Yes...Have same message.In all devices in network I see this in log
system,info ovpn server added by (/interface ovpn-server server set)
I look and see OpenVPN server add to list, not see any one logged in time of creation on device.
Anyone else ?
# 1970-01-02 00:46:38 by RouterOS 7.17
# software id = XXXX-XXXX
#
# model = RB750Gr3
# serial number = XXXXXXXXXXXX
/interface bridge add name=VLAN10
/interface bridge add name=VLAN20
/interface bridge add name=bridge1
/interface vlan add interface=bridge1 name=vlan10 vlan-id=10
/interface bridge port add bridge=VLAN10 interface=vlan10
/system note set show-at-login=no
/system routerboard settings set auto-upgrade=yes
Hello pe1chl,You need to set the admin-mac= parameter to the MAC of the bridge.
The default config does that automatically but apparently you have tinkered with it.
It works, thanks for the methodI was finally able to update RB450Gx4 7.16.2 -> 7.17 by going "babysteps":
At start 7.17. stable gave error message "free up 9 kB of kernel disk space"
I tried then with 7.17 beta6 -> "free up 5 kB of kernel disk space". Looks like we are moving to right direction...
Then I took 7.17 beta2 and that succeeded - CAP's became unbound though
Then I tried 7.17 stable again and failed.
I tried again with 7.17 beta6 and that succeeded - CAP's were operational again - good news.
Then I went to /system package update download to get 7.17 stable - and now that succeeded as well and all seems to be working OK for now.
So your path can be 7.16.2 -> 7.17beta2 -> 7.17beta6 -> 7.17 stable
That all meant that I had to manually dig out these old betas from download.mikrotik.com - if they would not be available then all this would not have been possible.
As always: some tens of users, who have problems after upgrade, did come here and report problems. Hundreds (thousands), who upgraded and didn't have any problems, didn't write any praise.After reading this thread... I'm wondering... does Mikrotik actually TEST these updates on *actual* devices?
After upgrading to 7.17 the dhcp+radius bundle stopped working. We switched back to 7.16.2 and everything works as it should. DHPC clients receive ip after authorization via radius.
omg! You are right! That's what's not working...UPD /ip/ipsec/proposal enc-algorithms=chacha20poly1305 doesn't work.IKEv2 tunnels fail to establish after upgrading to 7.17 (between 7.17<->7.17 and 7.17<->7.16.2). However, 7.17 does establish IKEv2 with Huawei AR (same settings).
Rolling back to 7.16.2 does fix the issue.
Auth method is PSK, 7.17 peer sends "Delete" right after successful IKE_AUTH. Tested on both live RBs and GNS3 lab.
Am I the only one with this issue?
You can always enable features you needMaybe I'm missing something here... but this "device-mode" thing seems REALLY problematic... am I the only one using various features, across device types for scheduling and scripting and management and updates and all kinds of other things??? There is no "mode" which has everything enabled any more? So...we just break thousands of devices on the next upgrade because some of the features are on some of the routers, but nothing has everything? This seems like the death of MirkoTik in our network at this point... or, never upgrading past 7.16.2 ... I'm kind of in shock. Am I reading this wrong?
system/device-mode/update mode=advanced zerotier=no
That was the theme from the 7.17beta thread... And, by now, Mikrotik is well aware folks use their routers on top of mountains and in war zones or other cases where a physical reboot is NOT easy...or, that they could apply to NEW routers from factory. Yet Mikrotik seemed set on adding device-mode upon upgrade, and retroactive removing features.Maybe I'm missing something here... but this "device-mode" thing seems REALLY problematic... [...] This seems like the death of MirkoTik in our network at this point... or, never upgrading past 7.16.2 ... I'm kind of in shock. Am I reading this wrong?
CCR2004-1G-12S-2XS -------DEAD
Really annoying but perhaps the market reactions forces MTik managers to think through it once again.The problem with device-mode is not that "no router has all features". You can simply enable all features on all your routers.
The problem is that it requires physical access to enable a feature, and there is no possibility to enable a feature before you upgrade (and lose access to the feature because it is now protected by device-mode and it is not yet enabled).
So you need a physical visit to your devices, and cause at least one reboot (with downtime) to make things work as before.
And even then, you run the risk that MikroTik discovers another abuse scenario and puts another feature behind device-mode.
Which will require another visit to solve, because there is no device-mode that says "don't bother me with device-mode"...
If it is full export of your configuration it wouldn't work regardless of Routeros version since it doesn't have any Ethernet interfaces attached to any bridge... as you would if you have chosen to activate default configuration in which case you would also have admin-mac of bridge1 set to the ether1 mac address... so either you made some additional modifications or you choose empty configuration and made this dysfunctional configuration from scratch all by your self...Hello pe1chl,You need to set the admin-mac= parameter to the MAC of the bridge.
The default config does that automatically but apparently you have tinkered with it.
That’s what I initially thought as well. However, in the example above, this is a full export of my HEX after a factory reset.
I created the bridges and VLANs using Winbox without making any additional modifications.
I’ve noticed that the issue seems to occur as soon as you add a VLAN to a bridge and then decide to bridge that VLAN to another bridge.
[eddie@rb1100] /ip/dns/static> add address=192.168.0.10 name=host1.home.lan. type=A
failure: bad name
[eddie@rb1100] /ip/dns/static> add address=192.168.0.10 name=host1.home.lan type=A
[eddie@rb1100] /ip/dns/static>
I installed 7.16.2 with NetinstallIf you can netinstall, it's not dead.
Already tried that ?
Thank you for the clarification... Yes, this is going to be an ongoing huge challenge if new features or old ones are added to device mode. I'm still just kind of in shock.. I get the need for security, but ultimately that's up to the end users.The problem with device-mode is not that "no router has all features". You can simply enable all features on all your routers.
The problem is that it requires physical access to enable a feature, and there is no possibility to enable a feature before you upgrade (and lose access to the feature because it is now protected by device-mode and it is not yet enabled).
So you need a physical visit to your devices, and cause at least one reboot (with downtime) to make things work as before.
And even then, you run the risk that MikroTik discovers another abuse scenario and puts another feature behind device-mode.
Which will require another visit to solve, because there is no device-mode that says "don't bother me with device-mode"...
Same situation here, and it will be impossible to get to all of the devices physically... it would literally take years and thousands of man hours to track down every device. This is just nuts.That was the theme from the 7.17beta thread... And, by now, Mikrotik is well aware folks use their routers on top of mountains and in war zones or other cases where a physical reboot is NOT easy...or, that they could apply to NEW routers from factory. Yet Mikrotik seemed set on adding device-mode upon upgrade, and retroactive removing features.Maybe I'm missing something here... but this "device-mode" thing seems REALLY problematic... [...] This seems like the death of MirkoTik in our network at this point... or, never upgrading past 7.16.2 ... I'm kind of in shock. Am I reading this wrong?
I also don't like device-mode, at all (i.e. all of my "real" routers are remote)... but in fairness, the device-mode blocked items are pretty targeted in the 7.17 stable. So it has not had a practical effects yet. Still the concept of some "!) new device-mode restrictions..." release note in a future release still has me worried too...
And I still don't get why they don't add all possible features to device-mode (with =yes) — so at least it's be wholistic one-time change that can be managed at install time & not some piecemeal approach of adding existing features to device-mode release-by-release in upgrades after deploying a router...
I agree 100%... The scheduler is one of the first things I think of when I freak out. We use the scheduler for scripts to do pretty much everything... we use use these together in groups and separately to provide "logic" to behaviors and automation, control traffic, enable and disable ports, etc etc.I see disabling the scheduler as worst problem of these "improvements". I remember the bug in hap ax lite LTE6 which caused SIM to be locked after every reboot and all Mikrotik was able to do was to provide a scheduled script as a workaround because problem was in modem firmware if my memory serves me right.
Now these devices might be in use as remote devices - what happens if somebody is relying on that Mikrotik-provided "fix" and decides to apply currently available update which kills scheduler functionality? At first he would be scratching his head about why device would not come back online. Then he might start to go through the details of configuration backup and might find that scheduled script - and then even find release notes on 7.17 with these "improvements" - and what if device is not in different town but in other country or on another continent?
Diving farther into this rabbit hole - can we be sure that next updates would not bring other "improvements" by disabling features through this same mechanism and everybody ends up doing this circus all over again?
There might be a point where one decides to switch equipment vendor...
Do you see something similar to "syn flood detected on port" in your logs? Other have reported if there is "too much" DNS requests, it falsely detects syn flood and DNS starts to returns NXDOMAIN, i saw the same once on a RB5009 running 7.17, did not happen again since.Is MT DNS buggy? ... "N", as a negative, and 0.0.0.0 IP address. Turning WG clients against the same Windows server directly, it resolves all internal domains / servers just flawlessly .....
Yes, for me also, and had to go back to 7.16.2 which is for me the last in the mikrotik line. I am already looking for other vendors unfortunately, after 16 years of Mikrotik use.Do you see something similar to "syn flood detected on port" in your logs?
@normis this is what the start of MikroTik business failure looks like.... I am already looking for other vendors unfortunately, after 16 years of Mikrotik use.
Download from ... FAILED: Idle timeout - receiving content
executing script ... from scheduler failed, please check it manually
Flagging is actually covered in documentation...Just saw the "Flagged Status" thing also... based on some arbitrary rules (which we do not know), our configuration could be flagged and we could be locked out of certain configuration items and have to PHYSICALLY visit a site to clear this flag.
What would make Mikrotik "special" in any use-worthy way if you would run other software on it?@normis this is what the start of MikroTik business failure looks like.... I am already looking for other vendors unfortunately, after 16 years of Mikrotik use.
Bug fix RouterOS before everything else is the best hope.
Alternative is allow third party software on MT hardware.
If that "cloud-enabled checkin" would work as this forum does then it would be significantly less than completely useless. It woud be one more thing for Mikrotik to maintain, develop and "bugfix"Thank you for the clarification... Yes, this is going to be an ongoing huge challenge if new features or old ones are added to device mode. I'm still just kind of in shock.. I get the need for security, but ultimately that's up to the end users.The problem with device-mode is not that "no router has all features". You can simply enable all features on all your routers.
The problem is that it requires physical access to enable a feature, and there is no possibility to enable a feature before you upgrade (and lose access to the feature because it is now protected by device-mode and it is not yet enabled).
So you need a physical visit to your devices, and cause at least one reboot (with downtime) to make things work as before.
And even then, you run the risk that MikroTik discovers another abuse scenario and puts another feature behind device-mode.
Which will require another visit to solve, because there is no device-mode that says "don't bother me with device-mode"...
It's too bad the device mode features cant be enabled by using some known codes or info from the device (the original admin password), or requiring registration online, with a secret code provided there... or, some cloud enabled checkin to enable or disable features (which, I realize doesn't work in all cases either with air-gapped devices).
IMO MikroTik has market share by undercutting both enterprise and consumer devices.What would make Mikrotik "special" in any use-worthy way if you would run other software on it?
Are you referring to the update channels (aka release trees: bug-fix (later long-term), stable and testing) here? Those were introduced circa 6.29 or 6.30 in the middle of 2015. At that point there were no missing features compared to v5, and this split allowed for field testing of new features in stable without exposing the accompanying bugs to those who don't need these new features. Apparently, it's too early to follow the same model in v7 yet, at least that's how explain it to myself.RouterOS v7 changed development model used upto v6 and prior.
Do you know what is funny? If you use CHR on cloud and want to enable features you gonna open case and beg admins to shut off VM within limited time if you are lucky enough. It's like wishing all planets to line up. What a joke.The problem with device-mode is not that "no router has all features". You can simply enable all features on all your routers.
The problem is that it requires physical access to enable a feature, and there is no possibility to enable a feature before you upgrade (and lose access to the feature because it is now protected by device-mode and it is not yet enabled).
Wouldn't it be more logical if you could do that power-cycle yourself ?Do you know what is funny? If you use CHR on cloud and want to enable features you gonna open case and beg admins to shut off VM within limited time if you are lucky enough. It's like wishing all planets to line up. What a joke.
Does device-mode get reset during factory rest to defaults?? or once they are enabled on hardware, they persist?
See https://help.mikrotik.com/docs/spaces/R ... evice-modeDocumentation doesn't say. One probably needs to test to find out...
and so if you upgrade to 7.17, you'll get "advanced" (or should per docs). There is NO reset to default mentioned in and the upgrade only changes the /system/device-mode setting, NOT your config.There are three available modes:
advanced, home and basic.
[...]
if the router is manufactured and shipped with MikroTik RouterOS v7.17 or later.
[*] Advanced (previously called enterprise) mode is assigned to CCR and 1100 series devices,
[*] home mode is assigned to home routers and basic mode to any other type of device.
For devices running versions prior to RouterOS version 7.17,
[*] all devices use the advanced/enterprise mode.
And resolving those device-mode restrictions from docs:By default, advanced mode allows options except traffic-gen, container, partitions, install-any-version, routerboard. So to use these features, you will need to turn it on by performing a device-mode update.
* device-mode container=no has always been disabled by device-mode for many versions. In my test, I had container=yes already enabled before upgrade and the upgrade left that alone - but on this one the docs are NOT clear....traffic-gen - /tool traffic-generator /tool flood-ping /tool ping-speed
partitions** - /partitions - does not allow to change count of partitions. If your router is unable to boot, it will still be able to boot into your other partitions. No restriction for crash recovery.
install-any-version - RouterOS will no longer allow for you to install RouterOS version below versions listed under "allowed-versions" attribute.
container* - all container features
routerboard - /system routerboard settings (except auto-upgrade option)
:put [/system/device-mode/get allowed-versions]
7.13+,6.49.8+
system/device-mode> print
mode: advanced
allowed-versions: 7.13+,6.49.8+
flagged: no
flagging-enabled: yes
scheduler: yes
socks: yes
fetch: yes
pptp: yes
l2tp: yes
bandwidth-test: yes
traffic-gen: no
sniffer: yes
ipsec: yes
romon: yes
proxy: yes
hotspot: yes
smb: yes
email: yes
zerotier: yes
container: no
install-any-version: no
partitions: no
routerboard: yes
attempt-count: 0
/interface bridge port
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged interface=ether1 internal-path-cost=10 \
path-cost=10 pvid=200 trusted=yes
/system routerboard settings
set boot-device=flash-boot-once-then-nand
/system/routerboard> print
routerboard: yes
board-name: netPower 16P
model: CRS318-16P-2S+
serial-number:
firmware-type: dx3230L
factory-firmware: 6.48.6
current-firmware: 7.17
upgrade-firmware: 7.17
Big fall of a great story, I'm sad. They don't seem to care until they realize they've shot themselves in the foot. Maybe they want to close the store, who knows, but I also stops every MTik device acquisition at my company as long as they cling rigidly to this nightmare. This is very not professional.@normis this is what the start of MikroTik business failure looks like.... I am already looking for other vendors unfortunately, after 16 years of Mikrotik use.
Bug fix RouterOS before everything else is the best hope.
Alternative is allow third party software on MT hardware.
Mikrotik locked out 3rd party OS with RouterBOARD firmware version 7...Most of the MT HW is 3rd party capable I think. Netboot a Linux on them and you can testing. I did it on my RB450G and RB433AH 15 years ago. Maybe it works on new ones too.
Mikrotik locked out 3rd party OS with RouterBOARD firmware version 7...
Not publishing bootloader specs is effectively the same thing as locking out, for as long as somebody from 3rd parties hacks and reverse engineer it at least...Writing that mikrotik locked out 3rd party OSes is quite a heavy statement.Mikrotik locked out 3rd party OS with RouterBOARD firmware version 7...
IMO "locking out" is deliberate and active act, "not publishing" can only be called "negligence" towards 3rd parties and is completely normal in normal (i.e. not "free as speach") corporate environments.Not publishing bootloader specs is effectively the same thing as locking out
Writing that mikrotik locked out 3rd party OSes is quite a heavy statement.
MikroTik has the choice to make it 3rd party software easy with full hardware disclosure or hard by doing nothing.Not publishing bootloader specs is effectively the same thing as locking out, for as long as somebody from 3rd parties hacks and reverse engineer it at least...
You could go to the EU Parliament and propose a law requiring all manufacturers to make their devices fully accessible for open-source operating systems, including the publication of specifications and all relevant documentation.Not publishing bootloader specs is effectively the same thing as locking out
Agreed, MikroTik rights on hardware disclose is their choice. I'm pleasantly surprised by last said which suggests as a late comer viewing MikroTik as hardware company first is a historical misconception; thank you for sharing that history and a different perception. This suggests MikroTik has customers with competing interests that it must straddle to maximize market share and secure it's future.IMO "locking out" is deliberate and active act, "not publishing" can only be called "negligence" towards 3rd parties and is completely normal in normal (i.e. not "free as speach") corporate environments.
... So IMO ROS is MT's strength and they should focus on it ... nice proprietary hardware might be a cherry on the top of a cake (and I prefer this cake over this cherry).
@normis! So good to see you out and about. I find your reassurances both credible and compelling. Thank you,We only make changes that improve security of the users, none of those changes are to actively deny 3rd party OSes
I respect everyone's right to petition their governing authority for relief they may deem compelling.You could go to the EU Parliament and propose a law requiring all manufacturers to make their devices fully accessible for open-source operating systems, including the publication of specifications and all relevant documentation.
After upgrading to 7.17 the dhcp+radius bundle stopped working. We switched back to 7.16.2 and everything works as it should. DHPC clients receive ip after authorization via radius.
We're experiencing the same issue when using DHCPv4 + RADIUS. DHCPv6 seems to work fine.
Just opened a support ticket (SUP-177570), will keep you updated
Thanks!!!Hello,
Thank you for contacting MikroTik Support.
The issue is identified and will be addressed in further RouterOS releases.
We are sorry for the inconvenience caused
Best regards,
Honestly... it's hard to see much worth of "writing home about" in Mikrotik hardware without RouterOS. It is mostly a combination of generic off-the-shelf components - and these combinations are often put together in a questionable way when it comes to performance. And I don't even want to start about these 24 V "power bricks" which cause most of equipment outages by their own death...But I guess this is now discussion about last year's snow, not important for MT and ROS future (at least not until MT changes their business goals).
I guess that there are large number of users who like ROS and some users who like MT hardware (and I guess their number is much lower than number of ROS fans ... after all, I don't find MT hardware particularly attractive compared to other vendors' offerings in same price range). And there are (majority?) users who don't have strong feelings about the matter (because low price point matters to them). So IMO ROS is MT's strength and they should focus on it ... nice proprietary hardware might be a cherry on the top of a cake (and I prefer this cake over this cherry).
Well, "improving security of the users" by making changes and then not documenting them is effectively the same as denying 3rd parties.@normis! So good to see you out and about. I find your reassurances both credible and compelling. Thank you,We only make changes that improve security of the users, none of those changes are to actively deny 3rd party OSes
The question is: was the method before the "new method" documented?Remember how the authentication of winbox and MAC access was changed, to improve security, but the new method remains undocumented.
Probably it was a "known" method, apparently someone was able to write an independent mac-telnet program that worked.The question is: was the method before the "new method" documented?
Well, "improving security of the users" by making changes and then not documenting them is effectively the same as denying 3rd parties.
allowed-versions: 7.13+,6.49.8+
That is as problematic as "release notes" stuff i.e. inability to have count on known issues. Maybe these are missing because they themselves do not know (about them)? This is lingering into "unknown known" field of things - which makes this issue itself one of "known unknowns"...Well, "improving security of the users" by making changes and then not documenting them is effectively the same as denying 3rd parties.
While, I don't doubt Mikrotik's efforts or good intent. It's the communications and attitude about security is downright lousy.
Security topics deserve some docs/blog/help/KB/etc, not just two-way trolling messages in the forum. Look at cloudflare/others, their security blogs are full of real discussion of problem/solution/effected things/workaround. I'm not that expecting much, but for example device-mode should have been mentioned/explained on https://mikrotik.com/supportsec – instead last update was in 2023.
Like I'd really like to know where the "allowed-version" /system/device-mode comes from?That implies less than 7.13 has some vulnerability or otherwise flawed. So should everyone upgrade to at least 7.13?Code: Select allallowed-versions: 7.13+,6.49.8+
Now for all we know they could have from @normis' cat too. Thus the complaints.
And it doesn't look promising when topics like this quickly gets deleted viewtopic.php?t=214285Security topics deserve some docs/blog/help/KB/etc, not just two-way trolling messages in the forum. Look at cloudflare/others, their security blogs are full of real discussion of problem/solution/effected things/workaround. I'm not that expecting much, but for example device-mode should have been mentioned/explained on https://mikrotik.com/supportsec – instead last update was in 2023.
Well, in fairness, they do publish a "responsible disclosure policy" on their security web site. So publishing potential vulnerabilities on the forum is pretty clearly against those rules, and thus forum rules. But it does strain credibility that there is nothing of note on the security front since 2023-07-27.And it doesn't look promising when topics like this quickly gets deleted viewtopic.php?t=214285
Still indexed by Google https://www.google.com/search?q=%22Rout ... ilities%22
I'm seeing this as well:Yes, for me also, and had to go back to 7.16.2 which is for me the last in the mikrotik line. I am already looking for other vendors unfortunately, after 16 years of Mikrotik use.Do you see something similar to "syn flood detected on port" in your logs?
There may be sufficient reason to hide an exploit technique but IMO hiding an exploit exists in specific version or the OP was just false warrants disclosure.Well, in fairness, they do publish a "responsible disclosure policy" on their security web site. So publishing potential vulnerabilities on the forum is pretty clearly against those rules, and thus forum rules. But it does strain credibility that there is nothing of note on the security front since 2023-07-27.And it doesn't look promising when topics like this quickly gets deleted viewtopic.php?t=214285
Still indexed by Google https://www.google.com/search?q=%22Rout ... ilities%22
Do you see a "TCP syn flood warning" in the log?I'm not sure, but since the upgrade to 7.17.1, neither my L2TP (IPsec) VPN nor my WireGuard tunnel to ProtonVPN are connecting. I hope this isn't directly related.
MikroTik did not delete that topic, it was one of the volunteer moderators, because it was a duplicate post. It still exists in the other post.There may be sufficient reason to hide an exploit technique but IMO hiding an exploit exists in specific version or the OP was just false warrants disclosure.
Well, in fairness, they do publish a "responsible disclosure policy" on their security web site. So publishing potential vulnerabilities on the forum is pretty clearly against those rules, and thus forum rules. But it does strain credibility that there is nothing of note on the security front since 2023-07-27.
You got it in less than 1 hour :)It is time for 7.17.1.
What does it mean exactly? What is the scenario that has been fixed?*) bgp - improved stability;
Didn't noticed that other duplicate/similar topics are such quickly deleted, mostly there is a post in it like "see -> <url_to_other_similar_topic>".MikroTik did not delete that topic, it was one of the volunteer moderators, because it was a duplicate post. It still exists in the other post.
To be correct, it was merged into this thread, not deleted.Like I said, I (or MikroTik) would not have deleted it. It was a volunteer mod.
There was one topic on "BugProve" where I responded/replied to. Then suddenly this particular topic vanished and my reply appeared in this topic - without any context. So I requested to delete my post because it made no sense without the original-post I had replied to.Not sure what all the fuss is about ...
Look for post in this thread with "RouterOS 7.17 BugProve Testing" as title.
It's still there for everyone to see.
To be correct, it was merged into this thread, not deleted.Like I said, I (or MikroTik) would not have deleted it. It was a volunteer mod.
(it wasn't me :lol: )
Do you have please any feedback how hap ac2 "cooperates" with 7.17+wifiwave2 ? I have some spare devices which i need to deploy, thinking about this config+capsman for one AP. Im just wondering how does it perform (registered in this topic some reboot issues during beta phase).
Currently I can not reproduce... Wondering if I tricked myself when I was connected a way I did not expect - will keep an eye on this.Uh, bad... I have public hotspots that route the traffic via VPN (Mullvad). That is does with routing rules, and fails to do so with RouterOS 7.17.1 - so all traffic goes via regular WAN.
This ambiguity is extremely inadequate!What does it mean exactly? What is the scenario that has been fixed?*) bgp - improved stability;
I tested the lab after upgrade to 7.17.1, and it seems 7.17beta2 is moooore stable than 7.17.1. Till 7.17beta2, all of the above features works.A have a CHRs only lab which was runs on 7.17beta2 fine. It has configured OSPFv2+v3, MPLS LDP dual-stack, BGP IPv4, IPv6, VPNv4, VPNv6, VPLS (both)
Upgraded to 7.18beta2 and the IPv4 RIB issue (SUP-176975) happens. On 7.17beta4 the same. Something happens between 7.17beta2 and 7.17beta4 and a lot of another bad things happened between 7.16 and 7.17.
7.17 is far from stable and from RC too in BGP aspect.
/routing bgp vpn
add disabled=yes export.redistribute=connected .route-targets=65530:1 import.route-targets=65530:1 .router-id=VRF_A label-allocation-policy=per-vrf name=bgp-mpls-vpn-1 \
route-distinguisher=65530:1 vrf=VRF_A
add disabled=yes export.redistribute=connected .route-targets=65530:2 import.route-targets=65530:2 .router-id=VRF_B label-allocation-policy=per-prefix name=bgp-mpls-vpn-2 \
route-distinguisher=65530:2 vrf=VRF_B
/routing bgp vpls
add bridge=VPLS_A bridge-horizon=3 cisco-id=33.33.33.16 disabled=no export-route-targets=65530:3 import-route-targets=65530:3 name=VPLS_A pw-type=vpls rd=65530:3
add bridge=VPLS_B bridge-horizon=4 disabled=no export-route-targets=65530:4 import-route-targets=65530:4 name=VPLS_B pw-type=vpls rd=65530:4 site-id=16
[admin@rtr6.CPE] > /interface/vpls/print detail
Flags: X - disabled, R - running; D - dynamic; B - bgp-signaled, C - cisco-bgp-signaled
0 D name="vpls1" mtu=1500 mac-address=02:BA:62:00:0B:4B arp-timeout=auto peer=10.0.10.11 vpls-id="" pw-type=vpls bridge=VPLS_A bridge-horizon=3 bgp-vpls=VPLS_A
bgp-vpls-prfx="33.33.33.11&65530:3"
1 D name="vpls2" mtu=1500 mac-address=02:5D:34:8F:DD:05 arp-timeout=auto peer=10.0.10.11 vpls-id="" pw-type=vpls bridge=VPLS_A bridge-horizon=3 bgp-vpls=VPLS_A
bgp-vpls-prfx="33.33.33.12&65530:3"
2 D name="vpls3" mtu=1500 mac-address=02:F9:1A:DB:B4:F5 arp-timeout=auto peer=10.0.10.11 vpls-id="" pw-type=vpls bridge=VPLS_A bridge-horizon=3 bgp-vpls=VPLS_A
bgp-vpls-prfx="33.33.33.14&65530:3"
3 D name="vpls4" mtu=1500 mac-address=02:E1:15:A7:BE:8E arp-timeout=auto peer=10.0.10.11 vpls-id="" pw-type=vpls bridge=VPLS_A bridge-horizon=3 bgp-vpls=VPLS_A
bgp-vpls-prfx="33.33.33.15&65530:3"
4 D name="vpls5" mtu=1500 mac-address=02:B9:23:E7:E5:68 arp-timeout=auto peer=10.0.10.11 vpls-id="" pw-type=vpls bridge=VPLS_A bridge-horizon=3 bgp-vpls=VPLS_A
bgp-vpls-prfx="33.33.33.13&65530:3"
5 RD name="vpls6" mtu=1500 mac-address=02:98:EA:AD:2C:87 arp-timeout=auto peer=10.0.10.11 pw-type=vpls pw-l2mtu=1500 pw-control-word=enabled bridge=VPLS_B bridge-horizon=4 bgp-vpls=VPLS_>
bgp-vpls-prfx="veId=11,veBlockOffset=16&65530:4"
6 RD name="vpls7" mtu=1500 mac-address=02:65:2B:31:40:F7 arp-timeout=auto peer=10.0.10.11 pw-type=vpls pw-l2mtu=1500 pw-control-word=enabled bridge=VPLS_B bridge-horizon=4 bgp-vpls=VPLS_>
bgp-vpls-prfx="veId=12,veBlockOffset=16&65530:4"
7 RD name="vpls8" mtu=1500 mac-address=02:29:76:7B:48:91 arp-timeout=auto peer=10.0.10.11 pw-type=vpls pw-l2mtu=1500 pw-control-word=enabled bridge=VPLS_B bridge-horizon=4 bgp-vpls=VPLS_>
bgp-vpls-prfx="veId=14,veBlockOffset=16&65530:4"
8 RD name="vpls9" mtu=1500 mac-address=02:4F:4A:8F:B7:23 arp-timeout=auto peer=10.0.10.11 pw-type=vpls pw-l2mtu=1500 pw-control-word=enabled bridge=VPLS_B bridge-horizon=4 bgp-vpls=VPLS_>
bgp-vpls-prfx="veId=15,veBlockOffset=16&65530:4"
9 RD name="vpls10" mtu=1500 mac-address=02:18:1A:D9:6B:CD arp-timeout=auto peer=10.0.10.11 pw-type=vpls pw-l2mtu=1500 pw-control-word=enabled bridge=VPLS_B bridge-horizon=4
bgp-vpls=VPLS_B bgp-vpls-prfx="veId=13,veBlockOffset=16&65530:4"
[admin@rtr6.CPE] > /interface/vpls/monitor vpls1
local-label: 5293
nexthops: { label=29; nh=10.0.6.1%ether1; interface=ether1 }
[admin@rtr6.CPE] > /interface/vpls/monitor vpls6
remote-label: 32
local-label: 5288
nexthops: { label=29; nh=10.0.6.1%ether1; interface=ether1 }
[admin@rtr6.CPE] > /ip/address/print
Columns: ADDRESS, NETWORK, INTERFACE
# ADDRESS NETWORK INTERFACE
0 10.0.6.2/30 10.0.6.0 ether1
1 10.0.10.16/32 10.0.10.16 Loopback0
2 10.0.11.41/29 10.0.11.40 Loopback_VRF_A
3 10.0.12.41/29 10.0.12.40 Loopback_VRF_B
4 10.0.13.16/24 10.0.13.0 VPLS_A
5 10.0.14.16/24 10.0.14.0 VPLS_B
[admin@rtr6.CPE] > ping 10.0.13.11
SEQ HOST SIZE TTL TIME STATUS
0 10.0.13.11 timeout
sent=1 received=0 packet-loss=100%
[admin@rtr6.CPE] > ping 10.0.14.11
SEQ HOST SIZE TTL TIME STATUS
0 10.0.14.11 56 64 4ms450us
1 10.0.14.11 56 64 1ms911us
sent=2 received=2 packet-loss=0% min-rtt=1ms911us avg-rtt=3ms180us max-rtt=4ms450us
[admin@rtr6.CPE] >
Ok that is nice, but I hope that the other BGP instabilities will also be fixed. At least now I know I do not have to try 7.17.1 for that.Thanks for feedback.
There was a chance that route process crashed during "/routing/bgp/advertisements/print". Updated the changelog:
*) bgp - improved system stability when printing BGP advertisements;
Are there MikroTik jira support ticket numbers for those?I hope that the other BGP instabilities will also be fixed.
- sessions go to idle state and have to be re-established when ANOTHER session closes e.g. due to hold time exceeded or BFD reachability failed.
- after some time, BGP prefixes are not accepted on sessions, received messages increases but prefixes count remains 0 and routes not in table.
- and of course: prefixes are only sent by the receiving end of a session after one keepalive-time has elapsed.
7.12 to 7.13 was the big wireless change, so might just be to prevent loosing wireless support on downgrade. Only MikroTik knows....
Like I'd really like to know where the "allowed-version" /system/device-mode comes from?That implies less than 7.13 has some vulnerability or otherwise flawed. So should everyone upgrade to at least 7.13?Code: Select allallowed-versions: 7.13+,6.49.8+
Now for all we know they could have from @normis' cat too. Thus the complaints.
Looks like this is already known.But I am suffering another issue I think: The hotspot profile keeps adding "flash" to the html-directory property, that causes my custom login page not being available.
Time for 7.17.2... 😁*) hotspot - fixed an issue where extra "flash/" is added to html-directory for devices with flash folders (introduced in v7.17);
@mkx, would you mind creating a dedicated topic to discuss the points above outside this 7.17.x related one?The big problem of hAP ac2 and wifi-qcom-driver is lack of flash storage.
...
wifi-qcom-ac drivers offer greatly improved throughputs and stability of wireless service
...
until it (quite quickly) ran out of flash space
Actually I do. My use case for my hAP ac2 doesn't require any wireless driver and it's not available for experimenting. Hence I'm not very interested in discussing this further. If somebody else starts new topic about this, I'll certainly follow discussion though.@mkx, would you mind creating a dedicated topic to discuss the points above outside this 7.17.x related one?The big problem of hAP ac2 and wifi-qcom-driver is lack of flash storage.
IMO @normis is on the best path.Like I said, I (or MikroTik) would not have deleted it. It was a volunteer mod.
For me the mistake was made by the moderator who accepted as the first post of this person yet another warning from the little green men with a clickbait title.IMO @normis is on the best path.Like I said, I (or MikroTik) would not have deleted it. It was a volunteer mod.
What matters most is confidence and trust in the forum process. Forum moderation suggestions:
The goal is a transparent audit trail doesn't leave much room for speculation or conspiracy theories.
After testing it a little bit more, IPv4 and IPv6 do not works at all on LDP signaled VPLS. Over BGP signaled, IPv4 works, IPv6 doesn't.Another function which doesn't work is LDP signaled VPLS, if I understand MT documentation right. BGP signaled VPLS works.
Today I've checked versions 7.17.1 and 7.18beta4 and it didn't solved the issue with MLAG - SUP-177393.I was not able to upgrade an MLAG setup on two CRS312-4C+8XG switches successfully. Right after an upgrade it immediately caused a broadcast storm on MLAG bonding-interfaces which were connected to another Mikrotik appliances like CCR2116-12G-4S+ where bonding-interfaces were a slave ports in a switch-chip bridge. CCR2116 was already upgraded to the 7.17 version.
Simpler two interface loops connected via a few same MSTP region Mikrotik switches also started to cause a broadcast storm and printed a multiple errors like these below:
Thankfully rolling back to the previous 7.16.2 version restored functionality of MLAG setup.Code: Select allcombo2 excessive broadcasts/multicasts, probably a loop combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> 33:33:00:00:00:01 VID 500 ETHERTYPE 0x86dd combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> 33:33:00:00:00:01 VID 500 ETHERTYPE 0x86dd combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> ff:ff:ff:ff:ff:ff VID 500 ETHERTYPE 0x0806 combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> ff:ff:ff:ff:ff:ff VID 500 ETHERTYPE 0x0806 combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> 33:33:00:00:00:01 VID 500 ETHERTYPE 0x86dd
/ip firewall connection tracking
set enabled=auto
set enabled=yes
system/package/print
Columns: NAME, VERSION, BUILD-TIME, SIZE
# NAME VERSION BUILD-TIME SIZE
0 wifi-qcom 7.16.2 2024-11-26 12:09:40 10.2MiB
1 rose-storage 7.16.2 2024-11-26 12:09:40 3016.1KiB
2 routeros 7.16.2 2024-11-26 12:09:40 11.7MiB
disk/ print
Flags: B - BLOCK-DEVICE; M - MOUNTED; m - MEDIA-SHARING
Columns: SLOT, MODEL, SERIAL, INTERFACE, SIZE, FREE, FS, RAID-MASTER
# SLOT MODEL SERIAL INTERFACE SIZE FREE FS RAID-MASTER
0 BMm usb2 JetFlash Mass Storage Device 1KRK9J0D USB 2.00 480Mbps 8 032 092 160 4 585 451 520 ext4 none
# duplicate vlan ids are not allowed due to interface list support, please merge vlan entries into one
[admin@crs309] /interface/bridge/vlan> export compact
# 2025-02-03 10:55:19 by RouterOS 7.17.1
# software id = ZBSD-VLT6
#
# model = CRS309-1G-8S+
# serial number = HG509ZJGZGZ
/interface bridge vlan
add bridge=bridge comment="public internet" tagged=sfp-sfpplus1,bridge,sfp-sfpplus7 vlan-ids=1000
add bridge=bridge tagged=bridge,sfp-sfpplus1,sfp-sfpplus7,sfp-sfpplus3 vlan-ids=911
# duplicate vlan ids are not allowed due to interface list support, please merge vlan entries into one
add bridge=bridge comment="trunk ports" tagged=sfp-sfpplus7,bridge,sfp-sfpplus1 vlan-ids=5-8,15,44,59,666
# duplicate vlan ids are not allowed due to interface list support, please merge vlan entries into one
add bridge=bridge comment="att wan" tagged=bridge,sfp-sfpplus1,sfp-sfpplus7,sfp-sfpplus5 vlan-ids=1001
add bridge=bridge comment="management vlan 2" tagged=bridge,sfp-sfpplus1,sfp-sfpplus7 untagged=sfp-sfpplus5 vlan-ids=2
add bridge=bridge comment="wifi vlan" tagged=sfp-sfpplus3 vlan-ids=5
[admin@crs309] /interface/bridge/vlan>
Any /interface/vlan interface that has its interface= set to a vlan-filtering=yes /interface/bridge, will "dynamically" get added to /interface/bridge/vlans with the bridge marked as a tagged= interface. So a "/interface/bridge/vlan/print" would show the "D" mark ones with vlan-ids from the L3 VLAN interface. And likely why your "static" config in ":export" it shows the comment since any vlan-id to VLAN that has a L3 interface is redundant config. But it should be harmless AFAIK, as it's just ignoring the duplicate.I'm having an issue after upgrading. I'm getting a message under bridge vlan:
I have eyeballed the config and don't see any duplicates. Things seem to be working, but the message is concerning and it also smacks my hands any time I want to make any changes.Code: Select all# duplicate vlan ids are not allowed due to interface list support, please merge vlan entries into one
I've been following the changes around automatically / dynamically tagging bridges, and dynamically adding untagged for bridge port pvid has been a thing for a while now, but in the past there was no issue being explicit with the config.Any /interface/vlan interface that has its interface= set to a vlan-filtering=yes /interface/bridge, will "dynamically" get added to /interface/bridge/vlans with the bridge marked as a tagged= interface. So a "/interface/bridge/vlan/print" would show the "D" mark ones with vlan-ids from the L3 VLAN interface. And likely why your "static" config in ":export" it shows the comment since any vlan-id to VLAN that has a L3 interface is redundant config. But it should be harmless AFAIK, as it's just ignoring the duplicate.I'm having an issue after upgrading. I'm getting a message under bridge vlan:
I have eyeballed the config and don't see any duplicates. Things seem to be working, but the message is concerning and it also smacks my hands any time I want to make any changes.Code: Select all# duplicate vlan ids are not allowed due to interface list support, please merge vlan entries into one
Now the underlying issue is that automatic VLAN tagged=bridge behavior is NOT expressed in config, other than by that new comment to tell you about the situation - which does make folks now aware of the new 7.16 logic for bridged VLANs (which I think 7.17 add comment about it). But dynamic config is never express in :export, so it is tricky problem if you're used to auditing VLANs via config....
Anyway, I suspect a "/interface/bridge/vlan/print detail" would give you a fuller picture.
[admin@crs309] /interface/bridge/vlan> print
Flags: D - DYNAMIC
Columns: BRIDGE, VLAN-IDS, CURRENT-TAGGED, CURRENT-UNTAGGED
# BRIDGE VLAN-IDS CURRENT-TAGGED CURRENT-UNTAGGED
;;; public internet
0 bridge 1000 bridge
sfp-sfpplus7
sfp-sfpplus1
1 bridge 911 bridge
sfp-sfpplus7
sfp-sfpplus3
sfp-sfpplus1
;;; duplicate vlan ids are not allowed due to interface list support, please merge vlan entries into one
;;; trunk ports
2 bridge 5-8 bridge
15 sfp-sfpplus7
44 sfp-sfpplus1
59
666
;;; duplicate vlan ids are not allowed due to interface list support, please merge vlan entries into one
;;; att wan
3 bridge 1001 bridge
sfp-sfpplus7
sfp-sfpplus5
sfp-sfpplus1
;;; management vlan 2
4 bridge 2 bridge sfp-sfpplus5
sfp-sfpplus7
sfp-sfpplus1
;;; wifi vlan
5 bridge 5 sfp-sfpplus3
;;; added by pvid
6 D bridge 1 bridge
sfp-sfpplus7
sfp-sfpplus1
;;; added by pvid
7 D bridge 6 sfp-sfpplus3
[admin@crs309] /interface/bridge/vlan>
[admin@crs309] /interface/bridge/vlan> set tagged=sfp-sfpplus7,sfp-sfpplus1 numbers=2
failure: vlan already added
[admin@crs309] /interface/bridge/vlan>
add bridge=bridge comment="trunk ports" tagged=sfp-sfpplus7,bridge,sfp-sfpplus1 vlan-ids=5-8,15,44,59,666
add bridge=bridge comment="trunk ports" tagged=sfp-sfpplus7,bridge,sfp-sfpplus1 vlan-ids=6-8,15,44,59,666
add bridge=bridge comment="wifi vlan" tagged=sfp-sfpplus3 vlan-ids=5
add bridge=bridge comment="wifi vlan" tagged=sfp-sfpplus7,bridge,sfp-sfpplus1,sfp-sfpplus3 vlan-ids=5
MikroTik RouterOS 7.17.1 (c) 1999-2025 https://www.mikrotik.com/
...
[admin@HubCerrado] > /system routerboard/print
routerboard: yes
model: RB4011iGS+
......
[admin@HubCerrado] > /file print
...
28 skins/wifiquefunciona7.json .json file 3731 2024-11-24 15:41:11
....
[admin@HubCerrado] > /user group set full skin=wifiquefunciona7
input does not match any value of skin
[admin@HubCerrado] >
The SMB server still suffers from compatibility issues with certain clients.What's new in 7.17.1 (2025-Jan-30 12:29):
Just did some light routing rules on my home router to see if there were any issues with.. since I depend on routing rules heavily.. and at least in my small environment at home with my LTE failover.. seems to be working just fine.. did you ever get this resolved ?Hmmm, since the update from 7.17 to 7.17.1 my routing rules are not working anymore.
I´ve two ISP-lines (TK is main, VF is backup) and SIP numbers from both.
To prevent the connectivity to the VF SIP numbers over the TK line I´ve created coresponding routing rules.
That worked fine until the update. After it all 3 VF numbers were offline.
A trace shows me that the connection went over the TK-line instead over the VF-line, so the rules were ignored.
The reactivation of dedicated routing entries in the MAIN table fixed it.
@MT: could you please check this behaviour?
It's not really a duplicate, that earlier entry doesn't specify sfp-sfpplus3. So yes two entries with tagged vlan 5, but they are covering interfaces that don't overlap. Also it won't let me touch any of the entries, it keeps giving the error failure: vlan already added every time I try to make a change. It won't even let me disable the entry #5 from above. I was able to "fix" this issue earlier on my rb5009 by nuking the entries and recreating them, but that locked external access and I was only able to finish the config from a serial console, even though I started under "safe mode". I'm now out of town and I'm obviously not trying that on a crs309.If you look at vlan id 5, it currently has two separate entries with tagged populated in both. You should change
Code: Select alladd bridge=bridge comment="trunk ports" tagged=sfp-sfpplus7,bridge,sfp-sfpplus1 vlan-ids=5-8,15,44,59,666
into
Code: Select alladd bridge=bridge comment="trunk ports" tagged=sfp-sfpplus7,bridge,sfp-sfpplus1 vlan-ids=6-8,15,44,59,666
and change
Code: Select alladd bridge=bridge comment="wifi vlan" tagged=sfp-sfpplus3 vlan-ids=5
into
Code: Select alladd bridge=bridge comment="wifi vlan" tagged=sfp-sfpplus7,bridge,sfp-sfpplus1,sfp-sfpplus3 vlan-ids=5
2025-02-04 01:09:47 system,error,critical router was rebooted without proper shutdown, probably kernel failure
2025-02-04 01:09:48 system,error,critical kernel failure in previous boot
2025-02-04 01:09:48 system,error,critical out of memory condition was detected
If you are using wifi-qcom-ac that is to be expected...Hello! Still have sometimes on AC2:
Code: Select all2025-02-04 01:09:47 system,error,critical router was rebooted without proper shutdown, probably kernel failure 2025-02-04 01:09:48 system,error,critical kernel failure in previous boot 2025-02-04 01:09:48 system,error,critical out of memory condition was detected
On CCR2116-12G-4S+ router, with v7.17.1 stable version, Webfig skin designer does not workon the CCR2116-12G-4S+ router, the Webfig skin designer is not working with v7.17. File is present on the correct place (skins/skinname.json) but is not selectable via System/User/Groups menu.
Same for me, upgraded my RB1100AHx2 PPC and i'm unable to change device-mode options. I notified MT support and received confirmation that this will be solved in next release.Since the client portal is down... here goes a Bug report:
on PowerPC platforms (RB1100AHX2, RB600A), "Device-Mode" is more broken than normal
trying to update it only causes the "attempt count" to increase, the reset-button is unresponsive(RB600) or effectivelly non-existant(RB1100AHx2, internal button requires disassembly)
cutting power also does not work, increasing "attempt count" every time.
Could you please explain the process you would use to netinstall thousands of CPEs—devices installed in customers' homes and businesses—to free up a few hundred kilobytes of space for an upgrade? For example, these devices are spread across more than a dozen U.S. states. The furthest locations would require over 40 hours of driving (almost 3,000 miles), not to mention installations that exist in other countries.@optio
Seems like you already had reduced free disk space on 7.16 already. I too have container+wifi-qcom-ac installed and about 200kb free on 7.17.1 (was 270kb on 7.17.0).
see viewtopic.php?t=213941#p1119443
Unless you have stored some files/graphs on your flash, you can reclaim disk space by a netinstall with keep-configuration flag. Last time I did that at 7.15 IIRC and regained quite some space.
But there is again a trend of shrinking free-space.