Can we get some extra info about this fix? Symptoms etc.*) switch - fixed disabling of MAC learning on CRS1xx/CRS2xx;
All I'm hoping for is an implementation that works between all MT devices and hopefully 3rd parties also, particularly with multiple bridges & vlans. I'd think having MSTP would solve the whole conundrum.I kinda want to ask what the scope was for the new STP implementation.
Is it meant to basically run like per vlan rapid spanning tree protocol that is similar to Cisco? Basically instantiate rapid STP and then have the instance communicate with tagged packets?
Per conversations that were had with support, does that mean that multiple STP is not going to be looked at?
If it is going to be rapid spanning tree protocol that is similar to Cisco, then what will the limitations be. For example, will there be an instance limit? Or will it be open to be added to as many bridges as possible?
Lastly, will the implementation be available per bridge? or will one have to still add a master port? That way one can have some bridges without spanning tree and others with spanning tree....
Thank you
Thank you very much for this one! It´s working now as expected*) capsman - fixed EAP identity reporting in “registration-table”;
*) winbox - added "eap-identity" to CAPsMAN registration table;
Hoping that means no more spammy "R_U_THERE" log messages.*) ipsec - optimized logging under IPSec topic;
[admin@hAP AC Lite] > /ipv6 firewall address-list print
Flags: X - disabled, D - dynamic
# LIST ADDRESS TIMEOUT
0 allowed ::/0
[admin@hAP AC Lite] > /ipv6 firewall address-list remove numbers=0
[admin@hAP AC Lite] > /ipv6 firewall address-list add list=allowed address=2001:db8::/64
[admin@hAP AC Lite] > /ipv6 firewall address-list print
Flags: X - disabled, D - dynamic
# LIST ADDRESS TIMEOUT
0 allowed ::/0
[admin@hAP AC Lite] > /ipv6 firewall address-list add list=allowed address=2001:db8::/64
failure: already have such entry
Well in a way it's right -- ::/0 contains all IPv6 addresses, including 2001:db8::/64IPv6 address list problem:
[admin@hAP AC Lite] > /ipv6 firewall address-list add list=allowed address=2001:db8::/64
[admin@hAP AC Lite] > /ipv6 firewall address-list print
Flags: X - disabled, D - dynamic
# LIST ADDRESS TIMEOUT
0 allowed ::/0
[admin@hAP AC Lite] > /ipv6 firewall address-list add list=allowed address=2001:db8::/64
failure: already have such entry
[/code]
Ok, but I don't want to access to my router from anywhere. Address 2001:db8::/64 -- only for example. If you add address list with any other address, you have your address list with address ::/0. You can remove it and recreate, but nothing changes -- you can have list with only ::/0.Well in a way it's right -- ::/0 contains all IPv6 addresses, including 2001:db8::/64IPv6 address list problem:
[admin@hAP AC Lite] > /ipv6 firewall address-list add list=allowed address=2001:db8::/64
[admin@hAP AC Lite] > /ipv6 firewall address-list print
Flags: X - disabled, D - dynamic
# LIST ADDRESS TIMEOUT
0 allowed ::/0
[admin@hAP AC Lite] > /ipv6 firewall address-list add list=allowed address=2001:db8::/64
failure: already have such entry
[/code]
Please post more details about your problem.6.40rc2 + WAP AC:
I was told that an IPhone 6s wasn´t able to connect. (Test with an old Enterasys 3600 access point was succesful, though)
I try to get the user with that iPhone 6s and create a support file out of the WAP AC while he tries to connect.Please post more details about your problem.6.40rc2 + WAP AC:
I was told that an IPhone 6s wasn´t able to connect. (Test with an old Enterasys 3600 access point was succesful, though)
Maybe you could write to support@mikrotik.com about this problem and include a support output file from the router?
Mikrotik devs, well done! Thank you for finally giving some care to nv2. Please continue to do so, probably optimising the code in order to achieve higher performance on existing hardware.Version 6.40rc6 has been released.
What's new in 6.40rc6 (2017-May-11 12:53):
*) wireless - added option to change "nv2-downlink-ratio" for nv2 protocol (CLI only);
*) wireless - added option to set "fixed-downlink" mode for nv2 protocol (CLI only)
this is something that many of us waited for.*) snmp - added "ifindex" on interface traps;
GREAT NEWS!!! can explain more about the config?Version 6.40rc6 has been released.
Changes since previous version:
What's new in 6.40rc6 (2017-May-11 12:53):
*) wireless - added option to change "nv2-downlink-ratio" for nv2 protocol (CLI only);
*) wireless - added option to set "fixed-downlink" mode for nv2 protocol (CLI only);
*) wireless - added option to change "nv2-downlink-ratio" for nv2 protocol (CLI only);
*) wireless - added option to set "fixed-downlink" mode for nv2 protocol (CLI only);
/interface wireless> set 0 nv2-mode=
Nv2Mode ::= dynamic-downlink | fixed-downlink
/interface wireless> set 0 nv2-downlink-ratio=
Nv2DownlinkRatio ::= 20..80 (integer number)
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (483949061) 56 days, 0:18:10.61 SNMPv2-MIB::snmpTrapOID.0 = OID: IF-MIB::linkDown IF-MIB::ifIndex = INTEGER: 308 IF-MIB::ifAdminStatus = INTEGER: up(1) IF-MIB::ifOperStatus = INTEGER: down(2)Version 6.40rc6 has been released.
*) snmp - added "ifindex" on interface traps;
+100 Thanks!Mikrotik devs, well done! Thank you for finally giving some care to nv2. Please continue to do so, probably optimising the code in order to achieve higher performance on existing hardware.Version 6.40rc6 has been released.
What's new in 6.40rc6 (2017-May-11 12:53):
*) wireless - added option to change "nv2-downlink-ratio" for nv2 protocol (CLI only);
*) wireless - added option to set "fixed-downlink" mode for nv2 protocol (CLI only)
we have added basic info on that in the Nv2 wiki manual. Here is the info:
Nv2-mode - specifies to use dynamic or fixed downlink/uplink ratio. Default value is "dynamic-downlink"
Nv2-downlink-ratio - specifies the Nv2 downlink ratio. Uplink ratio is automatically calculated from the downlink-ratio value. When using dynamic-downlink mode the downlink-ratio is also used when link get fully saturated. Minimum value is 20 and maximum 80. Default value is 50.
we have added basic info on that in the Nv2 wiki manual. Here is the info:
Nv2-mode - specifies to use dynamic or fixed downlink/uplink ratio. Default value is "dynamic-downlink"
Nv2-downlink-ratio - specifies the Nv2 downlink ratio. Uplink ratio is automatically calculated from the downlink-ratio value. When using dynamic-downlink mode the downlink-ratio is also used when link get fully saturated. Minimum value is 20 and maximum 80. Default value is 50.
I am seeing this error as well. (My Dude server is the device running 6.40rc6 and it can no longer monitor itself due to SNMP not working. It can monitor other devices just fine, but SNMP no longer responds on it.)With 6.40rc6 my SNMP counters for uptime, interface traffic and CPU are dead for WAP AC and HAP AC devices.
Logging on devices says: „cannot bind to requested src-address“
After downgrading to 6.40rc5, SNMP access works again.
Same here. I have updated three devices, two of them have lost SNMP.I am seeing this error as well. (My Dude server is the device running 6.40rc6 and it can no longer monitor itself due to SNMP not working. It can monitor other devices just fine, but SNMP no longer responds on it.)
Uldis if I use 2 radios on tha same routerboard (e.g, rb922) with the same Nv2-downlink-ratio the trasmission of both radios is syncronized?we have added basic info on that in the Nv2 wiki manual. Here is the info:
Nv2-mode - specifies to use dynamic or fixed downlink/uplink ratio. Default value is "dynamic-downlink"
Nv2-downlink-ratio - specifies the Nv2 downlink ratio. Uplink ratio is automatically calculated from the downlink-ratio value. When using dynamic-downlink mode the downlink-ratio is also used when link get fully saturated. Minimum value is 20 and maximum 80. Default value is 50.
script: #| RouterMode:
#| * WAN port is protected by firewall and enabled DHCP client
#| LAN Configuration:
#| switch group: ether2 (master), ether3, ether4, ether5
#| IP address 192.168.88.1/24 is set on LAN port
#| DHCP Server: enabled;
#| DNS: enabled;
#| WAN (gateway) Configuration:
#| gateway: ether1 ;
#| ip4 firewall: enabled;
#| ip6 firewall: enabled;
#| NAT: enabled;
:log info Starting_defconf_script_;
:global action;
#-------------------------------------------------------------------------------
# Apply configuration.
# these commands are executed after installation or configuration reset
#-------------------------------------------------------------------------------
:if ($action = "apply") do={
# wait for interfaces
:local count 0;
:while ([/interface ethernet find] = "") do={
:if ($count = 30) do={
:log warning "DefConf: Unable to find ethernet interfaces";
/quit;
}
:delay 1s; :set count ($count +1);
};
/interface ethernet {
set ether2 name=ether2-master;
set ether3 master-port=ether2-master;
set ether4 master-port=ether2-master;
set ether5 master-port=ether2-master;
}
/ip pool add name="default-dhcp" ranges=192.168.88.10-192.168.88.254;
/ip dhcp-server
add name=defconf address-pool="default-dhcp" interface=ether2-master lease-time=10m disabled=no;
/ip dhcp-server network
add address=192.168.88.0/24 gateway=192.168.88.1 comment="defconf";
/ip address add address=192.168.88.1/24 interface=ether2-master comment="defconf";
/ip dns {
set allow-remote-requests=yes
static add name=router address=192.168.88.1
}
/ip dhcp-client add interface=ether1 disabled=no comment="defconf";
/interface list add name=WAN comment="defconf"
/interface list add name=LAN comment="defconf"
/interface list member add list=LAN interface=ether2-master comment="defconf"
/interface list member add list=WAN interface=ether1 comment="defconf"
/ip firewall nat add chain=srcnat out-interface-list=WAN action=masquerade comment="defconf: masquerade"
/ip firewall {
filter add chain=input action=accept protocol=icmp comment="defconf: accept ICMP after RAW"
filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN"
filter add chain=forward action=fasttrack-connection connection-state=established,related comment="defconf: fasttrack"
filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related, untracked"
filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid"
filter add chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN comment="defconf: drop all from WAN not>
address-list add list=bad_ipv4 address=0.0.0.0/8 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=172.16.0.0/12 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=192.168.0.0/16 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=10.0.0.0/8 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=169.254.0.0/16 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=127.0.0.0/8 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=224.0.0.0/4 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=198.18.0.0/15 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=192.0.0.0/24 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=192.0.2.0/24 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=198.51.100.0/24 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=203.0.113.0/24 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=100.64.0.0/10 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=240.0.0.0/4 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=192.88.99.0/24 comment="defconf: 6to4 relay Anycast RFC 3068"
raw add chain=prerouting action=accept disabled=yes comment="defconf: enable for transparent firewall"
raw add chain=prerouting action=drop in-interface-list=WAN src-address-list=bad_ipv4 comment="defconf: drop from bogon IP's"
raw add chain=prerouting action=drop in-interface-list=LAN src-address=!192.168.88.0/24 comment="defconf: drop local if not from default IP range"
raw add chain=prerouting action=drop protocol=udp port=0 comment="defconf: drop bad UDP"
raw add chain=prerouting action=jump jump-target=icmp4 protocol=icmp comment="defconf: jump to ICMP chain"
raw add chain=prerouting action=jump jump-target=bad_tcp protocol=tcp comment="defconf: jump to TCP chain"
raw add chain=prerouting action=accept in-interface-list=LAN comment="defconf: accept everything else from LAN"
raw add chain=prerouting action=drop comment="defconf: drop the rest"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=0:0 limit=5,10:packet comment="defconf: echo reply"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:0 comment="defconf: net unreachable"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:1 comment="defconf: host unreachable"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:2 comment="defconf: protocol unreachable"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:3 comment="defconf: port unreachable"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:4 comment="defconf: fragmentation needed"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=8:0 limit=5,10:packet comment="defconf: echo"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=11:0-255 comment="defconf: time exceeded "
raw add chain=icmp4 action=drop protocol=icmp comment="defconf: drop other icmp"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=!fin,!syn,!rst,!ack comment="defconf: TCP flag filte"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,syn comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,rst comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,!ack comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,urg comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=syn,rst comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=rst,urg comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp port=0 comment="defconf: TCP port 0 drop"
}
/ipv6 firewall {
address-list add list=bad_ipv6 address=::1 comment="defconf: lo"
address-list add list=bad_ipv6 address=fec0::/10 comment="defconf: site-local"
address-list add list=bad_ipv6 address=::/96 comment="defconf: ipv4 compat"
address-list add list=bad_ipv6 address=2001:db8::/32 comment="defconf: documentation"
address-list add list=bad_ipv6 address=3ffe::/16 comment="defconf: 6bone"
address-list add list=bad_ipv6 address=::224.0.0.0/100 comment="defconf: other"
address-list add list=bad_ipv6 address=::127.0.0.0/104 comment="defconf: other"
address-list add list=bad_ipv6 address=::/104 comment="defconf: other"
address-list add list=bad_ipv6 address=::255.0.0.0/104 comment="defconf: other"
raw add chain=prerouting action=accept disabled=yes comment="defconf: enable for transparent firewall"
raw add chain=prerouting action=drop src-address-list=bad_ipv6 comment="defconf: drop packets with bad src ipv6"
raw add chain=prerouting action=drop dst-address-list=bad_ipv6 comment="defconf: drop packets with bad dst ipv6"
raw add chain=prerouting action=jump jump-target=icmp6 protocol=icmpv6 comment="defconf: jump to ICMPv6 chain"
raw add chain=prerouting action=drop src-address=ff00::/8 comment="defconf: drop if src is multicast"
raw add chain=prerouting action=accept in-interface-list=LAN dst-address=ff02::/16 comment="defconf: accept local multicast scope from LAN"
raw add chain=prerouting action=drop dst-address=ff00::/8 comment="defconf: drop other multicast destinations"
raw add chain=prerouting action=accept in-interface-list=LAN comment="defconf: accept everything else from LAN"
raw add chain=prerouting action=accept limit=5,10:packet protocol=udp port=33434-33534 comment="defconf: accept UDP traceroute with 5,10 limit"
raw add chain=prerouting action=accept protocol=udp dst-port=500,4500 comment="defconf: accept IKE"
raw add chain=prerouting action=accept protocol=ipsec-ah comment="defconf: accept ipsec AH"
raw add chain=prerouting action=accept protocol=ipsec-esp comment="defconf: accept ipsec ESP"
raw add chain=prerouting action=accept protocol=139 comment="defconf: accept HIP"
raw add chain=prerouting action=drop comment="defconf: drop the rest"
raw add chain=icmp6 action=accept protocol=icmpv6 hop-limit=not-equal:255 dst-address=fe80::/10 comment="defconf: rfc4890 drop ll if hop-limit!=255"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=1:0-255 comment="defconf: dst unreachable"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=2:0-255 comment="defconf: packet too big"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=3:0-1 comment="defconf: limit exceeded"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=4:0-2 comment="defconf: bad header"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=144:0-255 comment="defconf: Mobile home agent address discovery"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=145:0-255 comment="defconf: Mobile home agent address discovery"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=146:0-255 comment="defconf: Mobile prefix solic"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=147:0-255 comment="defconf: Mobile prefix advert"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=128:0-255 limit=5,10:packet comment="defconf: echo request limit 5,10"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=129:0-255 limit=5,10:packet comment="defconf: echo reply limit 5,10"
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=133:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf>
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=134:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf>
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=135:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf>
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=136:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf>
raw add chain=icmp6 action=drop protocol=icmpv6 comment="defconf: drop other icmp"
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=141:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf>
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=142:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf>
filter add chain=input action=accept protocol=icmpv6 comment="defconf: accept ICMPv6 after RAW"
filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
filter add chain=input action=accept protocol=udp port=33434-33534 comment="defconf: accept UDP traceroute"
filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN"
filter add chain=forward action=drop protocol=icmpv6 hop-limit=equal:1 comment="defconf: rfc4890 drop hop-limit=1"
filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid"
}
/ip neighbor discovery set [find name="ether1"] discover=no
/tool mac-server disable [find];
/tool mac-server mac-winbox disable [find];
:foreach k in=[/interface find where !(slave=yes || name~"ether1")] do={
:local tmpName [/interface get $k name];
/tool mac-server add interface=$tmpName disabled=no;
/tool mac-server mac-winbox add interface=$tmpName disabled=no;
}
}
#-------------------------------------------------------------------------------
# Revert configuration.
# these commands are executed if user requests to remove default configuration
#-------------------------------------------------------------------------------
:if ($action = "revert") do={
# remove wan port protection
/ip firewall raw remove [find comment~"defconf"]
/ip firewall filter remove [find comment~"defconf"]
/ip firewall address-list remove [find comment~"defconf"]
/ipv6 firewall raw remove [find comment~"defconf"]
/ipv6 firewall filter remove [find comment~"defconf"]
/ipv6 firewall address-list remove [find comment~"defconf"]
/ip firewall nat remove [find comment~"defconf"]
/interface list member remove [find comment~"defconf"]
/interface list remove [find comment~"defconf"]
/tool mac-server remove [find interface!=all]
/tool mac-server set [find] disabled=no
/tool mac-server mac-winbox remove [find interface!=all]
/tool mac-server mac-winbox set [find] disabled=no
/ip neighbor discovery set [find ] discover=yes
:local o [/ip dhcp-server network find comment="defconf"]
:if ([:len $o] != 0) do={ /ip dhcp-server network remove $o }
:local o [/ip dhcp-server find name="defconf" !disabled]
:if ([:len $o] != 0) do={ /ip dhcp-server remove $o }
/ip pool {
:local o [find name="default-dhcp" ranges=192.168.88.10-192.168.88.254]
:if ([:len $o] != 0) do={ remove $o }
}
:local o [/ip dhcp-client find comment="defconf"]
:if ([:len $o] != 0) do={ /ip dhcp-client remove $o }
/ip dns {
set allow-remote-requests=no
:local o [static find name=router address=192.168.88.1]
:if ([:len $o] != 0) do={ static remove $o }
}
/ip address {
:local o [find comment="defconf"]
:if ([:len $o] != 0) do={ remove $o }
}
:foreach iface in=[/interface ethernet find] do={
/interface ethernet set $iface name=[get $iface default-name]
/interface ethernet set $iface master-port=none
}
/interface bridge port remove [find comment="defconf"]
/interface bridge remove [find comment="defconf"]
}
:log info Defconf_script_finished;
So how will this affect the performance? Because on routerboard.com there is a really big performance hit the more firewall rules you add and this update adds like 20 new rules.For those that are curious about the new firewall rules
Soomanyquestions, great question. I personally run IPv6 natively with my ISP. I'm not running the default configuration rules but my device is running approximately the same number of rules, both IPv4 and IPv6. This is of course on a hEX, 750G r3. It's running an IPSec site to site VPN (GRE wrapped in IPSec) via IPv6. It also acts as a router on a stick for a handful of VLANs on my local network while routing the traffic of a typical home-user with a typical 20mbps home connection. So I guess my answer is, I don't seem to notice any performance problems with a rule-set of this length on my hardware under my use case which I'd classify as a power user home edge device.So how will this affect the performance? Because on routerboard.com there is a really big performance hit the more firewall rules you add and this update adds like 20 new rules.For those that are curious about the new firewall rules
such feature is not made yetUldis if I use 2 radios on tha same routerboard (e.g, rb922) with the same Nv2-downlink-ratio the trasmission of both radios is syncronized?we have added basic info on that in the Nv2 wiki manual. Here is the info:
Nv2-mode - specifies to use dynamic or fixed downlink/uplink ratio. Default value is "dynamic-downlink"
Nv2-downlink-ratio - specifies the Nv2 downlink ratio. Uplink ratio is automatically calculated from the downlink-ratio value. When using dynamic-downlink mode the downlink-ratio is also used when link get fully saturated. Minimum value is 20 and maximum 80. Default value is 50.
Considering that the 750Gr3 should be able to handle many houndred mbps of nat speed, it really shouldnt have a problem with your 20mbps connection even with many rules. But thanks for the data!Soomanyquestions, great question. I personally run IPv6 natively with my ISP. I'm not running the default configuration rules but my device is running approximately the same number of rules, both IPv4 and IPv6. This is of course on a hEX, 750G r3. It's running an IPSec site to site VPN (GRE wrapped in IPSec) via IPv6. It also acts as a router on a stick for a handful of VLANs on my local network while routing the traffic of a typical home-user with a typical 20mbps home connection. So I guess my answer is, I don't seem to notice any performance problems with a rule-set of this length on my hardware under my use case which I'd classify as a power user home edge device.So how will this affect the performance? Because on routerboard.com there is a really big performance hit the more firewall rules you add and this update adds like 20 new rules.For those that are curious about the new firewall rules
Below you'll find a link to a snap from my monitoring system (LibreNMS) showing CPU usage for the last 24 hours. I had to post the pic on imgur ... apparently this section on the forum doesn't allow uploads.
http://imgur.com/a/MwyH9
As a side note: My SNMPv3 over IPv6 works as smooth as a babies bottom. Sorry dudes and dudettes that are having issues with SNMP over IPv4.
Confirmed. Enabling IPv6 fixed it for me.Currently SNMP is broken for those devices which has no IPv6 package enabled. We hope to include fix in next rc release.
For me also. It's a workaround.Confirmed. Enabling IPv6 fixed it for me.Currently SNMP is broken for those devices which has no IPv6 package enabled. We hope to include fix in next rc release.
I've been looking at the new default firewall config - and the below doesn't seem quite right:*) defconf - replaced IPv4 firewall configuration with improved one;
/ip firewall raw
add action=drop chain=prerouting comment="defconf: drop the rest"
you mean, even in MikroTik?Finally someone actually tried default configuration )
[asaf23@MikroTik] /interface lte> info
number: 0
pin-status: no password required
functionality: full
manufacturer:
model: Huawei Technologies Co., Ltd.
revision: ME909u-521
current-operator: MTS RUS
current-cellid: 150xxxxx
access-technology: Evolved 3G (LTE)
session-uptime: 49m2s
imei: 12.636.12.01.00
imsi: 25001xxxxxxxxxxx
uicc: 89xxxxxxxxxxxxxx
subscriber-number: ,"+7xxxxxxxxxxx",145
rssi: -63dBm
rsrp: -84dBm
rsrq: -9dB
sinr: 12dB
-- [Q quit|D dump|C-z pause]
That was the first thing I did after reading change log 6.40rc8.Finally someone actually tried default configuration )
Yes, please add:Finally someone actually tried default configuration )
Next RC will have rule set improvements.
For the uplink you have left 45% and it looks like it is not enough for poor connections client to send the traffic to the AP. With dnamic-downlink mode most likely the client uses more than 45% and that is why you get more speed.*) wireless - added option to change "nv2-downlink-ratio" for nv2 protocol (CLI only);
*) wireless - added option to set "fixed-downlink" mode for nv2 protocol (CLI only);
Thanks very much for this. Tested it straight away it and works great. Throughput went way up for nv2 sector with 20 clients on. Latency stabilized mostly. It did however make client with low ccq on uplink almost useless and in dynamic mode the client is getting decent 4mpbs down and 1mbps up.
nv2 period size =3 ms
nv2 downlink-ratio= 65
Just want to know if that is normal or will final version not punish low ccq so badly? I will rather make a plan for that client and have stable latency and increased clients per sector.
Thanks
Mikrotik Devs
Thanks, maybe you have more suggestions what to add or change?/ipv6 firewall filter
add action=accept chain=input comment="Accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/16
To get the iPv6-Prefix from ISP, we need DHCPv6-PD.
Thanks, maybe you have more suggestions what to add or change?
In
I've been looking at the new default firewall config - and the below doesn't seem quite right:
This rule drops all traffic and nothing is passed to the clients behind the router.Code: Select all/ip firewall raw add action=drop chain=prerouting comment="defconf: drop the rest"
/ipv6 firewall raw
/ip firewall raw
add action=drop chain=bad_tcp comment="defconf: TCP flag filte" protocol=tcp tcp-flags=!fin,!syn,!rst,!ack
nice RCVersion 6.40rc8 has been released.
*) defconf - added IPv6 firewall configuration (IPv6 package must be enabled on reset);
*) defconf - replaced IPv4 firewall configuration with improved one;
PrefectVersion 6.40rc13 has been released.
Changes since previous version:
*) defconf - added IPv6 firewall configuration (IPv6 package must be enabled on reset);
*) defconf - renamed 192.168.88.1 address static DNS entry from "router" to "router.lan";
RB3011 dead after update.Version 6.40rc13 has been released.
From the previous one RC.GreySer - From which version did you upgrade your device?
what's so special in this version?..Version 6.40rc13 has been released.
Before an upgrade:
1) Remember to make backup/export files before an upgrade and save them on another storage device;
2) Make sure the device will not lose power during upgrade process;
3) Device has enough free storage space for all RouterOS packages to be downloaded.
So lazily.GreySer - Connect serial console to router, power it on and send output of serial console to support@mikrotik.com
Can you point to some more info about this problem ?Version 6.40rc13 has been released.
*) queue - fixed queuing when at least one child queue has "default-small" and other/s is/are different (introduced in 6.35);
Can you elaborate on this? What types of links are benefited and by how much?*) wireless - reduced load on CPU for high speed wireless links;
Reduced 802.11ac load on processor. This may reduce processor usage for other protocols too.Can you elaborate on this? What types of links are benefited and by how much?*) wireless - reduced load on CPU for high speed wireless links;
Can this mean that NV2 on 802.11ac will also run better?Reduced 802.11ac load on processor. This may reduce processor usage for other protocols too.Can you elaborate on this? What types of links are benefited and by how much?*) wireless - reduced load on CPU for high speed wireless links;
Well,Prefect
there is no problem with firewall ipv4-v6
/ipv6 firewall filter
add action=accept chain=forward comment="defconf: accept ICMPv6 to LAN" protocol=icmpv6
/ip firewall raw
add action=drop chain=prerouting comment="defconf: drop local if not from default IP range" in-interface-list=LAN src-address=!192.168.88.0/24
/ip firewall mangle
add action=set-priority chain=postrouting comment="Respect DSCP tagging" new-priority=from-dscp-high-3-bits passthrough=yes
Here you go:can anyone paste what the new default firewall config look like right now? i dont wanna install the latest rc as of yet.
/ip firewall nat add chain=srcnat out-interface-list=WAN action=masquerade comment="defconf: masquerade"
/ip firewall {
filter add chain=input action=accept protocol=icmp comment="defconf: accept ICMP after RAW"
filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN"
filter add chain=forward action=fasttrack-connection connection-state=established,related comment="defconf: fasttrack"
filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related, untracked"
filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid"
filter add chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN comment="defconf: drop all from WAN not DSTNATed"
address-list add list=bad_ipv4 address=0.0.0.0/8 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=172.16.0.0/12 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=192.168.0.0/16 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=10.0.0.0/8 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=169.254.0.0/16 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=127.0.0.0/8 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=224.0.0.0/4 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=198.18.0.0/15 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=192.0.0.0/24 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=192.0.2.0/24 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=198.51.100.0/24 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=203.0.113.0/24 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=100.64.0.0/10 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=240.0.0.0/4 comment="defconf: RFC6890"
address-list add list=bad_ipv4 address=192.88.99.0/24 comment="defconf: 6to4 relay Anycast RFC 3068"
raw add chain=prerouting action=accept disabled=yes comment="defconf: enable for transparent firewall"
raw add chain=prerouting action=drop in-interface-list=WAN src-address-list=bad_ipv4 comment="defconf: drop from bogon IP's"
raw add chain=prerouting action=drop in-interface-list=LAN src-address=!192.168.88.0/24 comment="defconf: drop local if not from default IP range"
raw add chain=prerouting action=drop protocol=udp port=0 comment="defconf: drop bad UDP"
raw add chain=prerouting action=jump jump-target=icmp4 protocol=icmp comment="defconf: jump to ICMP chain"
raw add chain=prerouting action=jump jump-target=bad_tcp protocol=tcp comment="defconf: jump to TCP chain"
raw add chain=prerouting action=accept in-interface-list=LAN comment="defconf: accept everything else from LAN"
raw add chain=prerouting action=accept in-interface-list=WAN comment="defconf: accept everything else from WAN"
raw add chain=prerouting action=drop comment="defconf: drop the rest"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=0:0 limit=5,10:packet comment="defconf: echo reply"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:0 comment="defconf: net unreachable"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:1 comment="defconf: host unreachable"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:2 comment="defconf: protocol unreachable"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:3 comment="defconf: port unreachable"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:4 comment="defconf: fragmentation needed"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=8:0 limit=5,10:packet comment="defconf: echo"
raw add chain=icmp4 action=accept protocol=icmp icmp-options=11:0-255 comment="defconf: time exceeded "
raw add chain=icmp4 action=drop protocol=icmp comment="defconf: drop other icmp"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=!fin,!syn,!rst,!ack comment="defconf: TCP flag filte"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,syn comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,rst comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,!ack comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,urg comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=syn,rst comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=rst,urg comment="defconf"
raw add chain=bad_tcp action=drop protocol=tcp port=0 comment="defconf: TCP port 0 drop"
}
thanks, with this ruleset, will i needHere you go:can anyone paste what the new default firewall config look like right now? i dont wanna install the latest rc as of yet.
Code: Select all/ip firewall nat add chain=srcnat out-interface-list=WAN action=masquerade comment="defconf: masquerade" /ip firewall { filter add chain=input action=accept protocol=icmp comment="defconf: accept ICMP after RAW" filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked" filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN" filter add chain=forward action=fasttrack-connection connection-state=established,related comment="defconf: fasttrack" filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related, untracked" filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid" filter add chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN comment="defconf: drop all from WAN not DSTNATed" address-list add list=bad_ipv4 address=0.0.0.0/8 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=172.16.0.0/12 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=192.168.0.0/16 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=10.0.0.0/8 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=169.254.0.0/16 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=127.0.0.0/8 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=224.0.0.0/4 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=198.18.0.0/15 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=192.0.0.0/24 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=192.0.2.0/24 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=198.51.100.0/24 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=203.0.113.0/24 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=100.64.0.0/10 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=240.0.0.0/4 comment="defconf: RFC6890" address-list add list=bad_ipv4 address=192.88.99.0/24 comment="defconf: 6to4 relay Anycast RFC 3068" raw add chain=prerouting action=accept disabled=yes comment="defconf: enable for transparent firewall" raw add chain=prerouting action=drop in-interface-list=WAN src-address-list=bad_ipv4 comment="defconf: drop from bogon IP's" raw add chain=prerouting action=drop in-interface-list=LAN src-address=!192.168.88.0/24 comment="defconf: drop local if not from default IP range" raw add chain=prerouting action=drop protocol=udp port=0 comment="defconf: drop bad UDP" raw add chain=prerouting action=jump jump-target=icmp4 protocol=icmp comment="defconf: jump to ICMP chain" raw add chain=prerouting action=jump jump-target=bad_tcp protocol=tcp comment="defconf: jump to TCP chain" raw add chain=prerouting action=accept in-interface-list=LAN comment="defconf: accept everything else from LAN" raw add chain=prerouting action=accept in-interface-list=WAN comment="defconf: accept everything else from WAN" raw add chain=prerouting action=drop comment="defconf: drop the rest" raw add chain=icmp4 action=accept protocol=icmp icmp-options=0:0 limit=5,10:packet comment="defconf: echo reply" raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:0 comment="defconf: net unreachable" raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:1 comment="defconf: host unreachable" raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:2 comment="defconf: protocol unreachable" raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:3 comment="defconf: port unreachable" raw add chain=icmp4 action=accept protocol=icmp icmp-options=3:4 comment="defconf: fragmentation needed" raw add chain=icmp4 action=accept protocol=icmp icmp-options=8:0 limit=5,10:packet comment="defconf: echo" raw add chain=icmp4 action=accept protocol=icmp icmp-options=11:0-255 comment="defconf: time exceeded " raw add chain=icmp4 action=drop protocol=icmp comment="defconf: drop other icmp" raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=!fin,!syn,!rst,!ack comment="defconf: TCP flag filte" raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,syn comment="defconf" raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,rst comment="defconf" raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,!ack comment="defconf" raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=fin,urg comment="defconf" raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=syn,rst comment="defconf" raw add chain=bad_tcp action=drop protocol=tcp tcp-flags=rst,urg comment="defconf" raw add chain=bad_tcp action=drop protocol=tcp port=0 comment="defconf: TCP port 0 drop" }
You could still have the one rule and use an address list:thanks, with this ruleset, will i need
7x similar rules for: raw add chain=prerouting action=drop in-interface-list=LAN src-address=!192.168.88.0/24 comment="defconf: drop local if not from default IP range" ?
i have 7 different vlans for 7 different lan subnets.
ive had numerous temptations to ask. so yeah lets see mstp, say next rc?Hello. When will it be possible to test mstp?
Wireless with CAPSMAN forwarding seems to be improved for me, at least somehow. I currently have ~300 connected clients on ~25 WAP AC/HAP AC/HAP AC lite and find less "disconnected, group key timeout" messages on 2.4Ghz connected clients within logging. Before that release I had hundreds/too much of them. Did you change anything else with wireless package?Version 6.40rc13 has been released.
*) wireless - added option to change "nv2-downlink-ratio" for nv2 protocol;
*) wireless - added option to set "fixed-downlink" mode for nv2 protocol;
*) wireless - reduced load on CPU for high speed wireless links;
Thanks for the input. We will improve FW rule set.Well,Prefect
there is no problem with firewall ipv4-v6
i suggest to add this rule to IPv6 firewall (after "defconf: rfc4890 drop hop-limit=1"):---Code: Select all/ipv6 firewall filter add action=accept chain=forward comment="defconf: accept ICMPv6 to LAN" protocol=icmpv6
Ramas
i do -- right after mstp.None knows that.
RB2011 RB3011 bootlop fixed ? Safe to install ?Version 6.40rc14 has been released.
Updated now from 6.39.1 , succesfull.GreySer - There is not generic bootloop with RB2011 and RB3011. It must be caused either by problems during upgrade process (for example, power cycle during upgrade) or specific configuration. Please write to support@mikrotik.com and report your problem. Provide configuration files, explanation and serial output during reboot loop and even better - one from upgrade process.
can anybody share optimal firewall rules for l2tp/ipsec and ikev2 ipsec with regards to fasttrack!) ipsec - added support for dynamic "action=notrack" RAW rules for policies;
/ip firewall address-list
add address=100.64.0.0/10 comment="defconf: RFC6890" list=bad_ipv4
/ip firewall raw
add action=drop chain=prerouting comment="defconf: drop from bogon IP's" in-interface-list=WAN src-address-list=bad_ipv4
/ip firewall raw add action=return chain=bad_tcp
Return is the default when reaching the end of a custom chain, I assume that applies here too, making it unnecessary. So the answer would be no.Hi!
Do we need add in last position of chain=bad_tcp RETURN rule?Code: Select all/ip firewall raw add action=return chain=bad_tcp
/ipv6 firewall {
address-list add list=bad_ipv6 address=::1 comment="defconf: lo"
address-list add list=bad_ipv6 address=fec0::/10 comment="defconf: site-local"
address-list add list=bad_ipv6 address=::/96 comment="defconf: ipv4 compat"
address-list add list=bad_ipv6 address=2001:db8::/32 comment="defconf: documentation"
address-list add list=bad_ipv6 address=3ffe::/16 comment="defconf: 6bone"
address-list add list=bad_ipv6 address=::224.0.0.0/100 comment="defconf: other"
address-list add list=bad_ipv6 address=::127.0.0.0/104 comment="defconf: other"
address-list add list=bad_ipv6 address=::/104 comment="defconf: other"
address-list add list=bad_ipv6 address=::255.0.0.0/104 comment="defconf: other"
raw add chain=prerouting action=accept disabled=yes comment="defconf: enable for transparent firewall"
raw add chain=prerouting action=drop src-address-list=bad_ipv6 comment="defconf: drop packets with bad src ipv6"
raw add chain=prerouting action=drop dst-address-list=bad_ipv6 comment="defconf: drop packets with bad dst ipv6"
raw add chain=prerouting action=jump jump-target=icmp6 protocol=icmpv6 comment="defconf: jump to ICMPv6 chain"
raw add chain=prerouting action=drop src-address=ff00::/8 comment="defconf: drop if src is multicast"
raw add chain=prerouting action=accept dst-address=ff02::/16 comment="defconf: accept local multicast scope"
raw add chain=prerouting action=drop dst-address=ff00::/8 comment="defconf: drop other multicast destinations"
raw add chain=prerouting action=accept in-interface-list=WAN comment="defconf: accept everything else from WAN"
raw add chain=prerouting action=accept in-interface-list=LAN comment="defconf: accept everything else from LAN"
raw add chain=prerouting action=drop comment="defconf: drop the rest"
raw add chain=icmp6 action=accept protocol=icmpv6 hop-limit=not-equal:255 dst-address=fe80::/10 comment="defconf: rfc4890 drop ll if hop-limit!=255"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=1:0-255 comment="defconf: dst unreachable"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=2:0-255 comment="defconf: packet too big"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=3:0-1 comment="defconf: limit exceeded"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=4:0-2 comment="defconf: bad header"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=144:0-255 comment="defconf: Mobile home agent address discovery"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=145:0-255 comment="defconf: Mobile home agent address discovery"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=146:0-255 comment="defconf: Mobile prefix solic"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=147:0-255 comment="defconf: Mobile prefix advert"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=128:0-255 limit=5,10:packet comment="defconf: echo request limit 5,10"
raw add chain=icmp6 action=accept protocol=icmpv6 icmp-options=129:0-255 limit=5,10:packet comment="defconf: echo reply limit 5,10"
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=133:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf: rfc4890 router solic limit 5,10 only LAN"
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=134:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf: rfc4890 router advert limit 5,10 only LAN"
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=135:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf: rfc4890 neighbor solic limit 5,10 only LAN"
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=136:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf: rfc4890 neighbor advert limit 5,10 only LAN"
raw add chain=icmp6 action=drop protocol=icmpv6 comment="defconf: drop other icmp"
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=141:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf: rfc4890 inverse ND solic limit 5,10 only LAN"
raw add chain=icmp6 action=accept in-interface-list=LAN protocol=icmpv6 icmp-options=142:0-255 limit=5,10:packet hop-limit=equal:255 comment="defconf: rfc4890 inverse ND advert limit 5,10 only LAN"
filter add chain=input action=accept protocol=icmpv6 comment="defconf: accept ICMPv6 after RAW"
filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
filter add chain=input action=accept protocol=udp port=33434-33534 comment="defconf: accept UDP traceroute"
filter add chain=input action=accept protocol=udp dst-port=546 src-address=fe80::/16 comment="defconf: accept DHCPv6-Client prefix delegation."
filter add chain=input action=accept protocol=udp dst-port=500,4500 comment="defconf: accept IKE"
filter add chain=input action=accept protocol=ipsec-ah comment="defconf: accept ipsec AH"
filter add chain=input action=accept protocol=ipsec-esp comment="defconf: accept ipsec ESP"
filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN"
filter add chain=forward action=drop protocol=icmpv6 hop-limit=equal:1 comment="defconf: rfc4890 drop hop-limit=1"
filter add chain=forward action=accept protocol=icmpv6 comment="defconf: accept ICMPv6 after RAW"
filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid"
filter add chain=forward action=accept protocol=139 comment="defconf: accept HIP"
filter add chain=forward action=drop in-interface-list=!LAN comment="defconf: drop everything else not coming from LAN"
}
The TX-Power value has been fixed.*) wireless - fixed registration table "signal-strength" reporting for chains when using nv2;
Now in ip firewall:I don't like this.Code: Select all/ip firewall address-list add address=100.64.0.0/10 comment="defconf: RFC6890" list=bad_ipv4 /ip firewall raw add action=drop chain=prerouting comment="defconf: drop from bogon IP's" in-interface-list=WAN src-address-list=bad_ipv4
This valid address for WAN interface for end user.
Many ISP use CGN network.
I just upgraded my hEX to latest and I'm not seeing anything in the default configuruation script for enhancements to the IPv4 now.The Shared Address Space address range is 100.64.0.0/10
Shared Address Space can only be used in Service Provider networks or on routing equipment that is able to do address translation across router the interfaces when addresses are identical on two different interfaces
---
Ramas
/ip firewall nat add chain=srcnat out-interface-list=WAN ipsec-policy=out,none action=masquerade comment="defconf: masquerade"
/ip firewall {
filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
filter add chain=input action=drop connection-state=invalid comment="defconf: drop invalid"
filter add chain=input action=accept protocol=icmp comment="defconf: accept ICMP"
filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN"
filter add chain=forward action=accept ipsec-policy=in,ipsec comment="defconf: accept in ipsec policy"
filter add chain=forward action=accept ipsec-policy=out,ipsec comment="defconf: accept out ipsec policy"
filter add chain=forward action=fasttrack-connection connection-state=established,related comment="defconf: fasttrack"
filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related, untracked"
filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid"
filter add chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN comment="defconf: drop all from WAN not>
}
ipv4 firewall was reverted.Now in ip firewall:I don't like this.Code: Select all/ip firewall address-list add address=100.64.0.0/10 comment="defconf: RFC6890" list=bad_ipv4 /ip firewall raw add action=drop chain=prerouting comment="defconf: drop from bogon IP's" in-interface-list=WAN src-address-list=bad_ipv4
This valid address for WAN interface for end user.
Many ISP use CGN network.I just upgraded my hEX to latest and I'm not seeing anything in the default configuruation script for enhancements to the IPv4 now.The Shared Address Space address range is 100.64.0.0/10
Shared Address Space can only be used in Service Provider networks or on routing equipment that is able to do address translation across router the interfaces when addresses are identical on two different interfaces
---
Ramas
Like the others have stated, this is valid address space. It can be used by a service provider to address their equipment, like a DNS server or NTP server for example. It also could be used for CPE addressing. In fact it should be preferred when a service provider does not have a device public addressing for IPv4 over using RFC1918 addressing. You are more likely to have issues with users when you use RFC1918 addressing instead of RFC6598 addressing. This brings me to my last point, if this configuration update is coming back the comment should be altered to reflect the either both RFC680 which simply indicates it's allocated addressing and or RFC6598, the actual document for it's use, or just RFC6598.Code: Select all/ip firewall nat add chain=srcnat out-interface-list=WAN ipsec-policy=out,none action=masquerade comment="defconf: masquerade" /ip firewall { filter add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked" filter add chain=input action=drop connection-state=invalid comment="defconf: drop invalid" filter add chain=input action=accept protocol=icmp comment="defconf: accept ICMP" filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN" filter add chain=forward action=accept ipsec-policy=in,ipsec comment="defconf: accept in ipsec policy" filter add chain=forward action=accept ipsec-policy=out,ipsec comment="defconf: accept out ipsec policy" filter add chain=forward action=fasttrack-connection connection-state=established,related comment="defconf: fasttrack" filter add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related, untracked" filter add chain=forward action=drop connection-state=invalid comment="defconf: drop invalid" filter add chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface-list=WAN comment="defconf: drop all from WAN not> }
Thoughts?
Thanks, mrz! Any improvement in the default firewall is worth while. You got us all excited with the IPv6 one so now we're playing with the changes in both IPv4 and IPv6. I look forward to seeing more improvements!ipv4 firewall was reverted.
why was it reverted anyway
ipv4 firewall was reverted.
Maybe the the forum can be updated to a new way of answering. Added could be "Answering to this posting" next to post reply and quote.@biatche:
Writing as moderator:
Could you PLEASE DO NOT CITE FULL POST if it is not needed. Can you count ratio of your words to citation ? It is almost 0%.
Do you think that it is necessary to make such long citations ? Do you think that full post need to be repeated post under post ? Do you think we have problem following thread ? If you need to emphasize on particular words from long post then just cite these words.
Please edit your post and treat this as prewarning.
Does the SXT LTE fix is the same as is current (6.39.2) firmware or is it something else?Version 6.40rc20 has been released.
Before an upgrade:
Changes since previous version:
*) lte - added "accounting" logs for LTE connections;
*) lte - improved reliability on SXT LTE;
/system default-configuration
/ipv6 firewall
filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop everything else not coming from LAN"
filter add chain=forward action=drop in-interface-list=!LAN comment="defconf: drop everything else not coming from LAN"
/ip firewall
filter add chain=input action=drop in-interface-list=!LAN comment="defconf: drop all not coming from LAN"
i didnt bother to look at the content.. i just hit "reply with quote" button. maybe you could fix the way that button works. mrz multi quoted himself #122. so whatever, ill change it.@biatche:
Writing as moderator:
Could you PLEASE DO NOT CITE FULL POST if it is not needed. Can you count ratio of your words to citation ? It is almost 0%.
Do you think that it is necessary to make such long citations ? Do you think that full post need to be repeated post under post ? Do you think we have problem following thread ? If you need to emphasize on particular words from long post then just cite these words.
Please edit your post and treat this as prewarning.
exactly. i typed all of it with haste, looking only at the content i typed. i didn't bother to look at all the automated quoted text. i believe that's what a moderator is here for in the case a forum button doesn't work as efficient as it can be.Maybe the the forum can be updated to a new way of answering. Added could be "Answering to this posting" next to post reply and quote.@biatche:
Writing as moderator:
Could you PLEASE DO NOT CITE FULL POST if it is not needed. Can you count ratio of your words to citation ? It is almost 0%.
Do you think that it is necessary to make such long citations ? Do you think that full post need to be repeated post under post ? Do you think we have problem following thread ? If you need to emphasize on particular words from long post then just cite these words.
Please edit your post and treat this as prewarning.
In the new posting on the top there is a automatically generated line that states "In reaction to post xxxxxx" and the xxxxxx is a number that is clickable and links to the post answered to.
Please cite or link the rules of the forum that indicate that full-quoting is not allowed. There is no visible forum rules either in the forum headers, footer, nor in the terms of registration given to a new user (at ucp.php?mode=register ). On every other forum I visit, full quoting is actually recommended and preferred unless the message you are quoting is more than a few paragraphs, or has embedded images. The terms say that Mikrotik (and moderators) can edit a post, but nowhere does it say that an account might face consequences for content that is allowed.That is the problem ... you do not bother.Why should you ? Maybe moderator should edit your posts for your convenience as you do not bother ?
Do you think that driver job is just driving a car without necessity to follow traffic rules as police is for obeying them ?
Have you checked difference in funcionality of "Post replay" button versus "Reply with quote" ? Cite.PNG
I can agree, especially on mobile, that full quoting can be annoying if the resulting reply is limited in content.Allowed or not, it's annoying. All that endless scrolling over quotes, just to see another "me too" type of reply below, that's just wrong.
This is precisely where "Reply with Quote" should be used. When there are multiple on-topic discussions in a single thread, quoting allows the reader to maintain understanding of the context. Especially if you call out the part you are referring to exactly, such as this.On the other hand, I do agree that multi-topic threads like this one are exceptions, and little more quotes than normal are fine. Still, no need to overdo it.
I agree, I responded off-topic in this thread since it was responding to a moderator whose message was off-topic.Btw, it would be probably wise if some moderator split this quoting discussion in another thread.
Tue Jun 13, 2017 1:17 am:I do not say that quoting is not allowed. There is no such rule.
So why would that be a prewarning if it is allowed and there is no rule? I take no offense to what you are trying to do, I agree that it would be best if everyone used quoting only strategically. I have an issue that you called it a "prewarning" which coming from a moderator means that repeat offenses would become a warning and then a ban or other restriction. I was silent on the issue until I read that line.@biatche:
Please edit your post and treat this as prewarning.
@biatche:
Please edit your post and treat this as prewarning.
Tapatalk (Android app for the phpBB) is atvertised when browsing forum from mobile browser. And it does not shrink quotes.What are you guys even talking about?
I have no control over what 3rd party tools do. Just don't use it.Tapatalk (Android app for the phpBB) is atvertised when browsing forum from mobile browser. And it does not shrink quotes.What are you guys even talking about?
This is the plugin misbehaving. Fixed it.it is advertised
And that is one unexpected development.... and just before the vacation....Version 6.40rc21 has been released.
!) wireless - added Nv2 AP synchronization feature (for experimental use)(CLI only);
Visit this link in order to find out more about new wireless feature:
https://wiki.mikrotik.com/wiki/Manual:N ... ronization
Sounds very promising.!) wireless - added Nv2 AP synchronization feature (for experimental use)(CLI only);
Good experiment..Version 6.40rc21 has been released.
!) wireless - added Nv2 AP synchronization feature (for experimental use)(CLI only);
Visit this link in order to find out more about new wireless feature:
https://wiki.mikrotik.com/wiki/Manual:N ... ronization
There is no need for synchronization if your APs on the same tower uses different frequencies as then there is no big interference between them.A step closer but requires AP's to be on the same frequency though
@UldisThere is no need for synchronization if your APs on the same tower uses different frequencies as then there is no big interference between them.A step closer but requires AP's to be on the same frequency though
Please enable the wireless,debug logs on the Master AP and also on the Slave APs.Hi,
i tested sync mode for nv2, but it did not run for me
I set AP1 to sync-master, client connectiong all OK
But when i set AP2 or AP3 to sync-slave, the Clients did not come back.
Log says nothing AP says runnig but no clients are connecting
on AP1 Master i see nothing that communication with AP2 or AP3 for sync is done.
mistry7
If the APs are very close together then yes.@UldisThere is no need for synchronization if your APs on the same tower uses different frequencies as then there is no big interference between them.A step closer but requires AP's to be on the same frequency though
You should know better than this.
There is interference even if you are 200mhz away from an AP.
That is exactly what we need. Sync on the same tower of course, but on different frequencies too. The fact that you are thinking about testing with different frequencies too is very good to hear.If the APs are very close together then yes.
At the moment the current implementation works only on the same wireless frequency. We could think how to sync the APs that are on different frequencies but located on the same tower and connected to the same ethernet network.
I completely agree with this.That is exactly what we need. Sync on the same tower of course, but on different frequencies too. The fact that you are thinking about testing with different frequencies too is very good to hear.If the APs are very close together then yes.
At the moment the current implementation works only on the same wireless frequency. We could think how to sync the APs that are on different frequencies but located on the same tower and connected to the same ethernet network.
+1At the moment the current implementation works only on the same wireless frequency. We could think how to sync the APs that are on different frequencies but located on the same tower and connected to the same ethernet network.
You give the Answer some topics later, it works only on the same Frequenzy, this config is not possile, at the moment.Please enable the wireless,debug logs on the Master AP and also on the Slave APs.Hi,
i tested sync mode for nv2, but it did not run for me
I set AP1 to sync-master, client connectiong all OK
But when i set AP2 or AP3 to sync-slave, the Clients did not come back.
Log says nothing AP says runnig but no clients are connecting
on AP1 Master i see nothing that communication with AP2 or AP3 for sync is done.
mistry7
What does the wireless monitor interface say on the AP2 or AP3?
Very good news!! Thanks!Version 6.40rc21 has been released.
!) wireless - added Nv2 AP synchronization feature (for experimental use)(CLI only);
absolutely +1.. [CUT].. We could think how to sync the APs that are on different frequencies but located on the same tower and connected to the same ethernet network.
I guess it is not [Ticket#2017021722001071].Version 6.40rc21 has been released.
*) dude - fixed server crash;
You could take some ideas from or use PTP (https://en.wikipedia.org/wiki/Precision_Time_Protocol) to synchronise the APs internal clocks over ethernet and hence transmission times from a collection of APs on a tower without having to mess with GPS. You only need relative not absolute time synchronisation. How well it works depends on how quickly you can get an incoming ethernet frame timestamped - but the articles all suggest sub-microsecond is possible.We could think how to sync the APs that are on different frequencies but located on the same tower and connected to the same ethernet network.
As always, I love to see the progress you guys make day by day. With that said and while you're in mucking around with ping. Can you update it to support IPv6 name resolution. I suspect someone is using a legacy system call ...*) ping - fixed ping getting stuck (after several thousands of ping attempts);
[admin@rtr1] > ping count=2 www.google.com
SEQ HOST SIZE TTL TIME STATUS
0 172.217.8.196 56 56 15ms
1 172.217.8.196 56 56 23ms
sent=2 received=2 packet-loss=0% min-rtt=15ms avg-rtt=19ms max-rtt=23ms
[admin@rtr1] > ping count=2 ipv6.google.com
invalid value for argument address:
invalid value of mac-address, mac address required
invalid value for argument ipv6-address
failure: dns name exists, but no appropriate record
[admin@rtr1] >
You ARE joking right ? Does Mikrotik really think that is the case ??? Have they ever run sectors in the field ? Even with RF Armour and 20' vertical and 6' horizontal separation it is a BIG problem. It absolutely DOES matter particularly if you run 802-N cards !There is no need for synchronization if your APs on the same tower uses different frequencies as then there is no big interference between them.A step closer but requires AP's to be on the same frequency though
Yes - that is painfully evident. They seem to be living in the B/G days when near channel interference didn't impact us very much. Sticking their heads in the sand and ignoring reality is not a valid business strategy !!!@zod
Yes mikrotik is thinking Wireless Works that way
mistry7 you are wrong https://community.ubnt.com/t5/airMAX-AC ... 63941#M454GPS Sync is now working with Airmax AC not yesterday
I agree that the worms/viruses are a problem for ubiquiti based networks, but if the network is designed right they should not be able to get to the radios to infect them.Hi Zod,
GPS Sync is now working with Airmax AC not yesterday
I dont had to reflash more then 100 CPE because of malware, another WISPs has to.
What i am realy missing is Spectral-scan and Spectral-history
I used these functions every day, interferrence is now Panic on AC-Equipment without
These Tools!
What exactly does this mean?rb750gr3 - fixed USB power;
viewtopic.php?f=21&t=121198&start=100#p602070What exactly does this mean?rb750gr3 - fixed USB power;
I saw that the default configuration firewall rules were back at least in 6.40rc21. My upgrade to 6.40rc24 went smoothly. Are the references to untracked connections an issue? I know in some of the earlier versions of the rules were using RAW tables, this is likely what caused the inclusion of untracked.*) quickset - added special firewall exception rules for IPSec;
Hi Oldman,
did you see the need of sync-secret?
Master AP:
/interface wireless set wlan1 nv2-mode=sync-master nv2-sync-secret=Tower1
Slave AP:
/interface wireless set wlan1 nv2-mode=sync-slave nv2-sync-secret=Tower1
mistry7
For this to work, there are two solutions :You could take some ideas from or use PTP (https://en.wikipedia.org/wiki/Precision_Time_Protocol) to synchronise the APs internal clocks over ethernet and hence transmission times from a collection of APs on a tower without having to mess with GPS. You only need relative not absolute time synchronisation. How well it works depends on how quickly you can get an incoming ethernet frame timestamped - but the articles all suggest sub-microsecond is possible.We could think how to sync the APs that are on different frequencies but located on the same tower and connected to the same ethernet network.
Mimosa is claiming tower to tower sync for micropop's that can see each other. That's wifi(ish) right?So for wifi, sync is only useful i think to reduce interferences on the same sync tower or the same roof. Not to sync a wide network.
GPS is good but does have drawbacks :To use radio to sync the AP is crazy if you have an interference on the channel (in dense urban area is very easy) you lost the slave or slaves..... GPS sync reduce interference on the tower, reduce interference beetwen the towers, allow dense deployment and the last but not least allow sync beetween operatoros that use MKT and the same duty cycle.
Without GPS sync MKT 'll loose the WISP wireless market very soon
Quickset rules are explicitly for L2TP/IPSec, IPv6 rules are generic for any type of IPSec configuration.Next, In the IPv6 firewall filter rules you are accepting UDP 500 and 4500 along with IPsec-AH and IPsec-ESP on input and forward. In the IPv4 firewall filter you are using the IPsec policy feature ...*) quickset - added special firewall exception rules for IPSec;
What's the thought process for the difference in posture? I'd imagine you'd want your policies to be consistent across IP stacks.Quickset rules are explicitly for L2TP/IPSec, IPv6 rules are generic for any type of IPSec configuration.
I think you have the wrong idea about the sync. My impression is that protocols like NV2 are TDMA. The purpose of syncing the transmitters on a tower would be to coordinate that they are transmitting and listening in unison to ensure weak signals from a client aren't drowned out by an adjacent AP. The Time of Day clocks in each AP probably run at microsecond or better accuracy so all you are trying to do is make sure that the transmit interrupt (or DMA transfer to a radio's own tx buffer) all happens in the same instant. It isn't to try and make sure their transmit centre frequency is locked precisely to 2.412GHz for instance.For this to work, there are two solutions :
- the radio clock need to have an input for a sync reference, and a sync generator is needed to generate the sync carrier on the right frequency.
- the radio clock need a VCO clock, voltage controlled oscillator, so that it is possible to adjust the transmit frequency very precisely.
Has it been promised?will we be seeing MSTP in 6.40 (a latter RC) perhaps? is it in planning?
6.39 (Stable) Changelog:Has it been promised?
In case it has, can you provide a link, please?
viewtopic.php?f=1&t=120946#p595389Has it been promised?will we be seeing MSTP in 6.40 (a latter RC) perhaps? is it in planning?
In case it has, can you provide a link, please?
If not, please stop spamming with the topic not directly related to the 6.40rc series.
Yes NV2 is TDMA modulation. So Mikrotik NV2 sync seems to be similar in design with OpenTDMF sync. In this case, APs synchronize their slot boundaries. This is possible using a something like IEEE 1588 PTP protocol for example to share a quite precise (in the microsecond range) clock reference.I think you have the wrong idea about the sync. My impression is that protocols like NV2 are TDMA. The purpose of syncing the transmitters on a tower would be to coordinate that they are transmitting and listening in unison to ensure weak signals from a client aren't drowned out by an adjacent AP. The Time of Day clocks in each AP probably run at microsecond or better accuracy so all you are trying to do is make sure that the transmit interrupt (or DMA transfer to a radio's own tx buffer) all happens in the same instant. It isn't to try and make sure their transmit centre frequency is locked precisely to 2.412GHz for instance.For this to work, there are two solutions :
- the radio clock need to have an input for a sync reference, and a sync generator is needed to generate the sync carrier on the right frequency.
- the radio clock need a VCO clock, voltage controlled oscillator, so that it is possible to adjust the transmit frequency very precisely.
+1Has it been promised?will we be seeing MSTP in 6.40 (a latter RC) perhaps? is it in planning?
In case it has, can you provide a link, please?
If not, please stop spamming with the topic not directly related to the 6.40rc series.
Are looking forward tov6.40 will have another separate VLAN-aware bridge implementation
Some other interesting background for synchronization :You could take some ideas from or use PTP (https://en.wikipedia.org/wiki/Precision_Time_Protocol) to synchronise the APs internal clocks over ethernet and hence transmission times from a collection of APs on a tower without having to mess with GPS. You only need relative not absolute time synchronisation. How well it works depends on how quickly you can get an incoming ethernet frame timestamped - but the articles all suggest sub-microsecond is possible.We could think how to sync the APs that are on different frequencies but located on the same tower and connected to the same ethernet network.
+1Please do some minimal work on the IPv6 routing..
+1, moar IPv6+1Please do some minimal work on the IPv6 routing..
problems still appears (currently with v6.40rc28) => Ticket#2017042722000941Version 6.40rc20 has been released.
*) wireless - fixed rare crash on cap disable;
.
This fixed fasttrack over bonded interfaces using dynamic mac. Great work*) fasttrack - fixed fasttrack over interfaces with dynamic MAC address;
Me too interested.IF mikrotik guys are working with dhcp part of ROS, its time to answer - when mikrotik will implement dhcp option 82?
Actually is interested lease issue by circuit-id.
Mikrotik stuff, c'mon you did half of work, go on and finish.
we've been using this since 2008 you just need external RADIUSIF mikrotik guys are working with dhcp part of ROS, its time to answer - when mikrotik will implement dhcp option 82?
Actually is interested lease issue by circuit-id.
Hi chupaka,we've been using this since 2008 you just need external RADIUSIF mikrotik guys are working with dhcp part of ROS, its time to answer - when mikrotik will implement dhcp option 82?
Actually is interested lease issue by circuit-id.
:global test "test"
:put $test
Scripting language has two types of variables:
global - accessible from all scripts created by current user, defined by global keyword;
local - accessible only within the current scope, defined by local keyword.
OoooOoooohhhhh! Okayscript 2 must be:
:global test;
:put $test
I'm really sure that it can't be selected more than 25. It turns the down arrow in grey, disabled.sindudas - You should be able to add up to 30 interfaces. Are you sure that simply menu did not go out of your computer display?
sindudas - You should be able to add up to 30 interfaces. Are you sure that simply menu did not go out of your computer display?
Forbidden
You don't have permission to access /link/mikrotik-vlan-add.jpeg on this server.
It should work now. Sorry, it was geoip restrictionsForbidden
You don't have permission to access /link/mikrotik-vlan-add.jpeg on this server.