I have not touched it for a year (since purchased), so I don't have it all in my head. The IP address of the ATL is 192.168.188.1. I believe the rest is pretty much factory default.Your ATL is probably configured with DHCP client and not with a static IP address? 192.168.188.1?
[admin@MikroTik] > /interface/ethernet/poe/print detail
0 name="ether5" poe-out=off poe-priority=10 power-cycle-ping-enabled=no power-cycle-interval=none
All my equipment is UPS powered. There have been no surges or power outages during the update either.your ATL maybe faced power interruption while updating.
*) poe-out - upgraded firmware for SAMD20 PSE (AF/AT) controlled boards (the update will cause brief power interruption to PoE-out interfaces);
Is that Mikrotik's fault? (e.g. bug)The POE controller on your HAP may unintentionally powercycled or something.
Yeah, I have seen that. However, I have no idea how I am supposed to use the information provided. OK - "will cause brief power interruption" - Why? If such interruption is bad - how come this is a "stable" version resulting in such troubles? This is quite confusing.See changelog of 7.16
Alright. But why should I need the computer to be a DHCP server to connect to the ATL? I have always been able to connect to the HAP using either DHCP or a static address (e.g. 192.168.88.*) and then access the ATL (which is 192.168.188.1) both from the HAP and from the LAN computers.The difference between connecting your ATL to computer or HAP is pretty easy to understand: your HAP may act as an DHCP server, whereas your computer most probably not.
The default IP address of the ATL is 192.168.188.1. Also mentioned in the manual. I have not changed it.But I assume you rather have changed the default static IP address from 192.168.88.1 to 192.168.188.1.
What are "leases", which DHCP server do you mean and how do I do what you suggest, please?Check the leases on your DHCP server and see if you can spot the ATL, make sure you have "Active Host Names" selected.
Yes, I am able to create such connection in NetworkManager:So you could be in luck, when configuring static IP address on your computers ethernet adapter. 192.168.188.2/24 maybe. See if connection is possible.
$ ping 192.168.188.1
PING 192.168.188.1 (192.168.188.1) 56(84) bytes of data.
From 10.138.15.200 icmp_seq=1 Packet filtered
From 10.138.15.200 icmp_seq=2 Packet filtered
...
According to https://ipinfo.io/10.138.15.200 it is a bogon IP address. I have absolutely no idea why it shows.What host is 10.x?
Previously you said that I should connect PC -> HAP --(PoE injector)--> APC.can you please unplug any other network devices. just connect your PC and ATL.
It might be due to the inter-VM network which is 10.0.0.0. Testing outside that network, i.e. directly from the physical Ethernet interface of the PC:I have absolutely no idea why it shows.
$ ping 192.168.188.1
PING 192.168.188.1 (192.168.188.1) 56(84) bytes of data.
From 192.168.188.22 icmp_seq=1 Destination Host Unreachable
From 192.168.188.22 icmp_seq=2 Destination Host Unreachable
From 192.168.188.22 icmp_seq=3 Destination Host Unreachable
...
No, only SSH from Linux.Are you using winbox?
As noted, the "winbox" client app using ethernet(layer2) so even if the config is FUBAR, if RouterOS boots you should be able to get using the MAC address. The defaults should have it enabled, but control via:Or is anyone using remote/difficult-to-reach-physically devices doomed to such issues?
What I can do:Are you not able to get in after upgrade? Or does it just not work for LTE after upgrade?
Considering I have no access to the RouterOS of the ATL, I have no way to check. One thing is sure: after buying and configuring the ATL, I explicitly disabled all possibilities for connection to it and left SSH only. For security reasons.As noted, the "winbox" client app using ethernet(layer2) so even if the config is FUBAR, if RouterOS boots you should be able to get using the MAC address. The defaults should have it enabled, but control via:
/tool mac-server set allowed-interface-list=all
/tool mac-server mac-winbox set allowed-interface-list=all
/tool mac-server ping set enabled=yes
If those were enabled, and you cannot get into the router...
That's my initial assumption. If I could get hands on the ATL, I can try this "factory reset" which you explain, then work my way up. The big question remains though - what about updating? (now, with the obviously buggy version, and in future) I surely don't want to engage into construction/deconstruction work just because the new software version obviously does not work.There is an intermediate step before netinstall. You can reset it the default configuration by de-powering it, THEN plug it back in WHILE holding the reset button for ~7 seconds - the reset button needs to be press when power is applied.
I can get only to the hAP ac3. If you think we can see something from there - please let me know.But if you CAN get into the router and something is not right, just post the config here by using ":export" in the Terminal/ssh.
Just to complete the thread...Anyway RouterOS has lots of options to do avoid a netinstall.
No, it's the opposite. Quoting myself:That seems like good news — If you can get into the ATL via ssh and 192.168.188.1 - there is no need for going to mast.
I can't ping anything (even the gateway), I can't SSH to the gateway.
And you tried winbox to see if shows up as "Neighbor" with MAC address?No, it's the opposite. Quoting myself:That seems like good news — If you can get into the ATL via ssh and 192.168.188.1 - there is no need for going to mast.I can't ping anything (even the gateway), I can't SSH to the gateway.
Gotcha. Well, then it's getting it off the roof/tower to reset it one way or another.As I said, I use only SSH to connect to any of the routers and all other methods were intentionally disabled for security reasons.
user@NETINSTALL:~/netinstall > sudo ./netinstall-cli -r -a 192.168.188.1 routeros-7.5-arm64.npk
Version: 7.5(2022-08-30 09:34:59)
Will reset config
connect: Network unreachable
Using server IP: 0.0.0.0
Starting PXE server
Waiting for RouterBOARD...
client: <MAC hidden for privacy reasons>
client: <MAC hidden for privacy reasons>
client: <MAC hidden for privacy reasons>
client: <MAC hidden for privacy reasons>
client: <MAC hidden for privacy reasons>
client: <MAC hidden for privacy reasons>
client: <MAC hidden for privacy reasons>
client: <MAC hidden for privacy reasons>
client: <MAC hidden for privacy reasons>
^C
user@NETINSTALL:~/netinstall > sudo ./netinstall-cli -r -a 192.168.188.1 routeros-7.5-arm64.npk
Version: 7.5(2022-08-30 09:34:59)
Will reset config
Using server IP: 192.168.188.2
Use Netmask: 255.255.255.0
Starting PXE server
Waiting for RouterBOARD...
client: <MAC hidden for privacy reasons>
Sending image: arm64
sendFile 9046272
Discovered RouterBOARD...
Formatting...
Sending package routeros-7.5-arm64.npk ...
Ready for reboot...
Sent reboot command
user@NETINSTALL:~/netinstall >
So, my second question is:The device supports RouterOS software version 7.5. The specific factory-installed version number is indicated in the RouterOS menu /system resource. Other operating systems have not been tested.
[admin@MikroTik] > /system/routerboard/print
routerboard: yes
model: ATLGM
serial-number: <hidden for privacy reasons>
firmware-type: a3700
factory-firmware: 7.8
current-firmware: 7.11.2
upgrade-firmware: 7.5
[admin@MikroTik] > /system/package/update/check-for-updates
channel: stable
installed-version: 7.5
latest-version: 7.12.1
status: New version is available
[admin@MikroTik] > /system/package/update/install
channel: stable
installed-version: 7.5
latest-version: 7.12.1
status: Downloaded 99% (13.3MiB)
Received disconnect from 192.168.188.1 port 22:11: shutdown/reboot
Disconnected from 192.168.188.1 port 22
$ ssh -l admin 192.168.188.1
ssh: connect to host 192.168.188.1 port 22: Network is unreachable
Based on what? The manual is clear - 7.5. What is there to try? I mean - I already tried a regular update... and you see what happens. What is the guarantee that if 7.16 doesn't work I will be able to netinstall 7.5? Yes, it is possible that the doc is outdated. But it is also possible that it is not. So far, considering the facts, it kind of seems the latter.I'd netinstall 7.16, and try that.
That's exactly what I thought too. I do care about security updates. The thing is, I am quite concerned not to end up with a blocked device in unrecoverable mode. With dysfunctional hardware the concept of security is meaningless.If you troubleshoot 7.16 while it NOT on the pole, you'd be better set for future updates.
Well... a decade of knowing Mikrotik is not great at updating documentation.Based on what? The manual is clear - 7.5. What is there to try?I'd netinstall 7.16, and try that.
Well... a decade of knowing Mikrotik is not great at updating documentation.
And yes you'd be able to downgrade to 7.5 from 7.16 using netinstall. Or any from/to version, it reformats the "disk".
You're really worried about the wrong things if you want this working+stable, and secure.
Nothing stops you from opening a case at help.mikroitk.com ...
factory-software: 7.4.1
/system/routerboard/print
routerboard: yes
model: ATLGM
serial-number: <hidden for privacy reasons>
firmware-type: a3700
factory-firmware: 7.8
current-firmware: 7.11.2
upgrade-firmware: 7.5
Update (through /system/package/update) is obviously not possible, as I can't reach 7.16 through sequential step-by-step version updates and reboots. As for netinstall 7.16 - the question remains: Can this break things in a way resulting in impossible netinstall of older version afterwards.I would update to 7.16 as well, as long the device is unmounted. In case of a defacto factory configuration I would go even further: netinstall 7.16 with reset.
[admin@MikroTik] > /system/package/update/download
channel: stable
installed-version: 7.5
latest-version: 7.12.1
status: Downloaded, please reboot router to upgrade it
[admin@MikroTik] >
[admin@MikroTik] > /system/package/update/check-for-updates
channel: stable
installed-version: 7.12.1
latest-version: 7.16
status: New version is available
[admin@MikroTik] > /system/package/update/download
channel: stable
installed-version: 7.12.1
latest-version: 7.16
status: Downloaded, please reboot router to upgrade it
[admin@MikroTik] > /system/routerboard/print
routerboard: yes
model: ATLGM
serial-number: ...
firmware-type: a3700
factory-firmware: 7.8
current-firmware: 7.16
upgrade-firmware: 7.16
[admin@MikroTik] > /system/package/update/check-for-updates
channel: stable
installed-version: 7.16
latest-version: 7.16
status: System is already up to date
You insisted to use ROS 7.5. If your factory version would have been already a newer version, like e g. 7.6, then you wouldn't even be able to install 7.5. You can't downgrade below factory version.@infabo
What did the factory version tell you in relation to the rest of the info you kindly provided?
Download does just that. It download the package files to the flash, but does not install them. The way packages work is if any are in the root file system when you reboot, they get applied. So you can download them yourself from mikrotik.com, and put the in the root to also upgrade a router. So the "download" essentially just automates that for the channel (i.e. "stable").The question is - is "download" vs "install" the key to safe updates? What did "install" do at 99% which "download" did not? Besides that, I have no explanation.
... and the HOWTO upgrade link explain how packages work.Before attempting an LTE modem firmware upgrade - upgrade RouterOS version to the latest releases How To Upgrade RouterOS
You insisted to use ROS 7.5.
Since that reboot happens immediately after download, the 99% may show because it started the reboot before the UI update made it to you.
I just discovered this:I wish Mikrotik's software was made more intelligent to e.g. auto-revert to older version in cases of such glitches.
Physical security. As soon as attacker gains physical access to your device, you've already lost the game. Guess how "denial of service" looks like in this case? Attacker simply steals your device.Now, the question is security: What would prevent an attacker with physical access to the cable to netinstall the device and do further mischief?
Physical security. As soon as attacker gains physical access to your device, you've already lost the game. Guess how "denial of service" looks like in this case? Attacker simply steals your device.
Having possibility to do netinstall is an essential means of re-posessing device if remote attacker manages to lock yourself out (e.g. by removing admin permissions from your administrative user) ... and that's way more probable than somebody climbing on your pole in the middle of winter and do funny stuff to your ATL.
What do you mean I discovered? Are you saying that my trouble was the result of a boot loop? If that was so, I think I would be experiencing repeated connect/disconnect in NetworkManager and I did not notice anything like that. Or what do you mean?Another probable thing as you discovered yourself is boot loop (and it's not always result of manual action) ...
so no way of getting into ROS to toggle the netinstall allowed thingie before doing netinstall to recover from boot loop.