Community discussions

MikroTik App
 
User avatar
loloski
Member
Member
Topic Author
Posts: 451
Joined: Mon Mar 15, 2021 9:10 pm

Feature Request: Port-Security & Dynamic Arp Inspection

Tue Jul 02, 2024 8:32 am

@MT

Last week we are in the middle of presentation for a potential big customers and we stumble a requirement that caught us off guard, the potential customer want to migrate their ageing cisco catalyst gear to Mikrotik they are almost sold to the extent the purchase order is about to sign but the last question of their CTO hang us dry and put everything on hold, the CTO asking for port-security & DAI equivalent of cisco, we told them the close possible we can get is 802.1x and the guy simply said hold on something isn't right

As a MT consultant i was really ashamed and thought yeah how can we sell this thing if basic feature like this virtually non existent on the product offering

Any thoughts?
 
Apachez
Member Candidate
Member Candidate
Posts: 159
Joined: Mon Jul 01, 2024 11:45 pm

Re: Feature Request: Port-Security & Dynamic Arp Inspection

Tue Jul 02, 2024 10:00 am

Sounds like really nice features to have specially on the switch-series.

Port-security with both dynamic (that resets when disconnecting interface) aswell as sticky (to be included in the config and survive a reboot) along with DAI (Dynamic ARP Inspection) and IP Source Guard are really nice features to have on the access-layer.

Same with DHCP-relay and DHCP-snooping to force the DHCP requests to your choice of DHCP servers while including Option82 information of where the DHCP request originated in your network (switch + interface) and when reply gets back the assigned IP will be used by IP Source Guard to dynamically build an ACL to drop any other source IP's on that interface.

While at it since Mikrotik is different it would be nice with an ACL style per interface similar to how Cisco, Arista and the others works - would make life so much easier when converting equipment from Cisco/Arista/Juniper etc into Mikrotik.
 
User avatar
loloski
Member
Member
Topic Author
Posts: 451
Joined: Mon Mar 15, 2021 9:10 pm

Re: Feature Request: Port-Security & Dynamic Arp Inspection

Tue Jul 02, 2024 8:07 pm

Indeed, this feature is not optional and MT should implement this feature soon most major brand support these
 
bommi
Frequent Visitor
Frequent Visitor
Posts: 52
Joined: Fri Jan 24, 2014 9:13 am
Location: Germany
Contact:

Re: Feature Request: Port-Security & Dynamic Arp Inspection

Sun Jul 07, 2024 11:41 pm

Dynamic ARP Inspection and IP Source Guard are my most missed L2 security features when it comes to Mikrotik.
 
User avatar
loloski
Member
Member
Topic Author
Posts: 451
Joined: Mon Mar 15, 2021 9:10 pm

Re: Feature Request: Port-Security & Dynamic Arp Inspection

Fri Jul 12, 2024 3:48 pm

Yeah, we lost the sales already and I can even look in the eyes of the customer, their CTO are willing to wait if only Mikrotik can/will commit a timeline but that's all a dream now they don't even reply to my support ticket with regards to this issue, sad it's hard to push them in the right direction they don't really know their customer because if they do they are going to prioritize the needs of "ISP" just llike us we need a solid routing and switching platform not a router with a container/media server/rose storage which we can moved on without.

I'm not saying other features beyond routing and switching is not important but the order of priority which features are going to hit in the street doesn't add up
 
User avatar
Seko777
Trainer
Trainer
Posts: 8
Joined: Fri Aug 05, 2022 8:46 pm
Location: Brazil
Contact:

Re: Feature Request: Port-Security & Dynamic Arp Inspection

Fri Jul 12, 2024 4:08 pm

Not a proper solution, but talking about Port Security, you can stick a port to only one mac (the first one seen by this port) if SwOS is used. I don't know why, but this option is not available on RouterOS, even on the last versions.

Inside Switch Chip ACL (now talking about RouterOS) you can also create rules to allow a single mac (or vendors for example, using the first 6 numbers from MAC with mask), but this is a manual setting... not very useful.

As I mentioned before, not a "solution" but some workaround to save this sale.
 
User avatar
loloski
Member
Member
Topic Author
Posts: 451
Joined: Mon Mar 15, 2021 9:10 pm

Re: Feature Request: Port-Security & Dynamic Arp Inspection

Sat Jul 13, 2024 10:30 am

In as much as we want it too it's dead on the water already, DAI was closely tied up in DHCP snooping database and the customer will surely not going to do any manual task on this even though it's possible in Cisco and also as an Integrator you want a proper solution in the long run

I'm just barely scratching the surface here how about the other enterprise features that most people here waiting for years sigh... very frustrating
 
gigabyte091
Forum Guru
Forum Guru
Posts: 1594
Joined: Fri Dec 31, 2021 11:44 am
Location: Croatia

Re: Feature Request: Port-Security & Dynamic Arp Inspection

Sat Jul 13, 2024 1:58 pm

+1 for that... I have a project where I have 4 switches connected with fiber to core switch and 5009.

Every access port needs to be protected and my workaround was by using 802.1x and MAC auth. So it was quite a hassle to add all devices to UM. It would be nice to have normal solution and not some workaround. Also not to mention that i have 45 devices and L5 license allows only 50 active sessions.