I just installed over automatic download and this happen. its a simple error maybe :=)Maybe 6.43.1 was retracted or not available for automatic download yet/now.
Big thanx broRouterOS version 6.43.1 has been released in public "stable" channel!
*) rb3011 - added IPsec hardware acceleration support;
Updated RB2011 the same way - this did not happen in my case (RouterOS versions are reported correctly)I just installed over automatic download and this happen. its a simple error maybe :=)Maybe 6.43.1 was retracted or not available for automatic download yet/now.
> /system package update check-for-updates
channel: current
installed-version: 6.43.1
latest-version: 6.43.1
status: System is already up to date
Write an email to support@mikrotik.comWhere is bugreport page or bugtracker?
+1CCR1016-12G 6.43.1 - "Delegated-IPv6-Prefix" attribute for PPPoE not work.
viewtopic.php?f=1&t=89443&p=687058#p687058
The "introduced in v6.43" means that it was a bug that was introduced (a.k.a. made) in RouterOS version 6.43 and only present in that version (since v6.43.1 is the first update after v6.43).What does this mean in details?
*) winbox - fixed corrupt user database after specifying allowed address range (introduced in v6.43);
Does this mean that in ROS lower than 6.43 address range not working?
Feel free to add a new title to you business card "Knight and Protector of the Internets"Yesterday upgraded two CCRs from 6.41.3 to 6.43.1 in the hotel I had vacation in Greece At least, now it's not vulnerable to WinBox user database reading xD Unfortunately, WinBox access is still allowed for every Free WiFi user in the hotel
AWESOME more test results and specifics on config/type of vpn/encryption you are using PLZ!!!!!!!!!!Upgraded one 3011 for tests, IPSEC diff:
- 6.42.7 - 50% CPU and 6 to 7 MB/s
- 6.43.1 - 40% CPU and full 10MB/s ( max bandwidth ) we will test it with smth like 1gbps/1gbps for lolz
For now working ok, we will see tomorrow...
Yes, the problem appears to be related to creating the DHCPv6 binding. If I manually create a DHCPv6 binding with the correct prefix, DUID, and IAID, then it works.Bug in DHCPv6 PD Pool no PPP Profile. Set pool IPv6 and does not working.
Before 6.43 everything ok.
netinstall.exe
advanced-tools-6.43.1-arm.npk
dhcp-6.43.1-arm.npk
ntp-6.43.1-arm.npk
ppp-6.43.1-arm.npk
security-6.43.1-arm.npk
system-6.43.1-arm.npk
wireless-6.43.1-arm.npk
Have you tried netinstall using the ARM main package instead?for a cAP AC
i'm trying to do a netinstall from a windows xp laptop that have nothing else activated than the lan local (old laptop with 10/100)
any idea?
I will try tomorrow and let you knowHave you tried netinstall using the ARM main package instead?
https://download.mikrotik.com/routeros/ ... 6.43.1.npk
Also, make sure you are using the newer netinstall 6.43.1 and not an older version. Each time there is a new ROS release, there is a new netinstall version, and using an older one may not work correctly.
viewtopic.php?f=2&t=139091still cant change any user names.
introduced in 6.43.0
PPPoE on WAN port, rest is bridged, 25 firewall rules, mostly drop 80/443 , srcnat to public ip, ipsec sha1 / aes128cbc+aes192cbc+aes256cbc so nothing fancyAWESOME more test results and specifics on config/type of vpn/encryption you are using PLZ!!!!!!!!!!Upgraded one 3011 for tests, IPSEC diff:
- 6.42.7 - 50% CPU and 6 to 7 MB/s
- 6.43.1 - 40% CPU and full 10MB/s ( max bandwidth ) we will test it with smth like 1gbps/1gbps for lolz
For now working ok, we will see tomorrow...
Good work!
This is a normal behaviour (in particular, it is the numerically lowest one of the MAC addresses of all bridged interfaces) unless you set a bridge mac address administratively. So it should not be different as compared to previous versions. Does it mean that the administrative (configuration) setting of the bridge mac stopped working, or that you haven't ever had a look in older versions because you never got the error regarding own MAC and loop?On all updated devices mac address bridge = mac address of one of the interfaces
Renaming is not possible anymore due to security changes, please see viewtopic.php?f=2&t=139091#p685742still cant change any user names.
introduced in 6.43.0
Chupaka you seem tired. I would be more than happy to run around Europe configuring mikrotiks for you. All I ask is airplane fare from Canada to Europe, train tickets to destinations and airbnb and meals covered. (and cell phone plan). If I think of anything else I will let you know, maybe some tickets to La Liga games LOL.Yesterday upgraded two CCRs from 6.41.3 to 6.43.1 in the hotel I had vacation in Greece At least, now it's not vulnerable to WinBox user database reading xD Unfortunately, WinBox access is still allowed for every Free WiFi user in the hotel
While you'll be running around Europe and working like crazy, I could fix a few Mikrotiks in Canada for you. I hear that Calgary isn't too bad place to be in winter time.Chupaka you seem tired. I would be more than happy to run around Europe configuring mikrotiks for you. All I ask is airplane fare from Canada to Europe, train tickets to destinations and airbnb and meals covered. (and cell phone plan). If I think of anything else I will let you know, maybe some tickets to La Liga games LOL.Yesterday upgraded two CCRs from 6.41.3 to 6.43.1 in the hotel I had vacation in Greece At least, now it's not vulnerable to WinBox user database reading xD Unfortunately, WinBox access is still allowed for every Free WiFi user in the hotel
Please try upgrading to v6.43.2, the particular issue is addressed in this release.Release 6.43.1 has broken five of my RB2011 routers, infinite boot loop.
Only Netinstall with longterm version 6.40 has revived the routers.
This one time i must say: not a good job from MTik :-/
S..t happens, but i'm loving the reaction time tho.Breaking the bootloader in a "stable" release...
Agree.Three "stable" releases in just over a week seems to be rather a contradiction in terms to me.
Perhaps "current" really was the correct name.
Indeed!Perhaps "current" really was the correct name.
A version should only be called "stable" if the user community deemed it stable..... as long as users still report issues, it should be "current". Only if determined after 1 or 2 weeks a 'current' version is stable it can be called 'stable'.Three "stable" releases in just over a week seems to be rather a contradiction in terms to me.
Perhaps "current" really was the correct name.
It should be fixed in 6.43.2, you will need to netinstall v6.43.2.I have two bricked device after flashing with 6.43.1 firmware. sxt lite2 and groove5 in bootloop.
What should i do?
I have a theory that they may want to support 6.40.x line (the last release branch before the bridge overhaul) for an extended period of time, hence the "long-term". This does not justify, however, renaming "current" to "stable".bugfix-only/long-term named 'stable' instead?
Proper Input chain filtering in the ip firewall solves the winbox issues quite well.Yesterday upgraded two CCRs from 6.41.3 to 6.43.1 in the hotel I had vacation in Greece At least, now it's not vulnerable to WinBox user database reading xD Unfortunately, WinBox access is still allowed for every Free WiFi user in the hotel
21:12:41 l2tp,info first L2TP UDP packet received from xxx.xxx.xxx.xxx
21:12:41 l2tp,ppp,info,account zzzzzzzzzz logged in, yyy.yyy.yyy.yyy
21:12:41 l2tp,ppp,info vpn-zzzzzzzzzz: authenticated
21:12:41 l2tp,ppp,info vpn-zzzzzzzzzz: connected
21:12:41 l2tp,ppp,info vpn-zzzzzzzzzz: using encoding - MPPE128 stateless
21:12:41 l2tp,ppp,info vpn-zzzzzzzzzz: disabling encoding - MPPE128 stateless
/interface l2tp-server server
set allow-fast-path=no authentication=mschap2 caller-id-type=ip-address default-profile=default-encryption enabled=yes ipsec-secret="" keepalive-timeout=30 \
max-mru=1440 max-mtu=1440 max-sessions=unlimited mrru=disabled one-session-per-host=no use-ipsec=no
/ppp profile
set *FFFFFFFE only-one=yes
/ppp secret
add local-address=10.254.254.1 name=user password=***************** remote-address=10.254.254.2 service=l2tp
You should really be using L2TP over IPsec, not just regular L2TP.L2TP VPN security concern since upgrading 6.42.6 to 6.43.2, MPPE128 is disabled after VPNs connect in approximately 33.3% of the cases:
I have the same impression.... thankfully they understood the importance of stability for production environments. Much more than always having the latest features.I have a theory that they may want to support 6.40.x line (the last release branch before the bridge overhaul) for an extended period of time, hence the "long-term". This does not justify, however, renaming "current" to "stable".bugfix-only/long-term named 'stable' instead?
Why do you need master ports back? You get the same thing with a bridge without vlan filtering and with hardware offloading enabled, and I believe MikroTik has added back all of the the switch menus that were removed in 6.41+. A lot of people seem to be under the (I believe mistaken) impression that certain configurations are no longer possible now that master ports are gone. I have not personally seen any configurations that you can do with the old switch chip that are no longer possible after 6.41, and can't really think of any. The master ports are still there under the hood, just hidden from view.But frankly, the only thing they really need to do to remain compatible with old config's is an extra package that restores masterports, and probably later (in a few versions, as bridge hardware vlan filtering etc. finally works for all RB's) also the switchconfig-menu, which seems to be oh-so-difficult for some to understand.
ether2-master
/ | \
ether3 ether4 ether5
bridge
|
ether2-master
/ | \
ether3 ether4 ether5
It would be really helpful if you listed affected devices or at least product ranges. Is CCR affected? Or just MIPS maybe? Do I have to update wireless wire?*) routerboot - fixed RouterOS booting on devices with particular NAND memory (introduced in v6.43);
I have tried the exact same thing with 6.43.2, without using main package
Have you tried netinstall using the ARM main package instead?
https://download.mikrotik.com/routeros/ ... 6.43.1.npk
Also, make sure you are using the newer netinstall 6.43.1 and not an older version. Each time there is a new ROS release, there is a new netinstall version, and using an older one may not work correctly.
Why? IF your devices booted - stay on v6.43.1, if they didn't - use v6.43.2, in future use v6.43.2, feature wise both are identical versions.It would be really helpful if you listed affected devices or at least product ranges. Is CCR affected? Or just MIPS maybe? Do I have to update wireless wire?*) routerboot - fixed RouterOS booting on devices with particular NAND memory (introduced in v6.43);
This is quite important information you are not giving us!
It's NO FUN updating large network of devices and if there is no reason to update some it could save a lot of time and possibly issues.
"devices with particular NAND memory" is as helpful as saying nothing...
Yes, 6.43 - 6.43.2 have a problem with DHCPv6 server, the bindings do not get added. If manual bindings are present, they continue to work, but dynamic bindings are not properly created.Hello friends I just upgraded to version 6.43.2 and our clients stopped working with ipv6, after this last update I downgraded to version 6.42.7 and returned to normal function.
Great, I did an upgrade to 6.43.1 on hEX and auto-upgrade of firmware was active. I did not reboot yet, so what to do now? I cannot upgrade to 6.43.2 bootloader before reboot! Will it be bricked afterwards?It should be fixed in 6.43.2, you will need to netinstall v6.43.2.
Ok, so it isn't the bootloader that bricks the devices?No, a reboot or upgrade will not brick the router. If your router works with 6.43.1, there is no need to upgrade to 6.43.2.
I have the same question, I know a few people who have upgraded RouterOS but haven't necessarily rebooted a second time for the firmware update to take effect.Ok, so it isn't the bootloader that bricks the devices?
My log says "firmware upgrade successfully, please reboot..." so it hasn't been rebooted since 6.43.1 upgrade.
Why do you need master ports back? You get the same thing with a bridgeBut frankly, the only thing they really need to do to remain compatible with old config's is an extra package that restores masterports
RouterBOARD 941-2nD 6.43.1, upgrade error 6.43.2 "not enough space for upgrade"
several attempts same error, after erasing files(files empty) same error
after attempt, routeros-smips-6.43.2.npk remains in files. reboot causes same error.
deleted routeros-smips-6.43.2.npk file and reboot the router works correct in 6.43.1
#35
2016. May 25. (Wed), 07:05Do you seriously suggest that our own software will one day no longer run on our own devices?Is MikroTik really publicly committing to never allowing the combo package to increase in size to the point where it does not fit on a 16MB device?
With a 2011, you can make two bridges with 6.42.7, one with 1G lans and one with 100M LANs, both should get hardware offloading as long as they don't include any ports from the other switch chip. Performance should be unchanged from the equivalent master port configuration on 6.40.9.NO ! If I have 2 swich chip in my RB2011, and one is 100M, another is 1G, I can make 2 individual "switch". No influence one on another.
If I must do it in bridge, my max. speed will be 100M and NOT 1G on any port. I tested it on 6.40.9 (eth1 - uplink, eth2 - master port of 1G lans, simple NAT): I got 240+Mbps throughput on my ISP.
Other test with 6.42.7 (eth1 - uplink, all other ports on bridge with HW offloading): I got stable 100Mbps on my ISP. Bridge limited my speed to its slowest port speed!
So not having master ports, only one bridge for everything... is a big drawback for us.
Hi,Why do you need master ports back?
Hi MduCharme,Why do you need master ports back?
It may be easier and more realistic to lobby them to improve the auto-convert function instead of keeping 6.40.xxx around forever, or adding an .npk to re-add master port function (which maybe sounds easy but I doubt would be that easy to code, and it becomes much easier to get the auto-convert more bulletproof for unusual configs).So if something just works with 6.40.xxx and it needs a security fix, the industry expects just that. And not the need for qualified engineers to be contracted to reprogram numerous Mikrotik devices, since 6.41+ just does not work anymore with the old config. (And "no", the auto-convert function did not yield the desired results in many cases)
What we need is ROS version that fully HW offloads everything that underlying HW supports.What we need is a version that can auto-convert existing configurations that use a combination of master-port, VLAN subinterfaces on that master port, and switch configuration for tagged/untagged VLAN on the ports,
into a new configuation with a single bridge with VLAN filtering and full hardware acceleration just like the above configuration always had.
Well, I would be satisfied with the common scenario described above. There are so many obscure filter possibilities in some of the switch chips that probably nobody uses, that it would be too much work to move those all into the new bridge functionality.What we need is ROS version that fully HW offloads everything that underlying HW supports.
@andriysssbaksa, what is in /tool profile?
It is probably not the 43 to 43.2 upgrade that did it, but instead, the routerboot firmware upgrade for 43. If you didn't reboot a second time after 6.43, the routerboot upgrade would not take place until the following reboot, which is probably by happenstance when you rebooted to upgrade to 6.43.2.DO NOT upgrade it on 2011.
Bricked one from 43 to 43.2., me too.
Remote destination...tommorow will be looong day.
Hi MduCharmeI do not personally know what MikroTik's plans are in this regard, but I would caution against reading too much into the "bugfix-only" being renamed "long-term" as having anything to do with a long term continuation of the 6.40.x software, unless they have made a specific announcement in this regard.
Almost every major version they have released lately has brought about config changes that, unless they are auto-converted by the upgrade process, prevents an older config from being loaded into a newer version router. Even simple changes like moving to interface lists for the MAC server / IP neighbor discovery lists breaks direct compatibility with old documented configs. These changes are unrelated to the new bridge code. There may be more re-certification needed already than is generally realized.It can ALSO mean some other way of still supporting the original config scripts, preferably without (auto)converting them (since this would mean re-certification in certain cases).
Yes that's true.....
Almost every major version they have released lately has brought about config changes that, unless they are auto-converted by the upgrade process, prevents an older config from being loaded into a newer version router. Even simple changes like moving to interface lists for the MAC server / IP neighbor discovery lists breaks direct compatibility with old documented configs. These changes are unrelated to the new bridge code. There may be more re-certification needed already than is generally realized.
It is probably not the 43 to 43.2 upgrade that did it, but instead, the routerboot firmware upgrade for 43. If you didn't reboot a second time after 6.43, the routerboot upgrade would not take place until the following reboot, which is probably by happenstance when you rebooted to upgrade to 6.43.2.
Current TX power readings are not supported for 802.11ac-capable wireless cards. That's a known (and documented!) limitation that has always been there.Current TX Power = 0dBm
My post is on the 802.11b/g/n WLAN cardCurrent TX power readings are not supported for 802.11ac-capable wireless cards. That's a known (and documented!) limitation that has always been there.Current TX Power = 0dBm
Look at the very bottom of this wiki page (in the "Winbox" section).Can you provide link to the documentation
Got it, thx.Look at the very bottom of this wiki page (in the "Winbox" section).Can you provide link to the documentation
And how? There is nothing blocked between two router and two sites, ICMP goes trough freely from one site to other. What sould I do? It looks like, the PMTU discovers wrong MTU value.Rather then doing MSS clamping you'd better fix your firewall to allow PMTUD to function properly across your tunnel...
Waiting too !Is there any information on correcting the error "Delegated-IPv6-Prefix" attribute for PPPoE?
viewtopic.php?f=1&t=89443&start=100#p687190
viewtopic.php?f=1&t=89443&start=100#p687516
viewtopic.php?f=1&t=89443&start=100#p687867
The problem is bigger than just the Delegated-IPv6-Prefix - from my testing, DHCPv6 prefix delegation is basically entirely broken, at least with PPP connections, whether or not RADIUS is used. Only if there is a static DHCPv6 binding will DHCPv6 prefix delegation work with PPP connections in 6.43.xx. We can't really tell if there is a problem with the Delegated-IPv6-Prefix RADIUS attribute until this issue is fixed.Is there any information on correcting the error "Delegated-IPv6-Prefix" attribute for PPPoE?
This was always set like this (you could verify it by checking output of /interface ethernet print). It is now shown in export because default setting starting with 6.43 is 1Gbps ... upgrade does not change settings and export shows differences from default. The value does not apply when autonegotiation is enabled... which is default as well.Since ROS 6.43 there are entries setting ethernet speed to 100Mbps for every cooper not auto negotiated interface on every MT device. Is it normal?
.....
set [ find default-name=ether5 ] speed=100Mbps
set [ find default-name=ether6 ] speed=100Mbps
set [ find default-name=ether7 ] speed=100Mbps
.....
Today I checked all my firewall rules (IPv6 and IPv4 too), I disabled some rules, that may have negative aftermaths, but these rules only touched that interfaces between them the tunnel is created on (end interfaces of 2 WWAN connection bridged trough unsafe switch in a tower). Inside the tunnel and on tunnel interfaces there is no blocking rules, all input output and forward allowed.Rather then doing MSS clamping you'd better fix your firewall to allow PMTUD to function properly across your tunnel...
/interface bridge
add arp=proxy-arp comment=LAN fast-forward=no name=bridge-lan
add fast-forward=no name=bridge1
Check if the MTU settings on your tunnel interfaces are correct. In case you rely on RouterOS to calculate it automatically try setting it to the correct value manually (I'm not even sure RouterOS can calculate it correctly in all possible tunneling/encapsulation scenarios).If I change the keying method from SHA1 to SHA256, the IPIPv6 reconnect and after thet the new TCP connections are broken, but ping works.
What next now?
Which values are correct for IPIPv6 MTU trough 802.11 with SHA256+AES256 IPSec? Now there is nothing set for MTU, the Actual MTU with SHA1 is 1414, with SHA256 is 1410 .Check if the MTU settings on your tunnel interfaces are correct. In case you rely on RouterOS to calculate it automatically try setting it to the correct value manually (I'm not even sure RouterOS can calculate it correctly in all possible tunneling/encapsulation scenarios).If I change the keying method from SHA1 to SHA256, the IPIPv6 reconnect and after thet the new TCP connections are broken, but ping works.
What next now?
Can you post output of command /interface bridge export? Just to check if there's something weird.I found a strange behavior about bridges - might be only WinBox issue but still...
Here is the output - bridge1 was only created to demonstrate this, and there is only one interface included atm. Yes, I'm aware that vlan filtering is inactive in this configuration - the thing is that after upgrade and removing the second bridge the vlan filtering rules (that so far worked as expected) suddenly blocked all traffic, even if removing second bridge should not definitely affect the operation of the first one:Can you post output of command /interface bridge export? Just to check if there's something weird.I found a strange behavior about bridges - might be only WinBox issue but still...
/interface bridge
add arp=proxy-arp comment=LAN fast-forward=no name=bridge-lan
add fast-forward=no name=bridge1
/interface bridge port
add bridge=bridge-lan interface=ether2
add bridge=bridge-lan interface=ether4
add bridge=bridge-lan interface=ether5
add bridge=bridge-lan interface=ether1
add bridge=bridge-lan interface=ether6
add bridge=bridge1 interface=vlan100-remote1
add bridge=bridge-lan frame-types=admit-only-vlan-tagged interface=ether3-tst pvid=10
add bridge=bridge-lan interface=ether7 pvid=20
add bridge=bridge-lan interface=ether8 pvid=10
add bridge=bridge-lan interface=ether9 pvid=10
/interface bridge settings
set allow-fast-path=no
/interface bridge vlan
add bridge=bridge-lan comment=A tagged=ether1,ether2,ether6,ether4,ether5 vlan-ids=30
add bridge=bridge-lan comment=M tagged=ether4,ether5,ether1,ether2,ether6,ether3-tst vlan-ids=10
add bridge=bridge-lan comment=S tagged=ether6 untagged=ether7 vlan-ids=20
add bridge=bridge-lan comment=G tagged=ether4,ether5,ether2 vlan-ids=60
add bridge=bridge-lan comment=TST tagged=ether6 vlan-ids=70
add bridge=bridge-lan comment=R1 tagged=ether6-server vlan-ids=100
Here - MACs seems to be originated from ether1 default MAC address:I was hoping to see actual configuration ... better yet, post output of /inteface bridge print, /interface bridge port print and /interface ethernet print ... it would be interesting to see where MAC of both bridges comes from.
/interface bridge> print
Flags: X - disabled, R - running
0 R ;;; LAN
name="bridge-lan" mtu=auto actual-mtu=1500 l2mtu=1598 arp=proxy-arp arp-timeout=auto mac-address=D4:CA:6D:41:F5:CA protocol-mode=rstp fast-forward=no
igmp-snooping=no auto-mac=yes ageing-time=5m priority=0x8000 max-message-age=20s forward-delay=15s transmit-hold-count=6 vlan-filtering=no dhcp-snooping=no
1 R name="bridge1" mtu=auto actual-mtu=1500 l2mtu=1594 arp=enabled arp-timeout=auto mac-address=D4:CA:6D:41:F5:CA protocol-mode=rstp fast-forward=no igmp-snooping=no
auto-mac=yes ageing-time=5m priority=0x8000 max-message-age=20s forward-delay=15s transmit-hold-count=6 vlan-filtering=no dhcp-snooping=no
/interface bridge port print
Flags: X - disabled, I - inactive, D - dynamic, H - hw-offload
# INTERFACE BRIDGE HW PVID PRIORITY PATH-COST INTERNAL-PATH-COST HORIZON
0 H ether2 bridge-lan yes 1 0x80 10 10 none
1 H ether4 bridge-lan yes 1 0x80 10 10 none
2 H ether5 bridge-lan yes 1 0x80 10 10 none
3 H ether1 bridge-lan yes 1 0x80 10 10 none
4 H ether6 bridge-lan yes 1 0x80 10 10 none
5 vlan100-remote1 bridge1 1 0x80 10 10 none
6 H ether3 bridge-lan yes 30 0x80 10 10 none
7 H ether7 bridge-lan yes 20 0x80 10 10 none
8 H ether8 bridge-lan yes 10 0x80 10 10 none
9 H ether9 bridge-lan yes 10 0x80 10 10 none
/interface ethernet print
Flags: X - disabled, R - running, S - slave
# NAME MTU MAC-ADDRESS ARP SWITCH
0 RS ;;;
ether1 1500 D4:CA:6D:41:F5:CA enabled switch2
1 RS ;;;
ether2 1500 D4:CA:6D:41:F5:CB enabled switch2
2 RS ;;;
ether3 1500 D4:CA:6D:41:F5:CC enabled switch2
3 RS ;;;
ether4 1500 D4:CA:6D:41:F5:CD enabled switch2
4 RS ;;;
ether5 1500 D4:CA:6D:41:F5:CE enabled switch2
5 RS ;;;
ether6 1500 D4:CA:6D:41:F5:CF proxy-arp switch1
6 RS ;;;
ether7 1500 D4:CA:6D:41:F5:D0 enabled switch1
7 RS ;;;
ether8 1500 D4:CA:6D:41:F5:D1 enabled switch1
8 RS ;;;
ether9 1500 D4:CA:6D:41:F5:D2 enabled switch1
9 X ether10 1500 D4:CA:6D:41:F5:D3 enabled switch1
10 R ;;; WAN
ether11-wan 1500 D4:CA:6D:41:F5:D4 enabled
11 X ether12 1500 D4:CA:6D:41:F5:D5 enabled
12 X ether13 1500 D4:CA:6D:41:F5:D6 enabled
It seems that bridge gets it's MAC automatically from the first port connected to it - dynamically changing this whenever the config change is made.... okay, tl;dr; probably my mistake with configuration.I was hoping to see actual configuration ... better yet, post output of /inteface bridge print, /interface bridge port print and /interface ethernet print ... it would be interesting to see where MAC of both bridges comes from.
/interface vlan> print
Flags: X - disabled, R - running
# NAME MTU ARP VLAN-ID INTERFACE
(output omitted)
7 R ;;; R1
vlan100-remote1 1500 enabled 100 bridge-lan
This is actually a documented behavior...It seems that bridge gets it's MAC automatically from the first port connected to it - dynamically changing this whenever the config change is made....
Yes, it is... I just had no idea, how two bridges managed to get the same MAC dynamically. Now I know - my mistake, case closed.This is actually a documented behavior...It seems that bridge gets it's MAC automatically from the first port connected to it - dynamically changing this whenever the config change is made....
Do you have an public IPv4 address for your internal network?Hello every one I just update my microtik os and i can not reach from outside to my internal network, actually when I trace my internal network address from outsite it comes till my internet ip address which is set on microtik but doesnt reach my local network, can any one help please.
Ok, it seems work with 1400 (I tried with Actual MTU 1410 too but TCP failure trough tunnel), if I set this value at booth ends, but with SHA1 such thing didnt need, it looked like actual MTU worked right without MTU settings.You can always set it lower than strictly required, e.g. 1400 or 1300
For SHA256: A clever latin guy said once in the far past: Si vis pacem, para bellum, and Google said, SHA1 is breakable (but expensive), so If the HW engine can accelerate SHA256, why we dont use?Well, when you think the default values are not good enough for you it always could mean you need to study the matter to
know the result of changing encryption lengths or hash methods. I happily run everything at the default SHA1/AES128 and
I am not too worried that the theoretical weaknesses will actually be exploited by someone...
The IPIP wiki page says the default is 1500. Nothing is said about MTU being automatically/dynamically adjusted, so I assume no automatic adjustment ever happens. Though I'd still expect it to work happily (though not fully efficiently) even with the default MTU of 1500, unless you set dont-fragment interface property to yes.The ROS is changing the actual MTU if I change the method, ... , but If a Mikrotik document doesnt write other (please link it for me if exists), It should work, but it doesnt.
Dmitriy, are you 100% sure that it did work different before 6.43? If yes, send your observations to support@mikrotik.com together with a supout.rif file; if not, create a separate topic in General section of the forum because in such case this one would not be the right topic to discuss it.Problem firmware 6.43 - 6.43.2.
Multiple gre with ipsec unreachable with new dynamic peer.
Because router os no distinction is made between peers with different local addresses to one remout address.
Thank you!
authorize {
files
mschap
}
authenticate {
mschap
}
I also have instabilities with my hap AC, crashing every week, although I wasn't graphing memory usage before so I can't be sure there is a leak on mine. I've just set up the graphing to try to see.My hap ac has still memory leak and crashes even in 6.43.2 not really stable
kernel failure in previous boot
out of memory condition was detected
Reverted to 6.42.7 and no related crashes anymore, with 6.43.2 I had daily out of memory crashes....I also have instabilities with my hap AC, crashing every week, although I wasn't graphing memory usage before so I can't be sure there is a leak on mine. I've just set up the graphing to try to see.My hap ac has still memory leak and crashes even in 6.43.2 not really stable
kernel failure in previous boot
out of memory condition was detected
Update: I do not seem to have a memory leak, graphing the memory usage over the past few days has shown no changes, but my device is still crashing about once a week since the new versions.I also have instabilities with my hap AC, crashing every week, although I wasn't graphing memory usage before so I can't be sure there is a leak on mine. I've just set up the graphing to try to see.My hap ac has still memory leak and crashes even in 6.43.2 not really stable
kernel failure in previous boot
out of memory condition was detected
I have the same issue - one of my hAP ac2 is rebooting from time to time (looks like it usually reboots within 24 hours and then works properly till I reboot it manually - however this most likely is pure coincidence). My hAP ac2 also stuck/crashed without rebooting once (it resumed working after unplugging+replugging power).On hAP ac2 is similar problem. Unexpected reboots every 2h to 48h. I sent description of problem to Mikrotik support.
I take my words back. Instability is not a regression from 6.42.9, my hAP ac2 was not completely stable while running 6.42.7 (but much more stable than any of 6.43.x). Two days ago I downgraded to 6.42.9 and so far it's stable.My experience on hAP ac2: very unstable, plenty of watchdog reboots (most of them due to ping timeouts, pinged address is linux server on LAN).
For me instability is regression from 6.42.9.
It's the reply from Mikrotik support:I have the same issue - one of my hAP ac2 is rebooting from time to time (looks like it usually reboots within 24 hours and then works properly till I reboot it manually - however this most likely is pure coincidence). My hAP ac2 also stuck/crashed without rebooting once (it resumed working after unplugging+replugging power).On hAP ac2 is similar problem. Unexpected reboots every 2h to 48h. I sent description of problem to Mikrotik support.
For me the issue started after upgrade from 6.43.1 to 6.43.2. Router was working on 6.43.1 for around 48 hours without a single reboot. Then router was upgraded to 6.43.2 and after around 6 hours it rebooted for the first time.
Has MikroTik support replied to you?
I have stable memory usage on my hAP AC and no VLAN filtering, but unexplained reboots approximately once a week.Appearently there is a memory leak since changelog 6.44beta17 (2018-Oct-04 09:42) states:
"*) bridge - fixed possible memory leak when VLAN filtering is used;"
I had VLAN filtering turned on... on my hap ac
The ones who monitored stable memory usage, did you have VLAN filtering on?
6.42.7 is still the best release for me so far and not 6.42.9.
After upgrading to 6.43.2 from 6.42.7 you can no longer have multiple IPsec peers to the same destination IP but with different source addresses.
Thanks. I totally missed that entry in the changelog.After upgrading to 6.43.2 from 6.42.7 you can no longer have multiple IPsec peers to the same destination IP but with different source addresses.
This regression is said to be fixed in 6.44beta14. Please check the change log in the post here. And I'd expect this kind fix to be merged to 6.42.x later as well.
Same here, repeated on 4 devices , copy paste .npk file, reboot...device DEAD, it make beep beep, but is not live, no winbox, no IP access, no wifi powered on ??Just upgraded RB951Ui-2nD from 6.42.7 to 6.43.2 and it's bricked. Netinstall does not see it.
I've upgraded it from winbox system -> packages -> download and install.
What could be a reason and is there any way to ressurect bricked device?
So I upgraded ROS to 6.43.2 while leaving firmware at 6.42.9 ... instability came back, in 2d10h it rebooted 8 times with average uptime of 7.3 hours. Memory usage (as charted by graphing tool) never raised above 40MB (out of 240MB), so this clearly is not the reason for reboots.I take my words back. Instability is not a regression from 6.42.9, my hAP ac2 was not completely stable while running 6.42.7 (but much more stable than any of 6.43.x). Two days ago I downgraded to 6.42.9 and so far it's stable.My experience on hAP ac2: very unstable, plenty of watchdog reboots (most of them due to ping timeouts, pinged address is linux server on LAN).
For me instability is regression from 6.42.9.
Some statistics:Every time I installed another version of ROS I also upgraded (or downgraded) firmware. Next I'll try to upgrade only ROS to determine if source of instability is ROS or firmware.
- while running 6.43 for 7d21h it rebooted 13 times due to "watchdog cannot ping address W.X.Y.Z, reboting". So it had average uptime of 14.5 hours.
- while running 6.43.1 for 15d4h it rebooted 48 times, so it had average uptime of 7.6 hours
- while running 6.42.9 for 1d21h it never rebooted (current uptime 1d21h16m57s)
N.b.: my hAP ac2 doesn't seem to suffer of memory leaks, memory usage graph shows more or less steady usage of less that 1/4 of available RAM.
Narian, what is the behavior of bricked device ? I have sveral with same problem.Just upgraded RB951Ui-2nD from 6.42.7 to 6.43.2 and it's bricked. Netinstall does not see it.
I've upgraded it from winbox system -> packages -> download and install.
What could be a reason and is there any way to ressurect bricked device?
Same situation, described below:On mipsbe devices with AR8227 switch chipset (100 Mbps 5-port routers like hAP, hAP ac lite, hEX lite, hEX PoE lite, RB951Ui-2Hnd, OmniTik 5) it seems you can damage the routerboard after upgrading it to 6.43.2 and using no-default settings...
Anyone experienced physical Ethernet port problems after upgrade to 6.43.2? Port not linking or port showing false link without any cable connected (and looping traffic)?
Thank you, draguzet!Same situation, described below:
1. After upgrade to 6.43.2 device are unreachable, boot up properly but not working.
2. I try to reset on default, and is passed, but same problem
3. Wifi are powered on with default SSID, after I try to connect to wifi stop working
4. LAN led are green even I disconnect LAN cable from that port
5. Netinstall not working
It is on old Firmware, because first boot are not successful and I did not have a way to upgrade firmware (Routerboard - Upgrade).Thank you, draguzet!Same situation, described below:
1. After upgrade to 6.43.2 device are unreachable, boot up properly but not working.
2. I try to reset on default, and is passed, but same problem
3. Wifi are powered on with default SSID, after I try to connect to wifi stop working
4. LAN led are green even I disconnect LAN cable from that port
5. Netinstall not working
I reported it, Ticket#2018101022006114.
Can you, please, also share if you did firmware (RouterBoot) upgrade on it (System -> Routerboard -> Upgrade)? Or did it stay on older firmware? Also - what is the device model?
BTW - wifi is available, but "not working", the same for me. Reason is - the wifi is in the same bridge as the faulty ports, and is getting a broadcast storm (the ports are doing loop), and after connecting to wifi I'm getting the MNDP broadcast packets multiplied thousands times.
BTW2 - Netinstall not working also for me...
Changes in this release:
*) routerboot - fixed RouterOS booting on devices with particular NAND memory (introduced in v6.43);
The same here. My RB750GL is gone. Bricked. LED is blinking as it should but Netinstall never gets anything from RB750GL.I've just upgraded my good old RB750G from 6.42.7 to 6.43.2 using check for updates and then download and install. The front LEDs of the router went out, as they usually do when it reboots, but they never came back. Winbox (latest version) couldn't connect to the router, no DHCP, no internet, nothing, the router was stuck. I've waited for about 5 minutes and decided to disconnect and reconnect the power cord. The router came back to life. I've checked the package list and version 6.43.2 was installed.
----snip-----
What's new in 6.43.2 (2018-Sep-18 12:12):
Changes in this release:
*) routerboot - fixed RouterOS booting on devices with particular NAND memory (introduced in v6.43);
Try this:The same here. My RB750GL is gone. Bricked. LED is blinking as it should but Netinstall never gets anything from RB750GL.
That's third time in 7 years of working with various MT's but this time I just can't do a thing.
Any sugestion?
/queue tree
add bucket-size=0 max-limit=4500k name=pppoe-out1-UP parent=global
add bucket-size=0 limit-at=3M max-limit=4500k name=QoS_Low-UP parent=\
pppoe-out1-UP
....
/queue type
...
/queue tree
add bucket-size=0 limit-at=500k max-limit=4500k name=QoS_1-UP packet-mark=\
QoS_1-UP parent=pppoe-out1-UP priority=1 queue=fifo-UP-1
.....
/queue tree
add bucket-size=0 max-limit=50M name=pppoe-out1-DW parent=global queue=\
default
add bucket-size=0 limit-at=500k max-limit=50M name=QoS_1-DW packet-mark=\
QoS_1-DW parent=pppoe-out1-DW priority=1 queue=pcq-DW-1
...
Done all of this. As I have few more devices for testing purpose it will wait for having some spare time to fiddle with this but it is annoying problem.Try this:The same here. My RB750GL is gone. Bricked. LED is blinking as it should but Netinstall never gets anything from RB750GL.
That's third time in 7 years of working with various MT's but this time I just can't do a thing.
Any sugestion?
1) Power your device off;
2) Power device on;
3) Press and hold the reset button (hold about 1m and relese reset button).
4) After board appears in Netinstall install version lower than 6.43.x !! (try different waiting time while holding reset button, 1 minute, 2 minute...)
I'm really strange when the Mikrotik will remove the 6.43.2 version and declare it unstable, since obviously the different boards are falling after the upgrade!
TTL serial. Get a TTL serial to USB converter from aliexpress or similar, and you can connect it to a PC and watch the boot procedure.are those 3 hidden spots with Rx, Tx, and GND marking real serial port or just ...
Speak about TTL serial to USB (and many serial to USB), beware that of them are using PL2303 series chipset and some of them are using fake PL2303 chipset, the latest driver and win10 driver will refuse to work with them. If you look for a Serial to USB cable better check if can work in win10 without manually install any driver.TTL serial. Get a TTL serial to USB converter from aliexpress or similar, and you can connect it to a PC and watch the boot procedure.are those 3 hidden spots with Rx, Tx, and GND marking real serial port or just ...
(or even flash new firmware over serial when you are patient)
Could be, I never use Windows, and in Linux they all work without problem...beware that of them are using PL2303 series chipset and some of them are using fake PL2303 chipset, the latest driver and win10 driver will refuse to work with them. If you look for a Serial to USB cable better check if can work in win10 without manually install any driver.
I have a fake PL2302 cable which damage my old wifi APCould be, I never use Windows, and in Linux they all work without problem...beware that of them are using PL2303 series chipset and some of them are using fake PL2303 chipset, the latest driver and win10 driver will refuse to work with them. If you look for a Serial to USB cable better check if can work in win10 without manually install any driver.
Ah, nice suggestion but, all my laptops are Pro type and I have real serial ports on themTTL serial. Get a TTL serial to USB converter from aliexpress or similar, and you can connect it to a PC and watch the boot procedure.are those 3 hidden spots with Rx, Tx, and GND marking real serial port or just ...
(or even flash new firmware over serial when you are patient)
The key here is that TTL serial and RS232 are somewhat different beasts- they differ at least in the voltage levels (while on the protocol level they must be compatible). You can easily damage TTL serial port by directly connecting it to a standard serial port on your laptop.Ah, nice suggestion but, all my laptops are Pro type and I have real serial ports on them