No, 0./system/resources/usb/print
Does the device show up there?
Yeah, I love the Mikrotik routers and in general their devices. But when it comes to wireless they only play nice with themselves. And with the latest update they barely do that. I have spun up a few third party APs that do nothing else but wireless because of this. My main Router is a RB5009UG+S+ and for APs I was using RBD52G-5HacD2HnD (AC^2), RDB53iG-5HacD2HnD (AC^3) and 2xC52iG-5HaxD2HaxD (AX^2) bridged wirelessly but those devices kept disconnecting. I have a few AX^2 that I bought when it was released that I have not been able to set up because of this wireless incompatibility, instability and lack of 4-mac modes, besides the misisng usb port that the AC^2 did have.I will also chime in and mention we're also experiencing Wireless stability issues since upgrading CAPS to 7.15.3, up from 6.49.X [legacy??] routerOS....
Clients appears to be constantly connecting/disconnecting. We're going to try downgrading to 7.14.X build to see if alleviates. if not, we're rolling back to 6.49.X release, and use the regular wireless package. We had also installed the wifi-qcom-ac driver package and had fun time manually configuring those CAPS to support SSID/VLANs -- but not also without issues.
What a mess. We're at a point of just dropping MT for another wireless vendor for client access.
Nope, just a few rules, see attached conf. And than why downgrading to 7.14.3 solves the issue?Looks like your device does more as you described.
there is at least an ovpn server configured.
/interface ovpn-server server set auth=sha1,md5
[admmikrotik@router50] > /user/active/print
Columns: WHEN, NAME, ADDRESS, VIA
# WHEN NAME ADDRESS VIA
0 2024-08-20 20:51:13 prometheus 192.168.175.113 (unknown)
1 2024-08-20 20:51:13 prometheus api
2 2024-08-20 20:51:24 admmikrotik 192.168.70.105 winbox
3 2024-08-20 20:53:09 admmikrotik 192.168.70.105 ssh
[admmikrotik@router50] > /user/active/request-logout numbers=0
action failed (6)
Thank you@dang21000:
viewtopic.php?t=207040
What does this change mean?*) bgp - correctly synchronize input.accept-nlri address list;
1. i think NLRI does not apply inmediatly, resend/refresh on BGP session is neeeded to enable/disable NLRI or any changes to itWhat does this change mean?*) bgp - correctly synchronize input.accept-nlri address list;
In the past I have configured an input.accept-nlri on one peer, referring to an address list that has a single /16 entry, and I think at that time it meant that all subnets WITHIN that /16 (so also e.g. a /24 or /28 within that /16) would be accepted.
Now I should admit that I have never fully analyzed that to see if it really worked.
But today I ran into an issue where this peer became important, and I found that this input.accept-nlri does not work correctly!
When the address list with the single /16 item is specified, it accepts a route for the full /16 network, and also for /32 addresses within that network, but NOT for /24 or /28 routes within the /16. These are simply dropped and only appeared after I removed the input.accept-nlri .
Is that related to this "fix" and has that now maybe been broken? Because I think it worked OK before, although I am not sure.
Correct, I submitted the same as a support case and the answer was that they were very surprised that I would assume that a /16 entry in the address list would admit all /24 entries "under" that /16 (while I would think that would be natural for many use cases), and when I replied that it DOES admit the /32 routes under the /16 network, it was said that this is a known bug.1. i think NLRI does not apply inmediatly, resend/refresh on BGP session is neeeded to enable/disable NLRI or any changes to it
2. i have seen that NLRI does not drop /32 in ipv4 and/or /128 on ipv6 i dont know why, in mi case that is not a problem, i filter that routes
*) poe-out - moved "PoE LLDP" property from "/interface/ethernet/poe" to "/ip/neighbor/discovery-settings" and enable it by default;
This kind of changes causes problems when importing older exports into devices with newer version.
Why have you set Cache size to 64MB? It seems that default on my routers is 2MB.The runtime is 20 days, and currently, the DNS cache has grown to 42,375 KiB.
The DNS memory leak in RouterOS 7.15.3 is continuously occurring.
This.Why have you set Cache size to 64MB?The runtime is 20 days, and currently, the DNS cache has grown to 42,375 KiB.
The DNS memory leak in RouterOS 7.15.3 is continuously occurring.
Currently, no adlist functionality is being used, so the issue is not caused by the adlist.Can this be related to "adlist" functionality? I use my own manually managed blacklist which has entries as NXDOMAIN and do not see this problem.
Doing "adlist" vith A entries '0.0.0.0' is probably not the best and most efficient solution after all...
if I don't keep increasing the size of the DNS cache, I get an error message saying "DNS cache full."This.
Why have you set Cache size to 64MB?
It's not a memory leak if service uses up to amount of RAM assigned. In this particular case, even if some DNS cache entries are expired it's not required to actually purge them if feature/service uses less RAM than assigned. Maybe those entries remain in the cache but when they get hit again, DNS service actually goes out to refresh the status ... and updating cache entry might be faster (less resource hungry) than creating a new one (not to mention periodic purging which costs CPU resources as well). Search has to be performed anyway (even if only to discover that wanted entry doesn't exist).
it will show cache full, an error message saying "DNS cache full" appears, which I hadn't encountered before. Moreover, when the cache is full, you'll notice that the DNS dynamic servers are much more likely to crash randomly. I suspect that when the cache is full, it causes certain anomalies that trigger these crashes. As a result, I have to keep increasing the DNS cache size to avoid the series of issues caused by the "DNS cache full" error. These issues did not exist before version 7.15, so with the same usage, I believe that version 7.15.3 has a memory leak in the DNS cache.Why have you set Cache size to 64MB? It seems that default on my routers is 2MB.The runtime is 20 days, and currently, the DNS cache has grown to 42,375 KiB.
The DNS memory leak in RouterOS 7.15.3 is continuously occurring.
Will not not the router use up to 64MB if its set to 64MB? (If you have a lot of requests)
It may have something to do with you config. You can post it here.it will show cache full, an error message saying "DNS cache full" appears, which I hadn't encountered before...
Since upgrading to 7.14.3 (from either 7.12 or 6.49) we've noticed some of our CCR1036/1072 rebooting due to kernel failure. From initial analysis this seems to coincide with IGP/LDP instability on the network casued by mmwave radio backhauls flapping.I've submitted a ticket, but wanted to post here just in case someone else has seen a similar problem.
I have five CCR2116's in a full iBGP mesh. Three are peers with other providers, two sit in our core. We take full routes, but filter out AS-PATH's longer than 2 ASN's.
For a couple of years this has worked fine. But in the last number of weeks, one or more of them has rebooted randomly. Today, four of the five all suffered a kernel failure at the same exact time, created no support files, and rebooted at the same time due to watchdog timeout. The three borders did the same thing a few weeks ago; unfortunately, two had watchdog disabled and required truck rolls to reboot them. It appears I upgraded them all 25 days ago to 7.15.3, so I'm restarting them into their 7.14.x partitions. (Not sure if the first reboot happened under 7.14... prior to that they were running 7.12.)
Because of the simultaneous reboot, and since they're all speaking BGP in the same ASN, I suspect an errant BGP message is the cause.
I have a number of CRS300's also running 7.15.3, and they're randomly rebooting every few days due to kernel failures as well, but those ones are likely the memory leak introduced in 7.15 (reportedly addressed in 7.16).
Other CCR2116's carrying similar amounts of traffic as our BGP mesh (the CGNAT routers) have been up and solid for those same three weeks since updating.
I think I have a reason for this. I may be wrong, I am waiting on support to confirm this.I am wondering why it keeps disconnecting every 3 hours give or take.
I do send Telegram notifications using /tool/fetch in 7.15.3 and I do not suffer from this kind of problems:Is here anyone with working Netwatch/Fetch? Anyone know how to solve it?
Hi,I do send Telegram notifications using /tool/fetch in 7.15.3 and I do not suffer from this kind of problems:Is here anyone with working Netwatch/Fetch? Anyone know how to solve it?
/tool fetch url="https://api.telegram.org/$botId:$botPwd ... MarkdownV2" output=none check-certificate=yes-without-crl
To stay on topic here, please open a new topic for further discussion regarding this.
The topic, please. This one is not the right place for discussing this, create a new one.What else should I change?
Very true. Just to close this out... since the permission have changed somewhat recently (but NOT in this release). Poster with fetch is using netwatch, which has restricted permissions. It also may not be the fetch per se but another restricted operation too.The topic, please. This one is not the right place for discussing this, create a new one.What else should I change?
There is also another process that seem to be running every 40 hours (give or take) and I am not sure what that could possibly be now. But this also resets the wireless interface.It seems that leaving the wireless channel on auto will make the device try to scan for the channels every 3 hours or so. And either that process kicks all the clients or it re-sets the same channel and it kicks all the clients.