[admin@migo] /ipv6 address> print
Flags: X - disabled, I - invalid, D - dynamic, G - global, L - link-local
# ADDRESS FROM-POOL INTERFACE ADVERTISE
0 IG ::1/64 netdsl... bridge-local yes
1 DL fe80::d6ca:6dff:fea0:ff93/64 bridge-local no
2 DL fe80::d/64 pppoe-out1 no
3 DL fe80::d6ca:6dff:fea0:ff92/64 ether1-gateway no
[admin@migo] /ipv6> dhcp-client print
Flags: D - dynamic, X - disabled, I - invalid
# INTERFACE STATUS REQUEST PREFIX ADDRESS
0 pppoe-out1 bound prefix 2001:4dd2:8c78::/48, 1d1h47m23s
My understanding from the 6.40rc36 and 38 releases was that the switch chip menu was to not be used for ports not in a new bridge and ideally all configurations should move to the new VLAN aware hw-offload bridges.Hello everyone
I'm confused on the crs 125 series what is the best way,
Use the new vlan on bridge or stay using the switch menu?
Thanks.
Enviado de meu XT1580 usando Tapatalk
I asked this because on here on wikiMy understanding from the 6.40rc36 and 38 releases was that the switch chip menu was to not be used for ports not in a new bridge and ideally all configurations should move to the new VLAN aware hw-offload bridges.Hello everyone
I'm confused on the crs 125 series what is the best way,
Use the new vlan on bridge or stay using the switch menu?
Thanks.
Enviado de meu XT1580 usando Tapatalk
I do recall a conflicting post from a MikroTik poster so clarification from own of the MikroTik folks would be great.
Leds work on boot. But after router come in working state they switch off.Upgrade from 6.40 last rc to 6.41.3 my 2011UiAS-2HnD all leds on active interfaces are off, Except led on eth10 is on witch is POE Out and is active. Is this normal or something wrong with this.
Same here, LED's are dead (RB2011UiAS).Upgrade from 6.40 last rc to 6.41.3 my 2011UiAS-2HnD all leds on active interfaces are off,
Currently, it is implemented only for CRS3xx series switches.My understanding from the 6.40rc36 and 38 releases was that the switch chip menu was to not be used for ports not in a new bridge and ideally all configurations should move to the new VLAN aware hw-offload bridges.
On CRS125 VLANs still have to be configured in "/interface ethernet switch" menu to keep hw-offload working. If they are configured in "/interface bridge vlan", the hw-offload will turn off.If you see the table of crs 1xx/2xx series
It have a - on bridge vlan filter
Becs, thanks for the clarification! While we're chatting. How do we mere mortals edit the wiki?Currently, it is implemented only for CRS3xx series switches.My understanding from the 6.40rc36 and 38 releases was that the switch chip menu was to not be used for ports not in a new bridge and ideally all configurations should move to the new VLAN aware hw-offload bridges.
On CRS125 VLANs still have to be configured in "/interface ethernet switch" menu to keep hw-offload working. If they are configured in "/interface bridge vlan", the hw-offload will turn off.If you see the table of crs 1xx/2xx series
It have a - on bridge vlan filter
Before changing my configuration... Does MAC-based-VLAN work with this implementation?!) bridge - implemented software based vlan-aware bridges;
https://wiki.mikrotik.com/wiki/Manual:I ... _Filtering
I'm creating VLAN20 on Bridge1 - there's still ok.
But when I add VLAN20 to Bridge2, RB is unavailable on these two ports.
It does not work even if I put my vlan on ether1 or 2.Shouldn't VLAN be created on Ethernet port, not the bridge ...
Or you are trying Bridge VLAN Filtering and vlan-ids ...I'm creating VLAN20 on Bridge1 - there's still ok.
But when I add VLAN20 to Bridge2, RB is unavailable on these two ports.
/interface bridge
add name=bridge1
add name=bridge2
add name=bridge3
/interface vlan
add interface=bridge1 name=vlan20 vlan-id=20
add interface=bridge1 name=vlan30 vlan-id=30
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether2
add bridge=bridge2 interface=vlan20
add bridge=bridge3 interface=vlan30
Will there be shift to new syntax also for CRS125 series? It is a bit confusing to have to use different syntax for each product to get things done ...On CRS125 VLANs still have to be configured in "/interface ethernet switch" menu to keep hw-offload working. If they are configured in "/interface bridge vlan", the hw-offload will turn off.If you see the table of crs 1xx/2xx series
It have a - on bridge vlan filter
+1, one would hope it continues to move towards a singular syntax for VLAN configuration and let MikroTik ninja's translate that as needed in middleware into any fidgety model specific configuration options.Will there be shift to new syntax also for CRS125 series? It is a bit confusing to have to use different syntax for each product to get things done ...On CRS125 VLANs still have to be configured in "/interface ethernet switch" menu to keep hw-offload working. If they are configured in "/interface bridge vlan", the hw-offload will turn off.If you see the table of crs 1xx/2xx series
It have a - on bridge vlan filter
JF.
Grickos, just put your vlan interfaces at bridge1 and add bridge1 to tagged ports inIt does not work even if I put my vlan on ether1 or 2.Shouldn't VLAN be created on Ethernet port, not the bridge ...
Or you are trying Bridge VLAN Filtering and vlan-ids ...I'm creating VLAN20 on Bridge1 - there's still ok.
But when I add VLAN20 to Bridge2, RB is unavailable on these two ports.
I want to get the old way tagged vlan20 on ports ether1,2,3 ... n (before master port1 and slave ether2,3, ... n)
Bridge strip Taging. I have DHCP server for vlan20.
+1+1
Agree, need to be more simple, no offense but the Cisco way it very simple
Switch port mode trunk/access
Switch port access vlan x
Switch port trunk allow vlan x,y,z
Just for INFO:RB2011UAS v6.41rc1 - rc20
IPv6 address assignment is broken State is 'invalid'
It should be like this ... (if your vlans 20 and 30 are on ether2):It does not work even if I put my vlan on ether1 or 2.
/interface bridge
add name=bridge1
add name=bridge2
add name=bridge3
/interface vlan
add interface=ether2 name=vlan20 vlan-id=20
add interface=ether2 name=vlan30 vlan-id=30
/interface bridge port
add bridge=bridge1 interface=ether1
add bridge=bridge1 interface=ether3
add bridge=bridge2 interface=vlan20
add bridge=bridge3 interface=vlan30
Beginners question: I am not using VLANs on CRS125, but was using masterport. Can I still use this masterport functionality? Or I need to go via VLANs now, to get hardware switching?!On CRS125 VLANs still have to be configured in "/interface ethernet switch" menu to keep hw-offload working. If they are configured in "/interface bridge vlan", the hw-offload will turn off.
JimmyNyholm, a Cisco trunk port will pass both tagged or untagged traffic depending on the allowed VLAN list assigned to the trunk port (by default all VLANs are allowed). This is the "hybrid" behavior you're describing. Leaving the native VLAN routable on trunks is what exposes people to double tagging VLAN hop methods for what it's worth.Vlan is Hard to understand IF you used HP as they use the term tag/untagged (Their Ports are all hybrid and can't be trunk or access from the cisco perpspective.)
AccessPort = A port that is only accepting untaged frames on ingress and only output untaged frames on egress. All other frametypes is silently droped
TrunkPort = A port that only accepts tagged frames, all untaged frames is silently droped. it only egress taged frames.
Other have then invented shortcuts of that:
Hybrid = A port that accept both taged and untaged frames on ingress, untaged frames are assumed to belong to a native vlan. the same vlan can even recieve frames taged as beloning to it. Egres a hybrid port outputs as a trunk on all vlans and as an access port on the native vlan.
HP's implementation of only hybrid have stirred quit a few it guys in the field. The cisco way is cleaner and less error prone.
This is a Mikrotik forum and I who claims to understand .1q or qinq or qinqinqinq for one loves the freedom in mikrotik bridge being software layer, switch being hardware layer or at least I assume. Here i'm am currently not sure due to 6.41rc work.... but that will clear when it's done.
Grickos, I've not used VLANs in that fashion in any configurations. Looking at the new bridges I have been creating a single bridge and I add the interfaces as bridge ports. I also add all VLANs to this central bridge and adjust ports for tagged or an untagged VLAN as needed. I wouldn't expect two bridges to share information regarding the same VLAN without another bridge to glue them together.The VLAN does not work on the Atheros 8327 chip switch.
I create Bridge1 and add Ethernet1 and Ethernet2.
I'm creating VLAN20 on Bridge1 - there's still ok.
But when I add VLAN20 to Bridge2, RB is unavailable on these two ports.
Sorry about my English.
/export
#error exporting /system routerboard mode-button
Idlemind: you are right when talking to later 802.1q adaptations from cisco side. switchport mode trunk will still only accept taged frames on ingress (leaning back from the isl days before 802.q was ratified). You have to tell it to process untagged frames as well and that command is only available after certain version of the ios. We do agree upon that this will make even ciscos implementation leaning to hybrid.JimmyNyholm, a Cisco trunk port will pass both tagged or untagged traffic depending on the allowed VLAN list assigned to the trunk port (by default all VLANs are allowed). This is the "hybrid" behavior you're describing. Leaving the native VLAN routable on trunks is what exposes people to double tagging VLAN hop methods for what it's worth.
Ahh, ISL has been removed in the newer IOS XE based switching lines and you no longer have to express which encapsulation method you want to use.Idlemind: you are right when talking to later 802.1q adaptations from cisco side. switchport mode trunk will still only accept taged frames on ingress (leaning back from the isl days before 802.q was ratified). You have to tell it to process untagged frames as well and that command is only available after certain version of the ios. We do agree upon that this will make even ciscos implementation leaning to hybrid.JimmyNyholm, a Cisco trunk port will pass both tagged or untagged traffic depending on the allowed VLAN list assigned to the trunk port (by default all VLANs are allowed). This is the "hybrid" behavior you're describing. Leaving the native VLAN routable on trunks is what exposes people to double tagging VLAN hop methods for what it's worth.
My writing was to open up peoples mind to the idea of what is happening ingress and egress of a switchport, and to set some acronyms. To many techs think vlan is difficult when it's actually not just with the right mindset.
never connect vlan 0 from different vendors, never use spanning tree. Allways know what you are doing.
Strods, this is implemented in the IPv6 pool code now but it doesn't seem to be implemented in the address assignment code yet, correct?What's new in 6.41rc3 (2017-Jul-26 09:32):
*) ippool6 - try to assign desired prefix for client if prefix is not being already used;
[admin@rtr1] > ipv6 address add
address advertise comment copy-from disabled eui-64 from-pool no-dad interface
Running the command:
Hardware I tested against:Code: Select all/export
The result I see in the print-out:
- RouterBOARD 750G r3
- RouterBOARD wAP G-5HacT2HnD
- RouterBOARD cAP L-2nD
I'm pretty sure it's benign but just thought I'd post it.Code: Select all#error exporting /system routerboard mode-button
To the half it goes.*) ipv6 - fixed IPv6 address request from pool (introduced in 6.41rc1);
[admin@migo] /ipv6 address> add address=::1/64 from-pool=netdsl-ipv6 interface=bridge-local advertise=yes
[admin@migo] /ipv6 address> print
Flags: X - disabled, I - invalid, D - dynamic, G - global, L - link-local
# ADDRESS FROM-POOL INTERFACE ADVERTISE
0 DL fe80::d6ca:6dff:fea0:ff93/64 bridge-local no
1 DL fe80::d6ca:6dff:fea0:ff92/64 ether1-gateway no
2 DL fe80::d/64 pppoe-out1 no
3 G 2001:4dd2:a7c1::1/64 netdsl... bridge-local yes
[admin@migo] /system> reboot
...
[admin@migo] /ipv6 address> print
Flags: X - disabled, I - invalid, D - dynamic, G - global, L - link-local
# ADDRESS FROM-POOL INTERFACE ADVERTISE
0 IG 2001:4dd2:a7c1::1/64 netdsl... bridge-local yes
1 DL fe80::d6ca:6dff:fea0:ff93/64 bridge-local no
2 DL fe80::d/64 pppoe-out1 no
3 DL fe80::d6ca:6dff:fea0:ff92/64 ether1-gateway no
[admin@migo] /ipv6 address> remove
numbers: 0
[admin@migo] /ipv6 address> add address=::1/64 from-pool=netdsl-ipv6 interface=bridge-local advertise=yes
[admin@migo] /ipv6 address> print
Flags: X - disabled, I - invalid, D - dynamic, G - global, L - link-local
# ADDRESS FROM-POOL INTERFACE ADVERTISE
0 DL fe80::d6ca:6dff:fea0:ff93/64 bridge-local no
1 DL fe80::d/64 pppoe-out1 no
2 DL fe80::d6ca:6dff:fea0:ff92/64 ether1-gateway no
3 G 2001:4dd2:a7c8::1/64 netdsl... bridge-local
So how do I use this feature?*) ippool6 - try to assign desired prefix for client if prefix is not being already used;
I get a new dynamic IPv6 prefix every time from my ISP after each reconnect or after 26 hours. (with IPv6-DHCP-Client)So how do I use this feature?*) ippool6 - try to assign desired prefix for client if prefix is not being already used;
Suppose my pool prefix is 2001:db8:/48 and I wish to assign subprefix 1234::1/64 from this pool onto interface ether1. How do I enter this?
Suppose further that I wish to define this in such a way that if the prefix changes in the future that I don't need to change anything in the router.
Problem with reliability of SXT LTE still exists (now: PLMN search in progress) - ROS 6.41rc7.*) lte - fixed LTE not passing any traffic while in running state;
I was already send it! Thank you for your job, guys!heaven - Please send supout file to support@mikrotik.com. Generate it while PPPoE client is not working. We have tested it locally and in general PPPoE client is working as suspected. There must be something very specific.
14:17:45 pppoe,ppp,debug netia: LCP lowerdown
14:17:45 pppoe,ppp,debug netia: LCP down event in initial state
14:17:45 pppoe,ppp,info netia: disconnected
14:17:55 pppoe,ppp,info netia: initializing...
14:17:55 pppoe,ppp,info netia: connecting...
14:18:05 pppoe,ppp,info netia: terminating... - disconnected
MMM MMM KKK TTTTTTTTTTT KKK
MMMM MMMM KKK TTTTTTTTTTT KKK
MMM MMMM MMM III KKK KKK RRRRRR OOOOOO TTT III KKK KKK
MMM MM MMM III KKKKK RRR RRR OOO OOO TTT III KKKKK
MMM MMM III KKK KKK RRRRRR OOO OOO TTT III KKK KKK
MMM MMM III KKK KKK RRR RRR OOOOOO TTT III KKK KKK
MikroTik RouterOS 6.41rc9 (c) 1999-2017 http://www.mikrotik.com/
[?] Gives the list of available commands
command [?] Gives help on the command and list of arguments
[Tab] Completes the command/word. If the input is ambiguous,
a second [Tab] gives possible options
/ Move up to base level
.. Move up one level
/command Use command at the base level
[admin@rtr1] > export
# aug/07/2017 13:27:40 by RouterOS 6.41rc9
# software id = 247N-DPAI
#
# model = RouterBOARD 750G r3
# serial number = xxxxxxxxxxxx
/interface bridge
add admin-mac=6C:3B:6B:bb:xx:yy auto-mac=no fast-forward=no igmp-snooping=no name=br1 vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] name=eth1
set [ find default-name=ether2 ] name=eth2
set [ find default-name=ether3 ] name=eth3
set [ find default-name=ether4 ] name=eth4
set [ find default-name=ether5 ] name=eth5
/ip neighbor discovery
set eth1 discover=no
/interface vlan
add interface=br1 name=br1-vlan11 vlan-id=11
add interface=br1 name=br1-vlan12 vlan-id=12
add interface=br1 name=br1-vlan999 vlan-id=999
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
add name=vlan11 ranges=10.214.11.100-10.214.11.199
add name=vlan12 ranges=10.214.11.100-10.214.11.199
add name=vlan13 ranges=10.214.11.100-10.214.11.199
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=br1 name=defconf
add address-pool=vlan11 disabled=no interface=br1-vlan11 name=vlan11
add address-pool=vlan12 disabled=no interface=br1-vlan12 name=vlan12
/interface bridge port
add bridge=br1 hw=no interface=eth2 pvid=11
add bridge=br1 hw=no interface=eth3
add bridge=br1 hw=no interface=eth4
add bridge=br1 hw=no interface=eth5
/interface bridge vlan
add bridge=br1 untagged=eth2 vlan-ids=11
/ip address
add address=192.168.88.1/24 comment=defconf interface=br1 network=192.168.88.0
add address=10.214.11.254/24 interface=br1-vlan11 network=10.214.11.0
add address=10.214.12.254/24 interface=br1-vlan12 network=10.214.12.0
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid disabled=no interface=eth1
/ip dhcp-server network
add address=10.214.11.0/24 dns-server=10.214.0.1 domain=123.local gateway=10.214.11.254
add address=10.214.12.0/24 dns-server=10.214.0.1 domain=123.local gateway=10.214.12.254
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 name=router.lan
/ip firewall nat
add action=masquerade chain=srcnat ipsec-policy=out,none out-interface=eth1
/system package update
set channel=release-candidate
#error exporting /system routerboard mode-button
/tool mac-server
set [ find default=yes ] disabled=yes
add interface=br1
add interface=br1-vlan11
/tool mac-server mac-winbox
set [ find default=yes ] disabled=yes
add interface=br1
add interface=br1-vlan11
does this mean ipsec tunnels can be established between 2 sites with dynamic ip addresses, so I can get rid of the additional L2TP Tunnel?*) ipsec - allow to specify remote peer address as DNS name (CLI only);
/interface bridge vlan add bridge=br1 untagged=eth2 vlan-ids=11
/interface vlan add add interface=br1 name=br1-vlan11 vlan-id=11
/interface bridge port add bridge=br1 hw=no interface=eth2 pvid=11
/ip address add interface=br-vlan11 address=10.214.11.254/24
How can I test this new feature?*) sftp - added functionality which imports ".auto.rsc" file or reboots router on ".auto.npk" upload;
/system identity set name=ITWORKS
Yes, with the SFTP client of my computer. But I thought it could be possible to transfer files between MikroTik routers with a native sftp client or with a new fetch mode=sftp.make a new plain text file with contents:
Save this file with name test.auto.rscCode: Select all/system identity set name=ITWORKS
Then upload it with SFTP. Check what your identity name is now.
So, if I rename the 6.41rc6 .npk file to 6.41rc6.auto.npk and upload it a RouterBoard it will reboot into 6.41rc6?make a new plain text file with contents:
Save this file with name test.auto.rscCode: Select all/system identity set name=ITWORKS
Then upload it with SFTP. Check what your identity name is now.
pppoe-client configs disappear after upgrade.Hello
is there any problem on PPPOE-out?
after upgrade they desapear.
Even ir I recreate ir it don't workpppoe-client configs disappear after upgrade.Hello
is there any problem on PPPOE-out?
after upgrade they desapear.
It also invalidates the firewall and NAT configs because the interface has disappeared.
I reinstall the pppoe-client config and try enabling pppoe-client.
I monitor the interface but nothing happens.
I unplug and re-insert the Ethernet lead and the pppoe-out1 interface springs into life.
All this is on RB751G-2HnD
So, it works for newer versions but not older versions. MikroTik please make it so you can downgrade RouterOS through this mechanic. If necessary make it a boolean value in the /ip service sftp settings to toggle allow/disallow software downgrades.So, if I rename the 6.41rc6 .npk file to 6.41rc6.auto.npk and upload it a RouterBoard it will reboot into 6.41rc6?make a new plain text file with contents:
Save this file with name test.auto.rscCode: Select all/system identity set name=ITWORKS
Then upload it with SFTP. Check what your identity name is now.
on the older versions this works just with ftp.So, it works for newer versions but not older versions. MikroTik please make it so you can downgrade RouterOS through this mechanic. If necessary make it a boolean value in the /ip service sftp settings to toggle allow/disallow software downgrades.
sorry.I'm looking for a way without netinstall to allow that action.
[bat@hgw2] /ip firewall nat> /sys package downgrade
Thank you!!!! Nice and convenient way to downgrade. Exactly what I was after.sorry.I'm looking for a way without netinstall to allow that action.
put your npk files on the /file section, then do ait will ask for confirmation on reload, and then install whatever version you have on the files, so yes it is the way you downgrade your OS.Code: Select all[bat@hgw2] /ip firewall nat> /sys package downgrade
i hope i got it right this time.
A bridge. If br1 is the VLAN aware bridge the master interface of the VLAN is br1.idlemind - Which type of interface is the master interface of VLAN?
Is it available for SXT LTE?What's new in 6.41rc15 (2017-Aug-18 07:33):
*) lte - added passthrough support (CLI only);
where? i cant find it*) lte - added passthrough support (CLI only);
Is there a chance to get support for brainpool ec curves like DH group 28, 29 and 30?*) ipsec - added DH groups 19, 20 and 21 support for phase1 and phase2 (CLI only);
passthrough Works With E3372 Hilink Mode RB750Gr3What's new in 6.41rc16 (2017-Aug-18 13:44):
Important note!!! Backup before upgrade!
RouterOS (v6.40rc36-rc40 and) v6.41rc1+ contains new bridge implementation that supports hardware offloading (hw-offload).
This update will convert all interface "master-port" configuration into new bridge configuration, and eliminate "master-port" option as such.
Bridge will handle all Layer2 forwarding and the use of switch-chip (hw-offload) will be automatically turned on based on appropriate conditions.
The rest of RouterOS Switch specific configuration remains untouched in usual menus for now.
Please, note that downgrading to previous RouterOS versions will not restore "master-port" configuration, so use backups to restore configuration on downgrade.
Before an upgrade:
1) Remember to make backup/export files before an upgrade and save them on another storage device;
2) Make sure the device will not lose power during upgrade process;
3) Device has enough free storage space for all RouterOS packages to be downloaded.
Changes since previous 6.41rc release:
*) ipsec - added DH groups 19, 20 and 21 support for phase1 and phase2 (CLI only);
*) lcd - fixed unresponsive LCD (introduced in 6.41rc15);
*) lte - added passthrough support (CLI only);
*) traffic-flow - fixed reboots when IPv6 address has been set as target address without active IPv6 package;
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as suspected or after crash.
/interface lte set lte1 apn=apn1/vlan600
Working on a new RB750Gr3 (hex). I installed 6.41rc9 and I'm unable to get an access port working for a VLAN on the new VLAN aware bridges. A similar configuration is working on a RB750Gr3 running 6,41rc6.
A packet capture shows STP frames and discovery frames from the relevant VLAN interface, in this case br-vlan11, but does not seem to forward other traffic. I'm unable to mac-telnet into the router despite allowing it on the br1-vlan11 interface. I cannot ping the IP address assigned to br-vlan11 despite seeing it in the CDP message in WireShark (both interface and IP).Code: Select allMMM MMM KKK TTTTTTTTTTT KKK MMMM MMMM KKK TTTTTTTTTTT KKK MMM MMMM MMM III KKK KKK RRRRRR OOOOOO TTT III KKK KKK MMM MM MMM III KKKKK RRR RRR OOO OOO TTT III KKKKK MMM MMM III KKK KKK RRRRRR OOO OOO TTT III KKK KKK MMM MMM III KKK KKK RRR RRR OOOOOO TTT III KKK KKK MikroTik RouterOS 6.41rc9 (c) 1999-2017 http://www.mikrotik.com/ [?] Gives the list of available commands command [?] Gives help on the command and list of arguments [Tab] Completes the command/word. If the input is ambiguous, a second [Tab] gives possible options / Move up to base level .. Move up one level /command Use command at the base level [admin@rtr1] > export # aug/07/2017 13:27:40 by RouterOS 6.41rc9 # software id = 247N-DPAI # # model = RouterBOARD 750G r3 # serial number = xxxxxxxxxxxx /interface bridge add admin-mac=6C:3B:6B:bb:xx:yy auto-mac=no fast-forward=no igmp-snooping=no name=br1 vlan-filtering=yes /interface ethernet set [ find default-name=ether1 ] name=eth1 set [ find default-name=ether2 ] name=eth2 set [ find default-name=ether3 ] name=eth3 set [ find default-name=ether4 ] name=eth4 set [ find default-name=ether5 ] name=eth5 /ip neighbor discovery set eth1 discover=no /interface vlan add interface=br1 name=br1-vlan11 vlan-id=11 add interface=br1 name=br1-vlan12 vlan-id=12 add interface=br1 name=br1-vlan999 vlan-id=999 /interface wireless security-profiles set [ find default=yes ] supplicant-identity=MikroTik /ip hotspot profile set [ find default=yes ] html-directory=flash/hotspot /ip pool add name=default-dhcp ranges=192.168.88.10-192.168.88.254 add name=vlan11 ranges=10.214.11.100-10.214.11.199 add name=vlan12 ranges=10.214.11.100-10.214.11.199 add name=vlan13 ranges=10.214.11.100-10.214.11.199 /ip dhcp-server add address-pool=default-dhcp disabled=no interface=br1 name=defconf add address-pool=vlan11 disabled=no interface=br1-vlan11 name=vlan11 add address-pool=vlan12 disabled=no interface=br1-vlan12 name=vlan12 /interface bridge port add bridge=br1 hw=no interface=eth2 pvid=11 add bridge=br1 hw=no interface=eth3 add bridge=br1 hw=no interface=eth4 add bridge=br1 hw=no interface=eth5 /interface bridge vlan add bridge=br1 untagged=eth2 vlan-ids=11 /ip address add address=192.168.88.1/24 comment=defconf interface=br1 network=192.168.88.0 add address=10.214.11.254/24 interface=br1-vlan11 network=10.214.11.0 add address=10.214.12.254/24 interface=br1-vlan12 network=10.214.12.0 /ip dhcp-client add comment=defconf dhcp-options=hostname,clientid disabled=no interface=eth1 /ip dhcp-server network add address=10.214.11.0/24 dns-server=10.214.0.1 domain=123.local gateway=10.214.11.254 add address=10.214.12.0/24 dns-server=10.214.0.1 domain=123.local gateway=10.214.12.254 add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1 /ip dns set allow-remote-requests=yes /ip dns static add address=192.168.88.1 name=router.lan /ip firewall nat add action=masquerade chain=srcnat ipsec-policy=out,none out-interface=eth1 /system package update set channel=release-candidate #error exporting /system routerboard mode-button /tool mac-server set [ find default=yes ] disabled=yes add interface=br1 add interface=br1-vlan11 /tool mac-server mac-winbox set [ find default=yes ] disabled=yes add interface=br1 add interface=br1-vlan11
What was the previos version where it worked? Enable the LTE logging topic and check the log file. What Firmware version you have fro the modem?Hallo!
After updating a RB922 with a Huawei ME909s-120 modem to 6.41RC16, the lte-interface doesn't switch in running mode. The status of the interface shows only one information: "Functionality == minimal", nothing else.
Is this a normal behavior in case of lte-passthrough or a bug?
regards
We tested and 909s-120 works with such firmware in RouterOS6.41rc16Hallo!
It is/was running perfect with 6.40.1 since it was released und before with 6.39.2. The Firmware of the modem is 11.617.06.00.00. To activate the logging is only with RC helpful, isn't it? I will try it once more in the evening.
So, after a bit of testing the solution was, that I have to do a usb power reset over CLI. Over Winbox it doesn't work and after the next reboot I have to handle the same procedure. I think there is a problem with the USB-power-reset after reboot in 6.41RC16. After a downgrade to 6.40.1 everything works fine.We tested and 909s-120 works with such firmware in RouterOS6.41rc16Hallo!
It is/was running perfect with 6.40.1 since it was released und before with 6.39.2. The Firmware of the modem is 11.617.06.00.00. To activate the logging is only with RC helpful, isn't it? I will try it once more in the evening.
Try to specify the init-delay in the System Routerboard settings to 9s and then reboot the board.
Also check if it works when you do a usb power reset option.
Have you tried to specify that init-delay?So, after a bit of testing the solution was, that I have to do a usb power reset over CLI. Over Winbox it doesn't work and after the next reboot I have to handle the same procedure. I think there is a problem with the USB-power-reset after reboot in 6.41RC16. After a downgrade to 6.40.1 everything works fine.We tested and 909s-120 works with such firmware in RouterOS6.41rc16Hallo!
It is/was running perfect with 6.40.1 since it was released und before with 6.39.2. The Firmware of the modem is 11.617.06.00.00. To activate the logging is only with RC helpful, isn't it? I will try it once more in the evening.
Try to specify the init-delay in the System Routerboard settings to 9s and then reboot the board.
Also check if it works when you do a usb power reset option.
The passthrough itself was working as expectet, but I can't set it on a VLAN, only physical interfaces are supported. Would it be possible to support Vlan-interfaces too?
The issue persists with 6.41rc16... Just downgraded to 6.41rc11 and wireless is up and running.I am having issues with CAPsMAN on 6.41rc13... Looks like cap interfaces with CAPsMAN forwarding do not pass any traffic.
Turns out I missed adding the VLAN as tagged to my bridge in /interface bridge vlanWorking on a new RB750Gr3 (hex). I installed 6.41rc9 and I'm unable to get an access port working for a VLAN on the new VLAN aware bridges. A similar configuration is working on a RB750Gr3 running 6,41rc6.
A packet capture shows STP frames and discovery frames from the relevant VLAN interface, in this case br-vlan11, but does not seem to forward other traffic. I'm unable to mac-telnet into the router despite allowing it on the br1-vlan11 interface. I cannot ping the IP address assigned to br-vlan11 despite seeing it in the CDP message in WireShark (both interface and IP).Code: Select allMMM MMM KKK TTTTTTTTTTT KKK MMMM MMMM KKK TTTTTTTTTTT KKK MMM MMMM MMM III KKK KKK RRRRRR OOOOOO TTT III KKK KKK MMM MM MMM III KKKKK RRR RRR OOO OOO TTT III KKKKK MMM MMM III KKK KKK RRRRRR OOO OOO TTT III KKK KKK MMM MMM III KKK KKK RRR RRR OOOOOO TTT III KKK KKK MikroTik RouterOS 6.41rc9 (c) 1999-2017 http://www.mikrotik.com/ [?] Gives the list of available commands command [?] Gives help on the command and list of arguments [Tab] Completes the command/word. If the input is ambiguous, a second [Tab] gives possible options / Move up to base level .. Move up one level /command Use command at the base level [admin@rtr1] > export # aug/07/2017 13:27:40 by RouterOS 6.41rc9 # software id = 247N-DPAI # # model = RouterBOARD 750G r3 # serial number = xxxxxxxxxxxx /interface bridge add admin-mac=6C:3B:6B:bb:xx:yy auto-mac=no fast-forward=no igmp-snooping=no name=br1 vlan-filtering=yes /interface ethernet set [ find default-name=ether1 ] name=eth1 set [ find default-name=ether2 ] name=eth2 set [ find default-name=ether3 ] name=eth3 set [ find default-name=ether4 ] name=eth4 set [ find default-name=ether5 ] name=eth5 /ip neighbor discovery set eth1 discover=no /interface vlan add interface=br1 name=br1-vlan11 vlan-id=11 add interface=br1 name=br1-vlan12 vlan-id=12 add interface=br1 name=br1-vlan999 vlan-id=999 /interface wireless security-profiles set [ find default=yes ] supplicant-identity=MikroTik /ip hotspot profile set [ find default=yes ] html-directory=flash/hotspot /ip pool add name=default-dhcp ranges=192.168.88.10-192.168.88.254 add name=vlan11 ranges=10.214.11.100-10.214.11.199 add name=vlan12 ranges=10.214.11.100-10.214.11.199 add name=vlan13 ranges=10.214.11.100-10.214.11.199 /ip dhcp-server add address-pool=default-dhcp disabled=no interface=br1 name=defconf add address-pool=vlan11 disabled=no interface=br1-vlan11 name=vlan11 add address-pool=vlan12 disabled=no interface=br1-vlan12 name=vlan12 /interface bridge port add bridge=br1 hw=no interface=eth2 pvid=11 add bridge=br1 hw=no interface=eth3 add bridge=br1 hw=no interface=eth4 add bridge=br1 hw=no interface=eth5 /interface bridge vlan add bridge=br1 untagged=eth2 vlan-ids=11 /ip address add address=192.168.88.1/24 comment=defconf interface=br1 network=192.168.88.0 add address=10.214.11.254/24 interface=br1-vlan11 network=10.214.11.0 add address=10.214.12.254/24 interface=br1-vlan12 network=10.214.12.0 /ip dhcp-client add comment=defconf dhcp-options=hostname,clientid disabled=no interface=eth1 /ip dhcp-server network add address=10.214.11.0/24 dns-server=10.214.0.1 domain=123.local gateway=10.214.11.254 add address=10.214.12.0/24 dns-server=10.214.0.1 domain=123.local gateway=10.214.12.254 add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1 /ip dns set allow-remote-requests=yes /ip dns static add address=192.168.88.1 name=router.lan /ip firewall nat add action=masquerade chain=srcnat ipsec-policy=out,none out-interface=eth1 /system package update set channel=release-candidate #error exporting /system routerboard mode-button /tool mac-server set [ find default=yes ] disabled=yes add interface=br1 add interface=br1-vlan11 /tool mac-server mac-winbox set [ find default=yes ] disabled=yes add interface=br1 add interface=br1-vlan11
I am seeing something very similar on a CRS210-8G-2S+ switch... CDP/LLDP passes just fine... I even get ARP in the right VLAN(s), but no dice when sending from the neighboring device on the same VLAN.
@MikroTik - @strodsWhat's new in 6.41rc3 (2017-Jul-26 09:32):
*) ippool6 - try to assign desired prefix for client if prefix is not being already used;
Please provide us more info on your setup and how to reproduce the problem as we tested locally and the CAPsMAN forwarding is working.The issue persists with 6.41rc16... Just downgraded to 6.41rc11 and wireless is up and running.I am having issues with CAPsMAN on 6.41rc13... Looks like cap interfaces with CAPsMAN forwarding do not pass any traffic.
SXT LTE?What's new in 6.41rc17 (2017-Aug-22 11:58):
Important note!!! Backup before upgrade!
RouterOS (v6.40rc36-rc40 and) v6.41rc1+ contains new bridge implementation that supports hardware offloading (hw-offload).
This update will convert all interface "master-port" configuration into new bridge configuration, and eliminate "master-port" option as such.
Bridge will handle all Layer2 forwarding and the use of switch-chip (hw-offload) will be automatically turned on based on appropriate conditions.
The rest of RouterOS Switch specific configuration remains untouched in usual menus for now.
Please, note that downgrading to previous RouterOS versions will not restore "master-port" configuration, so use backups to restore configuration on downgrade.
Before an upgrade:
1) Remember to make backup/export files before an upgrade and save them on another storage device;
2) Make sure the device will not lose power during upgrade process;
3) Device has enough free storage space for all RouterOS packages to be downloaded.
Changes since previous 6.41rc release:
*) bridge - fixed "R" state for bridge interfaces on x86 and CHR installations (introduced in v6.41rc12);
*) capsman - added "vlan-mode=no-tag" option;
*) ipsec - added DH groups 19, 20 and 21 support for phase1 and phase2 (CLI only);
*) ipsec - allow to specify "remote-peer" address as DNS name;
*) lcd - fixed unresponsive LCD (introduced in v6.41rc15);
*) lte - added Passthrough support (CLI only);
*) pppoe - fixed invalid PPPoE server or client after reboot or "interface" edit (introduced in v6.41rc9);
*) snmp - fixed bridge host requests on devices with multiple bridge interfaces;
*) winbox - added possibility to define "comment" for "/routing bgp network" entries;
*) winbox - do not show LCD menu for devices which does not have it;
*) www - fixed unresponsive Web services (introduced in v6.40);
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as suspected or after crash.
Is it possible to add this future in future release?irghost - What is the question about SXT LTE? Are you referring to Passthrough support? if you do, then take a look at this list:
https://wiki.mikrotik.com/wiki/Supporte ... and_modems
in last 3 releaseirghost - What is the question about SXT LTE? Are you referring to Passthrough support? if you do, then take a look at this list:
https://wiki.mikrotik.com/wiki/Supporte ... and_modems
but why still no support For most important LTE device "SXT LTE"*) lte - added Passthrough support (CLI only);
what this suppose to fix?*) pppoe - fixed invalid PPPoE server or client after reboot or "interface" edit (introduced in v6.41rc9);
i thought that fix applied to my case too ( pppoe interfaces disappears after reboot/upgrade)raffav - What do you mean with "don`t show up either"? Be more specific. This fixed as written in changelog "invalid PPPoE server or client after reboot or "interface" edit". Did you upgrade device and you see invalid (red) PPPoE server or client interface?
Have you tried to specify that init-delay?So, after a bit of testing the solution was, that I have to do a usb power reset over CLI. Over Winbox it doesn't work and after the next reboot I have to handle the same procedure. I think there is a problem with the USB-power-reset after reboot in 6.41RC16. After a downgrade to 6.40.1 everything works fine.We tested and 909s-120 works with such firmware in RouterOS6.41rc16Hallo!
It is/was running perfect with 6.40.1 since it was released und before with 6.39.2. The Firmware of the modem is 11.617.06.00.00. To activate the logging is only with RC helpful, isn't it? I will try it once more in the evening.
Try to specify the init-delay in the System Routerboard settings to 9s and then reboot the board.
Also check if it works when you do a usb power reset option.
The passthrough itself was working as expectet, but I can't set it on a VLAN, only physical interfaces are supported. Would it be possible to support Vlan-interfaces too?
What does it show in the log when you enable the lte logging?
It should support the Vlan interface as well - what error message did it show?
Almost there, now allow us to control the DNS server distributed in RA to enable our IPv6 clients to use the local MikroTik resolver cache.What's new in 6.41rc18 (2017-Aug-24 07:52):
*) ipv6 - add dynamic "/ip dns" server address from RA when RA is permitted by configuration;
does this mean ipsec tunnels can be established between 2 sites with dynamic ip addresses, so I can get rid of the additional L2TP Tunnel?*) ipsec - allow to specify remote peer address as DNS name (CLI only);
I tried that setup, mikrotik routers on both ends. Router 1 uses a dns-name as peer address, router 2 is set to 0.0.0.0/0. If I don't want to use any tunneling, I still have to specify the SA Dst. Address in router 1's policy-action. Are there plans to also make the use of dns-names possible in SA Address fields of policies?In road warrior setups, yes.
Opened Ticket#2017082822000816 with more details.Please provide us more info on your setup and how to reproduce the problem as we tested locally and the CAPsMAN forwarding is working.The issue persists with 6.41rc16... Just downgraded to 6.41rc11 and wireless is up and running.I am having issues with CAPsMAN on 6.41rc13... Looks like cap interfaces with CAPsMAN forwarding do not pass any traffic.
Could you make a support output file after the reboot when the interface doesn't work and send that to support@mikrotik.com?Have you tried to specify that init-delay?So, after a bit of testing the solution was, that I have to do a usb power reset over CLI. Over Winbox it doesn't work and after the next reboot I have to handle the same procedure. I think there is a problem with the USB-power-reset after reboot in 6.41RC16. After a downgrade to 6.40.1 everything works fine.We tested and 909s-120 works with such firmware in RouterOS6.41rc16Hallo!
It is/was running perfect with 6.40.1 since it was released und before with 6.39.2. The Firmware of the modem is 11.617.06.00.00. To activate the logging is only with RC helpful, isn't it? I will try it once more in the evening.
Try to specify the init-delay in the System Routerboard settings to 9s and then reboot the board.
Also check if it works when you do a usb power reset option.
The passthrough itself was working as expectet, but I can't set it on a VLAN, only physical interfaces are supported. Would it be possible to support Vlan-interfaces too?
What does it show in the log when you enable the lte logging?
It should support the Vlan interface as well - what error message did it show?
With RC17 I was able to set a Vlan for passthrough but the LTE-Modem doesn't start with 0,3,6 and 9 seconds init-delay. Also a total power-reset with a duration of more than 1 minute, didn't solve the problem. After a munual usb power-reset with a duration of 1 second, the LTE-interface starts. Tested with 2 RB922UAGS-5HPacT (current Firmware 3,41) with Huawei ME909s-120. With 3.40.1 or older I never had such problems (init-delay 1s)
Could you make a support output file after the reboot when the interface doesn't work and send that to support@mikrotik.com?Have you tried to specify that init-delay?So, after a bit of testing the solution was, that I have to do a usb power reset over CLI. Over Winbox it doesn't work and after the next reboot I have to handle the same procedure. I think there is a problem with the USB-power-reset after reboot in 6.41RC16. After a downgrade to 6.40.1 everything works fine.We tested and 909s-120 works with such firmware in RouterOS6.41rc16
Try to specify the init-delay in the System Routerboard settings to 9s and then reboot the board.
Also check if it works when you do a usb power reset option.
The passthrough itself was working as expectet, but I can't set it on a VLAN, only physical interfaces are supported. Would it be possible to support Vlan-interfaces too?
What does it show in the log when you enable the lte logging?
It should support the Vlan interface as well - what error message did it show?
With RC17 I was able to set a Vlan for passthrough but the LTE-Modem doesn't start with 0,3,6 and 9 seconds init-delay. Also a total power-reset with a duration of more than 1 minute, didn't solve the problem. After a munual usb power-reset with a duration of 1 second, the LTE-interface starts. Tested with 2 RB922UAGS-5HPacT (current Firmware 3,41) with Huawei ME909s-120. With 3.40.1 or older I never had such problems (init-delay 1s)
The problem also happens when you are not using the passthrough mode?
Yes the wiki needs it documented formally! In the meantime:How would one realize inter-vlan routing or generally vlan interfaces with the new bridge implementation?
Can't find anything on this except some emtpy placeholder topic in the Wiki.
/interface bridge add vlan-filtering=no name=br1
/interface vlan add interface=br1 vlan-id=11 name=br1-vlan11
/interface vlan add interface=br1 vlan-id=12 name=br1-vlan12
/ip address add interface=br-vlan11 address=10.99.11.254/24
/ip address add interface=br-vlan11 address=10.99.12.254/24
/interface bridge vlan add bridge=br1 vlan-ids=11 tagged=br1,ether4 untagged=ether2
/interface bridge vlan add bridge=br1 vlan-ids=12 tagged=br1,ether4 untagged=ether3
/interface bridge port add bridge=br1 interface=ether2 pvid=11 frame-types=admit-only-untagged-and-priority-tagged
/interface bridge port add bridge=br1 interface=ether3 pvid=12 frame-types=admit-only-untagged-and-priority-tagged
/interface bridge port add bridge=br1 interface=ether4 pvid=1 frame-types=admit-all
/interface bridge set [ find where name=br1 ] vlan-filtering=yes
uuuu, winbox support for new bridge implementation....What's new in 6.41rc20 (2017-Aug-29 06:41):
Strods, is the CRS1xx/2xx now able to do the new bridge based VLANs without mucking around in the Ethernet switch menu? I know in the first releases it was indicated by MikroTik posts that this was required at the time. I don't own one of these types of devices so I can't test myself but I do see posts in other threads and would like to be able to help those users if possible and be as consistent as possible in my advice. I do love the new bridge implementation so far though. Good work.What's new in 6.41rc20 (2017-Aug-29 06:41):
*) bridge - added initial support for hardware "igmp-snooping" on CRS1xx/2xx;
That is a special case of bridge FastPath that only works when you have exactly two interfaces in a bridge. My understanding is that this option has nothing to do with bridge HW offloading. And it's not that new, it first appeared in 6.39.Also I see there is new option Bridge Fast forward, what does it do?
thank you for making this happen*) bridge - implemented software based MSTP;
+1@andirys and mikrotik
thank you for making this happen*) bridge - implemented software based MSTP;
Thanks, will give it a shot....snip...
Ker-blamo, you have a 2 VLAN network with an access port in each and a trunk port on ether4 to uplink to your network.
- ipv6 - fixed IPv6 address request from pool (introduced in 6.41rc1);
RB2011UAS v6.41rc1 - rc20
IPv6 address assignment is broken State is 'invalid'
Just for INFO:
MikroTik have managed to reproduce the problem. The error only occurs with me and a few others. MikroTik are working on it. But I fear this will remain an eternal bug.
I can live with the router not to reboot.
Since 6.41rc13 the DHCPv6 client has no more prefix. The IPv6 address could therefore not be assigned manually. Since 6.41rc20 gets the DHCPv6 client again a prefix which I then manually assigned.
I can not test the feature with the dynamic subprefix.
- Ippool6 - try to assign the requested prefix for client if prefix is not being already used;
The example "InterVLAN Routing by Bridge" has been updated:How would one realize inter-vlan routing or generally vlan interfaces with the new bridge implementation?
Can't find anything on this except some emtpy placeholder topic in the Wiki.
Thanks!The example "InterVLAN Routing by Bridge" has been updated:
https://wiki.mikrotik.com/wiki/Manual:I ... _Bridge.29
Patrick, the new bridge automatically toggles HW support as you enable or disable features. This doesn't require you to manually switch between /interface Ethernet switch and /interface bridge when your feature need changes or you work on different models of hardware.How about HW switching if STP and Layer3 Routing is needed? (bridge vlan disables HW)
I believe that the new implementation inside bridge of tag and tag was very simple to understand,What's the difference between /interface ethernet switch vlan/ports and the bridge VLAN implementation?
What is the correct way to create a switch with multiple VLANs (tagged and untagged) with a management IP on a vlan?
If the underlying hardware supports it I imagine the new bridge implementation will catch up. Just watch the release notes for updates.I'm aware of that. VLAN aware bridges disables HW offload on small switches (RB750GL etc). I'd like to have routing (this will be in CPU) AND switching (in hardware) on the same device as it was possible before 6.41rc. STP is needed too. I don't see a way how to solve this.
Unfortunately, currently SXT LTE does not support passthrough mode.
Is there a plan for this or even and ETA? SXT LTE is the ultimate platform to get this feature.irghost - What is the question about SXT LTE? Are you referring to Passthrough support? if you do, then take a look at this list:
https://wiki.mikrotik.com/wiki/Supporte ... and_modems
Still having the same problem with v6.41 rc21v6.41rc20 has some really cool stuff. I'm still having a problem with IGMP-Snooping where it drops an ACTIVE multicast group (after about 4-5 Min.). I'm not sure why it is doing this and to remedy it, I have to deactivate IGMP-Snooping and redeploy PIM (v6.40.2). I can't seem to find the ability to list the "Master Port" under Interface/Ethernet anymore. This might have been on purpose, just asking. I believe you folks are coming along nicely on IGMP-Snooping though it needs some tweaks (time will tell, right?). Would the ability to "Query" for IGMP Groups help in my case? Just spit-balling there..
Thanks,
-tp
+1 For SXT LTEUnfortunately, currently SXT LTE does not support passthrough mode.Is there a plan for this or even and ETA? SXT LTE is the ultimate platform to get this feature.irghost - What is the question about SXT LTE? Are you referring to Passthrough support? if you do, then take a look at this list:
https://wiki.mikrotik.com/wiki/Supporte ... and_modems
I gave the new rc a go because of the multiple VLAN option, however after upgrading from the previous rc21 now the link is not stable anymore.*) bridge - fixed connectivity issues when there are multiple VLAN interfaces on bridge;
.
Too late. My users complain that they are connected to the wifi, but there´s hardly any or only few traffic is getting through the connection.DANGER
If you are running CAPSMAN avoid 6.41rc23
6.41rc23 breaks CAP communication with CAPSMAN, at least when using a tunelled datapath. Downgrading to 6.41rc20 does not fix the problem
Mikrotik support are aware of this issue.
How are you connecting the CAP to the CAPsMAN? Are you using Local-forwarding or CAPsMAN forwarding? Are you using VLAN in our setup?Too late. My users complain that they are connected to the wifi, but there´s hardly any or only few traffic is getting through the connection.DANGER
If you are running CAPSMAN avoid 6.41rc23
6.41rc23 breaks CAP communication with CAPSMAN, at least when using a tunelled datapath. Downgrading to 6.41rc20 does not fix the problem
Mikrotik support are aware of this issue.
There is bug that after the downgrade from the newest RC you need to do a soft reboot of the board as the dhcp-client doesn't start in the first boot. Powercycle will not help, you need to do a sift reboot.You can download prior versions of the RC by manually adjusting the URL from the download page if you wanted to revert back to an RC that it still works at for you to retain the new bridge.
Hi Uldis, it is Layer3 with CAPsMAN forwarding.How are you connecting the CAP to the CAPsMAN? Are you using Local-forwarding or CAPsMAN forwarding? Are you using VLAN in our setup?
Well, it doesn't matter what older version I used. I downgraded and then "telnet-mac" into the access point to add an dhcp-client interface which took ~ 30 seconds to be added. After a reboot the access points worked again (I went back to 6.40.3).There is bug that after the downgrade from the newest RC you need to do a soft reboot of the board as the dhcp-client doesn't start in the first boot. Powercycle will not help, you need to do a sift reboot.
Can you elaborate on this feature? It applies solely when acting as a transit P router or when encapsulating/decapsulating l2circuit also?*) crs317 - added initial support for HW offloaded MPLS forwarding;
is there any news about SXT LTE?What's new in 6.41rc26 (2017-Sep-07 13:26):
Important note!!! Backup before upgrade!
RouterOS (v6.40rc36-rc40 and) v6.41rc1+ contains new bridge implementation that supports hardware offloading (hw-offload).
This update will convert all interface "master-port" configuration into new bridge configuration, and eliminate "master-port" option as such.
Bridge will handle all Layer2 forwarding and the use of switch-chip (hw-offload) will be automatically turned on based on appropriate conditions.
The rest of RouterOS Switch specific configuration remains untouched in usual menus for now.
Please, note that downgrading to previous RouterOS versions will not restore "master-port" configuration, so use backups to restore configuration on downgrade.
Before an upgrade:
1) Remember to make backup/export files before an upgrade and save them on another storage device;
2) Make sure the device will not lose power during upgrade process;
3) Device has enough free storage space for all RouterOS packages to be downloaded.
Changes since previous 6.41rc release:
!) bridge - general development of hw-offload bridge implementation (introduced in v6.40rc36);
*) chr - added KVM memory balloon support;
*) chr - added suspend support;
*) crs1xx/2xx - fixed 1 Gbps forced mode for several SFP modules;
*) crs317 - added initial support for HW offloaded MPLS forwarding;
*) dhcp - fixed unresponsive DHCP service caused by inability to read not set RAW options;
*) e-mail - auto complete file name on "file" parameter (introduced in v6.40);
*) eoip - made L2MTU parameter read-only;
*) hotspot - fixed missing "/ip hotspot server profile" if invalid "dns-name" was specified;
*) lte - added Passthrough support (CLI only);
*) lte - added support for ZTE ME3630 E1C;
*) lte - fixed mode initialization after reboot;
*) ppp - fixed missing PPP client interface after reboot (introduced in v6.41rc);
*) rb931-2nd - fixed startup problems (requires additional reboot after upgrade);
*) userman - fixed unresponsive RADIUS server (introduced in v6.40.3);
*) webfig - improved reliability of login process;
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as suspected or after crash.
Your question was already answered!is there any news about SXT LTE?
Unfortunately, currently SXT LTE does not support passthrough mode.
Sorry, I don't understand, what are you talking about?What about netcut and ip scanner for who using hotspot and not managed switch with ubnt AP's ?
Does SXT LTE Support passthrough in this version?Your question was already answered!is there any news about SXT LTE?
Unfortunately, currently SXT LTE does not support passthrough mode.Sorry, I don't understand, what are you talking about?What about netcut and ip scanner for who using hotspot and not managed switch with ubnt AP's ?
For the Verizon USB730L / Novatel Global Mode USB730L, would it work if plugged into USB slot of the RB750UPr2? If not, which MikroTik routers compatible? And if yes, please point me to the relevant chapters/sections of documentation, or tutorials?What's new in 6.41rc6 (2017-Aug-01 11:30):
[...]
*) ppp - added support for Sierra MC7750, Verizon USB730L;
[...]
Normis could you Elaborate.Your question was already answered!is there any news about SXT LTE?
Unfortunately, currently SXT LTE does not support passthrough mode.
strods, breaking hearts on a Monday. Love it.Passthrough is not currently supported on SXT LTE and we do not have plans to implement such functionality in near future.
Why? It would be really nice to have this functionality...Passthrough is not currently supported on SXT LTE and we do not have plans to implement such functionality in near future.
Thanks for the elaboration.Passthrough is not currently supported on SXT LTE and we do not have plans to implement such functionality in near future.
Yes!JimmyNyholm - Did this happen when you used 6.41rc28?
Is this gona be not bridged intefaces can hardware switch depending on label but ldp is running on ip so one would have to configure ip adresses and a routing protocol say ospf to get routes that would be hardware switched on labels without cpu. the cpu would only run routing protocol and ldp and the hardware chip would switch/route incoming mpls packes according to ldp. being a router no l2 domain but doing it true switching on ldp labels... Like the big guys....What's new in 6.41rc26 (2017-Sep-07 13:26):
*) crs317 - added initial support for HW offloaded MPLS forwarding;
should be 'out of range' or 'off-range', but not both, I thinkadded "allow-signal-out-off-range" option
Interesting how fast some options appear compared to others, cough useful IPv6 changes.
Good observation!Interesting how fast some options appear compared to others, cough useful IPv6 changes.
Yes, I'm heckling you because well it's apparently needed.
Side-note: It seems the pace is slowing on this RC. I imagine this means we'll be seeing 6.41rc moving to GA and 6.42 started? Will we see a general theme targeted in this next cycle like we say with the new bridge implementation?
Board: CRS326-24G-2S+bajodel - Can you please send to support@mikrotik,.com precise commands which you execute to reproduce this problem? We added all ports into bridge, added DHCP client on bridge, rebooted device and it is working just fine.
/interface ethernet
set [ find default-name=ether1 ] mac-address=CC:4E:24:00:EE:01
set [ find default-name=ether2 ] mac-address=CC:4E:24:00:EE:02
set [ find default-name=ether3 ] mac-address=CC:4E:24:00:EE:03
set [ find default-name=ether4 ] mac-address=CC:4E:24:00:EE:04
set [ find default-name=ether5 ] mac-address=CC:4E:24:00:EE:05
set [ find default-name=ether6 ] mac-address=CC:4E:24:00:EE:06
set [ find default-name=ether7 ] mac-address=CC:4E:24:00:EE:07
set [ find default-name=ether8 ] mac-address=CC:4E:24:00:EE:08
set [ find default-name=ether9 ] mac-address=CC:4E:24:00:EE:09
set [ find default-name=ether10 ] mac-address=CC:4E:24:00:EE:10
set [ find default-name=ether11 ] mac-address=CC:4E:24:00:EE:11
set [ find default-name=ether12 ] mac-address=CC:4E:24:00:EE:12
set [ find default-name=ether13 ] mac-address=CC:4E:24:00:EE:13
set [ find default-name=ether14 ] mac-address=CC:4E:24:00:EE:14
set [ find default-name=ether15 ] mac-address=CC:4E:24:00:EE:15
set [ find default-name=ether16 ] mac-address=CC:4E:24:00:EE:16
set [ find default-name=ether17 ] mac-address=CC:4E:24:00:EE:17
set [ find default-name=ether18 ] mac-address=CC:4E:24:00:EE:18
set [ find default-name=ether19 ] mac-address=CC:4E:24:00:EE:19
set [ find default-name=ether20 ] mac-address=CC:4E:24:00:EE:20
set [ find default-name=ether21 ] mac-address=CC:4E:24:00:EE:21
set [ find default-name=ether22 ] mac-address=CC:4E:24:00:EE:22
set [ find default-name=ether23 ] mac-address=CC:4E:24:00:EE:23
set [ find default-name=ether24 ] mac-address=CC:4E:24:00:EE:24
set [ find default-name=sfp-sfpplus1 ] mac-address=CC:4E:24:00:EE:25
set [ find default-name=sfp-sfpplus2 ] mac-address=CC:4E:24:00:EE:26
BootROM 1.41
Booting from SPI flash
BootROM: Image checksum verification PASSED
RouterBOOT booter 3.41
CRS326-24G-2S+
CPU frequency: 800 MHz
Memory size: 512 MiB
Storage size: 16 MiB
Press <delete> key within 4 seconds to enter setup....
loading kernel... OK
setting up elf image... OK
jumping to kernel code
Starting...
Starting services...
Rebooting...
Stopping services...
so, now it's available in 6.41rc?I am waiting until today for a simple reset counter:
viewtopic.php?f=1&t=108552&p=614961&hil ... er#p614961
Weak. Be brave!I'll just wait for the stable version.
It didn't work for me until I added the bridge1 itself to the tagged ports list....bridge1 doesn't need to be in a vlan for that vlan to forward frames to the member ports?.
interface bridge port
add interface=ether1 bridge=bridge1 pvid=1 frame-types=admit-all hw=yes
add interface=ether2 bridge=bridge1 pvid=1 frame-types=admit-all hw=yes
add interface=ether3 bridge=bridge1 pvid=1 frame-types=admit-all hw=yes
add interface=ether4 bridge=bridge1 pvid=1 frame-types=admit-all hw=yes
interface bridge vlan add bridge=bridge1 vlan-ids=100 tagged=bridge1,ether1,ether2,ether3,ether4 untagged=""
interface bridge set bridge1 vlan-filtering=yes pvid=1
strods, are we looking feature complete for 6.41 yet? I'm just curious if it's down to polishing and bug fixes or if there's more that's intending to be added.What's new in 6.41rc31 (2017-Sep-20 06:56):
Important note!!! Backup before upgrade!
RouterOS (v6.40rc36-rc40 and) v6.41rc1+ contains new bridge implementation that supports hardware offloading (hw-offload).
This update will convert all interface "master-port" configuration into new bridge configuration, and eliminate "master-port" option as such.
Bridge will handle all Layer2 forwarding and the use of switch-chip (hw-offload) will be automatically turned on based on appropriate conditions.
The rest of RouterOS Switch specific configuration remains untouched in usual menus for now.
Please, note that downgrading to previous RouterOS versions will not restore "master-port" configuration, so use backups to restore configuration on downgrade.
Before an upgrade:
1) Remember to make backup/export files before an upgrade and save them on another storage device;
2) Make sure the device will not lose power during upgrade process;
3) Device has enough free storage space for all RouterOS packages to be downloaded.
Changes since previous 6.41rc release:
*) crs317 - added initial support for HW offloaded MPLS forwarding;
*) lte - added "/interface lte apn" menu (Passthrough requires reconfiguration) (CLI only);
*) lte - added Passthrough support (CLI only);
*) lte - added support for ZTE ME3630 E1C with additional "/port" for GPS usage;
*) lte - automatically add "/ip dhcp-client" configuration on interface;
*) lte - changed default values to "add-default-route=yes", "use-peer-dns=yes" and "default-route-distance=2";
*) ppp - fixed serial port loading (introduced in v6.41rc);
*) sfp - fixed temperature readings for various SFP modules;
*) snmp - fixed "/system license" parameters for CHR;
*) wireless - improved reliability on "rx-rate" selection process;
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as suspected or after crash.
one thing that i've never understood about mikrotik is why they add new features to RC.there should be testing or beta channel, rc channel (feature locked), stable(bugfix), mainline(current)
strods, are we looking feature complete for 6.41 yet? I'm just curious if it's down to polishing and bug fixes or if there's more that's intending to be added.
I know I'm not the only one very eager for it.
Which is why I won't touch updates with a 10 foot pole.One thing that I've never understood about MikroTik is why they add new features to the RC. There should be testing or beta channel, rc channel (feature locked), stable(bugfix), and mainline(current).
Which is why I won't touch updates with a 10 foot pole.One thing that I've never understood about MikroTik is why they add new features to the RC. There should be testing or beta channel, rc channel (feature locked), stable(bugfix), and mainline(current).
This is just a naming convention, you just have to get used to it.there should be testing or beta channel, rc channel (feature locked), stable(bugfix), mainline(current)
to you its a naming convention, but the rc are often very "alpha status", and rc can be misleading to new users who by norm perceive that rc's are "generally stable". why do you think cheeze asked if its down to polishing and bugfixes? its because rc naming convention makes it confusing for some users. no one would have to question if rc actually meant rc, alpha meant alpha, beta meant beta, and then we won't be having this discussion.This is just a naming convention, you just have to get used to it.there should be testing or beta channel, rc channel (feature locked), stable(bugfix), mainline(current)
In any case, please do NOT pollute this thread with the naming convention nonsense again. If you feel like you are in absolutely need to discuss, here is one of the many threads to reply to: viewtopic.php?f=2&t=123032.
We are aware of this, but in RouterOS world, "stable" is the only version you should use in important locations where you don't want new features. We update this branch rarely and only after long and rigorous testing. Current is more like RC (current = running release), and RC is more like Beta or "nightly build" in Windows land.to you its a naming convention, but the rc are often very "alpha status", and rc can be misleading to new users who by norm perceive that rc's are "generally stable"
/interface ethernet switch port
set ether6 learn-limit=1
set ether7 learn-limit=1
Not as faar as I can se for the moment..The previous switch settings supported MAC learning limits:
Is this feature still available with the new bridge implementation?Code: Select all/interface ethernet switch port set ether6 learn-limit=1 set ether7 learn-limit=1
What version you had before on your router where it was working ok?With v6.41rc31 my LTE connection was very slow, max. 7-10mbit/s and high pings >200ms. Also the E3372 LTE modem (still) loses connection when downloading larger amounts of data (via Steam for example) so you have to reboot the RB.
Yes, please. Cisco calls a learned MAC on reboot sticky (I think). Replace after a timeout is good too.While we are speaking about this, could we enhance it with ie: learn-limit=1 learn-clear-at-interface-down=no learn-replace-after-inactivity=15min
The previous switch settings supported MAC learning limits:
Is this feature still available with the new bridge implementation?Code: Select all/interface ethernet switch port set ether6 learn-limit=1
and or even cooler lear-radius-auth=yes (with all the magic options as answer properties in the radius answer?
Is it possible to get a better explanation or detail on the software based "igmp-snooping" ?What's new in 6.41rc32 (2017-Sep-21 13:51):
!) bridge - general development of hw-offload bridge implementation (introduced in v6.40rc36);
*) bridge - added initial support for hardware "igmp-snooping" on CRS1xx/2xx;
*) bridge - implemented software based "igmp-snooping";
The bridge will perform IGMP snooping in a way that requires the CPU to process to packets instead of customized and often accelerated (faster) hardware that is meant to do it at line-rate or near line-rate.Is it possible to get a better explanation or detail on the software based "igmp-snooping" ?What's new in 6.41rc32 (2017-Sep-21 13:51):
!) bridge - general development of hw-offload bridge implementation (introduced in v6.40rc36);
*) bridge - added initial support for hardware "igmp-snooping" on CRS1xx/2xx;
*) bridge - implemented software based "igmp-snooping";
Probably should of phrased the question better... How to "correctly" configure software based IGMP-Snooping .The bridge will perform IGMP snooping in a way that requires the CPU to process to packets instead of customized and often accelerated (faster) hardware that is meant to do it at line-rate or near line-rate.Is it possible to get a better explanation or detail on the software based "igmp-snooping" ?What's new in 6.41rc32 (2017-Sep-21 13:51):
!) bridge - general development of hw-offload bridge implementation (introduced in v6.40rc36);
*) bridge - added initial support for hardware "igmp-snooping" on CRS1xx/2xx;
*) bridge - implemented software based "igmp-snooping";
Very useful feature. Thank you. It could be possible to add the last signal when the state is disconnected?*) wireless - log "signal-strength" when successfully connected to AP;
Excelent idea!Very useful feature. Thank you. It could be possible to add the last signal when the state is disconnected?*) wireless - log "signal-strength" when successfully connected to AP;
That might be extremely useful, if the data correlates to client's disconnecting around full power. We could point blame at something other than coverage.Very useful feature. Thank you. Would it be possible to add the last signal when the state was disconnected?*) wireless - log "signal-strength" when successfully connected to AP;
Probably should of phrased the question better... How to "correctly" configure software based IGMP-Snooping .
interface bridge set bla-bla igmp-snooping=yes
I reverted back to 6.40.3 where speeds are normal, but that version too has the problem that the E3372 is unstable an looses LTE connection when there is some load. I hoped the latest RC would fix this...What version you had before on your router where it was working ok?
Please contact support@mikrotik.com for more information (include the modem number and revision). Also check what lte band it uses when you have normal speed and when you have slow speed.I reverted back to 6.40.3 where speeds are normal, but that version too has the problem that the E3372 is unstable an looses LTE connection when there is some load. I hoped the latest RC would fix this...What version you had before on your router where it was working ok?
careful now, forum police andyris might warn you to post in feature request thread.have you planned add HW offload with vlan-filtering function?
Updated to 6.41rc32 and everything works as expected. I can not tell what intermediate version fixed the issue though.The issue persists with 6.41rc16... Just downgraded to 6.41rc11 and wireless is up and running.I am having issues with CAPsMAN on 6.41rc13... Looks like cap interfaces with CAPsMAN forwarding do not pass any traffic.
this is not a feature request, it's a questioncareful now, forum police andyris might warn you to post in feature request thread.have you planned add HW offload with vlan-filtering function?
I had a similar issue with a 951G. First boot with upgrade, was still able to connect from port 5. Rebooted one more time and lost connection until I switched to port 2.I just put 6.41rc32 onto an RB2011UAS-2HnD and have a question.
Flags: X - disabled, I - inactive, D - dynamic, H - hw-offload
# INTERFACE BRIDGE HW PVID PRIORITY PATH-COST INTERNAL-PATH-COST HORIZON
0 H ether1 bridge1 yes 1 0x80 10 10 none
1 I H ether2 bridge1 yes 1 0x80 10 10 none
2 I H ether3 bridge1 yes 1 0x80 10 10 none
3 I H ether4 bridge1 yes 1 0x80 10 10 none
4 I H ether5 bridge1 yes 1 0x80 10 10 none
5 I H ether6 bridge1 yes 1 0x80 10 10 none
6 I H ether7 bridge1 yes 1 0x80 10 10 none
7 I H ether8 bridge1 yes 1 0x80 10 10 none
8 I H ether9 bridge1 yes 1 0x80 10 10 none
9 I H ether10 bridge1 yes 1 0x80 10 10 none
10 I H ether11 bridge1 yes 1 0x80 10 10 none
11 I H ether12 bridge1 yes 1 0x80 10 10 none
12 I H ether13 bridge1 yes 1 0x80 10 10 none
13 I H ether14 bridge1 yes 1 0x80 10 10 none
14 I H ether15 bridge1 yes 1 0x80 10 10 none
15 I H ether16 bridge1 yes 1 0x80 10 10 none
16 I H sfp-sfpplus1 bridge1 yes 1 0x80 10 10 none
17 I ether17 bridge2 yes 1 0x80 10 10 none
18 I ether18 bridge2 yes 1 0x80 10 10 none
19 I ether19 bridge2 yes 1 0x80 10 10 none
20 I ether20 bridge2 yes 1 0x80 10 10 none
21 I ether21 bridge2 yes 1 0x80 10 10 none
22 I ether22 bridge2 yes 1 0x80 10 10 none
23 I ether23 bridge2 yes 1 0x80 10 10 none
24 I ether24 bridge2 yes 1 0x80 10 10 none
25 I sfp-sfpplus2 bridge2 yes 1 0x80 10 10 none
Not stating your board but from what I can tell wlan1 is a wlan interface right? this interface maybe is not connected in hardware to the same switch chip. Hence it's not hardware enabled. Look att the Block diagrams of your unit an you will se how it's built.Hw. Offload
After reboot I have this in log...
hardware offloading activated on bridge "bridge1" ports: wlan1,ether2
hardware offloading activated on bridge "bridge1" ports: wlan1,ether3
But port wlan1 status is inactive and not Hw. Offload... Is is correct?
Flags: X - disabled, I - inactive, D - dynamic, H - hw-offload
0 XI ether1 bridge1 yes 1 0x80 10 10 none
1 H ether2 bridge1 yes 1 0x80 10 10 none
2 H ether3 bridge1 yes 1 0x80 10 10 none
3 XI ether4 bridge1 yes 1 0x80 10 10 none
4 wlan1 bridge1 yes 1 0x80 10 10 none
*) wireless - improved WPA2 key exchange reliability;
Thank you for this fix!What's new in 6.41rc37 (2017-Oct-02 06:47):
Changes since previous 6.41rc release:
*) fetch - accept all HTTP 2xx status codes;
[admin@CHR] > /tool fetch url="http://httpstat.us/204"
status: failed
action failed (6)
[admin@CHR] > /tool fetch url="https://httpstatuses.com/204"
status: finished
downloaded: 3KiBC-z pause]
duration: 1s
Try this:*) bridge - initial support for "/interface list" as a bridge port (CLI only);
/in bridge port add interface=all
What's new in 6.41rc31 (2017-Sep-20 06:56):*) lte - added Passthrough support (CLI only);
*) lte - added Passthrough support (CLI only);
If you see the same changelog entry in multiple rc versions then it is a new feature which is being implemented and changelog entry is simply moved up on each rc when additional work on it has been done.
Thank you!viewtopic.php?f=21&t=123936&start=100#p614799
If you see the same changelog entry in multiple rc versions then it is a new feature which is being implemented and changelog entry is simply moved up on each rc when additional work on it has been done.
We are constantly improving and fixing bugs for this feature.strods,
What is difference between earlier RC, for example:
What's new in 6.41rc38 (2017-Oct-03 11:51):What's new in 6.41rc31 (2017-Sep-20 06:56):*) lte - added Passthrough support (CLI only);*) lte - added Passthrough support (CLI only);
Then the correct should be:We are constantly improving and fixing bugs for this feature.
Connector Type SFP - LC
Fiber Type Reserved
Tx Central Wavelength 1310
Baud Rate 1G
Vendor OUI 00:00:00
Vendor Name Mikrotik
Vendor PN S-35LC20D
Vendor Rev 1.0
Vendor SN SK151211B35234
Date Code 151205
Temperature [Degrees Centigrade] 33.75
Vcc [Volt] 3.30
Mon1 (Bias) [mA] 1
Mon2 (TX PWR) [dBm] -5.19
Mon3 (RX PWR) [dBm] -17.42
[admin@BS568] > interface ethernet monitor sfp-sfpplus1
name: sfp-sfpplus1
status: link-ok
auto-negotiation: disabled
rate: 1Gbps
full-duplex: yes
tx-flow-control: yes
rx-flow-control: yes
sfp-module-present: yes
sfp-rx-loss: no
sfp-tx-fault: no
sfp-type: SFP-or-SFP+
sfp-connector-type: LC
sfp-link-length-9um: 20000m
sfp-vendor-name: Mikrotik
sfp-vendor-part-number: S-53LC20D
sfp-vendor-revision: 1.0
sfp-vendor-serial: SK151211B54444
sfp-manufacturing-date: 15-12-05
sfp-wavelength: 1550nm
sfp-temperature: 40C
sfp-supply-voltage: 3.296V
sfp-tx-bias-current: 0mA
sfp-rx-power: -9.752dBm
eeprom-checksum: good
eeprom: 0000: 03 04 07 00 00 00 02 00 00 00 00 01 0d 00 14 c8 ........ ........
0010: 00 00 00 00 4d 69 6b 72 6f 74 69 6b 20 20 20 20 ....Mikr otik
0020: 20 20 20 20 00 00 00 00 53 2d 35 33 4c 43 32 30 .... S-53LC20
0030: 44 20 20 20 20 20 20 20 31 2e 30 00 06 0e 00 e4 D 1.0.....
0040: 00 1a 00 00 53 4b 31 35 31 32 31 31 42 35 34 34 ....SK15 1211B544
0050: 34 34 20 20 31 35 31 32 30 35 20 20 68 f0 04 34 44 1512 05 h..4
0060: 1f a0 7b 0b 1a 66 2c 8c 00 00 52 52 52 52 00 52 ..{..f,. ..RRRR.R
0070: 00 40 52 52 00 40 52 52 52 52 52 ff ff ff ff 00 .@RR.@RR RRR.....
0080: 55 00 d8 00 46 00 00 00 8d cc 74 04 88 b8 79 18 U...F... ..t...y.
0090: af c8 00 00 88 b8 00 00 13 94 04 eb 13 94 04 eb ........ ........
00a0: 18 a6 00 10 13 94 00 10 00 00 00 00 00 00 00 00 ........ ........
00b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........
00c0: 00 00 00 00 3f 80 00 00 00 00 00 00 01 00 00 00 ....?... ........
00d0: 01 00 00 00 01 00 00 00 01 00 00 00 00 00 00 40 ........ .......@
00e0: 28 64 80 c6 00 65 0b b3 05 89 7d 7d 7d 7d 00 7d (d...e.. ..}}}}.}
00f0: 00 00 7d 7d 00 00 7d 7d 7d 7d 07 ff ff ff ff 00 ..}}..}} }}......
[admin@BS568] > interface ethernet monitor sfp-sfpplus1
name: sfp-sfpplus1
status: link-ok
auto-negotiation: disabled
rate: 1Gbps
full-duplex: yes
tx-flow-control: yes
rx-flow-control: yes
sfp-module-present: yes
sfp-rx-loss: no
sfp-tx-fault: no
sfp-type: SFP-or-SFP+
sfp-connector-type: LC
sfp-link-length-9um: 3000m
sfp-vendor-name: UBNT
sfp-vendor-part-number: UF-SM-1G-S
sfp-vendor-serial: FT17012008409
sfp-manufacturing-date: 17-01-12
sfp-wavelength: 1550.32nm
sfp-temperature: 39C
sfp-supply-voltage: 3.263V
sfp-tx-bias-current: 19mA
sfp-rx-power: -7.271dBm
eeprom-checksum: good
eeprom: 0000: 03 04 07 00 00 00 40 00 00 00 00 01 0d 00 03 1e ......@. ........
0010: 00 00 00 00 55 42 4e 54 20 20 20 20 20 20 20 20 ....UBNT
0020: 20 20 20 20 00 00 00 00 55 46 2d 53 4d 2d 31 47 .... UF-SM-1G
0030: 2d 53 20 20 20 20 20 20 20 20 20 20 06 0e 20 37 -S .. 7
0040: 20 0a 00 00 46 54 31 37 30 31 32 30 30 38 34 30 ...FT17 01200840
0050: 39 20 20 20 31 37 30 31 31 32 00 00 68 90 01 79 9 1701 12..h..y
0060: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0070: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0080: 5a 00 d3 00 55 00 d8 00 94 70 69 78 90 88 6d 60 Z...U... .pix..m`
0090: c3 50 00 00 af c8 00 32 18 a6 03 e8 13 94 04 eb .P.....2 ........
00a0: 27 10 00 28 1f 07 00 32 00 00 00 00 00 00 00 00 '..(...2 ........
00b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........
00c0: 00 00 00 00 3f 80 00 00 00 00 00 00 01 00 00 00 ....?... ........
00d0: 01 00 00 00 01 00 00 00 01 00 00 00 00 00 00 99 ........ ........
00e0: 27 c3 7f 78 25 76 0a 81 09 cd 00 00 00 00 22 00 '..x%v.. ......".
00f0: 00 40 00 00 00 40 00 00 00 00 00 ff ff ff ff 00 .@...@.. ........
On RB3011 sfp to a CRS326-24G-2S+ via DAC cable doesn't work if you set auto-negotiation , furthermore the RB3011 doesn't detect if link go down (CRS instead correctly detects it)...cut.. SFP transceiver, why do you have auto-negotiation disabled and what is connected to opposite side? Have you tried to turn auto-negotiation=on?
/interface ethernet
set [ find default-name=ether3 ] master-port=ether2
set [ find default-name=ether4 ] master-port=ether2
set [ find default-name=ether5 ] master-port=ether2
/interface vlan
add interface=ether2 name=ether2.vlan12 vlan-id=12
add interface=ether2 name=ether2.vlan19 vlan-id=19
add interface=ether2 name=ether2.vlan20 vlan-id=20
add interface=ether2 name=ether2.vlan24 vlan-id=24
add interface=ether2 name=ether2.vlan44 vlan-id=44
add interface=ether2 name=ether2.vlan58 vlan-id=58
/interface ethernet switch port
set 2 vlan-mode=secure
set 3 vlan-mode=secure
set 4 default-vlan-id=58 vlan-header=always-strip vlan-mode=secure
set 5 default-vlan-id=58 vlan-header=always-strip vlan-mode=secure
/interface ethernet switch vlan
add independent-learning=no ports=switch1-cpu,ether2,ether3 switch=switch1 vlan-id=44
add independent-learning=no ports=switch1-cpu,ether2,ether3,ether4,ether5 switch=switch1 vlan-id=58
add independent-learning=no ports=switch1-cpu,ether2 switch=switch1 vlan-id=20
add independent-learning=no ports=switch1-cpu,ether3 switch=switch1 vlan-id=19
add independent-learning=no ports=switch1-cpu,ether3 switch=switch1 vlan-id=12
add independent-learning=no ports=switch1-cpu,ether2 switch=switch1 vlan-id=24
Good evening,After upgrade to 6.41RC38, WAP R-2nD processor 100%, self nonstop reboot the system. I used Netinstall to run it.
The others Roterboard are work ok
Can confirm this, same new WAP LTE constant reboots, Critical process died, etc in logs, works fine with older version.Hello, after upgrading RBwAPR-2nD & R11e-LTE to version 6.41rc38, I received a critical error after which the router has been permanently rebooting.
if you want a relative version older than that, you need to log in with a static IP address, quickly roll over the main package, and quickly downgrade, or use netsintall
p.s. firmware version : 3.39.
Does upgrade to firmware up to version 3.41, does the RC start up normally?
What about configurations like mentioned in posting #275 in this topic? Are they supported now?What's new in 6.41rc44 (2017-Oct-11 08:21):
RouterOS (v6.40rc36-rc40 and) v6.41rc1+ contains new bridge implementation that supports hardware offloading (hw-offload).
This update will convert all interface "master-port" configuration into new bridge configuration, and eliminate "master-port" option as such.
/interface bridge port set 0 frame-types=
FrameTypes ::= admit-all | admit-only-untagged-and-priority-tagged | admit-only-vlan-tagged
Is this feature feature optional if someone does not want their router to contact cloud.mikrotik.com every minute?!) detnet - implemented "/interface detect-internet" feature;
https://wiki.mikrotik.com/wiki/Manual:Detect_internet
Specifying our own host instead of 8.8.8.8 and cloud.mikrotik.com, may be usefully in the future.Is this feature feature optional if someone does not want their router to contact cloud.mikrotik.com every minute?!) detnet - implemented "/interface detect-internet" feature;
https://wiki.mikrotik.com/wiki/Manual:Detect_internet
Is it just cosmetic (ie: "this interface is 'WAN' just FYI") or is it actually used somewhere (ie: in firewall rules as an interface list) ?
Does in any way affect the functionality of other features in ROS?
My understanding is it will populate the interface lists you specify with the actual interfaces. Those lists can then be used in firewall filter, NAT, etc.Is it just cosmetic (ie: "this interface is 'WAN' just FYI") or is it actually used somewhere (ie: in firewall rules as an interface list) ?
Yes that would actually be cool IMHO.Specifying our own host instead of 8.8.8.8 and cloud.mikrotik.com, may be usefully in the future.Is this feature feature optional if someone does not want their router to contact cloud.mikrotik.com every minute?!) detnet - implemented "/interface detect-internet" feature;
https://wiki.mikrotik.com/wiki/Manual:Detect_internet
Is it just cosmetic (ie: "this interface is 'WAN' just FYI") or is it actually used somewhere (ie: in firewall rules as an interface list) ?
Does in any way affect the functionality of other features in ROS?
Thank you!
Is the test IPv6 compliant. It needs to be. The address 8.8.8.8 is an IPv4 static, fail. The DNS name cloud.mikrotik.com only has an A record.!) detnet - implemented "/interface detect-internet" feature;
https://wiki.mikrotik.com/wiki/Manual:Detect_internet
The defconf already changed in version 6.40! It now uses the "WAN" interface list in the firewall instead of ether1.My understanding is it will populate the interface lists you specify with the actual interfaces. Those lists can then be used in firewall filter, NAT, etc.Is it just cosmetic (ie: "this interface is 'WAN' just FYI") or is it actually used somewhere (ie: in firewall rules as an interface list) ?
I'd also expect this feature to be used in the defconf, but we'd better wait for an official announcement.
Well that setting is not so important, I think. I probably unchecked it once because it would be like the switches I am accustomed with, and then just copied the same setting over and over.Fairly in depth post, to highlight a few things (community and strods correct me if I'm wrong).
The independent learning = no option doesn't exist anymore. You're going to get independent MAC databases per VLAN. I'm curious as to why you weren't doing that before, was it a hardware limitation?
Are you sure? I do not yet see the option to restrict certain tagged VLANs to certain ports. And what about tagging untagged frames with a certain VLAN tag?Frame tagging exists in the implementation:
I'd argue that setting a PVID and "admit-only-untagged-and-priority-tagged" is better than VLAN mode secure and always-strip.Code: Select all/interface bridge port set 0 frame-types= FrameTypes ::= admit-all | admit-only-untagged-and-priority-tagged | admit-only-vlan-tagged
The rest of the configuration is just basic VLAN configuration which is well supported.
Well it hopefully will not be very different between models that have a switch chip so I could do some experiments on a RB750.The only two points I personally can't speak for is how well the automatic conversion will go during the upgrade and the state of each of those features on the RB2011. I don't own that hardware.
Normally there is a local network with DHCP service on port 10 for emergency maintenance and of course these routers also have a serial port, but unfortunately they are located on sites all over the country that have limited access. We will clearly have to be very careful when updating to 6.41Personally, I'd make sure I have a back-door after the upgrade. Maybe take a port out of the "switch-chip" by removing master-port and set it up as a routed interface that you can plug a laptop into and easily get access to the device.
Changing the hosts is not just useful, it's a requirement. Just imagine, you can DDoS cloud.mikrotik.com and every router using this feature goes offline!Specifying our own host instead of 8.8.8.8 and cloud.mikrotik.com, may be usefully in the future.Is this feature feature optional if someone does not want their router to contact cloud.mikrotik.com every minute?!) detnet - implemented "/interface detect-internet" feature;
https://wiki.mikrotik.com/wiki/Manual:Detect_internet
Is it just cosmetic (ie: "this interface is 'WAN' just FYI") or is it actually used somewhere (ie: in firewall rules as an interface list) ?
Does in any way affect the functionality of other features in ROS?
Thank you!
ports still will be 'WAN', so nothing terrible should happenJust imagine, you can DDoS cloud.mikrotik.com and every router using this feature goes offline!
Opposite, inject a route to 8.8.8.8 into a dynamic protocol running on someones environment that relies on this feature. It'll toggle the interface to WAN, apply security policies, likely dropping all traffic until detect-interface flaps back to LAN. Then it flaps to WAN when it relearns the route and flap and flap and flap.ports still will be 'WAN', so nothing terrible should happenJust imagine, you can DDoS cloud.mikrotik.com and every router using this feature goes offline!
PVID = Default VLAN (Primary VLAN ID).Well that setting is not so important, I think. I probably unchecked it once because it would be like the switches I am accustomed with, and then just copied the same setting over and over.Fairly in depth post, to highlight a few things (community and strods correct me if I'm wrong).
The independent learning = no option doesn't exist anymore. You're going to get independent MAC databases per VLAN. I'm curious as to why you weren't doing that before, was it a hardware limitation?Are you sure? I do not yet see the option to restrict certain tagged VLANs to certain ports. And what about tagging untagged frames with a certain VLAN tag?Frame tagging exists in the implementation:
I'd argue that setting a PVID and "admit-only-untagged-and-priority-tagged" is better than VLAN mode secure and always-strip.Code: Select all/interface bridge port set 0 frame-types= FrameTypes ::= admit-all | admit-only-untagged-and-priority-tagged | admit-only-vlan-tagged
The rest of the configuration is just basic VLAN configuration which is well supported.
My config does not use the untagged VLAN at the CPU port, but it does have untagged external ports. Those have to be in some VLAN.
Now, the switch easily manages that with the default-vlan-id=xx vlan-header=always-strip setting, but can the bridge do the same thing? And will it
be hardware accellerated? (I do not want traffic between an untagged port and the tagged VLAN with the same ID on another port to be CPU-bridged)Well it hopefully will not be very different between models that have a switch chip so I could do some experiments on a RB750.The only two points I personally can't speak for is how well the automatic conversion will go during the upgrade and the state of each of those features on the RB2011. I don't own that hardware.Normally there is a local network with DHCP service on port 10 for emergency maintenance and of course these routers also have a serial port, but unfortunately they are located on sites all over the country that have limited access. We will clearly have to be very careful when updating to 6.41Personally, I'd make sure I have a back-door after the upgrade. Maybe take a port out of the "switch-chip" by removing master-port and set it up as a routed interface that you can plug a laptop into and easily get access to the device.
Hmm.. Why do you guys think that "detect-internet" feature will do ANY of that?...Opposite, inject a route to 8.8.8.8 into a dynamic protocol running on someones environment that relies on this feature. It'll toggle the interface to WAN, apply security policies, likely dropping all traffic until detect-interface flaps back to LAN. Then it flaps to WAN when it relearns the route and flap and flap and flap.ports still will be 'WAN', so nothing terrible should happenJust imagine, you can DDoS cloud.mikrotik.com and every router using this feature goes offline!
Dumb feature.
It's like VTP, was great on the drawing board and then it was used to wipe peoples VLAN databases. It took a few years but now Cisco disavows that feature.
/interface detect-internet state
The magic is in the other settings:Hmm.. Why do you guys think that "detect-internet" feature will do ANY of that?...Opposite, inject a route to 8.8.8.8 into a dynamic protocol running on someones environment that relies on this feature. It'll toggle the interface to WAN, apply security policies, likely dropping all traffic until detect-interface flaps back to LAN. Then it flaps to WAN when it relearns the route and flap and flap and flap.ports still will be 'WAN', so nothing terrible should happenJust imagine, you can DDoS cloud.mikrotik.com and every router using this feature goes offline!
Dumb feature.
It's like VTP, was great on the drawing board and then it was used to wipe peoples VLAN databases. It took a few years but now Cisco disavows that feature.
What I'm getting from wiki page, it's just an informational feature: you typeand you get some info, that this feature gathered..Code: Select all/interface detect-internet state
[admin@211-rtr1] > interface detect-internet set
Change properties of one or several items.
detect-interface-list --
internet-interface-list --
lan-interface-list --
wan-interface-list --
My understanding is detect-internet is aimed to be used on home-users' routers, which are definitely not supposed to be running any of the dynamic routing protocols (and are not by default). Honestly, I don't see anything wrong with it. Much better to have all ports protected, and treat some of them as WAN-facing (and others as LAN-facing) when certain criteria is met, than exposing your router to the DNS amplification attacks by simply adding PPPoE interface without also modifying the existing (default) firewall rules (a common problem that multiple people complained about up until recently).Opposite, inject a route to 8.8.8.8 into a dynamic protocol running on someones environment that relies on this feature. It'll toggle the interface to WAN, apply security policies, likely dropping all traffic until detect-interface flaps back to LAN. Then it flaps to WAN when it relearns the route and flap and flap and flap.
Ok, that sounds good. From earlier discussion I got the impression that from now on the bridge would be one big VLAN-transparent thing, whereas in my existing practice (not the above example) I would normally put VLAN subinterfaces on ports and make the subinterfaces part of a bridge, rather than putting entire ports in the bridge and adding VLAN subinterfaces to the bridge.PVID = Default VLAN (Primary VLAN ID).
So you can accomplish an untagged port by changing the PVID of a bridge port to whatever VLAN ID you need. You also have the /interface bridge vlan table. In that table you specify which ports have a VLAN tagged or untagged. So like secure mode, you set admit-only-tagged-frames and then only add that bridge port to the VLANs tagged lists that you want.