah, that is always a problem with IPsec. Some OS requiring settings that other OSes refuse.
it is not an exception but rather common practice to handle multiple phase1 selectors per peer.
Currently we have this rule:.
"
If the remote peer's address matches this prefix, then the peer configuration is used in authentication and establishment of Phase 1. If several peer's addresses match several configuration entries, the most specific one (i.e. the one with the largest netmask) will be used.
"
I don't think that can be done in IPsec. It is the protocol that limits that, not the implementation.What if there are still two or more matches?
Just select the one with the "best" matching profile :)
Hi, why?
That doesn't help when your goal is to have "road warrior" connectivity (i.e. remote prefix is 0.0.0.0/0)...
Yes indeed it can be used to have very strong encryption to one specific peer (e.g. for a tunnel) and default settings for the remainder.
the protocol just accepts one of client's phase1 proposal(s) or not.I don't think that can be done in IPsec. It is the protocol that limits that, not the implementation.
What is "dark-mode", is it the "all-leds-off" LEDs setting?*) leds - added "dark-mode" functionality for hAP ax3 and Chateau ax series devices;
I've experienced this too. In fact it has been the leading cause of wireguard sessions failing in my experience. Good job finding the culprit and solution: resetting the configured port of the wireguard interface (not peer) - I arrived at the same solution.Hi,
I had a strange wg issue (actually with 7.12.1, but the behavior didn't change after upgrading to 7.14.1 either):
Configuration:
Peer A initiates a connection to peer B on peer B's given public address : port.
Issue:
There was a network reconfiguration by the service provider on site A.
After this, peer A didn't receive peer B's reply anymore, no handshake occurred.
Resolution:
After clearing the random wg port on interface A, peer A created a new random port and the connection has been restored.
Probably the previous port didn't work anymore.
Question:
Is this behavior normal?
Wouldn't it be possible that a initiator peer changes it's random source port if no handshake occurs within a given period of time?
Same here, 7.14.1, the CRS310-5S-4S+ is running full speed. No tweaking of the values seem to fix this, it's 13K RPM continuously. Mikrotik, please fix this!I have no fan control at all after this 7.14 update. The fan of my CRS310-1G-5S-4S+IN runs with annoying maximum speed and reports ~+-13000rpm regardless which settings i put in the health settings menu. CPU temp was 39°C and Board around 33°C with default settings for the temperature control.- changed default "fan-min-speed-percent" from 0% to 12%;
- improved fan control on CRS3xx and CCR1016-12S-1S+r2;
Only a full rollback to 7.13.5 and loading the backup solved it immediately. Please have a look into this.
LED SettingsWhat is "dark-mode", is it the "all-leds-off" LEDs setting?*) leds - added "dark-mode" functionality for hAP ax3 and Chateau ax series devices;
/system leds setting all-leds-off
i found the answer somewhere (on reddit i think, but can't find the link) the CRS310-1G-5S-4S+IN fan is only able to handle two different fan states. These are OFF and ON (with max speed). Its not controllable in any other way. So you should set the "fan min speed percent" value to 0 again i.e. set the value back to 0% from 12%. This fixed it for me now. Fan only spins on startup then gets off. Sadly SwitchOS does not have this feature so its max noise there and i am forced to use RouterOS.Same here, 7.14.1, the CRS310-5S-4S+ is running full speed. No tweaking of the values seem to fix this, it's 13K RPM continuously. Mikrotik, please fix this!
I have the same issue. After some tinkering pihole started to work again, but one other container had to be reinstalled, something got corrupted. Be careful with this update if you run containers.Help, this update broke my containers. I just get "execve: No such file or directory" in the log on both of my containers when I try to start them.
Here are the relevant settings:
The containers are on a USB drive that seems to be working fine. What's the error, how can I get them working again?
Related problem on 7.14.1 on (underpowered) hAP lite. /tool/sms/export always throws an error. I've never used sms... I've reported the fault to Mikrotik. Worked okay on 7.12.1 and on hAP ax2.I am still having trouble with the /tool/SMS/Allowed-Number that disappears every time you do a /tool/sms/set receive-enable=yes
Thanks for letting me know.I have the same issue. After some tinkering pihole started to work again, but one other container had to be reinstalled, something got corrupted. Be careful with this update if you run containers.Help, this update broke my containers. I just get "execve: No such file or directory" in the log on both of my containers when I try to start them.
Here are the relevant settings:
The containers are on a USB drive that seems to be working fine. What's the error, how can I get them working again?
UPDATE: There is something wrong with USB mounts. This needs to be investigated!
Ooh, awesome, thank you! I thought 12% is the target when it is running, not in both cases. Well, lesson learned, thanks a lot!i found the answer somewhere (on reddit i think, but can't find the link) the CRS310-1G-5S-4S+IN fan is only able to handle two different fan states. These are OFF and ON (with max speed). Its not controllable in any other way. So you should set the "fan min speed percent" value to 0 again i.e. set the value back to 0% from 12%. This fixed it for me now. Fan only spins on startup then gets off. Sadly SwitchOS does not have this feature so its max noise there and i am forced to use RouterOS.Same here, 7.14.1, the CRS310-5S-4S+ is running full speed. No tweaking of the values seem to fix this, it's 13K RPM continuously. Mikrotik, please fix this!
Yes, I agree that it could be the case, but the cause is not a reboot, but after this update my USB Flash keeps randomly disappearing. If I unplug/plug it in again then it starts to work again.@clte19ax Maybe there is a issue that containers are not stopped gracefully before system shutdown (or there is short timeout for waiting). On mine device Pi-hole container is in stopping state about 2-3s before goes to stopped when manually stopped, some others a bit shorter, but overall, device shutdowns quite fast even when many containers are running so I'm guessing they are not stopped gracefully. Just because of that I'm stopping containers manually before shutdown/reboot to be safe.
If system is shuts down while some process is writing on disk that can lead to corruptions.
I created a fresh t3 instance with the 7.14 image, assigned my EIP and tried to update to 7.14.1, it's broken now.yesAWS sent me a notification that there is a new ROS Image available, does this mean updates will work now without the Instance type t3 -> t2 -> t3 limbo when freshly deployed?
https://aws.amazon.com/marketplace/pp/p ... gn6js6av54
--Michael
I changed the filename to ca.crt to avoid any trouble, but that didn't helped, until 7.14.1.Maybe your certificate file you want to import contains spaces or special chars 🤔
Someone from Mikrotik, are you going to enable a feature like this in a future release? Or do you have any other idea to solve the problem?Unless Mikrotik can implement a native inbuilt solution for this (maybe randomize source port for each connection attempt if the interface port isn't explicitly set, as this would be an ideal solution for such wg endpoints behind double nat)
/ip vrf
add interfaces=lte1 name=VRF_LTE
add interfaces=wlan2,wlan5 name=VRF_WIFI
/ip address
add address=192.168.103.33/27 interface=wlan2 network=192.168.103.32
add address=192.168.103.65/27 interface=wlan5 network=192.168.103.64
/routing bgp vpn
add export.redistribute=connected .route-targets=63000:200 import.route-targets=63000:100 label-allocation-policy=per-vrf name=bgp-mpls-vpn-1 route-distinguisher=63000:200 vrf=VRF_WIFI
add export.redistribute=modem .route-targets=63000:100 import.route-targets=63000:200 label-allocation-policy=per-vrf name=bgp-mpls-vpn-2 route-distinguisher=63000:100 vrf=VRF_LTE
route print detail afi=ip4
...
Ay afi=ip4 contribution=active dst-address=192.168.103.32/27 routing-table=VRF_LTE label=4294967295 gateway=VRF_WIFI@VRF_WIFI immediate-gw=VRF_WIFI distance=200 scope=40 target-scope=10 belongs-to="bgp-mpls-vpn-2-bgp-mpls-vpn-1-connected-export-import" bgp.ext-communities=rt:63000:200 .atomic-aggregate=no .origin=incomplete
...
Ay afi=ip4 contribution=active dst-address=0.0.0.0/0 routing-table=VRF_WIFI label=4294967295 gateway=VRF_LTE@VRF_LTE immediate-gw=VRF_LTE distance=200 scope=40 target-scope=10 belongs-to="bgp-mpls-vpn-1-bgp-mpls-vpn-2-modem-export-import" bgp.ext-communities=rt:63000:100 .atomic-aggregate=no .origin=incomplete debug.fwp-ptr=0x20242480
I had to do something similar. Would netinstall also be a way to update? Not as easy but I assume it doesn't have to have in effect two copies of the OS on there for a time.I dont know if this the correct way to do it, but it is working - at least for me.
Nothing special.. BGP/OSPF/BFD. With v7.14 the problem never occurred..Anything fancy in the config?
I have a 2116 that's still on 7.14beta something.
...netinstall, as always.What can i do to get the device working again?
[admin@MikroTik_CRS317] /system/health> print
Columns: NAME, VALUE, TYPE
# NAME VALUE TYPE
0 cpu-temperature 35 C
1 fan1-speed 3765 RPM
2 fan2-speed 3720 RPM
3 psu1-state ok
4 psu2-state ok
[admin@MikroTik_CRS317] /system/health>
#notfixed - it's getting ridiculous..*) vrf - fixed VRF interfaces being moved to main table after reboot (introduced in v7.14);
We still are having this same issue as well.
#notfixed - it's getting ridiculous..
Confirmed. I've spent a few hours to overhaul firewall configuration for the new VRF concept in 7.14.1 where you cannot filter separate interfaces in a VRF and then noticed that at least EoIP tunnel interface routes are not getting into an assigned VRF after reboot. You can recreate the interface and it will work until you reboot again.
If you have firewall rules on INPUT or FORWARD for any interface that are assigned to some non-main VRF you might consider to redesign it. Also if you have any EoIP interfaces in VRF just don't upgrade yet because it is almost certainly going to break.
If I remember correctly, there are some messages in this discussion about fan speed. Something like "in some models, fans can only be switched off or going at max speed, so the default value set to 12 means that fans are always at max speed. Setting the value to 0 restores the previous situation.". But please check.Hi again,
related to my previous post, I found following statement in documentation:
fan-min-speed-percent:
[...]
*NOTE: the default value may vary based on FAN controller chip and/or specific model requirements. From RouterOS verson 7.14 default value is set to 12, all previous versions have 0.
[...]
health.png
Still the same with v7.14.1...After upgrading to v7.14 I lost connectivity between OpenVPN server and clients in Ethernet mode. The connection is established normally and automatic routes are created, but still peers are inaccessible.
Anyone experiencing similar behaviour?
Edit: It's the same with v7.15beta4. Reverting back to v.7.13.5 solves the issue for me.
Depending on the fan with PWM controller (as used in CRS317) it may have different minimum speed and anything bellow some percentage (for example 30 percent) would run at same RPM unless percentage is zero (no PWM signal) in which case it will stop. By the way PWM signal percentage is more of a suggestion and it is not guaranteed that actual speed would exactly correspond to a percentage of a max fan RPM...Hi again,
related to my previous post, I found following statement in documentation:
fan-min-speed-percent:
[...]
*NOTE: the default value may vary based on FAN controller chip and/or specific model requirements. From RouterOS verson 7.14 default value is set to 12, all previous versions have 0.
[...]
health.png
> ipv6/route/print where dst-address in ::/16
Flags: D - DYNAMIC; A - ACTIVE; c - CONNECT, o - OSPF; H - HW-OFFLOADED
Columns: DST-ADDRESS, GATEWAY, DISTANCE
DST-ADDRESS GATEWAY DISTANCE
D oH ::1/128 fe80::de2c:6eff:fe38:c7e6%vlan13-sfpplus3 110
DAc ::1/128 lo
> ip/route/print where dst-address in 127.0.0.0/8
hi pe1chl,You can only indentify different peers before starting parameter negotiation when using exchange mode "agressive" instead of the default "main". That will again be a problem when you want to abide by the rules of several different client OSes.
22:00:03 ipsec -> ike2 request, exchange: SA_INIT:0 92.218.169.238[500] 5bf276184133cc0c:0000000000000000
22:00:03 ipsec ike2 respond
22:00:03 ipsec payload seen: SA (48 bytes)
22:00:03 ipsec payload seen: KE (136 bytes)
22:00:03 ipsec payload seen: NONCE (52 bytes)
22:00:03 ipsec payload seen: NOTIFY (8 bytes)
22:00:03 ipsec payload seen: NOTIFY (28 bytes)
22:00:03 ipsec payload seen: NOTIFY (28 bytes)
22:00:03 ipsec payload seen: VID (24 bytes)
22:00:03 ipsec,debug 1e2b516905991c7d7c96fcbfb587e46100000009
22:00:03 ipsec payload seen: VID (20 bytes)
22:00:03 ipsec,debug fb1de3cdf341b7ea16b7e5be0855f120
22:00:03 ipsec payload seen: VID (20 bytes)
22:00:03 ipsec,debug 26244d38eddb61b3172a36e3d0cfb819
22:00:03 ipsec payload seen: VID (24 bytes)
22:00:03 ipsec,debug 01528bbbc00696121849ab9a1c5b2a5100000002
22:00:03 ipsec processing payload: SA
22:00:03 ipsec IKE Protocol: IKE
22:00:03 ipsec proposal #1
22:00:03 ipsec enc: aes256-cbc
22:00:03 ipsec prf: hmac-sha256
22:00:03 ipsec auth: sha256
22:00:03 ipsec dh: modp1024
22:00:03 ipsec matched proposal:
22:00:03 ipsec proposal #1
22:00:03 ipsec enc: aes256-cbc
22:00:03 ipsec prf: hmac-sha256
22:00:03 ipsec auth: sha256
22:00:03 ipsec dh: modp1024
22:00:03 ipsec processing payload: KE
22:00:03 ipsec,debug => shared secret (size 0x80)
22:00:03 ipsec,debug ed4db930 da48c382 16c8b6d0 0e7e3c96 3c0ed077 375c1ad9 c442a294 ae125bd6
....
22:00:03 ipsec ike2 respond finish: request, exchange: SA_INIT:0 92.218.169.238[500] 5bf276184133cc0c:0000000000000000
22:00:03 ipsec processing payload: NONCE
22:00:03 ipsec adding payload: SA
22:00:03 ipsec,debug => (size 0x30)
22:00:03 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005
22:00:03 ipsec,debug 03000008 0300000c 00000008 04000002
22:00:03 ipsec adding payload: KE
22:00:03 ipsec,debug => (size 0x88)
22:00:03 ipsec,debug 00000088 00020000 e871eec4 262ed58b d0daead4 fecf2e3b 631792de a3dea688
....
22:00:03 ipsec,debug 578bfb75 2be8d777
22:00:03 ipsec adding payload: NONCE
22:00:03 ipsec,debug => (size 0x1c)
22:00:03 ipsec,debug 0000001c d43c330a de7696ba e63586d7 c7cb3fe8 c06e8cf5 c6897518
22:00:03 ipsec adding notify: NAT_DETECTION_SOURCE_IP
22:00:03 ipsec,debug => (size 0x1c)
22:00:03 ipsec,debug 0000001c 00004004 f26bd54c 523a1686 e779aa1d 81dec242 86a73555
22:00:03 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
22:00:03 ipsec,debug => (size 0x1c)
22:00:03 ipsec,debug 0000001c 00004005 44c34d90 2b8ce597 d5941902 a7fe024c d6d44692
22:00:03 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
22:00:03 ipsec,debug => (size 0x8)
22:00:03 ipsec,debug 00000008 0000402e
22:00:03 ipsec adding payload: CERTREQ
22:00:03 ipsec,debug => (size 0x5)
22:00:03 ipsec,debug 00000005 04
22:00:03 ipsec <- ike2 reply, exchange: SA_INIT:0 92.218.169.238[500] 5bf276184133cc0c:748693d32f3f7b78
22:00:03 ipsec,debug ===== sending 309 bytes from 192.168.178.2[500] to 92.218.169.238[500]
22:00:03 ipsec,debug 1 times of 309 bytes message will be sent to 92.218.169.238[500]
22:00:03 ipsec,debug => skeyseed (size 0x20)
22:00:03 ipsec,debug cc750a6b bb60a237 7639d7f0 17f9d42f 572c3fd9 c8140c79 16ae7350 0b6e4b86
22:00:03 ipsec,debug => keymat (size 0x20)
22:00:03 ipsec,debug 1d5bb68f e3a796ba 3a66245a 346f9ba8 9529ddda 103acf02 73489b6f e38ba767
22:00:03 ipsec,debug => SK_ai (size 0x20)
22:00:03 ipsec,debug ee762705 107e5f72 0acee098 05124f20 50949121 dbafd085 923f57eb 4de1e677
22:00:03 ipsec,debug => SK_ar (size 0x20)
22:00:03 ipsec,debug 90389239 c6ff6fab d763950b 1bacbe5d afbad831 06c71e9f f364ae21 4c2c1477
22:00:03 ipsec,debug => SK_ei (size 0x20)
22:00:03 ipsec,debug 53a081d4 236c84b6 745bfca7 1d240545 30da4001 5d8a5cc1 7d1c0518 8567806d
22:00:03 ipsec,debug => SK_er (size 0x20)
22:00:03 ipsec,debug 496a502f 3980d2c3 e3844135 80c14ebf 0ef42c0f e2d67894 ed2e4d2e 9002f8a8
22:00:03 ipsec,debug => SK_pi (size 0x20)
22:00:03 ipsec,debug f8a8a7a0 bd019204 8f50773b 39b4d2e5 ac6efe9a d31cb592 72740a88 82977221
22:00:03 ipsec,debug => SK_pr (size 0x20)
22:00:03 ipsec,debug b8e6de6d 63087a3d 850c06c3 d1e5ea8f 21f3440c 7ffe0a30 1dfb55de 940804d7
22:00:03 ipsec,info new ike2 SA (R): peer-ikev2 192.168.178.2[500]-92.218.169.238[500] spi:748693d32f3f7b78:5bf276184133cc0c
22:00:03 ipsec processing payloads: VID
22:00:03 ipsec peer is MS Windows (ISAKMPOAKLEY 9)
22:00:03 ipsec processing payloads: NOTIFY
22:00:03 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
22:00:03 ipsec notify: NAT_DETECTION_SOURCE_IP
22:00:03 ipsec notify: NAT_DETECTION_DESTINATION_IP
22:00:03 ipsec (NAT-T) REMOTE LOCAL
22:00:03 ipsec KA list add: 192.168.178.2[4500]->92.218.169.238[4500]
22:00:03 ipsec fragmentation negotiated
22:00:03 ipsec,debug ===== received 580 bytes from 92.218.169.238[4500] to 192.168.178.2[4500]
22:00:03 ipsec -> ike2 request, exchange: AUTH:1 92.218.169.238[4500] 5bf276184133cc0c:748693d32f3f7b78
22:00:03 ipsec payload seen: SKF (552 bytes)
22:00:03 ipsec processing payload: ENC (not found)
22:00:03 ipsec processing payload: SKF
22:00:03 ipsec => invalid payload (first 0x100 of 0x228)
22:00:03 ipsec 23000228 00010015 6c54892a 2f32e614 c86353b2 116e9e12 93c7b5c8 1fb2f423
....
....
22:00:03 ipsec reply notify: INVALID_SYNTAX
22:00:03 ipsec adding notify: INVALID_SYNTAX
22:04:44 ipsec -> ike2 request, exchange: SA_INIT:0 92.218.169.238[500] 30662d9e3dd4f417:0000000000000000
22:04:44 ipsec ike2 respond
22:04:44 ipsec payload seen: SA (256 bytes)
22:04:44 ipsec payload seen: KE (136 bytes)
22:04:44 ipsec payload seen: NONCE (52 bytes)
22:04:44 ipsec payload seen: NOTIFY (28 bytes)
22:04:44 ipsec payload seen: NOTIFY (28 bytes)
22:04:44 ipsec processing payload: SA
22:04:44 ipsec IKE Protocol: IKE
22:04:44 ipsec proposal #1
22:04:44 ipsec enc: 3des-cbc
22:04:44 ipsec prf: hmac-sha1
22:04:44 ipsec auth: sha1
22:04:44 ipsec dh: modp1024
....
22:04:44 ipsec matched proposal:
22:04:44 ipsec proposal #4
22:04:44 ipsec enc: aes256-cbc
22:04:44 ipsec prf: hmac-sha256
22:04:44 ipsec auth: sha256
22:04:44 ipsec dh: modp1024
22:04:44 ipsec processing payload: KE
22:04:44 ipsec,debug => shared secret (size 0x80)
22:04:44 ipsec,debug cacd86b3 2ac9f519 30f24759 918faec8 69eaf627 4e4f72ed 5b017fcf c93445ce
....
22:04:44 ipsec ike2 respond finish: request, exchange: SA_INIT:0 92.218.169.238[500] 30662d9e3dd4f417:0000000000000000
22:04:44 ipsec processing payload: NONCE
22:04:44 ipsec adding payload: SA
22:04:44 ipsec,debug => (size 0x30)
22:04:44 ipsec,debug 00000030 0000002c 04010004 0300000c 0100000c 800e0100 03000008 02000005
22:04:44 ipsec,debug 03000008 0300000c 00000008 04000002
22:04:44 ipsec adding payload: KE
22:04:44 ipsec,debug => (size 0x88)
22:04:44 ipsec,debug 00000088 00020000 4a43fee7 2414d79d bd3871af 89962461 59c21fa2 b1cf8f3c
....
22:04:44 ipsec adding payload: NONCE
22:04:44 ipsec,debug => (size 0x1c)
22:04:44 ipsec,debug 0000001c 6ab6c036 5d00e7cf 8625e9b1 377ab58a 9ab47d9d 681c0320
22:04:44 ipsec adding notify: NAT_DETECTION_SOURCE_IP
22:04:44 ipsec,debug => (size 0x1c)
22:04:44 ipsec,debug 0000001c 00004004 0f3ee9df 28abb5ca b3583693 fcdf2cd9 e19b1d26
22:04:44 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
22:04:44 ipsec,debug => (size 0x1c)
22:04:44 ipsec,debug 0000001c 00004005 2e4de6b6 7ceca631 f9790f64 5eded1c3 2e17f433
22:04:44 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
22:04:44 ipsec,debug => (size 0x8)
22:04:44 ipsec,debug 00000008 0000402e
22:04:44 ipsec adding payload: CERTREQ
22:04:44 ipsec,debug => (size 0x5)
22:04:44 ipsec,debug 00000005 04
22:04:44 ipsec <- ike2 reply, exchange: SA_INIT:0 92.218.169.238[500] 30662d9e3dd4f417:c54b477ba08eff43
22:04:44 ipsec,debug ===== sending 309 bytes from 192.168.178.2[500] to 92.218.169.238[500]
22:04:44 ipsec,debug 1 times of 309 bytes message will be sent to 92.218.169.238[500]
22:04:44 ipsec,debug => skeyseed (size 0x20)
22:04:44 ipsec,debug fdab80a4 4c283ba7 65b2ef51 8261a6ae 64e87139 fe416bb8 9bddecc2 4050601c
22:04:44 ipsec,debug => keymat (size 0x20)
22:04:44 ipsec,debug eeb82b4b c0fee115 2944b6df 2fec55cb 0f772b7d 378117d5 d70c7d56 ae6fd1d0
22:04:44 ipsec,debug => SK_ai (size 0x20)
22:04:44 ipsec,debug 02fca05c 95929c53 b80ddec7 42f14400 04889fff 43ef1b3a aac69eb0 8b89b8dd
22:04:44 ipsec,debug => SK_ar (size 0x20)
22:04:44 ipsec,debug c2f84726 ff8781a2 74bd8b45 6bf1dede 8f4ddeb4 ca1c58b6 b15c8c0f e33f21cf
22:04:44 ipsec,debug => SK_ei (size 0x20)
22:04:44 ipsec,debug 86a362eb 14bbbda7 cc6fe62b 26b3b1ef 80f1a019 0dacbb4e 8ec49d9c 23830b66
22:04:44 ipsec,debug => SK_er (size 0x20)
22:04:44 ipsec,debug 53e8890d 757e3f55 ea3e839d e1471a70 fc80758e fc567724 d1604a67 4943008d
22:04:44 ipsec,debug => SK_pi (size 0x20)
22:04:44 ipsec,debug 4e3039db 552a5d7c ece012c9 9d002bcf e8fa76d2 c77514af 80a29583 95fb78ed
22:04:44 ipsec,debug => SK_pr (size 0x20)
22:04:44 ipsec,debug c24a9936 582ade02 361b6684 71f84189 73de9413 a6c5265e c230570c 6212fa01
22:04:44 ipsec,info new ike2 SA (R): peer-ikev2 192.168.178.2[500]-92.218.169.238[500] spi:c54b477ba08eff43:30662d9e3dd4f417
22:04:44 ipsec processing payloads: VID (none found)
22:04:44 ipsec processing payloads: NOTIFY
22:04:44 ipsec notify: NAT_DETECTION_SOURCE_IP
22:04:44 ipsec notify: NAT_DETECTION_DESTINATION_IP
22:04:44 ipsec (NAT-T) REMOTE LOCAL
22:04:44 ipsec KA list add: 192.168.178.2[4500]->92.218.169.238[4500]
22:04:44 ipsec,debug ===== received 13488 bytes from 92.218.169.238[4500] to 192.168.178.2[4500]
22:04:44 ipsec -> ike2 request, exchange: AUTH:1 92.218.169.238[4500] 30662d9e3dd4f417:c54b477ba08eff43
22:04:44 ipsec payload seen: ENC (13460 bytes)
22:04:44 ipsec processing payload: ENC
22:04:44 ipsec,debug => iv (size 0x10)
22:04:44 ipsec,debug 745a3ad3 ddf4c60f 93d6930c ed188636
22:04:44 ipsec,debug decrypted packet
22:04:44 ipsec payload seen: ID_I (12 bytes)
22:04:44 ipsec payload seen: CERTREQ (13245 bytes)
22:04:44 ipsec payload seen: NOTIFY (8 bytes)
22:04:44 ipsec payload seen: CONFIG (24 bytes)
22:04:44 ipsec payload seen: SA (80 bytes)
22:04:44 ipsec payload seen: TS_I (24 bytes)
22:04:44 ipsec payload seen: TS_R (24 bytes)
22:04:44 ipsec processing payloads: NOTIFY
22:04:44 ipsec notify: MOBIKE_SUPPORTED
22:04:44 ipsec ike auth: respond
22:04:44 ipsec processing payload: ID_I
22:04:44 ipsec ID_I (ADDR4): 192.168.2.142
22:04:44 ipsec processing payload: ID_R (not found)
22:04:44 ipsec processing payload: AUTH (not found)
22:04:44 ipsec processing payloads: NOTIFY
22:04:44 ipsec notify: MOBIKE_SUPPORTED
22:04:44 ipsec ID_R (DER DN): C=DE, S=NRW, O=Home, CN=MT-CA
22:04:44 ipsec,debug => auth nonce (size 0x30)
22:04:44 ipsec,debug 9667e8ce ad0ff9db ef4db673 50fb39cd 8d4bf6d0 74195765 64c63c34 e84b6341
22:04:44 ipsec,debug 77dd0d44 2c1eaa82 a3eb2176 438c2f41
22:04:44 ipsec,debug => SK_p (size 0x20)
22:04:44 ipsec,debug c24a9936 582ade02 361b6684 71f84189 73de9413 a6c5265e c230570c 6212fa01
22:04:44 ipsec,debug => idhash (size 0x20)
22:04:44 ipsec,debug e91e774a 46d3d002 0f5e3773 67b7dc15 2713334f 3c7d6c7f 86d738c2 a708c460
22:04:44 ipsec,debug => my auth (size 0x100)
22:04:44 ipsec,debug 28affb55 ca8d5b92 e75cafd9 ec796184 ce48c793 8e12b4fa 704abe06 e326609d
...
22:04:44 ipsec adding payload: ID_R
22:04:44 ipsec,debug => (size 0x44)
22:04:44 ipsec,debug 00000044 09000000 303a310b 30090603 55040613 02444531 0c300a06 03550408
22:04:44 ipsec,debug 0c034e52 57310d30 0b060355 040a0c04 486f6d65 310e300c 06035504 030c054d
22:04:44 ipsec,debug 542d4341
22:04:44 ipsec adding payload: AUTH
22:04:44 ipsec,debug => (first 0x100 of 0x108)
22:04:44 ipsec,debug 00000108 01000000 28affb55 ca8d5b92 e75cafd9 ec796184 ce48c793 8e12b4fa
....
22:04:44 ipsec Certificate:
22:04:44 ipsec serialNr: ....
22:04:44 ipsec issuer: ....
22:04:44 ipsec subject: ...
22:04:44 ipsec notBefore: Mon Mar 18 16:19:20 2024
22:04:44 ipsec notAfter: Thu Mar 18 16:29:20 2049
22:04:44 ipsec selfSigned:1
22:04:44 ipsec extensions:
22:04:44 ipsec key usage: key-cert-sign, crl-sign
22:04:44 ipsec basic constraints: isCa: TRUE
22:04:44 ipsec subject key id: ....
22:04:44 ipsec signed with: SHA256+RSA
22:04:44 ipsec [RSA-PUBLIC]
22:04:44 ipsec modulus: ....
22:04:44 ipsec publicExponent: 10001
22:04:44 ipsec adding payload: CERT
22:04:44 ipsec,debug => (first 0x100 of 0x349)
22:04:44 ipsec,debug 00000349 04308203 40308202 28a00302 01020210 6c4a2ae3 844cc08f 4c95037b
....
22:04:44 ipsec Certificate:
22:04:44 ipsec serialNr: ....
22:04:44 ipsec issuer: ....
22:04:44 ipsec subject: ....
22:04:44 ipsec notBefore: Mon Mar 18 10:18:50 2024
22:04:44 ipsec notAfter: Thu Mar 18 10:18:50 2049
22:04:44 ipsec selfSigned:0
22:04:44 ipsec extensions:
22:04:44 ipsec key usage: digital-signature, key-encipherment, data-encipherment, key-agreement, key-cert-sign
22:04:44 ipsec extended key usage: tls-server, tls-client
22:04:44 ipsec subject key id: ....
22:04:44 ipsec authority key id:....
22:04:44 ipsec subject alternative name:
22:04:44 ipsec DNS: ....
22:04:44 ipsec signed with: SHA256+RSA
22:04:44 ipsec [RSA-PUBLIC]
22:04:44 ipsec modulus: ....
22:04:44 ipsec adding payload: CERT
22:04:44 ipsec,debug => (first 0x100 of 0x3ac)
22:04:44 ipsec,debug 000003ac 04308203 a3308202 8ba00302 01020210 7a76d202 e82291a9 4d989fb2
....
22:04:44 ipsec adding payload: EAP
22:04:44 ipsec,debug => (size 0x9)
22:04:44 ipsec,debug 00000009 01000005 01
22:04:44 ipsec <- ike2 reply, exchange: AUTH:1 92.218.169.238[4500] 30662d9e3dd4f417:c54b477ba08eff43
22:04:44 ipsec,debug ===== sending 2304 bytes from 192.168.178.2[4500] to 92.218.169.238[4500]
22:04:44 ipsec,debug 1 times of 2308 bytes message will be sent to 92.218.169.238[4500]
22:05:03 ipsec,debug KA: 192.168.178.2[4500]->92.218.169.238[4500]
22:05:03 ipsec,debug 1 times of 1 bytes message will be sent to 92.218.169.238[4500]
....
15:43:36 ipsec,debug ===== received 416 bytes from 89.1.175.13[61155] to 192.168.178.3[500]
15:43:36 ipsec -> ike2 request, exchange: SA_INIT:0 89.1.175.13[61155] 83537d7b19796f4b:0000000000000000
15:43:36 ipsec ike2 respond
15:43:36 ipsec payload seen: SA (48 bytes)
15:43:36 ipsec payload seen: KE (136 bytes)
15:43:36 ipsec payload seen: NONCE (52 bytes)
15:43:36 ipsec payload seen: NOTIFY (8 bytes)
15:43:36 ipsec payload seen: NOTIFY (28 bytes)
15:43:36 ipsec payload seen: NOTIFY (28 bytes)
15:43:36 ipsec payload seen: VID (24 bytes)
15:43:36 ipsec,debug 1e2b516905991c7d7c96fcbfb587e46100000009
15:43:36 ipsec payload seen: VID (20 bytes)
15:43:36 ipsec,debug fb1de3cdf341b7ea16b7e5be0855f120
15:43:36 ipsec payload seen: VID (20 bytes)
15:43:36 ipsec,debug 26244d38eddb61b3172a36e3d0cfb819
15:43:36 ipsec payload seen: VID (24 bytes)
15:43:36 ipsec,debug 01528bbbc00696121849ab9a1c5b2a5100000002
15:43:36 ipsec processing payload: NONCE
15:43:36 ipsec processing payload: SA
15:43:36 ipsec IKE Protocol: IKE
15:43:36 ipsec proposal #1
15:43:36 ipsec enc: aes256-cbc
15:43:36 ipsec prf: hmac-sha256
15:43:36 ipsec auth: sha256
15:43:36 ipsec dh: modp1024
15:43:36 ipsec matched proposal:
15:43:36 ipsec proposal #1
15:43:36 ipsec enc: aes256-cbc
15:43:36 ipsec prf: hmac-sha256
15:43:36 ipsec auth: sha256
15:43:36 ipsec dh: modp1024
15:43:36 ipsec processing payload: KE
15:43:36 ipsec,debug => shared secret (size 0x80)
15:43:36 ipsec,debug fccf5856 459b96fb 4797ef3e 8bf19677 01adb24a e561073a 6d7ab22a af09df6b
....
15:43:36 ipsec adding payload: SA
15:43:36 ipsec,debug => (size 0x30)
15:43:36 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005
15:43:36 ipsec,debug 03000008 0300000c 00000008 04000002
15:43:36 ipsec adding payload: KE
15:43:36 ipsec,debug => (size 0x88)
15:43:36 ipsec,debug 00000088 00020000 31549f63 d9dd7561 71fbe128 79163a4b 0c1b50ce 7abea09a
....
15:43:36 ipsec,debug 84467320 5ceae650
15:43:36 ipsec adding payload: NONCE
15:43:36 ipsec,debug => (size 0x1c)
15:43:36 ipsec,debug 0000001c a6f931ed db6c9502 aa239977 ca4c202d 3a3b852e b8fb1252
15:43:36 ipsec adding notify: NAT_DETECTION_SOURCE_IP
15:43:36 ipsec,debug => (size 0x1c)
15:43:36 ipsec,debug 0000001c 00004004 eaac1121 3800363d 26dccd35 486f3f34 01599949
15:43:36 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
15:43:36 ipsec,debug => (size 0x1c)
15:43:36 ipsec,debug 0000001c 00004005 7b215569 b5fc2583 33839f2a bbca7514 e5d613eb
15:43:36 ipsec adding payload: CERTREQ
15:43:36 ipsec,debug => (size 0x5)
15:43:36 ipsec,debug 00000005 04
15:43:36 ipsec <- ike2 reply, exchange: SA_INIT:0 89.1.175.13[61155] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec,debug ===== sending 301 bytes from 192.168.178.3[500] to 89.1.175.13[61155]
15:43:36 ipsec,debug 1 times of 301 bytes message will be sent to 89.1.175.13[61155]
15:43:36 ipsec,debug => skeyseed (size 0x20)
15:43:36 ipsec,debug d22e3f74 ccfe9600 badc7cec 4bf8e56d a656561b 2a1b4c89 8aed5aff 76508741
15:43:36 ipsec,debug => keymat (size 0x20)
15:43:36 ipsec,debug 2750a0f1 22c4b3b0 5e2e735f b7fd8695 8f04e9f2 c44c56fd 031b167a 4937450d
15:43:36 ipsec,debug => SK_ai (size 0x20)
15:43:36 ipsec,debug c750b975 65b188f2 31f277ac b732c672 473c9d26 0877eac5 3becfd9b a733d96f
15:43:36 ipsec,debug => SK_ar (size 0x20)
15:43:36 ipsec,debug eb152a64 ae927d46 d4ce54e7 5ac38d20 32521893 7eb70591 a5b06118 1aa942d8
15:43:36 ipsec,debug => SK_ei (size 0x20)
15:43:36 ipsec,debug 039dd29f 370a4ec5 4c20695f 4c0b573b cd3a121d 4a24c696 82a3101b cf041a19
15:43:36 ipsec,debug => SK_er (size 0x20)
15:43:36 ipsec,debug afe9bed8 defb1d4d f3072d05 6af3fd02 ac6d1b09 192fde62 e266bd17 6021e5a4
15:43:36 ipsec,debug => SK_pi (size 0x20)
15:43:36 ipsec,debug 1d5d5da3 7626d4df a53d6db2 2b4d9c0c b3ea61fa 71ca4a8d 36b89879 031a7809
15:43:36 ipsec,debug => SK_pr (size 0x20)
15:43:36 ipsec,debug 24fb3220 68c34ca9 75edf830 da97f3bd f2d5adb0 19d61e4c 72c3ba96 39c6faf4
15:43:36 ipsec,info new ike2 SA (R): 192.168.178.3[500]-89.1.175.13[61155] spi:d2793fca2b643b58:83537d7b19796f4b
15:43:36 ipsec processing payloads: VID
15:43:36 ipsec peer is MS Windows (ISAKMPOAKLEY 9)
15:43:36 ipsec processing payloads: NOTIFY
15:43:36 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
15:43:36 ipsec notify: NAT_DETECTION_SOURCE_IP
15:43:36 ipsec notify: NAT_DETECTION_DESTINATION_IP
15:43:36 ipsec (NAT-T) REMOTE LOCAL
15:43:36 ipsec KA list add: 192.168.178.3[4500]->89.1.175.13[61155]
15:43:36 ipsec,debug ===== received 10208 bytes from 89.1.175.13[61156] to 192.168.178.3[4500]
15:43:36 ipsec -> ike2 request, exchange: AUTH:1 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec peer ports changed: 61155 -> 61156
15:43:36 ipsec KA remove: 192.168.178.3[4500]->89.1.175.13[61155]
15:43:36 ipsec,debug KA tree dump: 192.168.178.3[4500]->89.1.175.13[61155] (in_use=1)
15:43:36 ipsec,debug KA removing this one...
15:43:36 ipsec KA list add: 192.168.178.3[4500]->89.1.175.13[61156]
15:43:36 ipsec payload seen: ENC (10180 bytes)
15:43:36 ipsec processing payload: ENC
15:43:36 ipsec,debug => iv (size 0x10)
15:43:36 ipsec,debug 28dd69e2 50c75f22 c46c67fd 1f4312c1
15:43:36 ipsec,debug => plain payload (trimmed) (first 0x100 of 0x279d)
15:43:36 ipsec,debug 2600000c 01000000 c0a8b2c5 290026c5 04121a24 b7518bf7 9ce2597b 396d2143
....
15:43:36 ipsec,debug decrypted
15:43:36 ipsec payload seen: ID_I (12 bytes)
15:43:36 ipsec payload seen: CERTREQ (9925 bytes)
15:43:36 ipsec payload seen: NOTIFY (8 bytes)
15:43:36 ipsec payload seen: CONFIG (24 bytes)
15:43:36 ipsec payload seen: SA (44 bytes)
15:43:36 ipsec payload seen: TS_I (64 bytes)
15:43:36 ipsec payload seen: TS_R (64 bytes)
15:43:36 ipsec processing payloads: NOTIFY
15:43:36 ipsec notify: MOBIKE_SUPPORTED
15:43:36 ipsec ike auth: respond
15:43:36 ipsec processing payload: ID_I
15:43:36 ipsec ID_I (ADDR4): 192.168.178.197
15:43:36 ipsec processing payload: ID_R (not found)
15:43:36 ipsec processing payload: AUTH (not found)
15:43:36 ipsec processing payloads: NOTIFY
15:43:36 ipsec notify: MOBIKE_SUPPORTED
15:43:36 ipsec ID_R (FQDN): xxxxxxx.xxxxx.xx
15:43:36 ipsec adding payload: ID_R
15:43:36 ipsec,debug => (size 0x18)
15:43:36 ipsec,debug 00000018 02000000 70656472 6f66622e 7370646e 732e6575
15:43:36 ipsec cert: CN=xxxxxxx.xxxxx.xx.eu,C=DE,ST=NRW,L=,O=Home,OU=,SN=
15:43:36 ipsec adding payload: CERT
15:43:36 ipsec,debug => (first 0x100 of 0x3ac)
15:43:36 ipsec,debug 000003ac 04308203 a3308202 8ba00302 01020210 7a76d202 e82291a9 4d989fb2
....
15:43:36 ipsec processing payload: NONCE
15:43:36 ipsec,debug => auth nonce (size 0x30)
15:43:36 ipsec,debug ab05427f 0c8fbeb2 decd96d6 3da2b3ec f6b9841d c847cddc 3bf9f056 c6847a6b
15:43:36 ipsec,debug 5570c140 c5fb833d fe6bf318 a019bfd4
15:43:36 ipsec,debug => SK_p (size 0x20)
15:43:36 ipsec,debug 24fb3220 68c34ca9 75edf830 da97f3bd f2d5adb0 19d61e4c 72c3ba96 39c6faf4
15:43:36 ipsec,debug => idhash (size 0x20)
15:43:36 ipsec,debug 79788e54 7ba9e0ca 99e3ddf7 504c9d47 ea36e95c 37e23a97 8ca5a5ff 19114741
15:43:36 ipsec,debug => my auth (size 0x100)
15:43:36 ipsec,debug 942d7114 54a2c241 bc5c4423 5f11553a a0f24776 892ccba5 997aad16 fc5a0afd
....
15:43:36 ipsec adding payload: AUTH
15:43:36 ipsec,debug => (first 0x100 of 0x108)
15:43:36 ipsec,debug 00000108 01000000 942d7114 54a2c241 bc5c4423 5f11553a a0f24776 892ccba5
....
15:43:36 ipsec adding payload: EAP
15:43:36 ipsec,debug => (size 0x9)
15:43:36 ipsec,debug 00000009 01000005 01
15:43:36 ipsec <- ike2 reply, exchange: AUTH:1 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec,debug ===== sending 1520 bytes from 192.168.178.3[4500] to 89.1.175.13[61156]
15:43:36 ipsec,debug 1 times of 1524 bytes message will be sent to 89.1.175.13[61156]
15:43:36 ipsec,debug ===== received 80 bytes from 89.1.175.13[61156] to 192.168.178.3[4500]
15:43:36 ipsec -> ike2 request, exchange: AUTH:2 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec payload seen: ENC (52 bytes)
15:43:36 ipsec processing payload: ENC
15:43:36 ipsec,debug => iv (size 0x10)
15:43:36 ipsec,debug 0c84d24c 8dc179f8 00253e3a 078ffb7b
15:43:36 ipsec,debug => plain payload (trimmed) (size 0xe)
15:43:36 ipsec,debug 0000000e 0200000a 0161646d 696e
15:43:36 ipsec,debug decrypted
15:43:36 ipsec payload seen: EAP (14 bytes)
15:43:36 ipsec processing payloads: NOTIFY (none found)
15:43:36 ipsec processing payload: EAP
15:43:36 ipsec update peer's identity: 192.168.178.197 -> admin
15:43:36 radius,debug new request 55:41 code=Access-Request service=ipsec called-id=192.168.178.3
15:43:36 radius,debug sending 55:41 to 192.168.178.2:1812
15:43:36 radius,debug,packet sending Access-Request with id 27 to 192.168.178.2:1812
15:43:36 radius,debug,packet Signature = 0xdf0716b589f1a4f880c3267b04a44bb4
15:43:36 radius,debug,packet User-Name = "admin"
15:43:36 radius,debug,packet Called-Station-Id = "192.168.178.3"
15:43:36 radius,debug,packet Calling-Station-Id = "89.1.175.13"
15:43:36 radius,debug,packet NAS-Port-Id = 0x0000000a
15:43:36 radius,debug,packet NAS-Port-Type = 5
15:43:36 radius,debug,packet Service-Type = 2
15:43:36 radius,debug,packet Event-Timestamp = 1710945816
15:43:36 radius,debug,packet Framed-MTU = 1400
15:43:36 radius,debug,packet EAP-Message = 0x0200000a0161646d696e
15:43:36 radius,debug,packet Message-Authenticator = 0x99a41153a662788660d61d83f6f38759
15:43:36 radius,debug,packet NAS-Identifier = "MikroTik"
15:43:36 radius,debug,packet NAS-IP-Address = 192.168.178.3
15:43:36 radius,debug,packet received Access-Challenge with id 27 from 192.168.178.2:1812
15:43:36 radius,debug,packet Signature = 0xdd590399c4590ce9a53e035d997fe99c
15:43:36 radius,debug,packet EAP-Message = 0x0101001b1a01010016103cfe103150bf
15:43:36 radius,debug,packet d2e32cdd36442552b79a20
15:43:36 radius,debug,packet State = 0xed3b5c31ccdc32d6b2e5c7801b908a30
15:43:36 radius,debug,packet Message-Authenticator = 0x8e0f9d8c8cd864233f38c6cfa95fbd1e
15:43:36 radius,debug received reply for 55:41
15:43:36 ipsec adding payload: EAP
15:43:36 ipsec,debug => (size 0x1f)
15:43:36 ipsec,debug 0000001f 0101001b 1a010100 16103cfe 103150bf d2e32cdd 36442552 b79a20
15:43:36 ipsec <- ike2 reply, exchange: AUTH:2 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec,debug ===== sending 128 bytes from 192.168.178.3[4500] to 89.1.175.13[61156]
15:43:36 ipsec,debug 1 times of 132 bytes message will be sent to 89.1.175.13[61156]
15:43:36 ipsec,debug ===== received 144 bytes from 89.1.175.13[61156] to 192.168.178.3[4500]
15:43:36 ipsec -> ike2 request, exchange: AUTH:3 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec payload seen: ENC (116 bytes)
15:43:36 ipsec processing payload: ENC
15:43:36 ipsec,debug => iv (size 0x10)
15:43:36 ipsec,debug 368dae72 34a1f57e ca0c5ee7 682b8bd2
15:43:36 ipsec,debug => plain payload (trimmed) (size 0x44)
15:43:36 ipsec,debug 00000044 02010040 1a020100 3b31e910 4d4030fc 62262036 ca54051b 532b0000
....
15:43:36 ipsec,debug 646d696e
15:43:36 ipsec,debug decrypted
15:43:36 ipsec payload seen: EAP (68 bytes)
15:43:36 ipsec processing payloads: NOTIFY (none found)
15:43:36 ipsec processing payload: EAP
15:43:36 radius,debug new request 55:42 code=Access-Request service=ipsec called-id=192.168.178.3
15:43:36 radius,debug sending 55:42 to 192.168.178.2:1812
15:43:36 radius,debug,packet sending Access-Request with id 28 to 192.168.178.2:1812
15:43:36 radius,debug,packet Signature = 0x7290ad9698232cb00a29392a912e9452
15:43:36 radius,debug,packet User-Name = "admin"
15:43:36 radius,debug,packet Called-Station-Id = "192.168.178.3"
15:43:36 radius,debug,packet Calling-Station-Id = "89.1.175.13"
15:43:36 radius,debug,packet NAS-Port-Id = 0x0000000a
15:43:36 radius,debug,packet NAS-Port-Type = 5
15:43:36 radius,debug,packet Service-Type = 2
15:43:36 radius,debug,packet Event-Timestamp = 1710945816
15:43:36 radius,debug,packet Framed-MTU = 1400
15:43:36 radius,debug,packet State = 0xed3b5c31ccdc32d6b2e5c7801b908a30
15:43:36 radius,debug,packet EAP-Message = 0x020100401a0201003b31e9104d4030fc
15:43:36 radius,debug,packet 62262036ca54051b532b000000000000
15:43:36 radius,debug,packet 0000a4af1d3d69c31195ff47e7b8d48c
15:43:36 radius,debug,packet 2dcd9d6a6e86f7b4b6870061646d696e
15:43:36 radius,debug,packet Message-Authenticator = 0x328dc4060f481438a2c8810fb308b613
15:43:36 radius,debug,packet NAS-Identifier = "MikroTik"
15:43:36 radius,debug,packet NAS-IP-Address = 192.168.178.3
15:43:36 radius,debug,packet received Access-Challenge with id 28 from 192.168.178.2:1812
15:43:36 radius,debug,packet Signature = 0xdf1a57e9789b1af0a0522703a69e89c8
15:43:36 radius,debug,packet EAP-Message = 0x010200331a0301002e533d3138463334
15:43:36 radius,debug,packet 34344537304635384439383737323245
15:43:36 radius,debug,packet 46324131333945324134443139463936
15:43:36 radius,debug,packet 303741
15:43:36 radius,debug,packet State = 0xed3b5c31ccdc32d6b2e5c7801b908a30
15:43:36 radius,debug,packet Message-Authenticator = 0xc93b0dfa560754af46e195207cfc0096
15:43:36 radius,debug received reply for 55:42
15:43:36 ipsec adding payload: EAP
15:43:36 ipsec,debug => (size 0x37)
15:43:36 ipsec,debug 00000037 01020033 1a030100 2e533d31 38463334 34344537 30463538 44393837
15:43:36 ipsec,debug 37323245 46324131 33394532 41344431 39463936 303741
15:43:36 ipsec <- ike2 reply, exchange: AUTH:3 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec,debug ===== sending 256 bytes from 192.168.178.3[4500] to 89.1.175.13[61156]
15:43:36 ipsec,debug 1 times of 260 bytes message will be sent to 89.1.175.13[61156]
15:43:36 ipsec,debug ===== received 80 bytes from 89.1.175.13[61156] to 192.168.178.3[4500]
15:43:36 ipsec -> ike2 request, exchange: AUTH:4 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec payload seen: ENC (52 bytes)
15:43:36 ipsec processing payload: ENC
15:43:36 ipsec,debug => iv (size 0x10)
15:43:36 ipsec,debug 088d4831 fe9107a9 6a09a6ca bcfb73dc
15:43:36 ipsec,debug => plain payload (trimmed) (size 0xa)
15:43:36 ipsec,debug 0000000a 02020006 1a03
15:43:36 ipsec,debug decrypted
15:43:36 ipsec payload seen: EAP (10 bytes)
15:43:36 ipsec processing payloads: NOTIFY (none found)
15:43:36 ipsec processing payload: EAP
15:43:36 radius,debug new request 55:43 code=Access-Request service=ipsec called-id=192.168.178.3
15:43:36 radius,debug sending 55:43 to 192.168.178.2:1812
15:43:36 radius,debug,packet sending Access-Request with id 29 to 192.168.178.2:1812
15:43:36 radius,debug,packet Signature = 0x3bbedf88ed2148156ef154b11bba926e
15:43:36 radius,debug,packet User-Name = "admin"
15:43:36 radius,debug,packet Called-Station-Id = "192.168.178.3"
15:43:36 radius,debug,packet Calling-Station-Id = "89.1.175.13"
15:43:36 radius,debug,packet NAS-Port-Id = 0x0000000a
15:43:36 radius,debug,packet NAS-Port-Type = 5
15:43:36 radius,debug,packet Service-Type = 2
15:43:36 radius,debug,packet Event-Timestamp = 1710945816
15:43:36 radius,debug,packet Framed-MTU = 1400
15:43:36 radius,debug,packet State = 0xed3b5c31ccdc32d6b2e5c7801b908a30
15:43:36 radius,debug,packet EAP-Message = 0x020200061a03
15:43:36 radius,debug,packet Message-Authenticator = 0x3ca52bf120318c6643a0e45cbb9b04b9
15:43:36 radius,debug,packet NAS-Identifier = "MikroTik"
15:43:36 radius,debug,packet NAS-IP-Address = 192.168.178.3
15:43:36 radius,debug,packet received Access-Accept with id 29 from 192.168.178.2:1812
15:43:36 radius,debug,packet Signature = 0x14560b54e470efa876b03c29d7b41f03
15:43:36 radius,debug,packet EAP-Message = 0x03020004
15:43:36 radius,debug,packet MS-MPPE-Recv-Key = 0xa0e08a7a898fa0cbc4a689a757c00067
15:43:36 radius,debug,packet db5c87c71f86d6d8132d16abe4ac82c7
15:43:36 radius,debug,packet 4aeb
15:43:36 radius,debug,packet MS-MPPE-Send-Key = 0xc02bc16a210705d53b209143f0f45c4f
15:43:36 radius,debug,packet e32c727fbe30dd280b6e3a7809876d4c
15:43:36 radius,debug,packet c147
15:43:36 radius,debug,packet Class = 0xc782769ce84e504f
15:43:36 radius,debug,packet Message-Authenticator = 0x7d66467dc3273b4d2759f63a179bdfc0
15:43:36 radius,debug received reply for 55:43
15:43:36 ipsec,debug => EAP MSK (size 0x20)
15:43:36 ipsec,debug cfcbde44 44148e41 4d45abef b02b5f7b 8ce9bb75 202411be fd32a395 60101fde
15:43:36 ipsec adding payload: EAP
15:43:36 ipsec,debug => (size 0x8)
15:43:36 ipsec,debug 00000008 03020004
15:43:36 ipsec <- ike2 reply, exchange: AUTH:4 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec,debug ===== sending 272 bytes from 192.168.178.3[4500] to 89.1.175.13[61156]
15:43:36 ipsec,debug 1 times of 276 bytes message will be sent to 89.1.175.13[61156]
15:43:36 ipsec,debug ===== received 112 bytes from 89.1.175.13[61156] to 192.168.178.3[4500]
15:43:36 ipsec -> ike2 request, exchange: AUTH:5 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec payload seen: ENC (84 bytes)
15:43:36 ipsec processing payload: ENC
15:43:36 ipsec,debug => iv (size 0x10)
15:43:36 ipsec,debug 6682a308 a77dbe4f 4f1f16cf 3872d434
15:43:36 ipsec,debug => plain payload (trimmed) (size 0x28)
15:43:36 ipsec,debug 00000028 02000000 5fbce3ed 3fa0d8c6 b9c0ed59 cecb2c37 085669c1 6b57200a
15:43:36 ipsec,debug 18b6f38a 2251fd82
15:43:36 ipsec,debug decrypted
15:43:36 ipsec payload seen: AUTH (40 bytes)
15:43:36 ipsec processing payloads: NOTIFY (none found)
15:43:36 ipsec processing payload: AUTH
15:43:36 ipsec requested auth method: SKEY
15:43:36 ipsec,debug => peer's auth (size 0x20)
15:43:36 ipsec,debug 5fbce3ed 3fa0d8c6 b9c0ed59 cecb2c37 085669c1 6b57200a 18b6f38a 2251fd82
15:43:36 ipsec,debug => auth nonce (size 0x18)
15:43:36 ipsec,debug a6f931ed db6c9502 aa239977 ca4c202d 3a3b852e b8fb1252
15:43:36 ipsec,debug => SK_p (size 0x20)
15:43:36 ipsec,debug 1d5d5da3 7626d4df a53d6db2 2b4d9c0c b3ea61fa 71ca4a8d 36b89879 031a7809
15:43:36 ipsec,debug => idhash (size 0x20)
15:43:36 ipsec,debug 56563c47 8425dee8 4cc5b536 e89e3928 48e096ee e30eaba3 6987887b 458188df
15:43:36 ipsec,debug => calculated peer's AUTH (size 0x20)
15:43:36 ipsec,debug 5fbce3ed 3fa0d8c6 b9c0ed59 cecb2c37 085669c1 6b57200a 18b6f38a 2251fd82
15:43:36 ipsec,info,account peer authorized: 192.168.178.3[4500]-89.1.175.13[61156] spi:d2793fca2b643b58:83537d7b19796f4b
15:43:36 ipsec processing payloads: NOTIFY
15:43:36 ipsec notify: MOBIKE_SUPPORTED
15:43:36 ipsec peer wants tunnel mode
15:43:36 ipsec processing payload: CONFIG
15:43:36 ipsec attribute: internal IPv4 address
15:43:36 ipsec attribute: internal IPv4 DNS
15:43:36 ipsec attribute: internal IPv4 NBNS
15:43:36 ipsec attribute: MS internal IPv4 server
15:43:36 ipsec,info acquired 192.168.9.254 address for 89.1.175.13, admin
15:43:36 ipsec processing payload: TS_I
15:43:36 ipsec 0.0.0.0/0
15:43:36 ipsec [::/0]
15:43:36 ipsec processing payload: TS_R
15:43:36 ipsec 0.0.0.0/0
15:43:36 ipsec [::/0]
15:43:36 ipsec TSi in tunnel mode replaced with config address: 192.168.9.254
15:43:36 ipsec canditate selectors: 0.0.0.0/0 <=> 192.168.9.254
15:43:36 ipsec canditate selectors: [::/0] <=> [::/0]
15:43:36 ipsec processing payload: SA
15:43:36 ipsec IKE Protocol: ESP
15:43:36 ipsec proposal #1
15:43:36 ipsec enc: aes256-cbc
15:43:36 ipsec auth: sha256
15:43:36 ipsec searching for policy for selector: 0.0.0.0/0 <=> 192.168.9.254
15:43:36 ipsec generating policy
15:43:36 ipsec matched proposal:
15:43:36 ipsec proposal #1
15:43:36 ipsec enc: aes256-cbc
15:43:36 ipsec auth: sha256
15:43:36 ipsec ike auth: finish
15:43:36 ipsec ID_R (FQDN): xxxxxxx.xxxxx.xx
15:43:36 ipsec processing payload: NONCE
15:43:36 ipsec,debug => auth nonce (size 0x30)
15:43:36 ipsec,debug ab05427f 0c8fbeb2 decd96d6 3da2b3ec f6b9841d c847cddc 3bf9f056 c6847a6b
15:43:36 ipsec,debug 5570c140 c5fb833d fe6bf318 a019bfd4
15:43:36 ipsec,debug => SK_p (size 0x20)
15:43:36 ipsec,debug 24fb3220 68c34ca9 75edf830 da97f3bd f2d5adb0 19d61e4c 72c3ba96 39c6faf4
15:43:36 ipsec,debug => idhash (size 0x20)
15:43:36 ipsec,debug 79788e54 7ba9e0ca 99e3ddf7 504c9d47 ea36e95c 37e23a97 8ca5a5ff 19114741
15:43:36 ipsec,debug => my auth (size 0x20)
15:43:36 ipsec,debug 0d5903a7 455633b1 6368e02a 447fab19 e2ce3dd7 03f4097f 666b893a d07b51ca
15:43:36 ipsec cert: CN=xxxxxxx.xxxxx.xx,C=DE,ST=NRW,L=,O=Home,OU=,SN=
15:43:36 ipsec adding payload: CERT
15:43:36 ipsec,debug => (first 0x100 of 0x3ac)
15:43:36 ipsec,debug 000003ac 04308203 a3308202 8ba00302 01020210 7a76d202 e82291a9 4d989fb2
....
15:43:36 ipsec adding payload: ID_R
15:43:36 ipsec,debug => (size 0x18)
15:43:36 ipsec,debug 00000018 02000000 70656472 6f66622e 7370646e 732e6575
15:43:36 ipsec adding payload: AUTH
15:43:36 ipsec,debug => (size 0x28)
15:43:36 ipsec,debug 00000028 02000000 0d5903a7 455633b1 6368e02a 447fab19 e2ce3dd7 03f4097f
15:43:36 ipsec,debug 666b893a d07b51ca
15:43:36 ipsec adding notify: INITIAL_CONTACT
15:43:36 ipsec,debug => (size 0x8)
15:43:36 ipsec,debug 00000008 00004000
15:43:36 ipsec preparing internal IPv4 address
15:43:36 ipsec preparing internal IPv4 netmask
15:43:36 ipsec preparing internal IPv6 subnet
15:43:36 ipsec preparing internal IPv4 DNS
15:43:36 ipsec adding payload: CONFIG
15:43:36 ipsec,debug => (size 0x2c)
15:43:36 ipsec,debug 0000002c 02000000 00010004 c0a809fe 00020004 ffffffff 000d0008 00000000
15:43:36 ipsec,debug 00000000 00030004 c0a80901
15:43:36 ipsec initiator selector: 192.168.9.254
15:43:36 ipsec adding payload: TS_I
15:43:36 ipsec,debug => (size 0x18)
15:43:36 ipsec,debug 00000018 01000000 07000010 0000ffff c0a809fe c0a809fe
15:43:36 ipsec responder selector: 0.0.0.0/0
15:43:36 ipsec adding payload: TS_R
15:43:36 ipsec,debug => (size 0x18)
15:43:36 ipsec,debug 00000018 01000000 07000010 0000ffff 00000000 ffffffff
15:43:36 ipsec adding payload: SA
15:43:36 ipsec,debug => (size 0x2c)
15:43:36 ipsec,debug 0000002c 00000028 01030403 079f8ec2 0300000c 0100000c 800e0100 03000008
15:43:36 ipsec,debug 0300000c 00000008 05000000
15:43:36 ipsec <- ike2 reply, exchange: AUTH:5 89.1.175.13[61156] 83537d7b19796f4b:d2793fca2b643b58
15:43:36 ipsec,debug ===== sending 1360 bytes from 192.168.178.3[4500] to 89.1.175.13[61156]
15:43:36 ipsec,debug 1 times of 1364 bytes message will be sent to 89.1.175.13[61156]
15:43:36 ipsec,debug => child keymat (size 0x80)
15:43:36 ipsec,debug bd44af42 53740c4b 0615b4f1 82a1516b 19db63ee a8f18c68 8a9c45be 3a3c4e56
....
15:43:36 ipsec IPsec-SA established: 89.1.175.13[61156]->192.168.178.3[4500] spi=0x79f8ec2
15:43:36 ipsec IPsec-SA established: 192.168.178.3[4500]->89.1.175.13[61156] spi=0xe631bbce
15:43:36 ipsec,debug recv DHCP inform from 192.168.9.254
15:43:36 ipsec,debug sending DHCP reply
15:43:36 ipsec,debug 1 times of 300 bytes message will be sent to 192.168.9.254[68]
15:43:36 ipsec,debug KA: 192.168.178.3[4500]->89.1.175.13[61156]
15:43:36 ipsec,debug 1 times of 1 bytes message will be sent to 89.1.175.13[61156]
....
16:30:59 ipsec -> ike2 request, exchange: SA_INIT:0 89.1.175.13[61157] e832f37d5a1a84a9:0000000000000000
16:30:59 ipsec ike2 respond
16:30:59 ipsec payload seen: SA (48 bytes)
16:30:59 ipsec payload seen: KE (136 bytes)
16:30:59 ipsec payload seen: NONCE (52 bytes)
16:30:59 ipsec payload seen: NOTIFY (8 bytes)
16:30:59 ipsec payload seen: NOTIFY (28 bytes)
16:30:59 ipsec payload seen: NOTIFY (28 bytes)
16:30:59 ipsec payload seen: VID (24 bytes)
16:30:59 ipsec,debug 1e2b516905991c7d7c96fcbfb587e46100000009
16:30:59 ipsec payload seen: VID (20 bytes)
16:30:59 ipsec,debug fb1de3cdf341b7ea16b7e5be0855f120
16:30:59 ipsec payload seen: VID (20 bytes)
16:30:59 ipsec,debug 26244d38eddb61b3172a36e3d0cfb819
16:30:59 ipsec payload seen: VID (24 bytes)
16:30:59 ipsec,debug 01528bbbc00696121849ab9a1c5b2a5100000002
16:30:59 ipsec processing payload: NONCE
16:30:59 ipsec processing payload: SA
16:30:59 ipsec IKE Protocol: IKE
16:30:59 ipsec proposal #1
16:30:59 ipsec enc: aes256-cbc
16:30:59 ipsec prf: hmac-sha256
16:30:59 ipsec auth: sha256
16:30:59 ipsec dh: modp1024
16:30:59 ipsec matched proposal:
16:30:59 ipsec proposal #1
16:30:59 ipsec enc: aes256-cbc
16:30:59 ipsec prf: hmac-sha256
16:30:59 ipsec auth: sha256
16:30:59 ipsec dh: modp1024
16:30:59 ipsec processing payload: KE
16:30:59 ipsec,debug => shared secret (size 0x80)
16:30:59 ipsec,debug 620660f4 d5b45fcf e620ce7d acdec84b 226e7127 e31385fa 0bff5a6b b499cab7
....
16:30:59 ipsec adding payload: SA
16:30:59 ipsec,debug => (size 0x30)
16:30:59 ipsec,debug 00000030 0000002c 01010004 0300000c 0100000c 800e0100 03000008 02000005
16:30:59 ipsec,debug 03000008 0300000c 00000008 04000002
16:30:59 ipsec adding payload: KE
16:30:59 ipsec,debug => (size 0x88)
16:30:59 ipsec,debug 00000088 00020000 b2cb043c 78648ad8 cb3b5408 13992ea0 a4303b53 e6b3090a
....
16:30:59 ipsec,debug 4d9d4b70 a6f8f7dc
16:30:59 ipsec adding payload: NONCE
16:30:59 ipsec,debug => (size 0x1c)
16:30:59 ipsec,debug 0000001c fe55002c 02c86d21 49b3d595 0e8e0c9c aef9f35e 79808ca3
16:30:59 ipsec adding notify: NAT_DETECTION_SOURCE_IP
16:30:59 ipsec,debug => (size 0x1c)
16:30:59 ipsec,debug 0000001c 00004004 7baeb0ca 3e017b0e 1a076a25 52f96443 8189c9e8
16:30:59 ipsec adding notify: NAT_DETECTION_DESTINATION_IP
16:30:59 ipsec,debug => (size 0x1c)
16:30:59 ipsec,debug 0000001c 00004005 7639864c 3fc2990f d6450142 62b314d8 bac1aaa4
16:30:59 ipsec adding notify: IKEV2_FRAGMENTATION_SUPPORTED
16:30:59 ipsec,debug => (size 0x8)
16:30:59 ipsec,debug 00000008 0000402e
16:30:59 ipsec adding payload: CERTREQ
16:30:59 ipsec,debug => (size 0x5)
16:30:59 ipsec,debug 00000005 04
16:30:59 ipsec <- ike2 reply, exchange: SA_INIT:0 89.1.175.13[61157] e832f37d5a1a84a9:a8d753933f764b81
16:30:59 ipsec,debug ===== sending 309 bytes from 192.168.178.3[500] to 89.1.175.13[61157]
16:30:59 ipsec,debug 1 times of 309 bytes message will be sent to 89.1.175.13[61157]
16:30:59 ipsec,debug => skeyseed (size 0x20)
16:30:59 ipsec,debug 77829c02 abc9f543 7d5f6aab 9883de37 c3e1d14b fa487175 e6e8235c bd6bee92
16:30:59 ipsec,debug => keymat (size 0x20)
16:30:59 ipsec,debug 9d7d8d28 70f1e50b 4289e28c 9aebf425 2f1a2619 892ac0d9 93990cd9 429230d1
16:30:59 ipsec,debug => SK_ai (size 0x20)
16:30:59 ipsec,debug cee1ca6d cffa6e61 5bb682dd 6c51ba2a c571ba28 0a289619 a224e847 57dac787
16:30:59 ipsec,debug => SK_ar (size 0x20)
16:30:59 ipsec,debug 818001bb 402fb660 811d04f5 cc7fcf09 4afc6483 e56b8d6d 5f9bd748 fadeb21c
16:30:59 ipsec,debug => SK_ei (size 0x20)
16:30:59 ipsec,debug d186c701 74f05689 56ad7798 fac87f4b 1ce7f1ce d54fed03 8e1c98db 5ecb3d7e
16:30:59 ipsec,debug => SK_er (size 0x20)
16:30:59 ipsec,debug d0b8fa6c 6fc67c05 6b5b527c b2b771db ce5070bd f4c9cfda c335eccd 949e8fd3
16:30:59 ipsec,debug => SK_pi (size 0x20)
16:30:59 ipsec,debug 1e7e50e3 4d3a9b61 3b59b309 8d7ef298 8ef77013 f602438f 2f1a90f8 2c43a546
16:30:59 ipsec,debug => SK_pr (size 0x20)
16:30:59 ipsec,debug da50cd40 90c98787 c3aee0f4 7b615b90 091a3f8c b7b81ba3 ae4de9bc 7c89d0c5
16:30:59 ipsec,info new ike2 SA (R): peer-ikev2 192.168.178.3[500]-89.1.175.13[61157] spi:a8d753933f764b81:e832f37d5a1a84a9
16:30:59 ipsec processing payloads: VID
16:30:59 ipsec peer is MS Windows (ISAKMPOAKLEY 9)
16:30:59 ipsec processing payloads: NOTIFY
16:30:59 ipsec notify: IKEV2_FRAGMENTATION_SUPPORTED
16:30:59 ipsec notify: NAT_DETECTION_SOURCE_IP
16:30:59 ipsec notify: NAT_DETECTION_DESTINATION_IP
16:30:59 ipsec (NAT-T) REMOTE LOCAL
16:30:59 ipsec KA list add: 192.168.178.3[4500]->89.1.175.13[61157]
16:30:59 ipsec fragmentation negotiated
16:30:59 ipsec,debug ===== received 580 bytes from 89.1.175.13[61158] to 192.168.178.3[4500]
16:30:59 ipsec -> ike2 request, exchange: AUTH:1 89.1.175.13[61158] e832f37d5a1a84a9:a8d753933f764b81
16:30:59 ipsec peer ports changed: 61157 -> 61158
16:30:59 ipsec KA remove: 192.168.178.3[4500]->89.1.175.13[61157]
16:30:59 ipsec,debug KA tree dump: 192.168.178.3[4500]->89.1.175.13[61157] (in_use=1)
16:30:59 ipsec,debug KA removing this one...
16:30:59 ipsec KA list add: 192.168.178.3[4500]->89.1.175.13[61158]
16:30:59 ipsec payload seen: SKF (552 bytes)
16:30:59 ipsec processing payload: ENC (not found)
16:30:59 ipsec processing payload: SKF
16:30:59 ipsec => invalid payload (first 0x100 of 0x228)
16:30:59 ipsec 23000228 00010015 97fbc6d8 10f936cb 6ec07f5e 9dbd06ce 45294b31 5c92c706
....
16:30:59 ipsec reply notify: INVALID_SYNTAX
16:30:59 ipsec adding notify: INVALID_SYNTAX
....
I had the same problem, after netinstall I could run 7.14My R11e-LTE-US keeps on boot loop. I Can't upgrade to this version.
This version creates a weird loopback interface that keeps running but LTE2 never boots up.
Downgrading to 7.13.5 problem solved.
LTE firmware is up to date on both LTE interfaces and RouterBOARD firmware keeps on 7.13.5 on all devices.
Tested on LtAP. I also have an RBM33G to do the tests.
Regards.
What I mean is: identify different peers that are all on dynamic addresses (so remote IP has to be 0.0.0.0/0).RouterOS decides which peer configuration to use based on the initiator IP (and its own interface IP) from top to bottom.You can only indentify different peers before starting parameter negotiation when using exchange mode "agressive" instead of the default "main". That will again be a problem when you want to abide by the rules of several different client OSes.
The associated P1 configuration(profile) has to match the initiator's proposal.
In this scenario, the P1 configuration is the result of the selection process and not an input parameter.
Me tooWhat I mean is: identify different peers that are all on dynamic addresses (so remote IP has to be 0.0.0.0/0).
That's the point....have to work with the same profile, which may be unacceptable for one of them.
Agreed, but having more options and in (infrequent) case of trouble omitting them its better than not having them....and also because some OSes simply fail when there are modes in the profile that the do not know about
I'm in doubt (however PFS is phase 2.. but we are talking about phase 1):...because e.g. PFS group can have only one value
09:31:14 ipsec,error radius timeout
[user@router] /user-manager> export
# 2024-03-25 09:33:23 by RouterOS 7.14.1
# software id = FFFF-EEEE
#
# model = RB750Gr3
# serial number = UWUWUWWE
#error exporting "/user-manager/attribute"
#error exporting "/user-manager/limitation"
#error exporting "/user-manager/profile"
#error exporting "/user-manager/user"
#error exporting "/user-manager/user/group"
#error exporting "/user-manager"
#error exporting "/user-manager/advanced"
#error exporting "/user-manager/profile-limitation"
#error exporting "/user-manager/router"
#error exporting "/user-manager/user-profile"
[user@router] /user-manager> /sys package/print
Columns: NAME, VERSION, BUILD-TIME, SIZE
# NAME VERSION BUILD-TIME SIZE
0 routeros 7.14.1 2024-03-08 12:50:23 9.3MiB
1 user-manager 7.14.1 2024-03-08 12:50:23 372.1KiB
2 wireless 7.14.1 2024-03-08 12:50:23 1572.1KiB
[user@router] /user-manager> /disk/print
Flags: B - BLOCK-DEVICE; M - MOUNTED; p - PARTITION
Columns: SLOT, MODEL, SERIAL, INTERFACE, SIZE, FREE, FS
# SLOT MODEL SERIAL INTERFACE SIZE FREE FS
0 B usb1 Kingston DataTraveler 2.0 00241D8CE51B1F90993F3CEC USB 2.00 480Mbps 7 757 398 016
1 BMp usb1-part1 @512-7'757'398'016 7 757 397 504 7 635 136 512 fat32
[admin@ccr2116] /ip/dns> export
# 2024-03-25 17:50:06 by RouterOS 7.14.1
# software id = 7WRZ-DFWZ
#
# model = CCR2116-12G-4S+
# serial number = XXXXXXXXXXX
#error exporting "/ip/dns" (timeout)
#error exporting "/ip/dns/static" (timeout)
I can't seem to find this on the documentation. How does it work? How do we configure it? How are the values mapped or parsed internally?What's new in 7.14.2 (2024-Mar-27 09:48):
*) wifi-qcom - added configuration.distance setting to enable operation over multi-kilometer distances (CLI only);
Your wish...I can't seem to find this on the documentation. How does it work? How do we configure it? How are the values mapped or parsed internally?
https://help.mikrotik.com/docs/display/ ... propertiesMaximum link distance in kilometers, needs to be set for long-range outdoor links. The value should reflect the distance to the AP or station that is furthest from the device. Unconfigured value allows usage of 3KM links.
So if I set "10" value, does this mean 10KM?Your wish...
https://help.mikrotik.com/docs/display/ ... propertiesMaximum link distance in kilometers, needs to be set for long-range outdoor links. The value should reflect the distance to the AP or station that is furthest from the device. Unconfigured value allows usage of 3KM links.
Well, in the case of distance= it already a proxy for time. 10km equates to some timing intervals at the end of the day.But would then it be speed of light in vacuum or in some thick air with large refractive index?
As a Chateau LTE 12 owner, I cannot even get past v7.14, let alone, v7.14.1 or further, as no storage, so how is that going to work.What's new in 7.14.2 (2024-Mar-27 09:48):
*) lte - fixed firmware upgrade not found issue for Chateau LTE12 (introduced in v7.14.1);
That is a different problem... it has been mentioned often enough already.As a Chateau LTE 12 owner, I cannot even get past v7.14, let alone, v7.14.1 or further, as no storage, so how is that going to work.
I shall do a happy dance when doing a downgrade to reclaim 200Kb free space! 😂You can netinstall 7.14.2 your device with "keep configuration". Should give you plenty of 200kb free space again. 😂😂😂😂
Do yourself a favor and downgrade to 7.13.5 when already netinstalling. Last stable version with reasonable free space (around 600kb) for a Chateau LTE12.
Third times the charm? Or is it? :|What's new in 7.14.2 (2024-Mar-27 09:48):
*) defconf - do not override default DHCP server lease time;
*) defconf - fixed 5ghz-ax channel width for L11, L22 devices;
*) ethernet - fixed interface disable for CRS326-4C+20G+2Q;
*) ethernet - improved port speed downshift functionality for CRS326-4C+20G+2Q;
*) leds - fixed LEDs for L22 device;
*) lte - fixed firmware upgrade not found issue for Chateau LTE12 (introduced in v7.14.1);
*) ssh - require "policy" user policy when adding public key;
*) timezone - updated timezone information from "tzdata2024a" release;
*) traffic-flow - improved system stability;
*) vrf - fixed VRF interfaces being moved to main table after reboot (introduced in v7.14);
*) wifi-qcom - added configuration.distance setting to enable operation over multi-kilometer distances (CLI only);
+1Still the same with v7.14.1...After upgrading to v7.14 I lost connectivity between OpenVPN server and clients in Ethernet mode. The connection is established normally and automatic routes are created, but still peers are inaccessible.
Anyone experiencing similar behaviour?
Edit: It's the same with v7.15beta4. Reverting back to v.7.13.5 solves the issue for me.
Edit:
OK, switching the STP of the bridge from RSTP to none makes the peers reachable...
/interface/bridge/port monitor [find]
What kind of issue?Installation went well without issues, but an issue that seems related to DFS probing on AX devices which has been present since 7.14 still persists. So I keep 5 GHz WiFi turned off on those devices that keep locking up. :-/
setting configuration.distance=1 will improve anything for indoor devices?Maximum link distance in kilometers, needs to be set for long-range outdoor links. The value should reflect the distance to the AP or station that is furthest from the device. Unconfigured value allows usage of 3KM links.
Nope. Still broken VRFs for IP services. @Edpa did you test this release with the previously mentioned issues on IP services not working in VRF anymore?Third times the charm? Or is it? :|What's new in 7.14.2 (2024-Mar-27 09:48):
*) defconf - do not override default DHCP server lease time;
*) defconf - fixed 5ghz-ax channel width for L11, L22 devices;
*) ethernet - fixed interface disable for CRS326-4C+20G+2Q;
*) ethernet - improved port speed downshift functionality for CRS326-4C+20G+2Q;
*) leds - fixed LEDs for L22 device;
*) lte - fixed firmware upgrade not found issue for Chateau LTE12 (introduced in v7.14.1);
*) ssh - require "policy" user policy when adding public key;
*) timezone - updated timezone information from "tzdata2024a" release;
*) traffic-flow - improved system stability;
*) vrf - fixed VRF interfaces being moved to main table after reboot (introduced in v7.14);
*) wifi-qcom - added configuration.distance setting to enable operation over multi-kilometer distances (CLI only);
Already seeing VRF devices come back that have had our management VRF down since 7.14.
[jmoore@arch-homerville-pop-487-holly-oob-r1] > /tool/sniffer/quick interface=ether15 port=22
Columns: INTERFACE, TIME, NUM, DIR, SRC-MAC, DST-MAC, SRC-ADDRESS, DST-ADDRESS, PROTOCOL, SIZE, CPU
INTERFACE TIME NUM DIR SRC-MAC DST-MAC SRC-ADDRESS DST-ADDRESS PROTOCOL SIZE CPU
ether15 3.8 1 <- 00:0C:29:29:D7:66 DC:2C:6E:8A:96:E5 172.16.30.254:35375 172.16.30.199:22 (ssh) ip:tcp 66 1
ether15 4.791 2 <- 00:0C:29:29:D7:66 DC:2C:6E:8A:96:E5 172.16.30.254:35375 172.16.30.199:22 (ssh) ip:tcp 66 1
ether15 6.799 3 <- 00:0C:29:29:D7:66 DC:2C:6E:8A:96:E5 172.16.30.254:35375 172.16.30.199:22 (ssh) ip:tcp 66 1
[jmoore@arch-homerville-pop-487-holly-oob-r1] > /ip/service/print
Flags: X - DISABLED, I - INVALID
Columns: NAME, PORT, CERTIFICATE, VRF
# NAME PORT CERTIFICATE VRF
0 X telnet 23 management
1 X ftp 21
2 www 80 management
3 ssh 22 management
4 X www-ssl 443 none main
5 X api 8728 main
6 X winbox 8291 main
7 X api-ssl 8729 none main
[jmoore@arch-homerville-pop-487-holly-oob-r1] > /ip/vrf/print
Flags: X - disabled; * - builtin
0 name="management" interfaces=ether15,wireguard1
1 * name="main" interfaces=all
[jmoore@arch-homerville-pop-487-holly-oob-r1] > /ip/firewall/filter/print
Flags: X - disabled, I - invalid; D - dynamic
0 ;;; Allow VPN
chain=input action=accept in-interface=wireguard1 log=no log-prefix=""
1 ;;; Allow VPN
chain=forward action=accept in-interface=wireguard1 log=no log-prefix=""
2 ;;; Allow BGP
chain=input action=accept protocol=tcp dst-port=179 log=no log-prefix=""
3 ;;; Allow Established/Related
chain=input action=accept connection-state=established,related,untracked log=no log-prefix=""
4 ;;; Allow Wireguard
chain=input action=accept protocol=udp in-interface-list=WAN dst-port=13231
5 ;;; Allow ICMP to WANs
chain=input action=accept protocol=icmp log=no log-prefix=""
6 ;;; Allow to management
chain=input action=accept in-interface=ether15 log=no log-prefix=""
7 chain=input action=drop
[jmoore@arch-homerville-pop-487-holly-oob-r1] > /system/routerboard/print
routerboard: yes
model: CCR2004-16G-2S+
serial-number: HBJ07H8VK5V
firmware-type: al64
factory-firmware: 7.0.4
current-firmware: 7.14.2
upgrade-firmware: 7.14.2
[jmoore@arch-homerville-pop-487-holly-oob-r1] >
/ip/firewall/filter/add in-interface=management action=accept place-before=1
/ip/firewall/filter/add action=accept chain=input comment="Allow to management" in-interface=ether15
This confirms the same behavior I am seeing in my previous posts.
#notfixed - it's getting ridiculous..
Confirmed. I've spent a few hours to overhaul firewall configuration for the new VRF concept in 7.14.1 where you cannot filter separate interfaces in a VRF and then noticed that at least EoIP tunnel interface routes are not getting into an assigned VRF after reboot. You can recreate the interface and it will work until you reboot again.
If you have firewall rules on INPUT or FORWARD for any interface that are assigned to some non-main VRF you might consider to redesign it. Also if you have any EoIP interfaces in VRF just don't upgrade yet because it is almost certainly going to break.
After reviewing your post and double checked my issues with the VRF firewall rules and I'm seeing exactly the same thing. All of the existing configs/VRF's I have are broken because of this change in the firewall rule config.UGH. Just to follow up from my previous post. It seems the firewall filtering logic with VRFs has also changed. I can now get IP services to respond on my broken router if I add:
Where "management" is the automatically generated VRF interface for my VRF named "management". This worked before with the following rule:Code: Select all/ip/firewall/filter/add in-interface=management action=accept place-before=1
Where "ether15" is a layer 3 interface added to the VRF "management". This needs to be fixed ASAP as backward compatibility with firewall rules for VRF interfaces is now broken.Code: Select all/ip/firewall/filter/add action=accept chain=input comment="Allow to management" in-interface=ether15
> sys package update check-for-updates
channel: stable
installed-version: 7.14.2
latest-version: 7.14.1
status: New version is available
host upgrade.mikrotik.com
upgrade.mikrotik.com is an alias for global-balancer-e.mikrotik.com.
global-balancer-e.mikrotik.com has address 159.148.147.251
global-balancer-e.mikrotik.com has IPv6 address 2a02:610:7501:3000::251
whois 159.148.147.251
inetnum: 159.148.147.226 - 159.148.147.255
netname: MIKROTIKLSSIA
abuse-c: AR23365-RIPE
descr: MIKROTIKLS SIA
country: LV
The problem was in DNS: upgrade.mikrotik.com resolved to 159.148.147.204.Check what "upgrade.mikrotik.com" resolves to. E.g. here:
forward: in:bridge out:up-etisalat, connection-state:invalid src-mac 30:9c:23:28:5e:0d, proto TCP (ACK,RST), 192.168.88.19:52394->52.210.81.44:443, len 40
or
forward: in:bridge out:up-etisalat, connection-state:invalid src-mac 30:9c:23:28:5e:0d, proto TCP (ACK,FIN), 192.168.88.19:52383->52.210.81.44:443, len 40
This has been discussed many times on the forum already. I advise to go back to 7.12.1 (or 7.12.2) using netinstall and remain on that version until MikroTik have sorted out this mess.I had one hAP ac2 brick itself after the upgrade and resetting it didn't bring it back to life. Fortunately I had a hAP ax3 on-hand spare to swap it with. The other hAP ac2 and lower models I'm managing I've had to pause auto-updates on (and just in time.) Bottom-line in my opinion, the ac2 and lower models will never be upgraded again and I'm considering them EOL after 7.13.x.
Hello netinstall my old friend,I shall do a happy dance when doing a downgrade to reclaim 200Kb free space! 😂You can netinstall 7.14.2 your device with "keep configuration". Should give you plenty of 200kb free space again. 😂😂😂😂
Do yourself a favor and downgrade to 7.13.5 when already netinstalling. Last stable version with reasonable free space (around 600kb) for a Chateau LTE12.
I run five cAP ax, two hAP ax3, and one wAP ac, and one of the cAP ax always locks up after some time (a few hours, usually), making a power cycle necessary. This also happens after netinstall with a fresh config, which is the same across all devices. I even swapped two cAP ax, and it seems that the lock-up is somehow related to where the device is located, probably seeing DFS activitiy or something.What kind of issue?
I personally run 6 CAP AX with 7.14.2 without any problems.
Well, among other things I just found and fixed the UDP timeout (which is amazing, Mikrotik changing it for new setups but not changing it for existing installations where the user has not changed the default value - talk about breaking systems) which fixed SOME of the issues (RDP it seems).forward: in:bridge out:up-etisalat, connection-state:invalid src-mac 30:9c:23:28:5e:0d, proto TCP (ACK,RST), 192.168.88.19:52394->52.210.81.44:443, len 40
or
forward: in:bridge out:up-etisalat, connection-state:invalid src-mac 30:9c:23:28:5e:0d, proto TCP (ACK,FIN), 192.168.88.19:52383->52.210.81.44:443, len 40
These two should be benign ... both indicate dropping of packets, belonging to connections which were in dying stage anyway (RST flag means that sending party is breaking the connection, FIN flag means that sending party is acknowledging that the connection is finishing).
So there must be something else going on ...
/system/history/print
[admin@kk-ap1] /interface/wifi> print detail
Flags: M - master; D - dynamic; B - bound; X - disabled, I - inactive, R - running
0 M B default-name="wifi2" name="ap1-kk2g_kk" l2mtu=1560 mac-address=48:A9:8A:BA:1F:8A arp-timeout=auto radio-mac=48:A9:8A:BA:1F:9D configuration=kk-2g
configuration.mode=ap
security=kk datapath=dp-vl3 channel=2gax steering=kk-steer
1 BR name="ap1-kk2g_kk-guest" l2mtu=1560 mac-address=4A:A9:8A:BA:1F:8B arp-timeout=auto master-interface=ap1-kk2g_kk configuration=kk-guest-2g
configuration.mode=ap
security=kk-guest datapath=dp-vl5 steering=kk-steer
2 M B default-name="wifi1" name="ap1-kk5g_kk" l2mtu=1560 mac-address=48:A9:8A:BA:1F:8C arp-timeout=auto radio-mac=48:A9:8A:BA:1F:9C configuration=kk-5g
configuration.mode=ap .tx-power=30
security=kk datapath=dp-vl3 channel=5gax steering=kk-steer
3 BR name="ap1-kk5g_kk-guest" l2mtu=1560 mac-address=48:A9:8A:BA:1F:8D arp-timeout=auto master-interface=ap1-kk5g_kk configuration=kk-guest-5g
configuration.mode=ap
security=kk-guest datapath=dp-vl5 channel=5gax
channel.band=(unknown) .width=(unknown)
steering=kk-steer
/interface wifi channel
add band=5ghz-ax disabled=no name=5gax width=20/40/80mhz
add band=2ghz-ax disabled=no name=2gax width=20mhz
/interface wifi security
add authentication-types=wpa2-psk,wpa3-psk disabled=no encryption=ccmp,gcmp,ccmp-256,gcmp-256 ft=yes name=kk-guest wps=disable
add authentication-types=wpa2-psk,wpa3-psk disabled=no encryption=ccmp,gcmp,ccmp-256,gcmp-256 ft=yes name=kk wps=disable
/interface wifi steering
add disabled=no name=kk-steer neighbor-group=dynamic-kk-6a8706d1 rrm=yes wnm=yes
add disabled=no name=kk-guest-steer neighbor-group=dynamic-kk-guest-f69bd7d7 rrm=yes wnm=yes
/interface wifi
set [ find default-name=wifi2 ] channel=2gax configuration=kk-2g configuration.mode=ap datapath=dp-vl3 disabled=no mac-address=48:A9:8A:BA:1F:8A name=ap1-kk2g_kk security=kk \
steering=kk-steer
add configuration=kk-guest-2g configuration.mode=ap datapath=dp-vl5 disabled=no mac-address=4A:A9:8A:BA:1F:8B master-interface=ap1-kk2g_kk name=ap1-kk2g_kk-guest security=kk-guest \
steering=kk-steer
set [ find default-name=wifi1 ] channel=5gax configuration=kk-5g configuration.mode=ap datapath=dp-vl3 disabled=no mac-address=48:A9:8A:BA:1F:8C name=ap1-kk5g_kk security=kk \
steering=kk-steer
add channel=5gax channel.band="(unknown)" .width="(unknown)" configuration=kk-guest-5g configuration.mode=ap datapath=dp-vl5 disabled=no mac-address=48:A9:8A:BA:1F:8D \
master-interface=ap1-kk5g_kk name=ap1-kk5g_kk-guest security=kk-guest steering=kk-steer
/interface wifi configuration
add channel=5gax country=Hungary datapath=dp-vl3 disabled=no mode=ap multicast-enhance=enabled name=kk-5g security=kk ssid=kk tx-power=30
add channel=2gax country=Hungary datapath=dp-vl3 disabled=no mode=ap multicast-enhance=enabled name=kk-2g security=kk ssid=kk tx-power=20
add channel=2gax country=Hungary datapath=dp-vl5 disabled=no mode=ap multicast-enhance=enabled name=kk-guest-2g security=kk-guest ssid=kk-guest steering=kk-guest-steer tx-power=20
add channel=5gax country=Hungary datapath=dp-vl5 disabled=no mode=ap multicast-enhance=enabled name=kk-guest-5g security=kk-guest ssid=kk-guest steering=kk-guest-steer tx-power=30
/interface wifi datapath
add bridge=br0 disabled=no name=dp-vl3 vlan-id=3
add bridge=br0 disabled=no name=dp-vl6 vlan-id=6
add bridge=br0 disabled=no name=dp-vl5 vlan-id=5
It might ... because ROS might be caching writes to flash. AFAIK that's not what linux kernel usually does though.Could the "memory leak" be due to 0 disk space available?
Mikrotik has "general rule" about not touching existing configs, except during major upgrades where a config update is necessary. Usually, changing connection tracking settings falls under that "not a major upgrade" category.Well, among other things I just found and fixed the UDP timeout (which is amazing, Mikrotik changing it for new setups but not changing it for existing installations where the user has not changed the default value - talk about breaking systems) which fixed SOME of the issues (RDP it seems).
Now I just read about some MTU trickery broken that "we are not going to fix because we plan to fix it in 7.15" which may well be it.
Given those I am really out of ideas. This is a setup that has been working flawlessly the last years, now I get significant issues down to PING not working over this one router to all machines (which change randomly after hours).
Except they did just this with VRFs and firewall rules. Existing firewall configs are now broken that reference L3 input interfaces attached to a VRF.Mikrotik has "general rule" about not touching existing configs, except during major upgrades where a config update is necessary. Usually, changing connection tracking settings falls under that "not a major upgrade" category.Well, among other things I just found and fixed the UDP timeout (which is amazing, Mikrotik changing it for new setups but not changing it for existing installations where the user has not changed the default value - talk about breaking systems) which fixed SOME of the issues (RDP it seems).
Now I just read about some MTU trickery broken that "we are not going to fix because we plan to fix it in 7.15" which may well be it.
Given those I am really out of ideas. This is a setup that has been working flawlessly the last years, now I get significant issues down to PING not working over this one router to all machines (which change randomly after hours).
The default NAT UDP timeout has been 10s for a very long time--years, if not decades. That's for "unacknowledged" connections (i.e. client doesn't respond using the same IP:PORT combination; UDP streams have a 3 minute timeout). Bumping it to 30s keeps the NAT entry in the router a little longer, most likely to accommodate high-latency, low-bandwidth/congested situations.
The MTU situation isn't new to RouterOS 7...it's been there as long as I can remember. Specifically it's a problem where VLAN MTU's that differ from the VLAN's parent bridge MTU are reset to either the bridge MTU or 1500 just after boot-up. (In my case it's always 1500, down from 2024 or 4000 or 9000, whatever my radio links are capable of.). More often than not, I see it on my switch-chip devices (CRS300's, CCR2116); I don't recall it as much on my RB4011's and RB5009's as much.
I have an RB5009 where I've started noticing it randomly stop talking to devices on one of the ports. It takes a reboot to fix it. No amount of port-bouncing or bridge tinkering works. I suspect it's seeing occasional route loops or some other packet it doesn't like and it silently shuts down the port. It usually happens if I've been messing physically with a device directly connected or downstream of the failing port. Noticed it on 7.11.2, still happens (very rarely) on 7.13.5.
Are you sure your (R/M)STP works properly? Maybe you should check bridge port status for this port and check which bridge is indicated as root bridge. If root bridge is not detected properly there might be a need to tune STP priority for bridges...
I have an RB5009 where I've started noticing it randomly stop talking to devices on one of the ports. It takes a reboot to fix it. No amount of port-bouncing or bridge tinkering works. I suspect it's seeing occasional route loops or some other packet it doesn't like and it silently shuts down the port. It usually happens if I've been messing physically with a device directly connected or downstream of the failing port. Noticed it on 7.11.2, still happens (very rarely) on 7.13.5.
Note the quotes around "general rule." Does the upgrade process actually change the configuration, or just modify previous behavior and require the user to adjust the configuration accordingly? The latter happens much more frequently, unfortunately, without an automatic fix.Except they did just this with VRFs and firewall rules. Existing firewall configs are now broken that reference L3 input interfaces attached to a VRF.
Mikrotik has "general rule" about not touching existing configs, except during major upgrades where a config update is necessary. Usually, changing connection tracking settings falls under that "not a major upgrade" category.
I don't doubt there's something along those lines, but this configuration has worked for four years on an RB4011 and now the 5009. It's on customer-facing ports with VLAN's that don't leave the router. There is undoubtedly some kind of "perfect storm" scenario that causes it to happen, and I wouldn't be surprised if it was STP-based, except it doesn't show up in the router as STP blocking the port when it does happen.Are you sure your (R/M)STP works properly? Maybe you should check bridge port status for this port and check which bridge is indicated as root bridge. If root bridge is not detected properly there might be a need to tune STP priority for bridges...
I have an RB5009 where I've started noticing it randomly stop talking to devices on one of the ports. It takes a reboot to fix it. No amount of port-bouncing or bridge tinkering works. I suspect it's seeing occasional route loops or some other packet it doesn't like and it silently shuts down the port. It usually happens if I've been messing physically with a device directly connected or downstream of the failing port. Noticed it on 7.11.2, still happens (very rarely) on 7.13.5.
Unfortunately, STP is needed on this router due to some uplink redundancy that risks being dumped into the same Layer 2 segment during physical network changes.I am using a 5009 with several ports with VLANs (all on a common VLAN-aware bridge) and I have not yet observed such a problem...
I have set the STP mode to "none", as I always do in places where there is no need for STP.
Sounds like a good reason to open a ticket, then, if you haven't already.I don't see how anyone but Mikrotik devs can really help, it's not a configuration issue...
In our experience 1072 is more suitable as edge router doing BGP and OSPF only and disable connection tracking for maximum performance and we move PPPoE + Queue on a separate 1036/2116 dedicated box, I know this is not the right answer you are looking for I'm just sharing with you the experience we've learned on that 1072 box it's not suitable for PPPoE termination it has 72 weak cores and Queue is heavy hitter in terms of CPU it needs higher core clock. We have seen this behavior even on 1036 for 800 customer it's working fine as soon as you hit 1K mark then CPU goes haywire and packet loss can now be observedWe don't do NAT. Everything is routed, there's one forward chain FW rule to deal with private addresses. Sure there are ~1000 queues, but it is, as you say, a big box! (for our heavier traffic we've moved
reporting: had discover why the old haplite running 7.14.1 has problem with winboxi had a hap-ac2 ran 6.49.8 , A audience ran 6.48.10 as a AP and a spare hap-lite(current 7.14)
i tried the haplite on 7.2, 7.7, 7.13.5(horrible) 7.14 & 7.14.1
surprisingly the hap lite with 7.14 is extremely responsively on the wan connection even faster than my hap-ac2(6.49.8)
*except the admin login winbox failure, everhting else seems fine(inc. wifi)
i'll keep the haplite with 7.14 and ran for a week,
if it is good i may upgrade the main router ac2 to 7.14 and keep the haplite as a spare
I guess you are not using the wifi-qcom-ac driver package.where everyone are concerned the freeHDD space, mine is 924Kb
i'm just using the wireless package, i had no idea, will the qcom-ac preform better?I guess you are not using the wifi-qcom-ac driver package.where everyone are concerned the freeHDD space, mine is 924Kb
SUP-149131 opened on this issue if you want/need a reference.Ended up adding a rule in the VRF to get it to work around whatever is going on with the firewall rules and VRF's. Before I had a rule that went from Guest (VLAN) out to the Wireguard tunnel for a VPN. So it was firewall rule (forward) allow from guest to WG Tunnel. With the VRF changes that doesn't work anymore. I had to add a rule that goes from the VRF (The now exposed interface) to the WG Tunnel and it works. Which is very confusing to me. I left the previous firewall rules in place just disabled but even before disabling no packets would hit them.
Ok, you probably have more experience than I do. I changed the wifi driver on a LHG5 ac that I have here in storage, just to see if it works and how the status is with the space issue (seen 7.15beta9 for good news!).@pe1chl - yes. Im using wifiwave drivers since they appeared in v7
If you are aware of a scenario where inheritance fails for Wifi driver, please let us know, from our standpoint we don't see anything buggy there.What I noticed at the time I replaced the driver is that some things can be configured in profiles and locally, and that the system does not seem to make the distinction all that well. Similar as with BGP Templates and Connections, actually.
I would expect that the higher-level object (Profile, Template) can contain configuration information that the lower level (Interface, Connection) inherits unless locally overridden, but it seems buggy at best. Sometimes values get copied, sometimes values in the object are not inherited.
subprofile can be assigned to main configuration profile, which can be assigned to interface. Subprofile values can be overwritten in main configuration profile, and all values can be overwritten on the interface itself.
For example, when I make a BGP template with local AS 65530, and I make a BGP connection referencing that template, the connection will have AS 65530 with white background. When I remove that using the up-triangle and save it, it will come back.Could you please give us an example?
This exactly same thing happens to me, using webfig. I'm with RoS 7.13.2, but this started far before this version. I just learned to leave with it - but is surely annoying.For example, when I make a BGP template with local AS 65530, and I make a BGP connection referencing that template, the connection will have AS 65530 with white background. When I remove that using the up-triangle and save it, it will come back.
Exactly this happens ! For instance the mentioned WiFi config: Todays devices equipped with radios are shipped with default config, where WiFi radios are turned on and configured with default password from "the sticker". Most devices im managing/most users (me also) prefer to have "one SSID" for both freqs, so ill create ONE security profile and two configuration profiles with different channels. One profile goes to 2.4radio, second profile goes to 5ghz radio, but security profile is ALWAYS the same. Because ill create those profiles, i have to "delete" the factory/default filled datas from "tabs" like SSID (Mikrotik-75395), password, etc... since we all know, they override the settings from profiles. And maybe this is what happens sometimes, that Winbox/RouterOS is using deleted password as "blank-open network", instead of security profile, however i always "delete" those settings by pressing the "small arrow" and neither by removing/backspacing the filled in content. I encountered this couple of times, recently yesterday after configuring Ax3 from scratch (netinstall). Even more strange is, that columns are from factory filled of for both WiFi radios, i managed to delete everything for both but only the "5ghz" radio security profile was "not accepted / owerwritten by blank password", however ill do everything exactly the same "as always". Ill give a try today with 7.13.5, if this will happen alsosubprofile can be assigned to main configuration profile, which can be assigned to interface. Subprofile values can be overwritten in main configuration profile, and all values can be overwritten on the interface itself.
The problem I an see is that often users consider properties set to empty value the same as if they were not set at all. And I guess that "set to empty" can overwrite correctly set value from profile (or subprofile) ...
And this problem is actually inherent to ROS: in most cases, some settings are removed using "unset" command ... but in a few places settings are effectively removed by setting certain property to empty value.
That does not make sense. I'm not sure that's valid advice.Use CLI for configuration - keeps the Netinstall away.👈
When someone disables that graphic... doesn't it get removed from the storage?It's does matter how you enabled stuff like graphing or dhcp leases or whatever-else needs might cleaning up.... There isn't some magic CLI to free these things once created, only netinstall will wipe them.
Well, there is quite some time already that I think 16MB is too little. If someone want to partition, I'd say 64MB would be the minimum acceptable. More is always better, but I think 64MB would do nicely as a bare minimum. This would ensure that even if RoS7.x grows beyond 16MB, one could still be able to partition it with some degree of confidence.In latest beta, Mikrotik does seem have made some progress. So to suggest to the community 16MB flash issues are winbox's fault is just alarmist and premature.
If someone want to partition, I'd say 64MB would be the minimum acceptable.
Only the stats data ... which I guess is a few kB. But graphics library and anything else needed stays installed ... probably most of it is needed for WebFig graphs anyway.When someone disables that graphic... doesn't it get removed from the storage?
Come on! That is just hogwash!Using the CLI avoids the trouble described by dwnldr above my post. That is the point.
CLI is explicit. Winbox is "QuickSet light".
I can't speak for these cases, but I would imagine that using ramdisk would be an easy fix: the code is already in place, no? More flash (I always like more flash) has a cost - and need to be supported by the hardware. Using already installed RAM has zero cost.It might if ROS was changed to use RAM disks more aggressivelly. As it is now, 128MB on audience isn't enough (or it wasn't back in v7.5 times), with 64MB partitions upgrade didn't succeed due to lack of flash space. It's because with audience's 256MB RAM, RAM disk is not used. It seems that flash storage usage isn't optimally used as well (7.13 with wifi-qcom-ac installed uses 28MB flash) and since upgrade packages have to bo downloaded to flash, 64MB seems to be too little.
Hello, EdPa!Hi, konradnh and 3dfx.
.....
Thank you.
This has been a discussion for a long time! The use of a RAMdisk as the root of the "Files" is only done for a 16MB flash device.I can't speak for these cases, but I would imagine that using ramdisk would be an easy fix: the code is already in place, no? More flash (I always like more flash) has a cost - and need to be supported by the hardware. Using already installed RAM has zero cost.It might if ROS was changed to use RAM disks more aggressivelly. As it is now, 128MB on audience isn't enough (or it wasn't back in v7.5 times), with 64MB partitions upgrade didn't succeed due to lack of flash space. It's because with audience's 256MB RAM, RAM disk is not used. It seems that flash storage usage isn't optimally used as well (7.13 with wifi-qcom-ac installed uses 28MB flash) and since upgrade packages have to bo downloaded to flash, 64MB seems to be too little.
I've created case number SUP-149434.Sure, send it and share the other details I mentioned in my previous post.
But doesn't help what we were talking about: using RAM to store the upgrade - making it possible to partition ARM devices with new wifi drivers and less than 128 MB of flash. Looks like that the download just doesn't fit when partitioned.ROS 7.7 - see https://help.mikrotik.com/docs/display/ ... AMtofolder
MikroTik could (and should) fix that! When a RAMdisk of sufficient size is available, use that as the temp area for download of the update. Or even any other disk, depending on what the particular device supports (USB, NFS, SMB).But doesn't help what we were talking about: using RAM to store the upgradeROS 7.7 - see https://help.mikrotik.com/docs/display/ ... AMtofolder
You understood correctly, devices with 32MB flash or lower have ramdisk as root "files" path. Such devices will always have flash folder under file/print, other devices don't create ramdisk automatically. Users can make ramdisk if they want using https://help.mikrotik.com/docs/display/ ... AMtofolderI don't understand what you (pe1chl and Paternot) are talking about. On devices with 16MB the update packages are already downloaded to some "internal" tmpfs on volatile memory. And you say, devices with e.g. 128MB flash memory do download the upgrade package to flash instead?
And, still, it doesn't address the problem: we can't use this to upgrade a system - this ramdisk can't be used to store the upgrade package.You understood correctly, devices with 32MB flash or lower have ramdisk as root "files" path. Such devices will always have flash folder under file/print, other devices don't create ramdisk automatically. Users can make ramdisk if they want using https://help.mikrotik.com/docs/display/ ... AMtofolder
We would like to have that as an option on ANY device. So when you have more than 32MB of flash but choose to partition it, you still can use ramdisk for upgrade.You understood correctly, devices with 32MB flash or lower have ramdisk as root "files" path.I don't understand what you (pe1chl and Paternot) are talking about. On devices with 16MB the update packages are already downloaded to some "internal" tmpfs on volatile memory. And you say, devices with e.g. 128MB flash memory do download the upgrade package to flash instead?
UGH. Just to follow up from my previous post. It seems the firewall filtering logic with VRFs has also changed. I can now get IP services to respond on my broken router if I add:
Where "management" is the automatically generated VRF interface for my VRF named "management". This worked before with the following rule:Code: Select all/ip/firewall/filter/add in-interface=management action=accept place-before=1
Where "ether15" is a layer 3 interface added to the VRF "management". This needs to be fixed ASAP as backward compatibility with firewall rules for VRF interfaces is now broken.Code: Select all/ip/firewall/filter/add action=accept chain=input comment="Allow to management" in-interface=ether15
After reviewing your post and double checked my issues with the VRF firewall rules and I'm seeing exactly the same thing. All of the existing configs/VRF's I have are broken because of this change in the firewall rule config.
Hate to be the bearer of bad news but MikroTik now considers this to be "expected behavior". I opened a support request with them on this and attached PDF is our conversation. If you want to continue to use VRFs on the platform then their expectation is that you change your firewall configs.after going for 7.14.2 on CCR2004-1G-12S+2XS winbox connect fails (connects, immediately disconnects), going back to 7.13.5 winbox connect is working again (connect is done using a management vrf)
Other routing engines generally treat "connected routes" and "kernel routes" differently.with the linux loopback interface being now exposed, the loopback address ::1 shows up in /ipv6/address and /ipv6/route
this creates unexpected behavior of OSPF's "redistribute connected" advertising ::1
viewtopic.php?p=1067136#p1067136Well...
Whilst I am happy and grateful to FINALLY have a v7 AMI on AWS... Reading this thread, I'll skip on 7.14
Hello!SUP-149131.pdf
To me sounds feasible to create a first dummy rule to match VRF and then redirect it to a VRF specific chain.Firewall did not match properly vrf traffic in versions priour to v7.14. From 7.14 virtual VRF interface should be used for firewall matching.
I totally agree with you! ..expecially if you are already using mangling/marking for other stuff..To me sounds feasible to create a first dummy rule to match VRF and then redirect it to a VRF specific chain.
With that, you could even have better performance(actually just avoid overpassing unused rules) on devices with several VRFs.
This could be specially useful for multi tenant environments.
Thank you for the explanation. Why wasn't this fundamental change or bug fix considered worthy of an entry in the changelog of 17.14.x?Hello!SUP-149131.pdf
Firewall did not match properly vrf traffic in versions priour to v7.14. From 7.14 virtual VRF interface should be used for firewall matching.
If it is needed to match traffic in specific interface while there are multiple interfaces in same vrf - proper matching can be achieved with mangle rules and setting marks in prerouting.
We added configuration examples to manual:
https://help.mikrotik.com/docs/pages/vi ... infirewall
Unfortunately this fix may influence specific configurations made in previous versions.
We will make warning notifications in ROS to notify users when an interface which is under VRF is set as in/out interface in firewall.
/interface bridge filter
add action=drop chain=forward in-interface=ether1 mac-protocol=vlan packet-type=broadcast vlan-id=98
Yes, you have to add wifi slave interfaces manually on the cap (if you want more than one SSID) and add master and slave wifi interfaces to a bridge. I followed the MikroTik example here: https://help.mikrotik.com/docs/display/ ... %22package:wifi-qcom-ac doesn't support "native" VLAN tagging. So how do you make wifi interface a bridge port?
Lots ??Lots of ext4 USB stick container problems with hAP ax³ and 7.14.2 or 7.15beta9, downgrade to 7.13.5 and everything works:
viewtopic.php?t=206110
After one day of running after downgrading to RouterOS 6 everything is running smoothly. Please have a look as there is something not ok with 7.x that causes those issues on this device.I have Mikrotik rb1100ahx2 which is on 6.49.13. I did an upgrade of RouterOS and the Routerboard to 7.14.2. The upgrade was smooth but I started to notice that my internet was unavailable after an hour. I got something like "lease stopped locally", went to check the router and I could see that no lights were blinking on the WAN port where I have a connection with ISP. After a couple of minutes router was unresponsive and all the lights on the ports were off. I unplugged the PSU cable and plugged it again. It worked for x amount of minutes/hours (random) and the same thing happened again and again. Sometimes it rebooted by itself and there were some kernel messages in the log.
Now I have downgraded back to 6.49.13 and it seems that now everything works as before.
Something is broken in 7.X version of the RouterOS. Any clues?
Best to upgrade again, let it happen and then send autosupout.rif (should be created then) to support describing your environment, what you already did to troubleshoot etc etc.After one day of running after downgrading to RouterOS 6 everything is running smoothly. Please have a look as there is something not ok with 7.x that causes those issues on this device.
Do you agree that "I have a problem with rb1100ahx2" is not describing your configuration/setup and thus give not a single hint to reproduce the issue for MikroTik?After one day of running after downgrading to RouterOS 6 everything is running smoothly. Please have a look as there is something not ok with 7.x that causes those issues on this device.
You are taking words from the context. If you have taken the time and read my first comment you could see that I have given a lot of information. If someone from support would comment on it I would gladly export my configuration or anything else that is necessary to solve it.Do you agree that "I have a problem with rb1100ahx2" is not describing your configuration/setup and thus give not a single hint to reproduce the issue for MikroTik?After one day of running after downgrading to RouterOS 6 everything is running smoothly. Please have a look as there is something not ok with 7.x that causes those issues on this device.
Again: support does not read all info on this place.You are taking words from the context. If you have taken the time and read my first comment you could see that I have given a lot of information. If someone from support would comment on it I would gladly export my configuration or anything else that is necessary to solve it.
Yeah, will do that today. Tnx.Again: support does not read all info on this place.You are taking words from the context. If you have taken the time and read my first comment you could see that I have given a lot of information. If someone from support would comment on it I would gladly export my configuration or anything else that is necessary to solve it.
This is a USER forum. Users like you and me helping out each other.
Sometimes MT staff do participate but not all the time.
If you want to be certain to get in touch with support, create a support ticket with the required info.
And since this is a USER forum the post about 1100ahx2 freezing randomly with ROS 7.14.2 installed can help others with similar issue identify that the problem is more common and not necessarily related to a faulty HW and this is what user forums should be about, no?Again: support does not read all info on this place.You are taking words from the context. If you have taken the time and read my first comment you could see that I have given a lot of information. If someone from support would comment on it I would gladly export my configuration or anything else that is necessary to solve it.
This is a USER forum. Users like you and me helping out each other.
Sometimes MT staff do participate but not all the time.
If you want to be certain to get in touch with support, create a support ticket with the required info.
Please describe your example.Has anyone had any issues with BFD running on VLAN interfaces since 7.14? - I've noticed an issue but I'm yet to further test / troubleshoot.
Sir, if thisYou are taking words from the context. If you have taken the time and read my first comment you could see that I have given a lot of information.
Do you agree that "I have a problem with rb1100ahx2" is not describing your configuration/setup and thus give not a single hint to reproduce the issue for MikroTik?
Yes, I found a serious bug (SUP-145493) in the queues with CAKE. On my router (CCR2004-1G-12S+2XS) the bug led to spontanious reboots during uploads to the internet.*) queue - improved system stability (introduced in v7.6);
Can someone elaborate on this please?, thanks
Is it fix "autorate ingress" issues too?Although the mentioned CAKE issue was caused by this bug, it was not limited to CAKE. However, mostly CAKE/Codel/PCQ/SFQ did let the issue to "appear" more easily. In short - queues handle packets and if the combination of queue configuration and processed traffic did meet some very specific requirements, then the router could get "stuck" or reboot itself.
To sum up - any routers experiencing system stability issues when queues are used should be upgraded.
Yea, especially since it references v7.6*) queue - improved system stability (introduced in v7.6);
Can someone elaborate on this please?, thanks
It seems RouterOS 7.14.3 fixes the problem more-or-less.Still the same with v7.14.1...After upgrading to v7.14 I lost connectivity between OpenVPN server and clients in Ethernet mode. The connection is established normally and automatic routes are created, but still peers are inaccessible.
Anyone experiencing similar behaviour?
Edit: It's the same with v7.15beta4. Reverting back to v.7.13.5 solves the issue for me.
Edit:
OK, switching the STP of the bridge from RSTP to none makes the peers reachable...
For dynamically bridged interfaces (including OpenVPN TAP connections) RouterOS adds them to the bridge with edge=auto parameter. In 7.14.2 it was edge=no. I turned back RSTP on the bridge and realized the connection still works. It also works with legacy STP, but needs about 40-50 seconds to initialize after establishing OpenVPN connection.What's new in 7.14.3 (2024-Apr-17 15:47):
[...]
*) bridge - use default "edge=auto" for dynamically bridged interfaces (PPP, VPLS, WDS);
[...]
it hAP ac2 in screenshot? doubtsaudience netinstall to 7.14.3 /w wifi-qcom-ac
looking to try to make roaming work with hap-ac2
Screenshot 2024-04-20 013840.jpg
it hAP ac2 in screenshot? doubts
Thank you. Will try and investigate further.Cloud backup work perfectly fine on hAP ac3 (7.14.3)
Done 30sec. before this reply on a RB5009 without any problems. ;-)Thank you. Will try and investigate further.Cloud backup work perfectly fine on hAP ac3 (7.14.3)
Have reached out to support as ive tested some other Mikrotik devices I have here and they are all working, its just my RB5009 thats not. It be good if someone else whos upgraded to 7.14.3 which has an RB5009 could also test Cloud Backup as this maybe limited to these units. Thank you.
Thank you for the test. Humph, wonder whats up. Hopefully support can figure. Thanks again for the test.Done 30sec. before this reply on a RB5009 without any problems. ;-)
Thank you. Will try and investigate further.
Have reached out to support as ive tested some other Mikrotik devices I have here and they are all working, its just my RB5009 thats not. It be good if someone else whos upgraded to 7.14.3 which has an RB5009 could also test Cloud Backup as this maybe limited to these units. Thank you.
"Some" is a good indication for either a configuration issue (most probably) or hardware defects.Upgraded to 7.14.3 - still some of my cAP ax tend to crash with 5 GHz enabled. :-(
17 D ;;; upnp 192.168.1.51: tailscale-portmap
chain=dstnat action=dst-nat to-addresses=192.168.1.51 to-ports=17318 protocol=udp dst-address=0.0.0.0
in-interface=*FFFFFFFF dst-port=17318
That's all ruled-out already. It seems to be related to DFS (hence only 5 GHz) and the specific position that they are located in, but definitely not hardware and/or config."Some" is a good indication for either a configuration issue (most probably) or hardware defects.Upgraded to 7.14.3 - still some of my cAP ax tend to crash with 5 GHz enabled. :-(