Could you elaborate please ?*) snmp - fixed health related OID polling (introduced in v6.46);
And hope to see this in 6.47 finally !I opened #2019032822004818 a few months ago, many SNMP hardware OIDs are missing for the CCR1072, compared to what Winbox shows :
- Board temperature
- Board temparature 2
- Fan speed 3
- Fan speed 4
- PSU1 status (should be OID .15 (*))
- PSU2 status (should be OID .16 (*))
(*) as seen on other models such as the CRS317-1G-16S+.
We are then clearly at risk with our CCR1072-1G-8S+, not being able to monitor all their hardware components, which is a rather tricky situation for core devices.
Does this come with new associated MIBs / OID's? Or more for polling via API?In v6.47beta there is a new menu added - "/system health gauges". You should use this for polling "Health" related data from all the RouterBOARDs.
shure on xmas, but you don't will get any year....Will we already get MU-MIMO support within 6.47beta release?
But some of your support confirmed it here, post #5ivicask - Have you reported this problem to support@mikrotik.com or https://help.mikrotik.com/servicedesk/c ... on=portals ?? We are not aware of any RoMON problems;
Testing OIDs...
14.12.2019 23:31:27 (98726 ms) : SNMP Datatype: ASN_UNSIGNED
Test 1.3.6.1.2.1.4.24.3.0: value=3 #
14.12.2019 23:31:28 (99944 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.1.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:30 (101377 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.1.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:31 (102658 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.1.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:32 (103789 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.2.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:33 (104495 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.2.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:33 (105034 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.2.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:35 (106269 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.3.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:36 (107475 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.3.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:37 (108783 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.3.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:39 (110254 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.4.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:40 (111267 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.4.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:40 (111839 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.4.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:41 (112396 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.5.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:42 (113092 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.5.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:42 (113881 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.5.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:43 (114760 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.6.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:44 (115728 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.6.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:45 (116158 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.6.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:45 (116616 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.7.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:46 (117546 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.7.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:47 (118558 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.7.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:48 (119709 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.8.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:50 (121071 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.8.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:51 (122398 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.8.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:52 (123440 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.10.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:53 (124483 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.10.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:54 (125600 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.10.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:55 (126839 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.11.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:56 (127828 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.11.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:58 (129141 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.11.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:58 (129730 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.12.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:31:59 (130054 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.12.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:31:59 (130798 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.12.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:32:00 (131935 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.13.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:32:01 (132994 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.13.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:32:03 (134092 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.13.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:32:04 (135693 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.14.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:32:05 (136548 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.14.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:32:06 (137167 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.14.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:32:06 (137965 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.15.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:32:07 (138930 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.15.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:32:09 (140092 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.15.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
14.12.2019 23:32:10 (141385 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.16.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
14.12.2019 23:32:11 (142697 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.16.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
14.12.2019 23:32:13 (144062 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.16.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
Testing OIDs...
14.12.2019 23:34:53 (6895 ms) : SNMP Datatype: ASN_UNSIGNED
Test 1.3.6.1.2.1.4.24.3.0: value=3 #
14.12.2019 23:34:53 (7012 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.1.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0.0.0.0 #
14.12.2019 23:34:53 (7128 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.1.10.10.0.0.255.255.252.0.0.10.10.0.70: value=10.10.0.0 #
14.12.2019 23:34:53 (7245 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.1.192.168.11.0.255.255.255.0.0.192.168.11.1: value=192.168.11.0 #
14.12.2019 23:34:53 (7361 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.2.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0.0.0.0 #
14.12.2019 23:34:53 (7620 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.2.10.10.0.0.255.255.252.0.0.10.10.0.70: value=255.255.252.0 #
14.12.2019 23:34:54 (7937 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.2.192.168.11.0.255.255.255.0.0.192.168.11.1: value=255.255.255.0 #
14.12.2019 23:34:54 (8054 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.3.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0 #
14.12.2019 23:34:54 (8172 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.3.10.10.0.0.255.255.252.0.0.10.10.0.70: value=0 #
14.12.2019 23:34:54 (8288 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.3.192.168.11.0.255.255.255.0.0.192.168.11.1: value=0 #
14.12.2019 23:34:54 (8447 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.4.0.0.0.0.0.0.0.0.0.10.10.0.1: value=10.10.0.1 #
14.12.2019 23:34:55 (8753 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.4.10.10.0.0.255.255.252.0.0.10.10.0.70: value=10.10.0.70 #
14.12.2019 23:34:55 (8878 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.4.192.168.11.0.255.255.255.0.0.192.168.11.1: value=192.168.11.1 #
14.12.2019 23:34:55 (8997 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.5.0.0.0.0.0.0.0.0.0.10.10.0.1: value=11 #
14.12.2019 23:34:55 (9161 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.5.10.10.0.0.255.255.252.0.0.10.10.0.70: value=11 #
14.12.2019 23:34:55 (9375 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.5.192.168.11.0.255.255.255.0.0.192.168.11.1: value=12 #
14.12.2019 23:34:55 (9626 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.6.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4 #
14.12.2019 23:34:56 (9831 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.6.10.10.0.0.255.255.252.0.0.10.10.0.70: value=3 #
14.12.2019 23:34:56 (9979 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.6.192.168.11.0.255.255.255.0.0.192.168.11.1: value=3 #
14.12.2019 23:34:56 (10094 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.7.0.0.0.0.0.0.0.0.0.10.10.0.1: value=3 #
14.12.2019 23:34:56 (10210 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.7.10.10.0.0.255.255.252.0.0.10.10.0.70: value=2 #
14.12.2019 23:34:56 (10325 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.7.192.168.11.0.255.255.255.0.0.192.168.11.1: value=2 #
14.12.2019 23:34:56 (10581 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.8.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0 #
14.12.2019 23:34:57 (10794 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.8.10.10.0.0.255.255.252.0.0.10.10.0.70: value=0 #
14.12.2019 23:34:57 (10907 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.8.192.168.11.0.255.255.255.0.0.192.168.11.1: value=0 #
14.12.2019 23:34:57 (11043 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.10.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0 #
14.12.2019 23:34:57 (11156 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.10.10.10.0.0.255.255.252.0.0.10.10.0.70: value=0 #
14.12.2019 23:34:57 (11270 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.10.192.168.11.0.255.255.255.0.0.192.168.11.1: value=0 #
14.12.2019 23:34:57 (11384 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.11.0.0.0.0.0.0.0.0.0.10.10.0.1: value=1 #
14.12.2019 23:34:57 (11617 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.11.10.10.0.0.255.255.252.0.0.10.10.0.70: value=0 #
14.12.2019 23:34:58 (11814 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.11.192.168.11.0.255.255.255.0.0.192.168.11.1: value=0 #
14.12.2019 23:34:58 (11918 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.12.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4294967295 #
14.12.2019 23:34:58 (12132 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.12.10.10.0.0.255.255.252.0.0.10.10.0.70: value=4294967295 #
14.12.2019 23:34:58 (12236 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.12.192.168.11.0.255.255.255.0.0.192.168.11.1: value=4294967295 #
14.12.2019 23:34:58 (12342 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.13.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4294967295 #
14.12.2019 23:34:58 (12587 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.13.10.10.0.0.255.255.252.0.0.10.10.0.70: value=4294967295 #
14.12.2019 23:34:59 (12785 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.13.192.168.11.0.255.255.255.0.0.192.168.11.1: value=4294967295 #
14.12.2019 23:34:59 (12889 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.14.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4294967295 #
14.12.2019 23:34:59 (12999 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.14.10.10.0.0.255.255.252.0.0.10.10.0.70: value=4294967295 #
14.12.2019 23:34:59 (13103 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.14.192.168.11.0.255.255.255.0.0.192.168.11.1: value=4294967295 #
14.12.2019 23:34:59 (13208 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.15.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4294967295 #
14.12.2019 23:34:59 (13312 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.15.10.10.0.0.255.255.252.0.0.10.10.0.70: value=4294967295 #
14.12.2019 23:34:59 (13458 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.15.192.168.11.0.255.255.255.0.0.192.168.11.1: value=4294967295 #
14.12.2019 23:35:00 (13755 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.16.0.0.0.0.0.0.0.0.0.10.10.0.1: value=1 #
14.12.2019 23:35:00 (13992 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.16.10.10.0.0.255.255.252.0.0.10.10.0.70: value=1 #
14.12.2019 23:35:00 (14193 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.16.192.168.11.0.255.255.255.0.0.192.168.11.1: value=1 #
viewtopic.php?f=2&t=116856#p741203I opened #2019032822004818 a few months ago, many SNMP hardware OIDs are missing for the CCR1072, compared to what Winbox shows
In v6.47beta there is a new menu added - "/system health gauges". You should use this for polling "Health" related data from all the RouterBOARDs.
Does this come with new associated MIBs / OID's? Or more for polling via API?
Interesting. And if available through SNMP, will these "gauges" give the PSUs status (which are for now missing on CCR1072 as stated above) ?
$ snmpwalk ... .1.3.6.1.4.1.14988.1.1.3
.1.3.6.1.4.1.14988.1.1.3.9.0 = STRING: "n/a"
.1.3.6.1.4.1.14988.1.1.3.11.0 = INTEGER: 370
.1.3.6.1.4.1.14988.1.1.3.12.0 = INTEGER: 435
.1.3.6.1.4.1.14988.1.1.3.14.0 = INTEGER: 1000
.1.3.6.1.4.1.14988.1.1.3.17.0 = Gauge32: 4169
.1.3.6.1.4.1.14988.1.1.3.18.0 = Gauge32: 4182
.1.3.6.1.4.1.14988.1.1.3.100.1.16 = STRING: "power-consumption"
.1.3.6.1.4.1.14988.1.1.3.100.1.17 = STRING: "cpu-temperature"
.1.3.6.1.4.1.14988.1.1.3.100.1.7001 = STRING: "fan1-speed"
.1.3.6.1.4.1.14988.1.1.3.100.1.7002 = STRING: "fan2-speed"
.1.3.6.1.4.1.14988.1.1.3.100.1.7003 = STRING: "fan3-speed"
.1.3.6.1.4.1.14988.1.1.3.100.1.7004 = STRING: "fan4-speed"
.1.3.6.1.4.1.14988.1.1.3.100.1.7101 = STRING: "board-temperature1"
.1.3.6.1.4.1.14988.1.1.3.100.1.7102 = STRING: "board-temperature2"
.1.3.6.1.4.1.14988.1.1.3.100.1.7201 = STRING: "psu1-voltage"
.1.3.6.1.4.1.14988.1.1.3.100.1.7202 = STRING: "psu2-voltage"
.1.3.6.1.4.1.14988.1.1.3.100.1.7301 = STRING: "psu1-current"
.1.3.6.1.4.1.14988.1.1.3.100.1.7302 = STRING: "psu2-current"
.1.3.6.1.4.1.14988.1.1.3.100.2.16 = Gauge32: 435
.1.3.6.1.4.1.14988.1.1.3.100.2.17 = Gauge32: 37
.1.3.6.1.4.1.14988.1.1.3.100.2.7001 = Gauge32: 4169
.1.3.6.1.4.1.14988.1.1.3.100.2.7002 = Gauge32: 4182
.1.3.6.1.4.1.14988.1.1.3.100.2.7003 = Gauge32: 4182
.1.3.6.1.4.1.14988.1.1.3.100.2.7004 = Gauge32: 4222
.1.3.6.1.4.1.14988.1.1.3.100.2.7101 = Gauge32: 25
.1.3.6.1.4.1.14988.1.1.3.100.2.7102 = Gauge32: 25
.1.3.6.1.4.1.14988.1.1.3.100.2.7201 = Gauge32: 0
.1.3.6.1.4.1.14988.1.1.3.100.2.7202 = Gauge32: 121
.1.3.6.1.4.1.14988.1.1.3.100.2.7301 = Gauge32: 0
.1.3.6.1.4.1.14988.1.1.3.100.2.7302 = Gauge32: 36
.1.3.6.1.4.1.14988.1.1.3.100.3.16 = INTEGER: 5
.1.3.6.1.4.1.14988.1.1.3.100.3.17 = INTEGER: 1
.1.3.6.1.4.1.14988.1.1.3.100.3.7001 = INTEGER: 2
.1.3.6.1.4.1.14988.1.1.3.100.3.7002 = INTEGER: 2
.1.3.6.1.4.1.14988.1.1.3.100.3.7003 = INTEGER: 2
.1.3.6.1.4.1.14988.1.1.3.100.3.7004 = INTEGER: 2
.1.3.6.1.4.1.14988.1.1.3.100.3.7101 = INTEGER: 1
.1.3.6.1.4.1.14988.1.1.3.100.3.7102 = INTEGER: 1
.1.3.6.1.4.1.14988.1.1.3.100.3.7201 = INTEGER: 3
.1.3.6.1.4.1.14988.1.1.3.100.3.7202 = INTEGER: 3
.1.3.6.1.4.1.14988.1.1.3.100.3.7301 = INTEGER: 4
.1.3.6.1.4.1.14988.1.1.3.100.3.7302 = INTEGER: 4
$ snmpwalk ... .1.3.6.1.4.1.14988.1.1.3
.1.3.6.1.4.1.14988.1.1.3.9.0 = STRING: "n/a"
.1.3.6.1.4.1.14988.1.1.3.10.0 = INTEGER: 270
.1.3.6.1.4.1.14988.1.1.3.14.0 = INTEGER: 1400
.1.3.6.1.4.1.14988.1.1.3.100.1.13 = STRING: "voltage"
.1.3.6.1.4.1.14988.1.1.3.100.1.14 = STRING: "temperature"
.1.3.6.1.4.1.14988.1.1.3.100.2.13 = Gauge32: 238
.1.3.6.1.4.1.14988.1.1.3.100.2.14 = Gauge32: 27
.1.3.6.1.4.1.14988.1.1.3.100.3.13 = INTEGER: 3
.1.3.6.1.4.1.14988.1.1.3.100.3.14 = INTEGER: 1
Installed 6.47beta8 and works fine now, thanks!Guscht You need to send supout.rif file to support@mikrotik.com and brief problem description. We are currently unable to reproduce such issue.
ivicask Have you tried the 6.46 stable and 6.47 testing versions? RoMoN works for me now. Make sure both the end user and the agent is updated. If it is not working in the latest versions, please open a support ticket with supout.rif file from your routers.
Hello. You have to consider that a lot of devices are unable to support ros 7 because of flash disk limitations. I think that they should develop ros 6 for a loong time.I am curious - how many more 6.4x versions are expected given that 7 is now in beta? Is 6.47 or 6.48 possibly the last RouterOS 6.x? Or will there be a longer period of overlap while 7.x is released and 6.x is still being developed?
Just testing this...In v6.47beta there is a new menu added - "/system health gauges". You should use this for polling "Health" related data from all the RouterBOARDs.
[admin@MikroTik] /system health gauges> :put [ :typeof [ get [ find where type="V" ] value ] ]
str
[admin@Mikrotik] /system health gauges> :put [ get [ find where type="V" ] value ]
50.3
AWESOME, So good to see this :)*) winbox - automatically refresh "Packets" table when new packets are captured by "Tools/Packet Sniffer";
But still developers can easily show current PHY-CellID because it is in hex in at command response:*) lte - fixed "cell-monitor" on R11e-LTE in 3G mode;
*) lte - fixed "earfcn" reporting on R11e-LTE6 in UMTS and GSM modes;
/log print where message~"CREG: 1"
lte,async,raw SXTR__LTE: $CREG: 1,"2b01","047ff4fb",2,"021"
# $CREG: 1,"LAC hex","CellID hex",UMTS type,"PHY-CellID hex"
/interface lte at-chat lte1 input="at*cell=2,2,,3030,33"
What this means?*) lte - report only valid info parameters on R11e-LTE6;
16:46:50 echo: system,error,critical login failure for user marcin.przysowa from 192.168.88.253 by romon 00:00:00:00:00:01 via winbox
22:25:22 warning denied winbox/dude connect from 192.168.91.253
Socks5 with radius auth? maybe?Version 6.47beta19 has been released.
Before an upgrade:
1) Remember to make backup/export files before an upgrade and save them on another storage device;
2) Make sure the device will not lose power during upgrade process;
3) Device has enough free storage space for all RouterOS packages to be downloaded.
What's new in 6.47beta19 (2020-Jan-09 08:08):
MAJOR CHANGES IN v6.47:
----------------------
!) socks - added support for SOCKS5 (RFC 1928);
----------------------
Changes in this release:
!) socks - added support for SOCKS5 (RFC 1928);
*) bonding - improved slave interface MAC address handling;
*) bonding - prefer primary slave MAC address for bonding interface;
*) bridge - added logging message when a host MAC address is learned on a different bridge port;
*) chr - improved stability when changing ARP modes on e1000 type adapters;
*) console - prevent "flash" directory from being removed (introduced in v6.46);
*) console - updated copyright notice;
*) crs305 - disable optical SFP/SFP+ module Tx power after disabling SFP+ interface;
*) defconf - fixed "caps-mode" not initialized properly after resetting;
*) defconf - fixed default configuration loading on RBwAPG-60adkit (introduced in v6.46);
*) discovery - do not send CDP and LLDP packets on interfaces that does not have MAC address;
*) discovery - do not send discovery packets on inactive bonding slave interfaces;
*) discovery - do not send discovery packets on interfaces that are blocked by STP;
*) dot1x - added "radius-mac-format" parameter (CLI only);
*) health - added "gauges" submenu with SNMP OID reporting;
*) lora - added "ru-864-mid" channel plan;
*) lora - fixed packet sending when using "antenna-gain" higher than 5dB;
*) lora - improved immediate packet delivery;
*) lte - do not allow running "scan" on R11e-4G;
*) lte - fixed "band" value setting when configuration is reset on R11e-4G;
*) lte - fixed "cell-monitor" on R11e-LTE in 3G mode;
*) lte - fixed "earfcn" reporting on R11e-LTE6 in UMTS and GSM modes;
*) lte - improved all APN session activation after disconnect on R11e-LTE;
*) lte - report only valid info parameters on R11e-LTE6;
*) lte - use APN from network when blank APN used on R11e-4G;
*) ppp - fixed minor typo in "ppp-client" monitor;
*) qsfp - do not report bogus monitoring readouts on modules without DDMI support;
*) qsfp - improved module monitoring readouts for DAC and break-out cables;
*) routerboard - added "mode-button" support for RBcAP2nD;
*) sniffer - allow setting port for "streaming-server";
*) snmp - added "dot1qTpFdbTable" OID reporting for Q-BRIDGE-MIB;
*) snmp - improved OID policy checking and error reporting on "set" command;
*) supout - added "dot1x" section to supout files;
*) system - correctly handle Generic Receive Offloading (GRO) for MPLS traffic;
*) system - fixed "*.auto.rsc" file execution (introduced in v6.46);
*) system - fixed "check-installation" on PowerPC devices (introduced in v6.46);
*) traceroute - improved stability when invalid packet is received;
*) traffic-generator - improved memory handling on CHR;
*) webfig - allow skin designing without "ftp" and "sensitive" policies;
*) webfig - fixed "skins" saving to "flash" directory if it exists (introduced in v6.46);
*) winbox - automatically refresh "Packets" table when new packets are captured by "Tools/Packet Sniffer";
*) winbox - fixed "Default Route Distance" default value when creating new LTE APN;
*) winbox - removed duplicate "join-eui", "dev-eui", "counter", "chain", "size" and "payload" parameters under "Lora/Traffic";
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as expected or after crash.
Testing OIDs...
16.01.2020 12:01:28 (1401 ms) : SNMP Datatype: ASN_UNSIGNED
Test 1.3.6.1.2.1.4.24.3.0: value=3 #
16.01.2020 12:01:28 (1433 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.1.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:28 (1467 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.1.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:28 (1503 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.1.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:28 (1532 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.2.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:28 (1560 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.2.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:28 (1587 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.2.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1617 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.3.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1649 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.3.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1680 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.3.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1710 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.4.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1740 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.4.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1764 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.4.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1791 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.5.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1818 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.5.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1851 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.5.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1880 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.6.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1906 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.6.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1930 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.6.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1958 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.7.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (1981 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.7.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2008 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.7.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2033 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.8.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2062 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.8.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2086 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.8.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2112 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.10.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2137 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.10.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2166 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.10.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2213 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.11.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2233 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.11.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2257 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.11.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2284 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.12.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2308 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.12.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2332 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.12.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2357 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.13.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2379 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.13.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2405 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.13.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2426 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.14.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2449 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.14.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2474 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.14.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2495 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.15.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2524 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.15.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2543 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.15.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2565 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.16.0.0.0.0.0.0.0.0.0.10.10.0.1: value=No such object (SNMP error # 222) #
16.01.2020 12:01:29 (2589 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.16.10.10.0.0.255.255.252.0.0.10.10.0.70: value=No such object (SNMP error # 222) #
16.01.2020 12:01:30 (2614 ms) : SNMP Datatype: SNMP_EXCEPTION_NOSUCHOBJECT
Test 1.3.6.1.2.1.4.24.4.1.16.192.168.11.0.255.255.255.0.0.192.168.11.1: value=No such object (SNMP error # 222) #
Testing OIDs...
16.01.2020 12:06:09 (1173 ms) : SNMP Datatype: ASN_UNSIGNED
Test 1.3.6.1.2.1.4.24.3.0: value=3 #
16.01.2020 12:06:09 (1200 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.1.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0.0.0.0 #
16.01.2020 12:06:09 (1226 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.1.10.10.0.0.255.255.252.0.0.10.10.0.70: value=10.10.0.0 #
16.01.2020 12:06:09 (1255 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.1.192.168.11.0.255.255.255.0.0.192.168.11.1: value=192.168.11.0 #
16.01.2020 12:06:09 (1283 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.2.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0.0.0.0 #
16.01.2020 12:06:09 (1304 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.2.10.10.0.0.255.255.252.0.0.10.10.0.70: value=255.255.252.0 #
16.01.2020 12:06:09 (1328 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.2.192.168.11.0.255.255.255.0.0.192.168.11.1: value=255.255.255.0 #
16.01.2020 12:06:09 (1354 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.3.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0 #
16.01.2020 12:06:09 (1383 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.3.10.10.0.0.255.255.252.0.0.10.10.0.70: value=0 #
16.01.2020 12:06:09 (1405 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.3.192.168.11.0.255.255.255.0.0.192.168.11.1: value=0 #
16.01.2020 12:06:09 (1430 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.4.0.0.0.0.0.0.0.0.0.10.10.0.1: value=10.10.0.1 #
16.01.2020 12:06:09 (1453 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.4.10.10.0.0.255.255.252.0.0.10.10.0.70: value=10.10.0.70 #
16.01.2020 12:06:09 (1480 ms) : SNMP Datatype: ASN_IPADDRESS
Test 1.3.6.1.2.1.4.24.4.1.4.192.168.11.0.255.255.255.0.0.192.168.11.1: value=192.168.11.1 #
16.01.2020 12:06:09 (1504 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.5.0.0.0.0.0.0.0.0.0.10.10.0.1: value=11 #
16.01.2020 12:06:09 (1529 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.5.10.10.0.0.255.255.252.0.0.10.10.0.70: value=11 #
16.01.2020 12:06:09 (1554 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.5.192.168.11.0.255.255.255.0.0.192.168.11.1: value=12 #
16.01.2020 12:06:09 (1581 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.6.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4 #
16.01.2020 12:06:09 (1601 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.6.10.10.0.0.255.255.252.0.0.10.10.0.70: value=3 #
16.01.2020 12:06:09 (1624 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.6.192.168.11.0.255.255.255.0.0.192.168.11.1: value=3 #
16.01.2020 12:06:09 (1648 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.7.0.0.0.0.0.0.0.0.0.10.10.0.1: value=3 #
16.01.2020 12:06:09 (1670 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.7.10.10.0.0.255.255.252.0.0.10.10.0.70: value=2 #
16.01.2020 12:06:09 (1697 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.7.192.168.11.0.255.255.255.0.0.192.168.11.1: value=2 #
16.01.2020 12:06:09 (1717 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.8.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0 #
16.01.2020 12:06:09 (1740 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.8.10.10.0.0.255.255.252.0.0.10.10.0.70: value=0 #
16.01.2020 12:06:09 (1763 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.8.192.168.11.0.255.255.255.0.0.192.168.11.1: value=0 #
16.01.2020 12:06:09 (1785 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.10.0.0.0.0.0.0.0.0.0.10.10.0.1: value=0 #
16.01.2020 12:06:09 (1812 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.10.10.10.0.0.255.255.252.0.0.10.10.0.70: value=0 #
16.01.2020 12:06:09 (1835 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.10.192.168.11.0.255.255.255.0.0.192.168.11.1: value=0 #
16.01.2020 12:06:09 (1857 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.11.0.0.0.0.0.0.0.0.0.10.10.0.1: value=1 #
16.01.2020 12:06:09 (1879 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.11.10.10.0.0.255.255.252.0.0.10.10.0.70: value=0 #
16.01.2020 12:06:09 (1900 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.11.192.168.11.0.255.255.255.0.0.192.168.11.1: value=0 #
16.01.2020 12:06:10 (1927 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.12.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4294967295 #
16.01.2020 12:06:10 (1951 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.12.10.10.0.0.255.255.252.0.0.10.10.0.70: value=4294967295 #
16.01.2020 12:06:10 (1974 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.12.192.168.11.0.255.255.255.0.0.192.168.11.1: value=4294967295 #
16.01.2020 12:06:10 (1997 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.13.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4294967295 #
16.01.2020 12:06:10 (2017 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.13.10.10.0.0.255.255.252.0.0.10.10.0.70: value=4294967295 #
16.01.2020 12:06:10 (2044 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.13.192.168.11.0.255.255.255.0.0.192.168.11.1: value=4294967295 #
16.01.2020 12:06:10 (2068 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.14.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4294967295 #
16.01.2020 12:06:10 (2091 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.14.10.10.0.0.255.255.252.0.0.10.10.0.70: value=4294967295 #
16.01.2020 12:06:10 (2115 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.14.192.168.11.0.255.255.255.0.0.192.168.11.1: value=4294967295 #
16.01.2020 12:06:10 (2138 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.15.0.0.0.0.0.0.0.0.0.10.10.0.1: value=4294967295 #
16.01.2020 12:06:10 (2190 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.15.10.10.0.0.255.255.252.0.0.10.10.0.70: value=4294967295 #
16.01.2020 12:06:10 (2210 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.15.192.168.11.0.255.255.255.0.0.192.168.11.1: value=4294967295 #
16.01.2020 12:06:10 (2239 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.16.0.0.0.0.0.0.0.0.0.10.10.0.1: value=1 #
16.01.2020 12:06:10 (2261 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.16.10.10.0.0.255.255.252.0.0.10.10.0.70: value=1 #
16.01.2020 12:06:10 (2285 ms) : SNMP Datatype: ASN_INTEGER
Test 1.3.6.1.2.1.4.24.4.1.16.192.168.11.0.255.255.255.0.0.192.168.11.1: value=1 #
Anyone @Mikrotik working on that bug?as no UPS-bugfixing is listed I tested anyhow:
UPS still not working with APC SMT750I, SMT1000I, SMT1500I (to name just 3 models). All of them connected via their USB-port. They all get identified, but only a few parameters get transferred to the routerboard. Tested using CRS125.
Is there anything you guys @ mikrotik want me to further check out?
Same thing finally for the FANs.One thing perhaps following my post above.
We have the PSUs' voltage and current in these new gauges.
We could then monitor PSUs checking for example that voltage >12.
Will you however add a psu-state OID ?
This might sound strange, but I need to not use the servers received.*) dns - use only servers received from IKEv2 server when present;
Where are that inline bar graphs? I cannot found it. This will be a new feature?Version 6.47beta32
*) winbox - added support for inline bar graphs for LTE signal values;
add action=reject chain=output comment="Rejecting request made by the router itself, if not to the local DNS server" dst-address=!192.168.88.2 dst-port=53 log-prefix="DNS unreach" protocol=udp reject-with=icmp-admin-prohibited src-address=192.168.88.1
*) dns - use only servers received from IKEv2 server when present;
IMHO that's a bad change. I have an open wifi network for guests, client traffic is routed via IKEv2 provider. I do not necessarily trust this provider - I just want to hide my public IP address for unknown clients.*) dns - use only servers received from IKEv2 server when present;
*) bonding - improved slave interface MAC address handling;
*) bonding - prefer primary slave MAC address for bonding interface;
/interface bonding remove Modem1;
/interface bonding add name=Modem1 mode=802.3ad slaves=ether7,ether8 transmit-hash-policy=layer-3-and-4;
/ip dhcp-client set 0 interface=Modem1;
/interface list member add interface=Modem1 list=WAN;
Hello,What's new in 6.47beta32 (2020-Feb-10 11:45):
Why did you remove the "antenna gain" line in Winbox for wireless???? To fix the ETSI not imposing the minimum. ????
Well I knew ETSI regulatory domain forgot to check the minimal antenna gain. Countries did impose the minimal gain.
As setting TX power is difficult with the few left over options, the method explained in this forum several times is to increase the antenna gain, to reduce the transmit power.
"All rates fixed" is no good as the radio cannot follow for the higher MCS encodings. And "manual" and "card rates" is not allowed.
The only other oprion is not to set the country ("no_country_set") and go fully manual." What an improvement! Forget regulations, you are on your own now!"
Why did you remove the "antenna gain" line in Winbox ???? To fix the ETSI not imposing the minimum.? It was the only practical way to reduce the TX power, not to heat up the radio, and always be legal
Can you please tell us then how to reduce the TX power, like all experts in Wifi give as advice, on those devices using the GUI. Most settings don't work at all or you will cut off things that you didn't want (e.g. all fixed). Changing the antenna gain was many times reported on this forum as the easiest , safest and the better method, to be some defined value below the legal and the device technical limits. I'm one of the persons that repeated this solution to others.Hello,What's new in 6.47beta32 (2020-Feb-10 11:45):
Why did you remove the "antenna gain" line in Winbox for wireless???? To fix the ETSI not imposing the minimum. ????
Well I knew ETSI regulatory domain forgot to check the minimal antenna gain. Countries did impose the minimal gain.
As setting TX power is difficult with the few left over options, the method explained in this forum several times is to increase the antenna gain, to reduce the transmit power.
"All rates fixed" is no good as the radio cannot follow for the higher MCS encodings. And "manual" and "card rates" is not allowed.
The only other oprion is not to set the country ("no_country_set") and go fully manual." What an improvement! Forget regulations, you are on your own now!"
Why did you remove the "antenna gain" line in Winbox ???? To fix the ETSI not imposing the minimum.? It was the only practical way to reduce the TX power, not to heat up the radio, and always be legal
This line was removed from Winbox GUI only for wireless devices with built-in antennas, due to the fact that changing this setting did not affect the performance in any way. Please note that RouterOS CLI shows all of the available options (not only the ones that can be used on the router). For example, if you type band=<tab> on router with 2 GHz wireless, you will be able to see also 5 GHz bands.
Thank you for eliminating the automatic change to wireless mode = "station-wds" when an AP is identified as a routerboard device.*) quickset - use "station-wds" mode when connecting to AP with RouterOS flag;
Of course you can go to the CLI. You can always go to the CLI for non-trivial, special, expert and exceptional settings. And we are "blind" anyway , as the "current TX powers" is not filled in. Or should we use the CLI for that as well???
/interface wireless info allowed-channels YOUR_WIFI_IF
Ha, that was fast. Thanks!*) ssh - added support for RSA keys with SHA256 hash (RFC8332);
Looks like this breaks public key authentication. If I remove ssh-rsa from host key algorithms I am prompted for a password.Ha, that was fast. Thanks!*) ssh - added support for RSA keys with SHA256 hash (RFC8332);
Will give it a try now.
This is configurable now? Where to find this setting?*) dns - added support for exclusive dynamic DNS server usage from IPsec;
Found it!This is configurable now? Where to find this setting?*) dns - added support for exclusive dynamic DNS server usage from IPsec;
/ ip ipsec mode-config set use-responder-dns=no [ find ... ]
/ ip ipsec mode-config set use-responder-dns=no [ find ]
The old icons probably did need a refresh, but the new extra bland icons are....bland:*) webfig - updated icon design;
*) winbox - updated icon design;
I bet the reason is connected with "The Dude server must be updated to monitor v6.47beta30+ RouterOS type devices."can no longer login using the MikroTik Android application...
Can you please explain this a bit? Any example use cases? Does it also affect the forwarding CPU spikes and lost packets on ARM when The Dude is running?*) system - improved system stability when receiving/sending TCP traffic on multicore devices;
What SSH client do you use? Try to disable host key algorithm rsa-sha2-256 for now.Damn, I should have checked the forum before installing 6.47beta35. I can no longer login via ssh (key/password). I cannot test winbox because it is disabled. But I assume it would fail too. The device is HAP AC2.
ssh -oHostKeyAlgorithms=-rsa-sha2-256 admin@mikrotik
With the new 1.3.11 version in the store, the issue is resolved. Thanks fixing the Android version so it works again with 6.47 Beta.Yes, there is a known issue with latest MikroTik smartphone app on Android. We are working on it.
iOS works fine.
Actually it introduced more issues (on Android 9 anyway), when you try to change certain drop down options they won't pop-up when in portrait and won't show up in landscape.With the new 1.3.11 version in the store, the issue is resolved. Thanks fixing the Android version so it works again with 6.47 Beta.
Agreed. New icon set is horrendousHi,
can you bring back the old icons please?
I don't want to offend any designer, but the new ones are bad...
at least add an option to update some old_icon_set file!
look at the difference yourself, is this an improvement?
especially the addresses and routes icons (on the right) are terrible!
Those new are just UGLY, one color type.Agreed. New icon set is horrendous
Yes! Bring our colors back! It is much easier to find something on a glance when it is different from its neighbors...Those new are just UGLY, one color type.Agreed. New icon set is horrendous
Same here, can't use Royal TSX Secure Gateway with ssh keys anymore:Looks like this breaks public key authentication. If I remove ssh-rsa from host key algorithms I am prompted for a password.Ha, that was fast. Thanks!*) ssh - added support for RSA keys with SHA256 hash (RFC8332);
Will give it a try now.
Password login succeeds (if always-allow-password-login is enabled).
This is fixed with 6.46.4 stable, so I guess it will be ok with next beta.Same here, can't use Royal TSX Secure Gateway with ssh keys anymore:
I am on 6.46.4 stable. I came from 6.46.1. now i have the issue. I am on confused.This is fixed with 6.46.4 stable, so I guess it will be ok with next beta.Same here, can't use Royal TSX Secure Gateway with ssh keys anymore:
With openssh and RouterOS 6.46.4 everything works fine, even if I disable host key algorithm ssh-rsa, which forces rsa-sha2-256.I am on 6.46.4 stable. I came from 6.46.1. now i have the issue. I am on confused.This is fixed with 6.46.4 stable, so I guess it will be ok with next beta.Same here, can't use Royal TSX Secure Gateway with ssh keys anymore:
+1Yes! Bring our colors back! It is much easier to find something on a glance when it is different from its neighbors...Those new are just UGLY, one color type.Agreed. New icon set is horrendous
Why ?DoH is a nightmare and I don't understand why it is supported by Mikrotik.
thanks for reply now it's verified but could not resolve any dns nameTry setting https://10.5.51.5 as the server.
DoH is weapon and not a tool. You should use that in countries that are not respecting freedoms or if ISP that manipulate DNS resolves.Why ?DoH is a nightmare and I don't understand why it is supported by Mikrotik.
You can ingnore verify but then how do you know you are talking to the correct DNS server? DoH need TLS and so a verify.Try setting https://10.5.51.5 as the server.
How can it verify only by a IP address?thanks for reply now it's verified but could not resolve any dns nameTry setting https://10.5.51.5 as the server.
OMG! I don't belive it! )!) dns - added client side support for DNS over HTTPS (DoH) (RFC8484);
Certificates can have subject alternative name with ip address.How can it verify only by a IP address?thanks for reply now it's verified but could not resolve any dns nameTry setting https://10.5.51.5 as the server.
/system logging add topics=dns
tested with public DoH server but nothingEnable DNS logs, it should provide all necessary information for troubleshooting. I tested the DoH implementation with various publicly available servers and could not find any issues. If there are any, please let us know.
Code: Select all/system logging add topics=dns
Possibly the system does not know the name for "dns.nextdns.io"? Chicken and Egg problem...tested with public DoH server but nothingEnable DNS logs, it should provide all necessary information for troubleshooting. I tested the DoH implementation with various publicly available servers and could not find any issues. If there are any, please let us know.
Code: Select all/system logging add topics=dns
doh.PNG
Same for quad-nine:You could try "https://1.1.1.1/dns-query" - Cloudflare managed to get the the ip address into the certificate.
Are DoH servers prioritized? When does it fall back to regular dns servers?As others are saying. The router does not know what dns.nextdns.io is. Add at least a single regular DNS server which will be used for DoH servers name resolving. Adding a static DNS entry should also suffice.
yeah it's worked without Verify DoH CertificateYou could try "https://1.1.1.1/dns-query" - Cloudflare managed to get the the ip address into the certificate.
If you trust my repository get it here: https://git.eworm.de/cgit/routeros-scri ... r%20CA.pemyeah it's worked without Verify DoH CertificateYou could try "https://1.1.1.1/dns-query" - Cloudflare managed to get the the ip address into the certificate.
and where can we get cloudflare certificate file to importing in router ?
thanks. I download it from your linkIf you trust my repository get it here: https://git.eworm.de/cgit/routeros-scri ... r%20CA.pemyeah it's worked without Verify DoH CertificateYou could try "https://1.1.1.1/dns-query" - Cloudflare managed to get the the ip address into the certificate.
and where can we get cloudflare certificate file to importing in router ?
Otherwise search for "DigiCert ECC Secure Server CA".
I think you should open dedicated thread about possible SOCKS improvements. I can think about some myself, but this thread is not the right place for it.parent proxy? For socks5
Are DoH servers prioritized? When does it fall back to regular dns servers?As others are saying. The router does not know what dns.nextdns.io is. Add at least a single regular DNS server which will be used for DoH servers name resolving. Adding a static DNS entry should also suffice.
Oh, and is it possible to specify more than one DoH server for redundancy?
/ certificate settings crl-download=no crl-use=yes
dns,error DoH connection error: SSL: handshake failed: unable to get certificate CRL (6)
What's the problem?Would be nice if we could specify ipv6 address
Last one is server certificate and not required in certificate store.When you import the cert int RouterOS you should have 3 entries.
DigiCert Global Root CA
DigiCert ECC Secure Server CA
cloudflare-dns.com
/ip dns static
add address=2606:4700:4700::1111 name=one.one.one.one
/ip dns ... use-doh-server=https://one.one.one.one/dns-query verify-doh-cert=yes
/ip dns
set use-doh-server=https://dns.google/dns-query verify-doh-cert=yes
/ip dns static
add address=8.8.8.8 name=dns.google
add address=8.8.4.4 name=dns.google
add address=1.1.1.1 name=cloudflare-dns.com
add address=1.0.0.1 name=cloudflare-dns.com
@Florian : same here. couldnt get it to work stable.Seems there are some errors with DoH, I've this sometime in the logs : DoH max queue size reached, dropping query
If you want fully secure internet access, you should setup your own POPs, gateways, recursive servers and get your own AS number and peer with the world yourself.How DoH works. Pssssst I like to go to the Pornhub can you give me the IP address. Here you go says Google, of you are. Google making a note the IP xxx.xxx.xxx.xxx went to the pornhub on that day and time and it is already the 6543 time. Lets ask pornhub what is the preference of IP xxx.xxx.xxx.xxx and show advertising on others sites visited by that IP.
You can replace Google by Cloudflare and it's all put in a BIG database. But but they say we don't keep track of what you ask for....an other big firm that did not sell/intentional leak your info by inserting bugs, is Facebook and it told also that they were safe.
@Florian : same here. couldnt get it to work stable.Seems there are some errors with DoH, I've this sometime in the logs : DoH max queue size reached, dropping query
dns,error: DoH connection error: Network is unreachable
dns,error: DoH connection error: Idle timeout - connecting
dns,error: DoH connection error: SSL: handshake timed out (6)
same here.. made me sick 2 days.. need more stable version..I was receiving way too may errors.
Also the connections slowed way down when the router was reporting:
dns,error DoH max queue size reached, dropping query
I removed my DoH configurations, back to normal.
After HTTS become standard, your ISP did not anymore see what you was surfing on, but up until DoH or other solution are in place, then they can always look at your DNS request on port 53. They will not see what your read, but what site you are viseting and they can point the DNS request to any server they like. Even if you set 8.8.8.8, they can intercept this and change it to 1.1.1.1 with a port 53 redirect.DoH is a nightmare and I don't understand why it is supported by Mikrotik.
The ISP can still see where to you are surfing to because that is still in plain sight for everyone, despite using HTTPS. DoH also shows the sites name your are asking on for your resolves and only a few DoH providers can hide that already.After HTTS become standard, your ISP did not anymore see what you was surfing on, but up until DoH or other solution are in place, then they can always look at your DNS request on port 53. They will not see what your read, but what site you are viseting and they can point the DNS request to any server they like. Even if you set 8.8.8.8, they can intercept this and change it to 1.1.1.1 with a port 53 redirect.DoH is a nightmare and I don't understand why it is supported by Mikrotik.
With DoH the can not see DNS traffic anymore. Nor can they redirect it.
When TLS 1.3 becomes mainstream, it will no longer be an assumption.It is a FALSE assumption, that your traffic (metadata) is invisible when using HTTPS or/and DoH.
That what you wrote is still in the future. At the moment using DoH is futile if you want to have privacy. Secondly you are dealing with the biggest privacy enemies, having you DoH connecting to Google and Cloudflare.When TLS 1.3 becomes mainstream, it will no longer be an assumption.It is a FALSE assumption, that your traffic (metadata) is invisible when using HTTPS or/and DoH.
Right now even using TLS, the ISP can see the domain you are visiting.
After TLS 1.3 that will no longer be possible and the L3-L4 "metadata" that it can collect is useless.
For example you visit a website that it is hosted in cloudflare.
Great, the ISP will see that you initiated a connection to a CF IP on port 443. And?
That IP may host hundreds of websites. It is pretty much impossible to infer anything useful other than you visited a server that is managed by CF.
On the same IP there may be a kittens site and a neonazi site. The ISP won't know which one you visited (only CF - of course).
All major web servers support TLS 1.3 already. Browsers too. It is NOT in the future. It's already being rolled out. It has started since 2018.That what you wrote is still in the future.
I remember back in the non SSL/TLS days, people saying the same thing. SSL is futile if you want security/privacy because "reasons". Well... scripta manent. Guess who wishes they hadn't posted those silly comments...At the moment using DoH is futile if you want to have privacy.
You do understand that DoH is not some Google proprietary protocol but an open standard (RFC 8484), right?Secondly you are dealing with the biggest privacy enemies, having you DoH connecting to Google and Cloudflare.
You keep talking about TLS 1.3 whereas you really mean ESNI. TLS 1.3 is a requirement for ESNI, but not the other way round. Enabling ESNI for a particular web-site is not only about using a web server that supports that, in fact that's a pretty involving process, and I don't believe that that will happen for a significant number of domains any time soon.All major web servers support TLS 1.3 already. Browsers too. It is NOT in the future. It's already being rolled out. It has started since 2018.
It's not about protocol, it's about services using that protocol. That's about who you trust more- your ISP or someone running public DoH server like Google or Cloudflare. You are free to chose, but in either case it has little to do with the privacy.You do understand that DoH is not some Google proprietary protocol but an open standard (RFC 8484), right?
It's like saying that using HTTP amounts to dealing with "the biggest privacy enemies" because google services run on HTTP. That statement is ridiculous.
This is done on purpose so you don't install it automatically/by accident. To go to 7.x has to be a manual process.At ROS 6.47beta49 I press Download in "Check For Updates" and in loop see that:
qcRwlwoD1m.gif
To stop this loop I do:
/system package update cancel
/ip dns set servers=1.1.1.1,1.0.0.1
/system ntp client set enabled=yes server-dns-names=time.cloudflare.com
/tool fetch url=https://curl.haxx.se/ca/cacert.pem
/certificate import file-name=cacert.pem passphrase=""
/ip dns set use-doh-server=https://1.1.1.1/dns-query verify-doh-cert=yes
/ip dns set servers=""
/system clock set date=jan/01/2020
/certificate import file-name=cacert.pem passphrase=""
/ip dns set use-doh-server=https://1.1.1.1/dns-query verify-doh-cert=yes
Yes, this is the exact situation happening here. (west korea)After HTTS become standard, your ISP did not anymore see what you was surfing on, but up until DoH or other solution are in place, then they can always look at your DNS request on port 53. They will not see what your read, but what site you are viseting and they can point the DNS request to any server they like. Even if you set 8.8.8.8, they can intercept this and change it to 1.1.1.1 with a port 53 redirect.DoH is a nightmare and I don't understand why it is supported by Mikrotik.
With DoH the can not see DNS traffic anymore. Nor can they redirect it.
I did not install this version because it is beta. say this new feature means that the mikrotik itself can connect over the secure https Protocol to the DNS server and find out the IP. Does this mean that for the client? Please explain.new feature:
dns - added client side support for DNS over HTTPS (DoH) (RFC8484);
I did not install this version because it is beta. say this new feature means that the mikrotik itself can connect over the secure https Protocol to the DNS server and find out the IP. Does this mean that for the client? Please explain.new feature:
dns - added client side support for DNS over HTTPS (DoH) (RFC8484);
This looks like SHA1 key ids. Can you give more details?*) certificate - added "skid" and "akid" values for detailed print;
Two ways to solve this:I got confused a bit please elaborate to me..
If I set the RouterOS to act as DoH client to a server (Google/Cloudflare), how do they know the first time to address of google/cloudflare without first querying via regular DNS server?
This is very little extra load for the CPU... You can ignore that and there is no issue for the user.Also, is there any specific CPU spec for this DoH support because I believe the CPU usage will spike and things will get slow on any HAP users.
no problem with 802.3ad on RB4011Bonding 802.3ad Problem :
after i upgrade to this version the Bonding 802.3ad not working ( or stop about 30s ) i have not change anything and it's work without any problem in stable version
seemes there are issue about arp and bonding interface on tilera platforma and a lot of routes.... I notifiend it in a previous posta but they still didn't manage to fix it.Bonding 802.3ad Problem :
after i upgrade to this version the Bonding 802.3ad not working ( or stop about 30s ) i have not change anything and it's work without any problem in stable version
thanksYou could try "https://1.1.1.1/dns-query" - Cloudflare managed to get the the ip address into the certificate.
yesSo is antenna gain added back now?
please contact support@mikrotik.com and provide supout.rif generated from your device after the "5G has stopped working"5G stopped working at all on 4011
You haven´t already integrated MU-MIMO capable drivers in this release, haven´t you?Version 6.47beta54 has been released.
[...]
What's new in 6.47beta54 (2020-Apr-06 06:32):
[...]
Changes in this release:
*) wireless - improved 5GHz interface stability on RB4011iGS+5HacQ2HnD and Audience;
*) wireless - improved system stability on hAP ac^2;.
Got the same issue ( RouterBOARD 962UiGS-5HacT2HnT) . Had to roll back to stable 6.46.4Damn, I should have checked the forum before installing 6.47beta35. I can no longer login via ssh (key/password). The device is HAP AC2.
seemes there are issue about arp and bonding interface on tilera platforma and a lot of routes.... I notifiend it in a previous posta but they still didn't manage to fix it.Bonding 802.3ad Problem :
after i upgrade to this version the Bonding 802.3ad not working ( or stop about 30s ) i have not change anything and it's work without any problem in stable version
Ros
i'm wondering whether these enhancements also apply to the 'sister-devices' like cAP-ac.*) wireless - improved system stability on hAP ac^2;
not possible to test form me because i do lacp to l2 switch and it too risky to use an untested lacp.@Xymox, rpingar, anas94c - regarding the LACP, it does look like an ARP entry never gets completed when the ARP reply is received on a certain slave port. We will try to fix this in the coming RouterOS testing releases, thanks for sharing the details. In the meantime, you could try to change the bonding mode to balance-xor (or static LAG) as this mode did not show the same behavior.
I have not found this and do you use dynamic and/or DOH servers?
I found a memory leak (or cleaning error) in the DNS (hEX v6.47beta53/54), after flushing the cache it is not reset to aprox. 17KiB, but grows until the device reboots, in this example 358KiB. Accordingly, it does not clean normally during working and only grows.
print;
dynamic-servers:
use-doh-server:
verify-doh-cert: no
allow-remote-requests: yes
max-udp-packet-size: 512
query-server-timeout: 5s
query-total-timeout: 10s
max-concurrent-queries: 3
max-concurrent-tcp-sessions: 3
cache-size: 1024KiB
cache-max-ttl: 1d
cache-used: 75KiB
cache flush; print;
dynamic-servers:
use-doh-server:
verify-doh-cert: no
allow-remote-requests: yes
max-udp-packet-size: 512
query-server-timeout: 5s
query-total-timeout: 10s
max-concurrent-queries: 3
max-concurrent-tcp-sessions: 3
cache-size: 1024KiB
cache-max-ttl: 1d
cache-used: 65KiB
DOH server only (this did not happen in beta 49):I have not found this and do you use dynamic and/or DOH servers?
I found a memory leak (or cleaning error) in the DNS (hEX v6.47beta53/54), after flushing the cache it is not reset to aprox. 17KiB, but grows until the device reboots, in this example 358KiB. Accordingly, it does not clean normally during working and only grows.Code: Select allprint; dynamic-servers: use-doh-server: verify-doh-cert: no allow-remote-requests: yes max-udp-packet-size: 512 query-server-timeout: 5s query-total-timeout: 10s max-concurrent-queries: 3 max-concurrent-tcp-sessions: 3 cache-size: 1024KiB cache-max-ttl: 1d cache-used: 75KiB cache flush; print; dynamic-servers: use-doh-server: verify-doh-cert: no allow-remote-requests: yes max-udp-packet-size: 512 query-server-timeout: 5s query-total-timeout: 10s max-concurrent-queries: 3 max-concurrent-tcp-sessions: 3 cache-size: 1024KiB cache-max-ttl: 1d cache-used: 65KiB
/ip dns
set use-doh-server=https://dns.google/dns-query verify-doh-cert=yes
/ip dns static
add address=8.8.8.8 name=dns.google
add address=8.8.4.4 name=dns.google
Hello Ros,we discovered another issue present in RB4011 (ARM) and all version up to beta54:
- when there is an eth with speed at 100mbps
- the traffic on the this eth reach the maximum and the interface queue is full
All the traffic through the router is fully compromised like to one ethernet queue is the limiting factor.
This problem is not present on powerpc and ccr platforms.
We think it is related to the way MT is handling the group switches and cpu on rb4011, all the ethernet traffic is handled just by one cpu.
regards
Ros
is it fixed in latest beta60?@Xymox, rpingar, anas94c - regarding the LACP, it does look like an ARP entry never gets completed when the ARP reply is received on a certain slave port. We will try to fix this in the coming RouterOS testing releases, thanks for sharing the details. In the meantime, you could try to change the bonding mode to balance-xor (or static LAG) as this mode did not show the same behavior.
*) dns - added support for forwarding DNS queries of static entries to specific server (CLI only);
*) dns - added support for multiple type static entries (CLI only);
What exactly this 2 option do ?Finally!!!Code: Select all*) dns - added support for forwarding DNS queries of static entries to specific server (CLI only); *) dns - added support for multiple type static entries (CLI only);
Can't wait to test this one out!
Will forwarding be able to match regex entries also?
Same for me! I will test on my CHR test router this weekend...Finally!!!Code: Select all*) dns - added support for forwarding DNS queries of static entries to specific server (CLI only); *) dns - added support for multiple type static entries (CLI only);
Can't wait to test this one out!
OK. now how to set event ?system routerboard reset-button set on-event=??????
That is a chicken and egg problem. Lets say you need to resolve the DoH for google.Yes! Mikrotik, you made my day!
One thing, though: Looks like DNS forwarding does not work if DoH configuration is active. I think the forwarding should have priority over DoH.
add name=dns.google ns=8.8.8.8 type=NS
wiki is also updated:OK. now how to set event ?system routerboard reset-button set on-event=??????
Update: event on scripts must be entered.
thanks for reply. but it's not workingwiki is also updated:OK. now how to set event ?system routerboard reset-button set on-event=??????
Update: event on scripts must be entered.
https://wiki.mikrotik.com/wiki/Manual:R ... et_buttons
system routerboard mode-button set on-event=script1 hold-time=3
..5 enabled=yes
I have same issue with connection to remote L2TP server witch IPSEC, in IPSEC i see error "suggestion to use stronger pre-shared key or different authentication method", but i can't change key, server not my. In 6.47.b54 no this problem.After upgrade to beta60, L2TP/IPSEC client can't connect to server:
*******: terminating... - tunnel was not encrypted
No. I think you do not understand the purpose and intention of this new functionality.is it true about the DNS forward ?
ip dns static set ns=8.8.8.8 forward-to=1.1.1.1
does this command forwarding the 8.8.8.8 to 1.1.1.1
Well of course I could not wait to try, and so far it looks good! I made a couple of entries and they all work OK.Same for me! I will test on my CHR test router this weekend...Finally!!!Code: Select all*) dns - added support for forwarding DNS queries of static entries to specific server (CLI only); *) dns - added support for multiple type static entries (CLI only);
Can't wait to test this one out!
Yeah, DoH is cool, but DNS forwarding is more essential to me.I was waiting for this much more than for DoH but each has their own preferences I guess.
Neither chicken nor egg is involved.That is a chicken and egg problem.
/ip dns static add forward-to=10.0.0.1 regexp="(.*\\.)\?example\\.com" type=FWD
Indeed there is a serious problem with L2TP/IPsec in this beta! When using that, definately don't install it, it does not work OK.I have same issue with connection to remote L2TP server witch IPSEC, in IPSEC i see error "suggestion to use stronger pre-shared key or different authentication method", but i can't change key, server not my. In 6.47.b54 no this problem.After upgrade to beta60, L2TP/IPSEC client can't connect to server:
*******: terminating... - tunnel was not encrypted
/ip dns static
add type=A name=ns1.test address=10.0.0.1
add type=A name=ns1.test address=10.0.0.2
add type=FWD regexp=<regexp> forward-to=ns1.test
Well, it works like that in all existing recursive resolvers. When the client asks for NS it gets the NS, when it asks for something else the query is forwarded.I think such dual-purpose NS records would be wrong, confusing.
What device are you using? Is reset button acting as WPS button on this device as well?thanks for reply. but it's not working
DoH is used exclusively if configured.Im currently testing DoH on my HAP Lite, which is working great. But I have few questions.
I got some Dynamic NS Servers supplied by my ISP and thus they are automatically added to Mikrotik DNS server list (read-only). I also put some static NS records (e.g dns.cloudflare 1.1.1.1) as Static list. So, now I have DoH active to Cloudflare, I have Dynamic NS supplied by ISP and also I have my own static NS list. Which one goes first on any query request?
Thanks for answering!DoH is used exclusively if configured.Im currently testing DoH on my HAP Lite, which is working great. But I have few questions.
I got some Dynamic NS Servers supplied by my ISP and thus they are automatically added to Mikrotik DNS server list (read-only). I also put some static NS records (e.g dns.cloudflare 1.1.1.1) as Static list. So, now I have DoH active to Cloudflare, I have Dynamic NS supplied by ISP and also I have my own static NS list. Which one goes first on any query request?
/ip dns set verify-doh-cert=yes
One thing perhaps following my post above.
We have the PSUs' voltage and current in these new gauges.
We could then monitor PSUs checking for example that voltage >12.
Will you however add a psu-state OID ?
Same thing finally for the FANs.
On some devices, FAN speed always remains at a high level, making FAN monitoring based on their speed rather easy.
Though, on some other devices, FAN speed sometimes falls to 0 RPM, then increases to some thousands, then falls again to 0...
Making FAN speed monitoring on such devices rather impossible.
Could you then also add a fan-state OID among the new health gauges ?
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.16 = STRING: "power-consumption"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.17 = STRING: "cpu-temperature"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7001 = STRING: "fan1-speed"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7002 = STRING: "fan2-speed"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7003 = STRING: "fan3-speed"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7004 = STRING: "fan4-speed"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7101 = STRING: "board-temperature1"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7102 = STRING: "board-temperature2"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7201 = STRING: "psu1-voltage"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7202 = STRING: "psu2-voltage"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7301 = STRING: "psu1-current"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.2.7302 = STRING: "psu2-current"
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.16 = Gauge32: 447
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.17 = Gauge32: 40
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7001 = Gauge32: 4860
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7002 = Gauge32: 5079
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7003 = Gauge32: 4860
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7004 = Gauge32: 4843
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7101 = Gauge32: 28
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7102 = Gauge32: 28
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7201 = Gauge32: 5
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7202 = Gauge32: 121
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7301 = Gauge32: 0
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.3.7302 = Gauge32: 37
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.16 = INTEGER: 5
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.17 = INTEGER: 1
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7001 = INTEGER: 2
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7002 = INTEGER: 2
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7003 = INTEGER: 2
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7004 = INTEGER: 2
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7101 = INTEGER: 1
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7102 = INTEGER: 1
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7201 = INTEGER: 3
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7202 = INTEGER: 3
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7301 = INTEGER: 4
SNMPv2-SMI::enterprises.14988.1.1.3.100.1.4.7302 = INTEGER: 4
Yes! Mikrotik, you made my day!
One thing, though: Looks like DNS forwarding does not work if DoH configuration is active. I think the forwarding should have priority over DoH.
+1we need both DOH and DNS forwarding.
Unfortunately, DoT is not planned to be implemented in the near future.
For all DoT lovers out there, I'm bringing fresh official bad news. Received yesterday, directly from MT support:Unfortunately, DoT is not planned to be implemented in the near future.
I completely agree - forwarding entries (under /ip dns static) should work together with DoH!we need both DOH and DNS forwarding.
/ip dns
set allow-remote-requests=yes servers=1.1.1.1,1.0.0.1 use-doh-server=https://cloudflare-dns.com/dns-query
/ip dns static
add forward-to=https://dns.google/dns-query name=archive.is type=FWD
*) dns - added support for forwarding DNS queries of static entries to specific server (CLI only);
*) dns - added support for multiple type static entries (CLI only);
/ip dns static
add type=A name=ns1.test address=10.0.0.1 allow-for=10.0.0.0/24
Can you please explain why the download page (https://mikrotik.com/download) suddenly lists 6.47beta53 (Testing) as latest beta testing version? What happened with version 6.47beta60? Does version 60 contain a critical bug? Is version 60 removed intentionally? Or is this a bug in the download page? Which was introduced while you were working on the rlease system?There were just works being done on the release system, there is nothing to worry about.
https://download.mikrotik.com/routeros/6.47beta60/routeros-mipsbe-6.47beta60.npk
We are also using beta60 with no problems in a hAP AC2, but we upgraded a hEX S (RB760iGS) doing some l2tp/ipsec tunnel (as l2tp-client)I'm also using hAP AC2 with beta60 and works fine for me, simple home network setup, QoS and DoH.
use-ipsec="yes"
14:18:14 l2tp,info first L2TP UDP packet received from XX.XX.XX.XX
14:18:14 ipsec,info respond new phase 1 (Identity Protection): YY.YY.YY.YY[500]<=>XX.XX.XX.XX[500]
14:18:19 ipsec,info purging ISAKMP-SA YY.YY.YY.YY[500]<=>XX.XX.XX.XX[500] spi=35e86c3675224b18:d8fa159a8f7365c5.
14:18:19 ipsec,info ISAKMP-SA deleted YY.YY.YY.YY[500]-XX.XX.XX.XX[500] spi:35e86c3675224b18:d8fa159a8f7365c5 rekey:1
I think they made same mistake many software developers make when implementing high-DPI-aware application: They made a new icons once in much higher resolution and then simply scaled the bitmap to get smaller or other sizes. This results in blurry icons with no edges, just soft blobs... on some icons it's more noticeable (like the blue bridge icon) then on others.By the way, I kind of gotten used to the new icon-set, but it appears terribly low quality.
@ALL
Only 2 cert are needed
1s for Google
2nd for CloudFlare.Code: Select all/ip dns set use-doh-server=https://dns.google/dns-query verify-doh-cert=yes /ip dns static add address=8.8.8.8 name=dns.google add address=8.8.4.4 name=dns.google add address=1.1.1.1 name=cloudflare-dns.com add address=1.0.0.1 name=cloudflare-dns.com
DOH.png
Based on:
https://developers.google.com/speed/public-dns/docs/doh
https://developers.cloudflare.com/1.1.1 ... red-proxy/