You can install cm2 before update. Then switch the packages and update afterwards. I agree that automatic wireless packages switch during the update would be much more convenient.PLEASE make wireless-fp auto replaced by wireless-cm2. Otherwise it will be a pain to upgrade all CPEs in the network to 6.36
And... Could you please release a changelog for wireless-fp -> wireless-cm2?
Sure, but you have to manually (or automatically in batch) change package.You can install cm2 before update. Then switch the packages and update afterwards. I agree that automatic wireless packages switch during the update would be much more convenient.PLEASE make wireless-fp auto replaced by wireless-cm2. Otherwise it will be a pain to upgrade all CPEs in the network to 6.36
And... Could you please release a changelog for wireless-fp -> wireless-cm2?
As far as I'm aware the only major difference between the two is the supported version of CAPsMAN. Otherwise they should be functionally equivalent. If you happen to used CAPsMAN v1, there are upgrade instruction on the wiki.Could you please release a changelog for wireless-fp -> wireless-cm2?
That's true, but you don't have to do that at the same time- start doing the former now already, if you feel like.you have to schedule both wireless package change and RouterOS upgrade.
yes, but doing auto-upgrade with manually added packages (e.g. not the bundled in main package) will fail as wireless-fp-x.xx-arch.npk will not be on the distribution site.As far as I'm aware the only major difference between the two is the supported version of CAPsMAN. Otherwise they should be functionally equivalent. If you happen to used CAPsMAN v1, there are upgrade instruction on the wiki.Could you please release a changelog for wireless-fp -> wireless-cm2?
+1I´d like to request a feature for wireless-rep package:
- Is it possible to show the username (beside the MAC address) for all connected clients within CAPSMAN window?
(It would be helpful to see on which access point a client is connected when users calling support and complains about connectivity issues they have...)
Is it possible to show CCQ for each connected client? Or dropped / retransmitted frames percentage?
Is it possible to perform background scan for each remote radio?
(It would be helpful to see connection quality statistics as well as channel usage statistics within CAPSMAN window)
+ vendor OUI auto namingshow the username (beside the MAC address) for all connected clients within CAPSMAN window?
)
What do you mean? Is '/system identity' on a CAP device not what you need?+ custom names for CAP devices
Let´s summarize the feature requests for wireless-rep:Is it possible to show CCQ for each connected client? Or dropped / retransmitted frames percentage?
Is it possible to perform background scan for each remote radio?
(It would be helpful to see connection quality statistics as well as channel usage statistics within CAPSMAN window)+ vendor OUI auto namingshow the username (beside the MAC address) for all connected clients within CAPSMAN window?
)
+ custom names for CAP devices
+ centralized ressource monitoring / statistics ([CPU, RAM, amount of connected clients for each CAP device], total amount of connected devices, frequency band usage, "rogue devices" using the same frequency band or the same SSID per CAP device,...)
Requests for CAPsMAN bug fixes and new features, based on my experience with the current RC version:
1. {Nice to have} Add "CCQ", P Throughput" and "Signal to Noise", "Encryption" and "Group Encryption" and "WMM Enabled" fields to CAPsMAN Registration Table.
2. {Feature} Add "Frequency Mode", "WMM Support", "Multicast Buffering", "Keepalive frames", "Adaptive Noise Immunity" and "AMPDU Priorities" to CAPsMAN Config Settings.
3. {BUG} Make "Multicast Helper=full" in CAPsMAN slave interfaces work (now the interfaces stay in default setting).
4. {BUG} Make "Country=no_country_set" work on CAPsMAN 5GHz 802.11ac interfaces (it works on 2.4GHz, but on 5GHz ones it results in "no supported band" error message, regardless of the band and frequency settings).
5. {Feature} Add a scan/freq usage feature in CAPsMAN, with an aption to run in the background. Right now, if one wants to scan, they have to detach the physical interface from the Manager, do the scan and re-attach it. [In the future, use this info to auto-adjust CAP channels and power levels.]
6. {Annoying} Stop CAPsMAN from creating virtual interfaces on CAPs with name "wlanXXX" where XXX is a number which is incremented every time the interface is disabled and re-enabled.
7. {Nice to have} Let the user rename the virtual interfaces on the CAPs, like he/she can do with physical interfaces.
+1Can on 6.36 final release a forced changeover from wireless-fp to wireless-cm2?
Good news, but...nkourtzis, this problem is reproduced and fixed. We hope we will be able to release a fixed version today.
What you call "stable" is called "bugfix only" by Mikrotik guys. And it is version 6.32.4 at the moment. Please read release branch descriptions at the top of official download page. CAPsMAN is rock solid in 6.32.4 with wireless-cm2 for me.When was this bug introduced and how did it make it into the "stable" version?
Hi Sergejs,*) traffic-flow - added ipfix support (RFC5101 and RFC5102);
How it can be used? I have not found in winbox anywhere.MikroTik RouterOS v6.36rc4 is released.
*) tunnel - added option to auto detect tunnel local-address;
ОК.We will adjust Winbox in future rc releases.
/interface 6to4 add local-address=0.0.0.0 remote-address=192.168.88.1
Work with 6to4, but not with gre or ipip existing tunnels.it would be something like this example for tunnelbroker 6to4:
Code: Select all/interface 6to4 add local-address=0.0.0.0 remote-address=192.168.88.1
Any hope to get IPIP point to multipoint tunnel interfaces like in GNU/Linux?it would be something like this example for tunnelbroker 6to4:
Code: Select all/interface 6to4 add local-address=0.0.0.0 remote-address=192.168.88.1
/interface ipip add local-address=11.22.33.44 remote-address=0.0.0.0 name="ipip1"
/ip route add dst-address=10.0.1.0/24 gateway=1.2.3.4%ipip1
/ip route add dst-address=10.0.2.0/24 gateway=2.3.4.5%ipip1
/ip tunnel add ipip1 mode ipip local 11.22.33.44
/ip route add 10.0.1.0/24 via 1.2.3.4 dev ipip1
/ip route add 10.0.2.0/24 via 2.3.4.5 dev ipip1
Can you please tell exactly what should i use instead of it to still have fastpath enabled(as on CCR without it fastpath support was disabled)?wireless - wireless-fp is discontinued, it needs to be uninstalled/disabled before upgrade;
Both replacement modules (wireless-cm2 and wireless-rep) support fastpath.Can you please tell exactly what should i use instead of it to still have fastpath enabled(as on CCR without it fastpath support was disabled)?wireless - wireless-fp is discontinued, it needs to be uninstalled/disabled before upgrade;
Or fastpath support migrated fully to main module now?
The only wireless package that does not support fastpath was old/regular "wireless", which was first removed from the bundle package lust July, then completely discontinued last December. All three "wireless-fp", "wireless-cm2" and "wireless-rep" do support fastpath. The major difference is -fp supports CAPsMAN v1 while -cm2 and -rep support CAPsMAN v2, and v1 is not compatible with v2 so you have to plan the migration in case you use CAPsMAN.Can you please tell exactly what should i use instead of it to still have fastpath enabled(as on CCR without it fastpath support was disabled)?
What encryption are you running?Hi.
Is any chance to improve TCP performance on single session over IPSEC on IPIP/GRE tunnel in this version?
Now is max 40-80 Mbps per session regardless of device model (tested on CCR 1009 and CCR 1036).
Could you share that config?What encryption are you running?Hi.
Is any chance to improve TCP performance on single session over IPSEC on IPIP/GRE tunnel in this version?
Now is max 40-80 Mbps per session regardless of device model (tested on CCR 1009 and CCR 1036).
We see close to 600mbit/s over EoIP/IPSEC with AES256-AES256-CBC on a CCR1036
I don't know if Mikrotik hired a monkey to direct the development team, but going from bad to worse. Where is the stability of the branch 5? MikroTik is provoking nightmares to their "carrier users".Several RB751's and a 951G have locked up... WTF guys... Please, quit putting out software that locks up our units.
I have every right to complain if the software locks up my router !!RC software is for testing purposes, do not complain if your unit doesn't boot after upgrade. If you want to be useful, try to describe your problem to mikrotik's staff, so they can find and fix the bug that caused it.
You have never been a programmer. Test software is far from perfect. Complex software can easily include deadly bugs. If you don't want your device to lock up, don't use RC, there are other two branches that suit you better.I have every right to complain if the software locks up my router !!
Are you speaking for Mikrotik as an authority of what will, and what won't lock up? Or should I just roll the dice?If you don't want your device to lock up, don't use RC, there are other two branches that suit you better.
MT might not be rock solid and probably never will, not only it's extremely complicated system but also it's constantly evolving. That being said if you randomly upload RC version on your production system you can't really have right to complain, it says right at the top of the download page - "(...) Release candidate for testing the absolute latest builds in test environments".Are you speaking for Mikrotik as an authority of what will, and what won't lock up? Or should I just roll the dice?
If I ran a company like Mikrotik, I wouldn't want people to think that my product might include "deadly bugs".
The only thing we know about you is your bad behaviour.Thank you for your comments, but I must say..You do not know who I am, or what I am able to do.
You should expect that official software releases work as they should. If not, you have right to complain.The one thing I am though is a customer, and so I EXPECT certain things.
You can even roll two dices at once.Are you speaking for Mikrotik as an authority of what will, and what won't lock up? Or should I just roll the dice?
Who stops you to run your own software company ? Show us how to release software with no errors ? Each time.If I ran a company like Mikrotik, I wouldn't want people to think that my product might include "deadly bugs".
Thank you for your constructive complaints.Again, I thank you for your constructive(?) comments.
For example:RC software is for testing purposes, do not complain if your unit doesn't boot after upgrade. If you want to be useful, try to describe your problem to mikrotik's staff, so they can find and fix the bug that caused it.
Great Thanks. I will back down to 6.35, disable package and w8 for the new rc to come out. I'm eager to se what have been done with automatic tunnel ip selection..... May solve some of our pressing needs.If you are talking about not disabling wireless package, then you can not upgrade until you have removed it. From which version did you upgrade? As we were telling in previous topics about other versions, there was a problem with upgrade but it is not an issue of 6.36rc. It was a problem with old version on which actually upgrade is performed.
Try to Netinstall device to this same rc version to see if problem was caused by old version or this new one:
http://wiki.mikrotik.com/wiki/Manual:Netinstall
Looks like OSPF is not working properly with rc6 because of this fix. Please use with caution. This change will hopefully fix problems when two OSPFv3 neighbors are stuck in Exchange/ExStart states.*) route - fixed ospf by handling ipv6 encoded prefixes with stray bits;
I have a long open ticket with Mikrotik on this issue. I'm guessing you are using an application that is sensitive to packet loss and/or you have latency above a few milliseconds.What encryption are you running?Hi.
Is any chance to improve TCP performance on single session over IPSEC on IPIP/GRE tunnel in this version?
Now is max 40-80 Mbps per session regardless of device model (tested on CCR 1009 and CCR 1036).
We see close to 600mbit/s over EoIP/IPSEC with AES256-AES256-CBC on a CCR1036
So I just keep waiting to see it in the changelog. I would welcome others inviting them to make this a higher priority though.Hello,
There is no fix yet. When we will fix it, changes will be in the changelog.
Regards,
Maris B.
We are working on the fix.
I don't know if Mikrotik hired a monkey to direct the development team, but going from bad to worse. Where is the stability of the branch 5? MikroTik is provoking nightmares to their "carrier users".Several RB751's and a 951G have locked up... WTF guys... Please, quit putting out software that locks up our units.
We upgraded to RC because MikroTik support indicates, we are following with MikroTik support team.I don't know if Mikrotik hired a monkey to direct the development team, but going from bad to worse. Where is the stability of the branch 5? MikroTik is provoking nightmares to their "carrier users".Several RB751's and a 951G have locked up... WTF guys... Please, quit putting out software that locks up our units.
Why don't you move to another brand then? Many less features, many less bugs. Or many features, less bugs, 10 times the price. Slow release cycle and no access to beta software. You have a choice. I anyone told you you can have it all, they lied to you my friend.
The upgrade process of the latests RC and the final version must upgrade automatically wireless-fp to the most reliable alternative wireless package, as it did when plain wireless got replaced by wireless-fp somewhere around v6.30. I understand that this is are initial RC releases and for testing purposes manually uninstalling a package its ok, but this is something that Mikrotik should address before final release to avoid some nightmares their fellow Wisp's...Note: wireless-fp package is discontinued in this version. It needs to be uninstalled/disabled before upgrade. Use wireless-rep or wireless-cm2 instead.
I using default settings and encryption - aes-128-cbc (I use property "IPsec Secret" in IPIP tunnel).nz_monkey wrote:
dev246 wrote:
Hi.
Is any chance to improve TCP performance on single session over IPSEC on IPIP/GRE tunnel in this version?
Now is max 40-80 Mbps per session regardless of device model (tested on CCR 1009 and CCR 1036).
What encryption are you running?
We see close to 600mbit/s over EoIP/IPSEC with AES256-AES256-CBC on a CCR1036
Per cor CPU does not exceed 1-5%, this same with total CPUstrods wotre:
dev246 - Is any of CPU cores loaded 100%? Not total CPU load but load per CPU core.
This isn't sensitive application issue and is fully replicable. Application that i'm using is simply iperf with parm "-P" for setting number of parallel connections (result as this same when i using filezilla for FTP traffic , or simple windows file sharing for SMB traffic)alexjhart wotre:
nz_monkey wrote:
dev246 wrote:
Hi.
Is any chance to improve TCP performance on single session over IPSEC on IPIP/GRE tunnel in this version?
Now is max 40-80 Mbps per session regardless of device model (tested on CCR 1009 and CCR 1036).
What encryption are you running?
We see close to 600mbit/s over EoIP/IPSEC with AES256-AES256-CBC on a CCR1036
I have a long open ticket with Mikrotik on this issue. I'm guessing you are using an application that is sensitive to packet loss and/or you have latency above a few milliseconds.
So on one hand, I have some sympathy for you, with regard to the criticism you are receiving. I agree that in general practice, you should only install RC software (most of the time) on a production system if a) you absolutely need the features in the RC, and b) you have a reasonably good history with the developer that gives you confidence in the stability of their RC releases. As an example, I wouldn't have any problem putting a pfSense RC release in a production environment if, say, it was the only version that would support the NIC I was using, because PFS has a history of releasing betas that are stable enough for production, and RCs that are more stable than other companies' "release" versions.Each and every release we have to remind two things.
First of all, rc versions are nightly builds and are not completely tested. It means that each version can and must be tested only on devices which you are willing to Netinstall, if it will be necessary. Basically - just for testing.
Secondary, if you want to complain about specific things, then please create specific topic for that. This is 6.36rc version topic which is created for actual software related discussions to help MikroTik staff and our clients to get rid of problems within specific version - 6.36.
Support staff is actually very open minded and is open for suggestions. Send your requests, suggestions and complaints to support team, if problem is related to software in any way. Otherwise, please create separate topics and do not hijack topic within which people are actually tying to help each other.
As for rc version itself - we are not seeing reboot loops with this version in general. It must/should be related to configuration. Please send supout files and/or serial output to support@mikrotik.com so we can research this particular issue.
Agree !If you plan on using the structure you outlined above (i.e. builds released with limited or no testing), I would suggest changing the branch name from "release candidate" to "snapshot" or "nightly" to reduce confusion, and bring the terminology more inline with what is used more broadly in the industry.
OMG ... no more doubled/tripled rules for each interface ... OMG*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-zone matcher in firewall (CLI only);
Change of the year!*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-zone matcher in firewall (CLI only)
Can I add a single interface into multiple zones?Under "/interface list" you can add multiple interfaces and group under list with a common name. Now this list/zone will be available in firewall. In firewall there are new matchers called in-zone and out-zone implemented. Basically, it is the same thing as in-interface and out-interface, but now by using "/interface list" you can select multiple interfaces on one firewall rule.
OK I have had a play with it, and it appears to work as advertised very nice.*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-zone matcher in firewall (CLI only)
Before reading this message from nz_monkey, I was going to say the exact same thing :My feedback is:
- Calling it an "interface list" in one part of RouterOS, and a "zone" in another is confusing. Make it either a "zone" or an "interface list" not both.
- Using "in-zone" and "out-zone" is not consistent with the rest of the firewall rule config on RouterOS. It should be "src-zone" and "dst-zone" or "src-interface-list" and "dst-interface-list"
Looks like OSPF is not working properly with rc6 because of this fix. Please use with caution. This change will hopefully fix problems when two OSPFv3 neighbors are stuck in Exchange/ExStart states.*) route - fixed ospf by handling ipv6 encoded prefixes with stray bits;
09:18:50 route,ospf,info OSPFv3 neighbor 138.97.60.1: state change from Exchange to 2-Way
09:18:56 route,ospf,info Database Description packet has different options field
09:18:56 route,ospf,info received=11001000 (V6|E|R)
09:18:56 route,ospf,info mine=11001000 (V6|E|R)
09:18:56 route,ospf,info OSPFv3 neighbor 138.97.60.1: state change from Exchange to 2-Way
09:19:01 route,ospf,info OSPFv3 neighbor 138.97.60.1: state change from ExStart to Down
I vote for interface list naming convention. Should be in and out as the interfaces are also called in and out. Src and dst is about the addresses in the packet not about interfaces of the router.OK I have had a play with it, and it appears to work as advertised very nice.*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-zone matcher in firewall (CLI only)
My feedback is:
- Calling it an "interface list" in one part of RouterOS, and a "zone" in another is confusing. Make it either a "zone" or an "interface list" not both.
- Using "in-zone" and "out-zone" is not consistent with the rest of the firewall rule config on RouterOS. It should be "src-zone" and "dst-zone" or "src-interface-list" and "dst-interface-list"
Does route marking problem fixed?(bug in 6.35.1 and 6.36rc6)Version 6.36rc8 has been released.
*) chr - fixed stalling services (introduced in 6.36rc6);
*) dhcp-server - fixed radius framed route addition after reboot on client renew;
*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-zone matcher in firewall (CLI only);
*) firewall - added raw table to be able to disable connection tracking on selected packets or drop packets before connection tracking (CLI only);
*) lte - added cinterion pls8 support;
*) lte - improved multiple same model modems identification;
*) route - fixed ospf-v3 crash (introduced in 6.36rc6);
*) traffic-flow - added ipfix support (RFC5101 and RFC5102);
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as suspected or after crash.
This is great! ...*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-zone matcher in firewall (CLI only);
Please tell me we're going to extend that!!!Spoiler alert - alexjhart was correct. This new feature for now is available in firewall only, but will be available also in other places. That is why it is available under "/interface list" not "/ip firewall interfaces-list".
As for naming - we will discuss and decide which name we should use for firewall matcher.
Why new matcher? It is not posibble to integrate into In-Interface and Out-Interface? Address list should be too integrate into Src-Address and Dst-Address.*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-zone matcher in firewall (CLI only);
Because of greater flexibility ? I can bet that in short time someone finds a "case" when it will be useful.Why new matcher? It is not posibble to integrate into In-Interface and Out-Interface?
Thank you for the sanityAfter your requests we have renamed matchers in firewall by replacing zone with interface-list.
Issues in RB3011 (unrecognized disk) cannot mount USB flash drive supported?Version 6.36rc9 has been released.
Changes since previous version:
*) arm - added Dude server support;
*) arm - fixed kernel failure on low memory;
*) discovery - fixed identity discovery (introduced in 6.36rc5 and 6.35.1);
*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-zone matcher in firewall (CLI only);
*) log - fixed time zone adjustment (introduced in 6.36rc5 and 6.35.1);
*) lte - added cinterion pls8 support;
*) snmp - fixed snmp timeout (introduced in 6.36rc5 and 6.35.1);
*) ssl - fixed memory leak on ssl connect/disconnect (fetch, ovpn, etc.);
*) trafficflow - allow to filter with interface lists;
*) vrrp - fixed missing vrrp interfaces after upgrade (introduced in 6.36rc5 and 6.35.1);
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as suspected or after crash.
IMHO those two fields are basically exclusive, you need one (in-interface=<interface name>) or the other (in-interface-list=<list name>), I can't think about any use for both at the same time (feel free to correct me). To me it looks like unnecessary exposing of low level stuff and I think common in-interface=<interface or list name> would work fine.Because of greater flexibility ? I can bet that in short time someone finds a "case" when it will be useful.Why new matcher? It is not posibble to integrate into In-Interface and Out-Interface?
Quick example:IMHO those two fields are basically exclusive, you need one (in-interface=<interface name>) or the other (in-interface-list=<list name>
I have one as welljondavy - Please provide an example of export which you are not being able to import afterwards
#line 1407 + 1408
set cpu-frequency=650MHz init-delay=0s memory-frequency=300MHz \
expected end of command (line 1 column 26)
notToNew - This is not LCD configuration but try to delete init-delay configuration and import afterwards. Does device on which you test import support init-delay and actually has firmware version with init-delay support?
Sorry, I should have added that it's not LCD.notToNew - This is not LCD configuration but try to delete init-delay configuration and import afterwards. Does device on which you test import support init-delay and actually has firmware version with init-delay support?
RouterBOARD 952Ui-5ac2nD
/system routerboard settings> set cpu-frequency=650MHz init-delay=0s memory-frequency=300MHz protected-routerboot=disabled
/system routerboard settings
set cpu-frequency=650MHz init-delay=0s memory-frequency=300MHz \
protected-routerboot=disabled
expected end of command (line 1 column 26)
Has anyone tried IPFIX over NetFlow?*) traffic-flow - added ipfix support (RFC5101 and RFC5102);
Thank you to the support staff and developers who worked to fix this!
*) bonding - implemented l2mtu value == smallest slave interfaces l2mtu;
How exactly this works?MikroTik RouterOS v6.36rc4 is released.
*) tunnel - added option to auto detect tunnel local-address;
you not need add local address to an tunnel only the remote addressHow exactly this works?MikroTik RouterOS v6.36rc4 is released.
*) tunnel - added option to auto detect tunnel local-address;
6 should be like: cap_abcdef. Where abcdef are the last digits of the cap WiFi mac address.Let´s summarize the feature requests for wireless-rep:Is it possible to show CCQ for each connected client? Or dropped / retransmitted frames percentage?
Is it possible to perform background scan for each remote radio?
(It would be helpful to see connection quality statistics as well as channel usage statistics within CAPSMAN window)+ vendor OUI auto namingshow the username (beside the MAC address) for all connected clients within CAPSMAN window?
)
+ custom names for CAP devices
+ centralized ressource monitoring / statistics ([CPU, RAM, amount of connected clients for each CAP device], total amount of connected devices, frequency band usage, "rogue devices" using the same frequency band or the same SSID per CAP device,...)
My post with CAPsMAN feature requests in the 6.35rc thread:
Requests for CAPsMAN bug fixes and new features, based on my experience with the current RC version:
1. {Nice to have} Add "CCQ", P Throughput" and "Signal to Noise", "Encryption" and "Group Encryption" and "WMM Enabled" fields to CAPsMAN Registration Table.
2. {Feature} Add "Frequency Mode", "WMM Support", "Multicast Buffering", "Keepalive frames", "Adaptive Noise Immunity" and "AMPDU Priorities" to CAPsMAN Config Settings.
3. {BUG} Make "Multicast Helper=full" in CAPsMAN slave interfaces work (now the interfaces stay in default setting).
4. {BUG} Make "Country=no_country_set" work on CAPsMAN 5GHz 802.11ac interfaces (it works on 2.4GHz, but on 5GHz ones it results in "no supported band" error message, regardless of the band and frequency settings).
5. {Feature} Add a scan/freq usage feature in CAPsMAN, with an aption to run in the background. Right now, if one wants to scan, they have to detach the physical interface from the Manager, do the scan and re-attach it. [In the future, use this info to auto-adjust CAP channels and power levels.]
6. {Annoying} Stop CAPsMAN from creating virtual interfaces on CAPs with name "wlanXXX" where XXX is a number which is incremented every time the interface is disabled and re-enabled.
7. {Nice to have} Let the user rename the virtual interfaces on the CAPs, like he/she can do with physical interfaces.
I can understand that having 3 different wireless packages is not desirable.why wireless FP is discontinued..?
any specific reason
1) dude server nt clientThe Dude client for ARM , missing
Once again, I second request #6, and was promised about two months ago by support that they would try to work on implementing it if it didn't conflict with anything else. I figured I would wait until the 3 month mark to follow up on their progress. I like the idea to tie the name of the interface to the wifi MAC - that would be even more helpful than just a static number.6 should be like: cap_abcdef. Where abcdef are the last digits of the cap WiFi mac address.Let´s summarize the feature requests for wireless-rep:
+ vendor OUI auto naming
+ custom names for CAP devices
+ centralized ressource monitoring / statistics ([CPU, RAM, amount of connected clients for each CAP device], total amount of connected devices, frequency band usage, "rogue devices" using the same frequency band or the same SSID per CAP device,...)
My post with CAPsMAN feature requests in the 6.35rc thread:
Requests for CAPsMAN bug fixes and new features, based on my experience with the current RC version:
1. {Nice to have} Add "CCQ", P Throughput" and "Signal to Noise", "Encryption" and "Group Encryption" and "WMM Enabled" fields to CAPsMAN Registration Table.
2. {Feature} Add "Frequency Mode", "WMM Support", "Multicast Buffering", "Keepalive frames", "Adaptive Noise Immunity" and "AMPDU Priorities" to CAPsMAN Config Settings.
3. {BUG} Make "Multicast Helper=full" in CAPsMAN slave interfaces work (now the interfaces stay in default setting).
4. {BUG} Make "Country=no_country_set" work on CAPsMAN 5GHz 802.11ac interfaces (it works on 2.4GHz, but on 5GHz ones it results in "no supported band" error message, regardless of the band and frequency settings).
5. {Feature} Add a scan/freq usage feature in CAPsMAN, with an aption to run in the background. Right now, if one wants to scan, they have to detach the physical interface from the Manager, do the scan and re-attach it. [In the future, use this info to auto-adjust CAP channels and power levels.]
6. {Annoying} Stop CAPsMAN from creating virtual interfaces on CAPs with name "wlanXXX" where XXX is a number which is incremented every time the interface is disabled and re-enabled.
7. {Nice to have} Let the user rename the virtual interfaces on the CAPs, like he/she can do with physical interfaces.
jondavy - Please provide an example of export which you are not being able to import afterwards
ok, Dude windows client, please link1) dude server nt clientThe Dude client for ARM , missing
2) separate package can be downloaded here:
http://download2.mikrotik.com/routeros/ ... 11-arm.npk
really I'm just not using it and installing the companies that attend for lack of decent monitoringStill no band steering and CCQ in CAPsMAN
If want to use it in a commercial environment, 2.4 and 5G in a same SSID is a basic requirement !!!!
Done Ticket#2016051166000808.docmarius - Please send supout file to support@mikrotik.com. Generate file while port is inactive. We can not reproduce such issue. If something is connected then it is active, if we disconnect USB, then it becomes inactive. Connect back and active again.
Is it possible add support for ASIX USB3 Ethernet?Version 6.36rc12 has been released.
...
*) usb - implement possibility to recognize usb hubs/ethernet-dongles;
(if usb hubs/ethernet-dongles shows up as LTE interface with this version - send supout.rif file)
...
OSPFv3 is running fine with H3C/Comware 5 (HP A series switches) here.When OSPFv3 will be fixed? Still cant use it with different manufacter!
I trying to run this with an EdgeRouter Pro.OSPFv3 is running fine with H3C/Comware 5 (HP A series switches) here.When OSPFv3 will be fixed? Still cant use it with different manufacter!
and what the problem with that today ?Is there a possibility to log PSU failures on CCR in future versions?
+1Since v 6.35.1 there is a bug that causes mikrotik to fail routing based on routing marks.
For example i have a mangle rule that sets routing mark on connections to certain IPs to go via different interface.
This stopped worked since 6.35.1.
Worst part is that if i start packet sniffer on the affected device, all starts to work normally
Downgrading to 6.35 resolves the problem
6.36 rc 10 that claims to resolve problem does not resolve the problem
You want to have multiple drop-down options for the access list interface, so you could select multiple cap interfaces?Hello! Add in the possibility CAPsMAN - Access List to add one client for several interfaces Cap. Thank you!
and why it shouldn't ?Are you sure, UPS will log PSU failures? (on CCR with redundant PSU).
screenshot above given "just as reference", explanation how to create additionl(to deafult/pre-created by ROS deployment itself)logging rules/policies.Because PSU has nothing to do with UPS?
Very interesting! Is there a reason that you have not done a PPC build of The Dude? There are PPC RouterBoards that outclass the RB3011.*) arm - added Dude server support;
Nice!!!Version 6.36rc16 has been released.
*) firewall - allow to add domain name to address-lists (dynamic entries for resolved addresses will be added to specified list);
Nice!!!Version 6.36rc16 has been released.
*) firewall - allow to add domain name to address-lists (dynamic entries for resolved addresses will be added to specified list);
So which is faster in terms of throughput - fasttrack or no tracking at all?*) firewall - added pre-connection tracking filter - "raw" table, that allow to protect connection-tracking from unnecessary traffic;
My question exactlyNice!!!Version 6.36rc16 has been released.
*) firewall - allow to add domain name to address-lists (dynamic entries for resolved addresses will be added to specified list);
How often is updated?
That's what I would like to know as well.My question exactly
Nice!!!
How often is updated?
I will try to answer the question myself: I think the address is resolved at boot and when DNS TTL reaches 0 and is renew in cache.That's what I would like to know as well.My question exactly
How often is updated?
Test it yourself? That's crazy talk! Actually, good idea. We just tested as well and found the same results. We also noticed that domains with multiple A records add multiple entries, which is welcomed. Even follows CNAMEs.I will try to answer the question myself: I think the address is resolved at boot and when DNS TTL reaches 0 and is renew in cache.That's what I would like to know as well.
My question exactly
Until now I have used a script to resolve the dynamic IP address from where I manage routers. Now it is much easier.Thank you grusu. You managed to answer before us and answer is completely correct.
*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-interface-list matcher in firewall;
Version 6.36rc16 has been released.
..[CUT]..
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as suspected or after crash.
OK ..to give more help I've netinstalled one of the RB3011 with 6.36rc16...[cut].. bajodel - please generate supout file on device and send it to support@mikrotik.com
Why structure of "/interface list" menu is different from "/address list" in WinBox? Why they haven't same logic?*) firewall - added "/interface list" menu which allows to create list of interfaces which can be used as in/out-interface-list matcher in firewall;
Hi Strodsnz_monkey - what type of interfaces do you add there?
bajodel - please generate supout file on device and send it to support@mikrotik.com
I wondered exactly the same thing!Why structure of "/interface list" menu is different from "/address list" in WinBox? Why they haven't same logic?.
The Only viable sullution should be the TTL and Refresh values specified on each individual record but then again a confirmation on that one would be very much apprechiated as the wiki seldom states new features until very much later.My question exactly
Nice!!!
How often is updated?
It has been confirmed already. Check a few posts above.The Only viable sullution should be the TTL and Refresh values specified on each individual record but then again a confirmation on that one would be very much apprechiated as the wiki seldom states new features until very much later.
We talked about this earlier in the thread. They are planning more for this than the current firewall use. Ideally, they consolidate all in the future to use the same logic, but one came long ago and has had less intended scope than the new one.I wondered exactly the same thing!Why structure of "/interface list" menu is different from "/address list" in WinBox? Why they haven't same logic?.
Workflow inconsistency = Bad
Hi Strods, AlexAs we have explained already earlier in this post and others have told - interface list is not a firewall feature. It is already supported not only in firewall but also on traffic flow.
Can we set from 5 sec to 5 minThat's what I would like to know as well.My question exactly
How often is updated?
Timestamp: Jul 5, 1970 11:05:20.000000000 GTB Daylight Time
Timestamp: Jul 5, 1970 11:38:40.000000000 GTB Daylight Time
Timestamp: Jul 5, 1970 12:12:00.000000000 GTB Daylight Time
No. Time Source Destination Protocol Length Info
383778 748.591451000 10.10.153.218 10.26.35.34 CFLOW 542 IPFIX partial flow (500/5 bytes)
Frame 383778: 542 bytes on wire (4336 bits), 542 bytes captured (4336 bits) on interface 0
Ethernet II, Src: Routerbo_XX:XX:XX (XX:XX:XX:XX:XX:XX), Dst: YY:YY:YY:YY:YY:YY (YY:YY:YY:YY:YY:YY)
Internet Protocol Version 4, Src: 10.10.153.218 (10.10.153.218), Dst: 10.26.35.34 (10.26.35.34)
User Datagram Protocol, Src Port: 2055 (2055), Dst Port: 2055 (2055)
Cisco NetFlow/IPFIX
Version: 10
Length: 5
Timestamp: Jul 5, 1970 11:05:20.000000000 GTB Daylight Time
ExportTime: 16013120
FlowSequence: 384
Observation Domain Id: 0
Set 1
FlowSet Id: (Data) (258)
FlowSet Length: 484
Flow 1
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16010.600000000 seconds
EndTime: 16010.600000000 seconds
Packets: 3
Octets: 192
SrcPort: 2000
DstPort: 39216
InputInt: 4
OutputInt: 0
Protocol: 6
IP ToS: 0x00
TCP Flags: 0x18
Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
SrcAddr: 10.10.153.217 (10.10.153.217)
DstAddr: 10.10.153.218 (10.10.153.218)
NextHop: 10.10.153.218 (10.10.153.218)
SrcMask: 0
DstMask: 0
IP TTL: 64
IsMulticast: 0
IP Header Length: 5
IP Total Length: 64
UDP Length: 0
TCP Sequence Number: 1439408172
TCP Acknowledgement Number: 786858282
TCP Windows Size: 905
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.217 (10.10.153.217)
Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 2
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16011.120000000 seconds
EndTime: 16011.120000000 seconds
Packets: 2
Octets: 1056
SrcPort: 2055
DstPort: 2055
InputInt: 0
OutputInt: 4
Protocol: 17
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.26.35.34 (10.26.35.34)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 255
IsMulticast: 0
IP Header Length: 5
IP Total Length: 528
UDP Length: 508
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.26.35.34 (10.26.35.34)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 3
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16011.120000000 seconds
EndTime: 16011.120000000 seconds
Packets: 2
Octets: 800
SrcPort: 2055
DstPort: 2055
InputInt: 0
OutputInt: 4
Protocol: 17
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.69.110.21 (10.69.110.21)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 255
IsMulticast: 0
IP Header Length: 5
IP Total Length: 400
UDP Length: 380
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.69.110.21 (10.69.110.21)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 4
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16012.000000000 seconds
EndTime: 16012.000000000 seconds
Packets: 3
Octets: 194
SrcPort: 33353
DstPort: 179
InputInt: 0
OutputInt: 4
Protocol: 6
IP ToS: 0xc0
TCP Flags: 0x18
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.10.153.217 (10.10.153.217)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 64
IsMulticast: 0
IP Header Length: 5
IP Total Length: 71
UDP Length: 0
TCP Sequence Number: 131047850
TCP Acknowledgement Number: 1912585720
TCP Windows Size: 1016
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.10.153.217 (10.10.153.217)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 5
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16012.000000000 seconds
EndTime: 16012.000000000 seconds
Packets: 3
Octets: 175
SrcPort: 179
DstPort: 33353
InputInt: 4
OutputInt: 0
Protocol: 6
IP ToS: 0xc0
TCP Flags: 0x10
Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
SrcAddr: 10.10.153.217 (10.10.153.217)
DstAddr: 10.10.153.218 (10.10.153.218)
NextHop: 10.10.153.218 (10.10.153.218)
SrcMask: 0
DstMask: 0
IP TTL: 64
IsMulticast: 0
IP Header Length: 5
IP Total Length: 52
UDP Length: 0
TCP Sequence Number: 1912585720
TCP Acknowledgement Number: 131047869
TCP Windows Size: 1082
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.217 (10.10.153.217)
Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
No. Time Source Destination Protocol Length Info
384733 750.593356000 10.10.153.218 10.26.35.34 CFLOW 638 IPFIX partial flow (596/6 bytes)
Frame 384733: 638 bytes on wire (5104 bits), 638 bytes captured (5104 bits) on interface 0
Ethernet II, Src: Routerbo_XX:XX:XX (XX:XX:XX:XX:XX:XX), Dst: YY:YY:YY:YY:YY:YY (YY:YY:YY:YY:YY:YY)
Internet Protocol Version 4, Src: 10.10.153.218 (10.10.153.218), Dst: 10.26.35.34 (10.26.35.34)
User Datagram Protocol, Src Port: 2055 (2055), Dst Port: 2055 (2055)
Cisco NetFlow/IPFIX
Version: 10
Length: 6
Timestamp: Jul 5, 1970 11:38:40.000000000 GTB Daylight Time
ExportTime: 16015120
FlowSequence: 385
Observation Domain Id: 0
Set 1
FlowSet Id: (Data) (258)
FlowSet Length: 580
Flow 1
IPVersion: 04
[Duration: 1.820000000 seconds]
StartTime: 16011.220000000 seconds
EndTime: 16013.040000000 seconds
Packets: 3
Octets: 288
SrcPort: 0
DstPort: 0
InputInt: 4
OutputInt: 0
Protocol: 1
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
SrcAddr: 10.69.110.16 (10.69.110.16)
DstAddr: 10.10.153.218 (10.10.153.218)
NextHop: 10.10.153.218 (10.10.153.218)
SrcMask: 0
DstMask: 0
IP TTL: 63
IsMulticast: 0
IP Header Length: 5
IP Total Length: 96
UDP Length: 0
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 8
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.69.110.16 (10.69.110.16)
Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 2
IPVersion: 04
[Duration: 1.820000000 seconds]
StartTime: 16011.220000000 seconds
EndTime: 16013.040000000 seconds
Packets: 3
Octets: 288
SrcPort: 0
DstPort: 0
InputInt: 0
OutputInt: 4
Protocol: 1
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.69.110.16 (10.69.110.16)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 64
IsMulticast: 0
IP Header Length: 5
IP Total Length: 96
UDP Length: 0
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.69.110.16 (10.69.110.16)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 3
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16013.120000000 seconds
EndTime: 16013.120000000 seconds
Packets: 2
Octets: 1056
SrcPort: 2055
DstPort: 2055
InputInt: 0
OutputInt: 4
Protocol: 17
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.26.35.34 (10.26.35.34)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 255
IsMulticast: 0
IP Header Length: 5
IP Total Length: 528
UDP Length: 508
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.26.35.34 (10.26.35.34)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 4
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16013.120000000 seconds
EndTime: 16013.120000000 seconds
Packets: 2
Octets: 800
SrcPort: 2055
DstPort: 2055
InputInt: 0
OutputInt: 4
Protocol: 17
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.69.110.21 (10.69.110.21)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 255
IsMulticast: 0
IP Header Length: 5
IP Total Length: 400
UDP Length: 380
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.69.110.21 (10.69.110.21)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 5
IPVersion: 04
[Duration: 1.010000000 seconds]
StartTime: 16012.600000000 seconds
EndTime: 16013.610000000 seconds
Packets: 4
Octets: 256
SrcPort: 2000
DstPort: 39216
InputInt: 4
OutputInt: 0
Protocol: 6
IP ToS: 0x00
TCP Flags: 0x18
Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
SrcAddr: 10.10.153.217 (10.10.153.217)
DstAddr: 10.10.153.218 (10.10.153.218)
NextHop: 10.10.153.218 (10.10.153.218)
SrcMask: 0
DstMask: 0
IP TTL: 64
IsMulticast: 0
IP Header Length: 5
IP Total Length: 64
UDP Length: 0
TCP Sequence Number: 1439408196
TCP Acknowledgement Number: 786858306
TCP Windows Size: 905
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.217 (10.10.153.217)
Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 6
IPVersion: 04
[Duration: 2.030000000 seconds]
StartTime: 16011.580000000 seconds
EndTime: 16013.610000000 seconds
Packets: 9
Octets: 528
SrcPort: 39216
DstPort: 2000
InputInt: 0
OutputInt: 4
Protocol: 6
IP ToS: 0x00
TCP Flags: 0x18
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.10.153.217 (10.10.153.217)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 64
IsMulticast: 0
IP Header Length: 5
IP Total Length: 64
UDP Length: 0
TCP Sequence Number: 786858282
TCP Acknowledgement Number: 1439408184
TCP Windows Size: 913
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.10.153.217 (10.10.153.217)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
No. Time Source Destination Protocol Length Info
385861 752.592360000 10.10.153.218 10.26.35.34 CFLOW 830 IPFIX partial flow (788/8 bytes)
Frame 385861: 830 bytes on wire (6640 bits), 830 bytes captured (6640 bits) on interface 0
Ethernet II, Src: Routerbo_XX:XX:XX (XX:XX:XX:XX:XX:XX), Dst: YY:YY:YY:YY:YY:YY (YY:YY:YY:YY:YY:YY)
Internet Protocol Version 4, Src: 10.10.153.218 (10.10.153.218), Dst: 10.26.35.34 (10.26.35.34)
User Datagram Protocol, Src Port: 2055 (2055), Dst Port: 2055 (2055)
Cisco NetFlow/IPFIX
Version: 10
Length: 8
Timestamp: Jul 5, 1970 12:12:00.000000000 GTB Daylight Time
ExportTime: 16017120
FlowSequence: 386
Observation Domain Id: 0
Set 1
FlowSet Id: (Data) (258)
FlowSet Length: 772
Flow 1
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16014.870000000 seconds
EndTime: 16014.870000000 seconds
Packets: 2
Octets: 192
SrcPort: 0
DstPort: 0
InputInt: 4
OutputInt: 0
Protocol: 1
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
SrcAddr: 10.69.110.16 (10.69.110.16)
DstAddr: 10.10.153.218 (10.10.153.218)
NextHop: 10.10.153.218 (10.10.153.218)
SrcMask: 0
DstMask: 0
IP TTL: 63
IsMulticast: 0
IP Header Length: 5
IP Total Length: 96
UDP Length: 0
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 8
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.69.110.16 (10.69.110.16)
Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 2
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16014.870000000 seconds
EndTime: 16014.870000000 seconds
Packets: 2
Octets: 192
SrcPort: 0
DstPort: 0
InputInt: 0
OutputInt: 4
Protocol: 1
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.69.110.16 (10.69.110.16)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 64
IsMulticast: 0
IP Header Length: 5
IP Total Length: 96
UDP Length: 0
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.69.110.16 (10.69.110.16)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 3
IPVersion: 04
[Duration: 27.660000000 seconds]
StartTime: 15987.450000000 seconds
EndTime: 16015.110000000 seconds
Packets: 411
Octets: 32667
SrcPort: 65470
DstPort: 8291
InputInt: 4
OutputInt: 0
Protocol: 6
IP ToS: 0x00
TCP Flags: 0x18
Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
SrcAddr: 10.26.35.34 (10.26.35.34)
DstAddr: 10.10.153.218 (10.10.153.218)
NextHop: 10.10.153.218 (10.10.153.218)
SrcMask: 0
DstMask: 0
IP TTL: 61
IsMulticast: 0
IP Header Length: 5
IP Total Length: 523
UDP Length: 0
TCP Sequence Number: 537131081
TCP Acknowledgement Number: 3081807626
TCP Windows Size: 65184
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.26.35.34 (10.26.35.34)
Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 4
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16015.120000000 seconds
EndTime: 16015.120000000 seconds
Packets: 2
Octets: 1248
SrcPort: 2055
DstPort: 2055
InputInt: 0
OutputInt: 4
Protocol: 17
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.26.35.34 (10.26.35.34)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 255
IsMulticast: 0
IP Header Length: 5
IP Total Length: 624
UDP Length: 604
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.26.35.34 (10.26.35.34)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 5
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16015.120000000 seconds
EndTime: 16015.120000000 seconds
Packets: 2
Octets: 936
SrcPort: 2055
DstPort: 2055
InputInt: 0
OutputInt: 4
Protocol: 17
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.69.110.21 (10.69.110.21)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 255
IsMulticast: 0
IP Header Length: 5
IP Total Length: 468
UDP Length: 448
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.69.110.21 (10.69.110.21)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 6
IPVersion: 04
[Duration: 0.000000000 seconds]
StartTime: 16015.600000000 seconds
EndTime: 16015.600000000 seconds
Packets: 3
Octets: 192
SrcPort: 2000
DstPort: 39216
InputInt: 4
OutputInt: 0
Protocol: 6
IP ToS: 0x00
TCP Flags: 0x18
Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
SrcAddr: 10.10.153.217 (10.10.153.217)
DstAddr: 10.10.153.218 (10.10.153.218)
NextHop: 10.10.153.218 (10.10.153.218)
SrcMask: 0
DstMask: 0
IP TTL: 64
IsMulticast: 0
IP Header Length: 5
IP Total Length: 64
UDP Length: 0
TCP Sequence Number: 1439408232
TCP Acknowledgement Number: 786858342
TCP Windows Size: 905
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.217 (10.10.153.217)
Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 7
IPVersion: 04
[Duration: 8.370000000 seconds]
StartTime: 16007.320000000 seconds
EndTime: 16015.690000000 seconds
Packets: 50
Octets: 3700
SrcPort: 42989
DstPort: 161
InputInt: 4
OutputInt: 0
Protocol: 17
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
SrcAddr: 10.69.110.15 (10.69.110.15)
DstAddr: 10.10.153.218 (10.10.153.218)
NextHop: 10.10.153.218 (10.10.153.218)
SrcMask: 0
DstMask: 0
IP TTL: 63
IsMulticast: 0
IP Header Length: 5
IP Total Length: 74
UDP Length: 54
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.69.110.15 (10.69.110.15)
Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
Flow 8
IPVersion: 04
[Duration: 6.340000000 seconds]
StartTime: 16009.350000000 seconds
EndTime: 16015.690000000 seconds
Packets: 48
Octets: 3600
SrcPort: 161
DstPort: 42989
InputInt: 0
OutputInt: 4
Protocol: 17
IP ToS: 0x00
TCP Flags: 0x00
Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ)
SrcAddr: 10.10.153.218 (10.10.153.218)
DstAddr: 10.69.110.15 (10.69.110.15)
NextHop: 10.10.153.217 (10.10.153.217)
SrcMask: 0
DstMask: 0
IP TTL: 64
IsMulticast: 0
IP Header Length: 5
IP Total Length: 75
UDP Length: 55
TCP Sequence Number: 0
TCP Acknowledgement Number: 0
TCP Windows Size: 0
IGMP Type: 0
IPv4 ICMP Type: 0
IPv4 ICMP Code: 0
Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218)
Post NAT Destination IPv4 Address: 10.69.110.15 (10.69.110.15)
Post NAPT Source Transport Port: 0
Post NAPT Destination Transport Port: 0
> /ip traffic-flow export verbose
# may/29/2016 22:35:09 by RouterOS 6.36rc19
# software id =
#
/ip traffic-flow
set active-flow-timeout=1m cache-entries=32k enabled=yes inactive-flow-timeout=1s interfaces=ether3-ibgp
/ip traffic-flow ipfix
set bytes=yes dst-address=yes dst-address-mask=yes dst-mac-address=yes dst-port=yes first-forwarded=yes gateway=yes icmp-code=yes \
icmp-type=yes igmp-type=yes in-interface=yes ip-header-length=yes ip-total-length=yes ipv6-flow-label=yes is-multicast=yes \
last-forwarded=yes nat-dst-address=yes nat-dst-port=yes nat-src-address=yes nat-src-port=yes out-interface=yes packets=yes \
protocol=yes src-address=yes src-address-mask=yes src-mac-address=yes src-port=yes tcp-ack-num=yes tcp-flags=yes tcp-seq-num=yes \
tcp-window-size=yes tos=yes ttl=yes udp-length=yes
/ip traffic-flow target
add disabled=no dst-address=10.69.110.21 port=2055 src-address=0.0.0.0 v9-template-refresh=20 v9-template-timeout=1m version=9
add disabled=no dst-address=10.26.35.34 port=2055 src-address=0.0.0.0 v9-template-refresh=20 v9-template-timeout=1m version=ipfix
If it is a production unit, better wait. Say to yourself that v6.36 does not exist yet.I`ve got hAP ac with RouterOS v6.35.2. But there`re some features in v6.36rc which are interesting me. What will you advice me ? Update to v6.36rc or wait for final release?
I am trying to test this new feature but I haven't got any results yet.*) firewall - added raw table to be able to disable connection tracking on selected packets or drop packets before connection tracking (CLI only)
Since 6.36rc8 it is possible to configure firewall rules in a raw table ("/ip firewall raw", "/ipv6 firewall raw"). These rules have two possible chains - prerouting and output which happens before connection tracking in packet flow.
There is action called "notrack". It means that you can select on which packets you want to use connection tracking. It is also possible to drop packets already before connection tracking.
These rules do not have firewall rule matchers that would depend on connection tracking like "connection-state".
Packets which match rules with action "notrack" also are not being fragmented. In past as soon as you loaded connection tracking packets were fragmented. Now even if connection tracking is on "notrack" packets are not being defragmented.
Now in regular firewall, there is new possible connection-state value called "untracked".
Basically, this raw firewall should be used to protect your devices against DDoS attacks.
There's problem with CNAMEs, when more of them point to same host. If DNS contains records like this:*) firewall - allow to add domain name to address-lists (dynamic entries for resolved addresses will be added to specified list);
test.test.lan. A 127.0.0.1
test1.test.lan. CNAME test.test.lan.
test2.test.lan. CNAME test.test.lan.
/ip firewall address-list
add address=test1.test.lan list=test
add address=test2.test.lan list=test
/ip firewall address-list print detail
Flags: X - disabled, D - dynamic
0 list=test address=test1.test.lan dynamic=no
1 D ;;; test1.test.lan
list=test address=127.0.0.1 dynamic=yes
2 list=test address=test2.test.lan dynamic=no
I was about to chime in with thisEdit: On second thought, it's correct. It does not make sense to have same address in one list twice. With different lists it works fine. Sorry, my bad. The only valid concern might be when you add several hostnames and you don't know in advance that they resolve to same address, it might look like there's a problem, even though there isn't.
Finally received my first RB3001 for testing. My first issue is minor....Version 6.36rc21 has been released.
Changes since previous version:
*) icmp - fixed kernel failure when icmp packet could not be processed on high load;
*) lte - Huawei MU609 must use latest firmware to work correctly;
*) lte - use only creg result codes as network status indications;
*) proxy - limit max ram usage to 80% for tile and x86 devices;
*) rb3011 - fixed reset button functionality;
*) snmp - fixed interface stats branch from MikroTik MIB;
*) snmp - report current access technology and cell id for lte modems;
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as suspected or after crash.
/system resource print
perhaps you right, its "not completely imlemented" case. same about DNS, IPv6 stack and other things (like netfilter portions, RIP and etc generallty legacy stuff).Please fix OSPFv3, Mikrotik isnt following the RFC.
https://tools.ietf.org/html/rfc5340#appendix-A.2
I cant run OSPFv3 with an EdgeRouter, because of wrong RFC implementation of the Mikrotik.perhaps you right, its "not completely imlemented" case. same about DNS, IPv6 stack and other things (like netfilter portions, RIP and etc generallty legacy stuff).Please fix OSPFv3, Mikrotik isnt following the RFC.
https://tools.ietf.org/html/rfc5340#appendix-A.2
Rb3011 still doesn't see usb disk and partition's tool doesn't work..Version 6.36rc27 has been released.
.. cut ..
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as suspected or after crash.
why-y-y?..*) address-list - make "dynamic=yes" as read-only option;
[admin@TestPlace] /ip firewall address-list> ad ad=99.88.77.77 list=test timeout=3000w
[admin@TestPlace] /ip firewall address-list> pr
Flags: X - disabled, D - dynamic
# LIST ADDRESS TIMEOUT
0 D test 99.88.77.77 17w2d16h28m43s
Bump... No Comment. Neither Winbox 3.4 nor the CLI is displaying anything on any tunnel interface about this feature. What is is about and where can I explore it?*) tunnel - added option to auto detect tunnel local-address;
Can't Seem to find it?
Does it solve changing ip in conjuction of auto ipsec aswell? Otherwise please ad that.
Address lists can still be dynamic. Creating an item with a timeout makes it dynamic. it really should not be a big issue. My scripts only required very minor changes.as for "dynamic-only" adress-list options - i still don' get whole idea of removing tweaking that option from ROS
if its used not for operrational management(eg marking and balancing, routing traffic)but for example for tracking emerging threats, then persistent elements in adress-lists - a must(preferably with timestamp in). i think that should remain tweakable. but not on "record-level" but on "adress-list level" to adjust it for Both purposes, depend needs.
And what if I need infinite timeout?Address lists can still be dynamic. Creating an item with a timeout makes it dynamic. it really should not be a big issue.
Wouldn't that be, by definition, static?And what if I need infinite timeout?Address lists can still be dynamic. Creating an item with a timeout makes it dynamic. it really should not be a big issue.
I don't want to backup some data that is continuously synced to billing system. and I don't want to kill NAND by writing that data to persistent storagehow to add dynamic entry in this version? the goal is excluding such entries from export and NOT writing them to NAND
well, config versioning and NAND resource doesn't make sense for you? welcome to the world of telecomThat doesn't make sense
exactly. if your router reboots once a year just for OS upgrade and in a few dozens seconds after that your billing system recreates all dynamic lists - you don't want them to disturb you in your everyday workYou want an item permanently in an address list, but you don't want it backed up and you don't want it saved?
sounds like working spike-nail, but the main question is: why silly destroy what was working before?It sounds like your only option is to write a script that will refresh your permeant-dynamic lists.
thats EXACTLY my point.sounds like working spike-nail, but the main question is: why silly destroy what was working before?
EXACTLY! This change was also made in 6.35.4. It makes no sense to eliminate a configuration capability that was working just fine. Perhaps MT could explain what the problem was that needed to be resolved by total removal of a configuration option.why-y-y?..*) address-list - make "dynamic=yes" as read-only option;
how to add dynamic entry in this version? the goal is excluding such entries from export and NOT writing them to NAND
Haven't played with this feature, but I would presume that leaving "local address" field empty is the way to invoke the auto detection....Bump... No Comment. Neither Winbox 3.4 nor the CLI is displaying anything on any tunnel interface about this feature. What is is about and where can I explore it?*) tunnel - added option to auto detect tunnel local-address;
Can't Seem to find it?
Does it solve changing ip in conjuction of auto ipsec aswell? Otherwise please ad that.
ThanksBefore you was able to manually add dynamic entry without timeout. Now there's no such possibility.
He was adding them via command line, and including dynamic=yes in the command. Mikrotik has removed this ability going forward, so if you've never used this ability before, it's probably a bad idea to fall in love with it now.ThanksBefore you was able to manually add dynamic entry without timeout. Now there's no such possibility.
But how was possible? Never used this function
Because I always set ip and hit ok for me that is a static entry
Thanks,He was adding them via command line, and including dynamic=yes in the command. Mikrotik has removed this ability going forward, so if you've never used this ability before, it's probably a bad idea to fall in love with it now.ThanksBefore you was able to manually add dynamic entry without timeout. Now there's no such possibility.
But how was possible? Never used this function
Because I always set ip and hit ok for me that is a static entry
yeah. i used that in 3 things: 1. store 2rd stage emergin threats, detected. 2. entries for advertisment filtering, fetched and upadted periodically. 3. full bogons list. 4. unconditional "funky/hostile" datacenters, companies(spammers, offenders, malware, whatever else you may encounter in. aside moving to asia, chinaand pacific from central and east europe now its greatly shifted to NA and Africa s-holes in terms of percentage generated threats)EXACTLY! This change was also made in 6.35.4. It makes no sense to eliminate a configuration capability that was working just fine. Perhaps MT could explain what the problem was that needed to be resolved by total removal of a configuration option.why-y-y?..*) address-list - make "dynamic=yes" as read-only option;
how to add dynamic entry in this version? the goal is excluding such entries from export and NOT writing them to NAND
I don't like the idea of establishing BGP peer to my billing system, sometime in a future. I prefer RouterOS API and nowThis will open the gates for amazing dynamic realtime blacklists distributed via BGP, and would totally obviate the problem with the adding-as-dynamic issue (as being discussed here anyway)
in-interface-list=*1389
OK. Then it is not possible with ipsec witch i was hoping for. when are we going to be able to set upp crypted tunnels from a dynamic localpoint without hasseling with scripts?Haven't played with this feature, but I would presume that leaving "local address" field empty is the way to invoke the auto detection....Bump... No Comment. Neither Winbox 3.4 nor the CLI is displaying anything on any tunnel interface about this feature. What is is about and where can I explore it?*) tunnel - added option to auto detect tunnel local-address;
Can't Seem to find it?
Does it solve changing ip in conjuction of auto ipsec aswell? Otherwise please ad that.
Do you use L2TP over IPsec? In case you do, please make sure your inner-tunnel IPsec traffic isn't fasttracked (otherwise it bypasses the IPsec policies). This is the expected behaviour.L2TP tunnel stops routing traffic when any version later than 6.35 is installed.
Seems like fastpath/fasttrack isn't working.
that wasn't option in several applications "at all". also BGP usage imply rather bigger resource consumption, while adress lists implementation - would(and actually was. except DNS static overrides since i think ~ 6.10 or 6.11 somewhere)work perfectly even on mid to low -grade devices(sometimes with moderate impact on boottime, but that expected consequences/drawback).When the mystical unicorn that is ROSv7 comes out, it's supposed to have an enhancement to the routing filters with a new action of add prefix to address list.
This will open the gates for amazing dynamic realtime blacklists distributed via BGP, and would totally obviate the problem with the adding-as-dynamic issue (as being discussed here anyway)
No I can't becaus if I specify crypto on tunnel interface then routeros complaint and localendpoint must be specified. This is truely unintuitive. I do understand that it is because of reasons with ipsec engine not able to handle dns and other stuff. But, if I want an encrypted tunnel with a dynamic internet connection it is messy to be polite. I can offcoruse solve this by using script but it is a bad user experience and the tunnel will surly go down till script is triggered again. This SHOULD be leaner, meaner, greater implemented with tunnels and ipsec supporting dns on local endpoint as they are now with remote end point. so why not the local endpoint?You may be able to accomplish what you want by using GRE or L2TP with hooks to IPSec available in those services.
RB3011 on 6.36rc30 (rebooted 2 times after) doesn't see usb disk (USB kingston datatraveler 8GB); item present in system resources usb list but not in system disks.Version 6.36rc30 has been released.
*) rb3011 - fixed usb driver load (introduced in 6.36r22);
If you experience version related issues.. [cut]..
I got it, so I must wait..bajodel - This is different fix for other issue.
Any news on that?Hello,
I just gave IPFIX a try on version 6.36rc19 on a RB2011UAS and it seems that it exports the flows with 'random' timestamps in the year 1970.
The time on the RB2011 is correct (double checked).
Those netflow packets where exported to wireshark by mikrotik every 2 seconds.Code: Select allTimestamp: Jul 5, 1970 11:05:20.000000000 GTB Daylight Time Timestamp: Jul 5, 1970 11:38:40.000000000 GTB Daylight Time Timestamp: Jul 5, 1970 12:12:00.000000000 GTB Daylight Time
The full capture:Reverting back to NetFlow v9 the timestamp fields contain the right date/time.Code: Select allNo. Time Source Destination Protocol Length Info 383778 748.591451000 10.10.153.218 10.26.35.34 CFLOW 542 IPFIX partial flow (500/5 bytes) Frame 383778: 542 bytes on wire (4336 bits), 542 bytes captured (4336 bits) on interface 0 Ethernet II, Src: Routerbo_XX:XX:XX (XX:XX:XX:XX:XX:XX), Dst: YY:YY:YY:YY:YY:YY (YY:YY:YY:YY:YY:YY) Internet Protocol Version 4, Src: 10.10.153.218 (10.10.153.218), Dst: 10.26.35.34 (10.26.35.34) User Datagram Protocol, Src Port: 2055 (2055), Dst Port: 2055 (2055) Cisco NetFlow/IPFIX Version: 10 Length: 5 Timestamp: Jul 5, 1970 11:05:20.000000000 GTB Daylight Time ExportTime: 16013120 FlowSequence: 384 Observation Domain Id: 0 Set 1 FlowSet Id: (Data) (258) FlowSet Length: 484 Flow 1 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16010.600000000 seconds EndTime: 16010.600000000 seconds Packets: 3 Octets: 192 SrcPort: 2000 DstPort: 39216 InputInt: 4 OutputInt: 0 Protocol: 6 IP ToS: 0x00 TCP Flags: 0x18 Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) SrcAddr: 10.10.153.217 (10.10.153.217) DstAddr: 10.10.153.218 (10.10.153.218) NextHop: 10.10.153.218 (10.10.153.218) SrcMask: 0 DstMask: 0 IP TTL: 64 IsMulticast: 0 IP Header Length: 5 IP Total Length: 64 UDP Length: 0 TCP Sequence Number: 1439408172 TCP Acknowledgement Number: 786858282 TCP Windows Size: 905 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.217 (10.10.153.217) Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 2 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16011.120000000 seconds EndTime: 16011.120000000 seconds Packets: 2 Octets: 1056 SrcPort: 2055 DstPort: 2055 InputInt: 0 OutputInt: 4 Protocol: 17 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.26.35.34 (10.26.35.34) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 255 IsMulticast: 0 IP Header Length: 5 IP Total Length: 528 UDP Length: 508 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.26.35.34 (10.26.35.34) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 3 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16011.120000000 seconds EndTime: 16011.120000000 seconds Packets: 2 Octets: 800 SrcPort: 2055 DstPort: 2055 InputInt: 0 OutputInt: 4 Protocol: 17 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.69.110.21 (10.69.110.21) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 255 IsMulticast: 0 IP Header Length: 5 IP Total Length: 400 UDP Length: 380 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.69.110.21 (10.69.110.21) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 4 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16012.000000000 seconds EndTime: 16012.000000000 seconds Packets: 3 Octets: 194 SrcPort: 33353 DstPort: 179 InputInt: 0 OutputInt: 4 Protocol: 6 IP ToS: 0xc0 TCP Flags: 0x18 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.10.153.217 (10.10.153.217) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 64 IsMulticast: 0 IP Header Length: 5 IP Total Length: 71 UDP Length: 0 TCP Sequence Number: 131047850 TCP Acknowledgement Number: 1912585720 TCP Windows Size: 1016 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.10.153.217 (10.10.153.217) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 5 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16012.000000000 seconds EndTime: 16012.000000000 seconds Packets: 3 Octets: 175 SrcPort: 179 DstPort: 33353 InputInt: 4 OutputInt: 0 Protocol: 6 IP ToS: 0xc0 TCP Flags: 0x10 Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) SrcAddr: 10.10.153.217 (10.10.153.217) DstAddr: 10.10.153.218 (10.10.153.218) NextHop: 10.10.153.218 (10.10.153.218) SrcMask: 0 DstMask: 0 IP TTL: 64 IsMulticast: 0 IP Header Length: 5 IP Total Length: 52 UDP Length: 0 TCP Sequence Number: 1912585720 TCP Acknowledgement Number: 131047869 TCP Windows Size: 1082 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.217 (10.10.153.217) Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 No. Time Source Destination Protocol Length Info 384733 750.593356000 10.10.153.218 10.26.35.34 CFLOW 638 IPFIX partial flow (596/6 bytes) Frame 384733: 638 bytes on wire (5104 bits), 638 bytes captured (5104 bits) on interface 0 Ethernet II, Src: Routerbo_XX:XX:XX (XX:XX:XX:XX:XX:XX), Dst: YY:YY:YY:YY:YY:YY (YY:YY:YY:YY:YY:YY) Internet Protocol Version 4, Src: 10.10.153.218 (10.10.153.218), Dst: 10.26.35.34 (10.26.35.34) User Datagram Protocol, Src Port: 2055 (2055), Dst Port: 2055 (2055) Cisco NetFlow/IPFIX Version: 10 Length: 6 Timestamp: Jul 5, 1970 11:38:40.000000000 GTB Daylight Time ExportTime: 16015120 FlowSequence: 385 Observation Domain Id: 0 Set 1 FlowSet Id: (Data) (258) FlowSet Length: 580 Flow 1 IPVersion: 04 [Duration: 1.820000000 seconds] StartTime: 16011.220000000 seconds EndTime: 16013.040000000 seconds Packets: 3 Octets: 288 SrcPort: 0 DstPort: 0 InputInt: 4 OutputInt: 0 Protocol: 1 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) SrcAddr: 10.69.110.16 (10.69.110.16) DstAddr: 10.10.153.218 (10.10.153.218) NextHop: 10.10.153.218 (10.10.153.218) SrcMask: 0 DstMask: 0 IP TTL: 63 IsMulticast: 0 IP Header Length: 5 IP Total Length: 96 UDP Length: 0 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 8 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.69.110.16 (10.69.110.16) Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 2 IPVersion: 04 [Duration: 1.820000000 seconds] StartTime: 16011.220000000 seconds EndTime: 16013.040000000 seconds Packets: 3 Octets: 288 SrcPort: 0 DstPort: 0 InputInt: 0 OutputInt: 4 Protocol: 1 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.69.110.16 (10.69.110.16) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 64 IsMulticast: 0 IP Header Length: 5 IP Total Length: 96 UDP Length: 0 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.69.110.16 (10.69.110.16) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 3 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16013.120000000 seconds EndTime: 16013.120000000 seconds Packets: 2 Octets: 1056 SrcPort: 2055 DstPort: 2055 InputInt: 0 OutputInt: 4 Protocol: 17 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.26.35.34 (10.26.35.34) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 255 IsMulticast: 0 IP Header Length: 5 IP Total Length: 528 UDP Length: 508 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.26.35.34 (10.26.35.34) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 4 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16013.120000000 seconds EndTime: 16013.120000000 seconds Packets: 2 Octets: 800 SrcPort: 2055 DstPort: 2055 InputInt: 0 OutputInt: 4 Protocol: 17 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.69.110.21 (10.69.110.21) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 255 IsMulticast: 0 IP Header Length: 5 IP Total Length: 400 UDP Length: 380 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.69.110.21 (10.69.110.21) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 5 IPVersion: 04 [Duration: 1.010000000 seconds] StartTime: 16012.600000000 seconds EndTime: 16013.610000000 seconds Packets: 4 Octets: 256 SrcPort: 2000 DstPort: 39216 InputInt: 4 OutputInt: 0 Protocol: 6 IP ToS: 0x00 TCP Flags: 0x18 Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) SrcAddr: 10.10.153.217 (10.10.153.217) DstAddr: 10.10.153.218 (10.10.153.218) NextHop: 10.10.153.218 (10.10.153.218) SrcMask: 0 DstMask: 0 IP TTL: 64 IsMulticast: 0 IP Header Length: 5 IP Total Length: 64 UDP Length: 0 TCP Sequence Number: 1439408196 TCP Acknowledgement Number: 786858306 TCP Windows Size: 905 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.217 (10.10.153.217) Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 6 IPVersion: 04 [Duration: 2.030000000 seconds] StartTime: 16011.580000000 seconds EndTime: 16013.610000000 seconds Packets: 9 Octets: 528 SrcPort: 39216 DstPort: 2000 InputInt: 0 OutputInt: 4 Protocol: 6 IP ToS: 0x00 TCP Flags: 0x18 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.10.153.217 (10.10.153.217) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 64 IsMulticast: 0 IP Header Length: 5 IP Total Length: 64 UDP Length: 0 TCP Sequence Number: 786858282 TCP Acknowledgement Number: 1439408184 TCP Windows Size: 913 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.10.153.217 (10.10.153.217) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 No. Time Source Destination Protocol Length Info 385861 752.592360000 10.10.153.218 10.26.35.34 CFLOW 830 IPFIX partial flow (788/8 bytes) Frame 385861: 830 bytes on wire (6640 bits), 830 bytes captured (6640 bits) on interface 0 Ethernet II, Src: Routerbo_XX:XX:XX (XX:XX:XX:XX:XX:XX), Dst: YY:YY:YY:YY:YY:YY (YY:YY:YY:YY:YY:YY) Internet Protocol Version 4, Src: 10.10.153.218 (10.10.153.218), Dst: 10.26.35.34 (10.26.35.34) User Datagram Protocol, Src Port: 2055 (2055), Dst Port: 2055 (2055) Cisco NetFlow/IPFIX Version: 10 Length: 8 Timestamp: Jul 5, 1970 12:12:00.000000000 GTB Daylight Time ExportTime: 16017120 FlowSequence: 386 Observation Domain Id: 0 Set 1 FlowSet Id: (Data) (258) FlowSet Length: 772 Flow 1 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16014.870000000 seconds EndTime: 16014.870000000 seconds Packets: 2 Octets: 192 SrcPort: 0 DstPort: 0 InputInt: 4 OutputInt: 0 Protocol: 1 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) SrcAddr: 10.69.110.16 (10.69.110.16) DstAddr: 10.10.153.218 (10.10.153.218) NextHop: 10.10.153.218 (10.10.153.218) SrcMask: 0 DstMask: 0 IP TTL: 63 IsMulticast: 0 IP Header Length: 5 IP Total Length: 96 UDP Length: 0 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 8 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.69.110.16 (10.69.110.16) Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 2 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16014.870000000 seconds EndTime: 16014.870000000 seconds Packets: 2 Octets: 192 SrcPort: 0 DstPort: 0 InputInt: 0 OutputInt: 4 Protocol: 1 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.69.110.16 (10.69.110.16) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 64 IsMulticast: 0 IP Header Length: 5 IP Total Length: 96 UDP Length: 0 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.69.110.16 (10.69.110.16) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 3 IPVersion: 04 [Duration: 27.660000000 seconds] StartTime: 15987.450000000 seconds EndTime: 16015.110000000 seconds Packets: 411 Octets: 32667 SrcPort: 65470 DstPort: 8291 InputInt: 4 OutputInt: 0 Protocol: 6 IP ToS: 0x00 TCP Flags: 0x18 Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) SrcAddr: 10.26.35.34 (10.26.35.34) DstAddr: 10.10.153.218 (10.10.153.218) NextHop: 10.10.153.218 (10.10.153.218) SrcMask: 0 DstMask: 0 IP TTL: 61 IsMulticast: 0 IP Header Length: 5 IP Total Length: 523 UDP Length: 0 TCP Sequence Number: 537131081 TCP Acknowledgement Number: 3081807626 TCP Windows Size: 65184 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.26.35.34 (10.26.35.34) Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 4 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16015.120000000 seconds EndTime: 16015.120000000 seconds Packets: 2 Octets: 1248 SrcPort: 2055 DstPort: 2055 InputInt: 0 OutputInt: 4 Protocol: 17 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.26.35.34 (10.26.35.34) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 255 IsMulticast: 0 IP Header Length: 5 IP Total Length: 624 UDP Length: 604 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.26.35.34 (10.26.35.34) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 5 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16015.120000000 seconds EndTime: 16015.120000000 seconds Packets: 2 Octets: 936 SrcPort: 2055 DstPort: 2055 InputInt: 0 OutputInt: 4 Protocol: 17 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.69.110.21 (10.69.110.21) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 255 IsMulticast: 0 IP Header Length: 5 IP Total Length: 468 UDP Length: 448 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.69.110.21 (10.69.110.21) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 6 IPVersion: 04 [Duration: 0.000000000 seconds] StartTime: 16015.600000000 seconds EndTime: 16015.600000000 seconds Packets: 3 Octets: 192 SrcPort: 2000 DstPort: 39216 InputInt: 4 OutputInt: 0 Protocol: 6 IP ToS: 0x00 TCP Flags: 0x18 Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) SrcAddr: 10.10.153.217 (10.10.153.217) DstAddr: 10.10.153.218 (10.10.153.218) NextHop: 10.10.153.218 (10.10.153.218) SrcMask: 0 DstMask: 0 IP TTL: 64 IsMulticast: 0 IP Header Length: 5 IP Total Length: 64 UDP Length: 0 TCP Sequence Number: 1439408232 TCP Acknowledgement Number: 786858342 TCP Windows Size: 905 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.217 (10.10.153.217) Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 7 IPVersion: 04 [Duration: 8.370000000 seconds] StartTime: 16007.320000000 seconds EndTime: 16015.690000000 seconds Packets: 50 Octets: 3700 SrcPort: 42989 DstPort: 161 InputInt: 4 OutputInt: 0 Protocol: 17 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) Post Source Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) SrcAddr: 10.69.110.15 (10.69.110.15) DstAddr: 10.10.153.218 (10.10.153.218) NextHop: 10.10.153.218 (10.10.153.218) SrcMask: 0 DstMask: 0 IP TTL: 63 IsMulticast: 0 IP Header Length: 5 IP Total Length: 74 UDP Length: 54 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.69.110.15 (10.69.110.15) Post NAT Destination IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0 Flow 8 IPVersion: 04 [Duration: 6.340000000 seconds] StartTime: 16009.350000000 seconds EndTime: 16015.690000000 seconds Packets: 48 Octets: 3600 SrcPort: 161 DstPort: 42989 InputInt: 0 OutputInt: 4 Protocol: 17 IP ToS: 0x00 TCP Flags: 0x00 Destination Mac Address: 00:00:00_00:00:00 (00:00:00:00:00:00) Post Source Mac Address: Routerbo_ZZ:ZZ:ZZ (ZZ:ZZ:ZZ:ZZ:ZZ:ZZ) SrcAddr: 10.10.153.218 (10.10.153.218) DstAddr: 10.69.110.15 (10.69.110.15) NextHop: 10.10.153.217 (10.10.153.217) SrcMask: 0 DstMask: 0 IP TTL: 64 IsMulticast: 0 IP Header Length: 5 IP Total Length: 75 UDP Length: 55 TCP Sequence Number: 0 TCP Acknowledgement Number: 0 TCP Windows Size: 0 IGMP Type: 0 IPv4 ICMP Type: 0 IPv4 ICMP Code: 0 Post NAT Source IPv4 Address: 10.10.153.218 (10.10.153.218) Post NAT Destination IPv4 Address: 10.69.110.15 (10.69.110.15) Post NAPT Source Transport Port: 0 Post NAPT Destination Transport Port: 0
Those bad timestamps cause software like nfacct/pmacct to insert bad data to the database.
Also it discards many flows due to bad sequence number (although checking the capture the sequence numbers seem ok. Maybe nfacct consults the timestamp along with the sequence number to detect if a received flow is valid)
Here's my traffic flow configuration:
[Ticket#2016052966000463]Code: Select all> /ip traffic-flow export verbose # may/29/2016 22:35:09 by RouterOS 6.36rc19 # software id = # /ip traffic-flow set active-flow-timeout=1m cache-entries=32k enabled=yes inactive-flow-timeout=1s interfaces=ether3-ibgp /ip traffic-flow ipfix set bytes=yes dst-address=yes dst-address-mask=yes dst-mac-address=yes dst-port=yes first-forwarded=yes gateway=yes icmp-code=yes \ icmp-type=yes igmp-type=yes in-interface=yes ip-header-length=yes ip-total-length=yes ipv6-flow-label=yes is-multicast=yes \ last-forwarded=yes nat-dst-address=yes nat-dst-port=yes nat-src-address=yes nat-src-port=yes out-interface=yes packets=yes \ protocol=yes src-address=yes src-address-mask=yes src-mac-address=yes src-port=yes tcp-ack-num=yes tcp-flags=yes tcp-seq-num=yes \ tcp-window-size=yes tos=yes ttl=yes udp-length=yes /ip traffic-flow target add disabled=no dst-address=10.69.110.21 port=2055 src-address=0.0.0.0 v9-template-refresh=20 v9-template-timeout=1m version=9 add disabled=no dst-address=10.26.35.34 port=2055 src-address=0.0.0.0 v9-template-refresh=20 v9-template-timeout=1m version=ipfix
PleaseI got it, so I must wait..bajodel - This is different fix for other issue.
Please.. answer.. when do you plan to make partitions work on RB3011/ARM ?
Did you enable wireless-rep package and upgrade firmware ? If it does no help, please write to support and add supout file in attachment.*) wap-ac - fixed performance problems with 2.4GHz wireless (additional reboot after upgrade required);
After update signal become worse (wAP-ac working as repeater, main router hap AC). wAP-ac loosing connections constantly...
I just tested my mAP Lite and clock works fine now.Version 6.36rc36 has been released.
Changes since previous version:
*) clock - fixed time keeping for SXT ac, 911L, cAP, mAP lite, wAP;
Hello,*) l2tp - fixed crash when rebooting or disabling l2tp while there are still active connections;
/ip firewall nat
add action=masquerade chain=srcnat out-interface=!pppoe-out1 src-address=\
192.168.88.8
Re-ordering works the same as in the other tables.can i make suggestion about newly-implemented "raw table"?
its lack support for dragging/re-ordering rules there like in "firewall" and "nat", "mangle" was. that would be helpful i think.
To which bugs are you referring to?I noticed lots of issues with the RB3011 router board, and unanswered questions. I'm new to the product and wondering if Mikrotik will provide adequate support for errors released on it's behalf. Are all of the bugs with RB3011 cured yet?
/ip firewall nat
add action=masquerade chain=srcnat out-interface=!pppoe-out1 src-address=\
192.168.88.8
*) firewall - fixed interface list matcher showing incorrect name for NAT rules;
works fine on sxt lte. thanks (Ticket#2016062466000121)*) lte - added use-peer-dns option (will work only combined with add-default-route);
No, this is service beststresser.com. My firewall:Don't you have dns service opened to the wan port, do you?
/ip firewall filter
add action=accept chain=input comment="default configuration" connection-state=established,related \
log-prefix=""
add action=accept chain=input comment="default configuration" icmp-options=!5:0-255 log-prefix="" \
protocol=icmp
add action=accept chain=input comment="igmp proxy" log-prefix="" protocol=igmp
add action=accept chain=input comment=traceroute connection-state=new dst-port=33430-33530 \
log-prefix="" protocol=udp
add action=drop chain=input comment="default configuration" in-interface=wan1 log-prefix=""
add action=fasttrack-connection chain=forward comment="default configuration" connection-state=\
established,related log-prefix=""
add action=accept chain=forward comment="default configuration" connection-state=established,related \
log-prefix=""
add action=drop chain=forward comment="default configuration" connection-state=invalid log-prefix=""
add action=drop chain=forward comment="default configuration" connection-nat-state=!dstnat \
connection-state=new in-interface=wan1 log-prefix=""
/ip firewall nat
[size=85][font=monospace]add action=masquerade chain=srcnat out-interface=!pppoe-out1 src-address=\[/font][/size]
192.168.88.8
/ interface wireless scan 0 save-file = file
[admin@MikroTik-CHR-Dude] > /interface export compact
# jul/19/2016 15:29:29 by RouterOS 6.36rc30
# software id =
#
/interface list
add name=TEST
/interface list member
add interface=ether1 list=TEST
admin@MikroTik-CHR-Dude] > /ip firewall export compact
# jul/19/2016 15:29:36 by RouterOS 6.36rc30
# software id =
#
/ip firewall filter
add action=accept chain=input in-interface-list=TEST log-prefix=""
[admin@MikroTik-CHR-Dude] > /interface export compact
# jul/19/2016 15:31:53 by RouterOS 6.36rc40
# software id =
#
/interface list
add name=TEST
/interface list member
add interface=ether1 list=TEST
admin@MikroTik-CHR-Dude] > /ip firewall export compact
# jul/19/2016 15:32:01 by RouterOS 6.36rc40
# software id =
#
/ip firewall filter
add action=accept chain=input in-interface-list="" log-prefix=""
Same here... router was not accessible after upgrade because of this. I had to write a script to manually add all interface-lists from a rc38 backup-file again.After the update: add action=accept chain=input in-interface-list="" log-prefix=""
/ipv6 address add address=fc00::1/126 advertise=no interface=vlan4091
[admin@MikroTik] > ping fc00::0 count=5
SEQ HOST SIZE TTL TIME STATUS
0 fc00::1 56 64 0ms echo reply
1 fc00::1 56 64 0ms echo reply
2 fc00::1 56 64 0ms echo reply
3 fc00::1 56 64 0ms echo reply
4 fc00::1 56 64 0ms echo reply
sent=5 received=5 packet-loss=0% min-rtt=0ms avg-rtt=0ms max-rtt=0ms