👍!) added support for Let's Encrypt certificate generation;
!) added L3 HW support for all CRS3xx devices;
!) added MLAG support for CRS3xx devices (CLI only);
Are there known stability issues? AFAIK they are just waiting for routing protocols to be finished to move out of beta.I'm a bit disappointed, would like to see more focus on stability and features that not in V7 but are available in V6 instead of brand new features.
Well Cake QoS crashes routeros but other than that it has been flawless for me. Well that and the CCR2004 has problems with mixed speeds SFPs but that's part of the 6.49 fixes :)Are there known stability issues? AFAIK they are just waiting for routing protocols to be finished to move out of beta.I'm a bit disappointed, would like to see more focus on stability and features that not in V7 but are available in V6 instead of brand new features.
running a lot of beta5 at non-essential places, can't say that i'm having stability issues.
I don't know of any specific instabilities but have heard rumors in the past about some instabilities.Are there known stability issues? AFAIK they are just waiting for routing protocols to be finished to move out of beta.I'm a bit disappointed, would like to see more focus on stability and features that not in V7 but are available in V6 instead of brand new features.
running a lot of beta5 at non-essential places, can't say that i'm having stability issues.
Does this mean that even if there is only a limited amount of connected/static routes present, the default route will still be processed by CPU?*1 Since total amount of routes that can be offloaded is very limited, prefixes with higher netmask are preferred to be forwarded by hardware (e.g /32 /30 /29 etc, last route is 0.0.0.0/0 always processed by CPU), any other prefix that does not fit in the HW table will be processed by the CPU.
Does it crashes this beta (beta6) as well?Well Cake QoS crashes routeros
From newly added part about L3 HW offloading on Marvell DX3000/2000 Series chips: https://help.mikrotik.com/docs/display/ ... OffloadingDoes this mean that even if there is only a limited amount of connected/static routes present, the default route will still be processed by CPU?*1 Since total amount of routes that can be offloaded is very limited, prefixes with higher netmask are preferred to be forwarded by hardware (e.g /32 /30 /29 etc, last route is 0.0.0.0/0 always processed by CPU), any other prefix that does not fit in the HW table will be processed by the CPU.
Or does it apply only for a situation when the total routes number exceeds the maximum?
Great, thanks! That makes the huge new field of how to use the mentioned switches.The fallback to CPU applies only to a situation when the total number of routes exceeds the maximum. Otherwise, everything can be routed by the hardware, including the default gateway(-s).
Great, thanks! That makes the huge new field of how to use the mentioned switches.The fallback to CPU applies only to a situation when the total number of routes exceeds the maximum. Otherwise, everything can be routed by the hardware, including the default gateway(-s).
Probably you should rephrase the text in the wiki, so that this "always processed by CPU" don't raise any questions.
There are no plans to support running both packages at the same time, no.I know it was said that there are no plans for AR9300 to be supported in WiFiWave2 package. However are there any plans of supporting running both wifiwave2 and the normal wireless package alongside?
So do we have any chance to get wpa3 on older devices with 2.4GHz ?Because RouterOS is made for all devices, but your example with OpenWRT is compiled specifically for one product only.
Until RouterOS doesn't have NPK file for each model separately, it will always be bigger, as it has more drivers inside.
Totally agree. Also it would be interesting in seeing progress on protocols here: https://help.mikrotik.com/docs/display/ ... col+StatusI'm a bit disappointed, would like to see more focus on stability and features that not in V7 but are available in V6 instead of brand new features.
I haven't tested yet. I will when I'm back home tomorrow.Does it crashes this beta (beta6) as well?Well Cake QoS crashes routeros
I would like to request a separate wifiwave2 package for IPQ4018/IPQ4019 devices with 16MB of ROM. With such a package a lot of more users could test this it, send feedbacks and bug reports which will result in an earlier available bugfree stable release.RouterOS version 7.1beta5 has been released in public "development" channel!
*) wifiwave2 - improved interface stability with multiple WPA3 authenticated clients;
.My OSPF stoped working after upgrade. When I downgrade back to 7.1beta5 it works again.
/routing ospf interface-template
add area=ospf-area-0 interfaces=ovpn-in1,ovpn-in2 networks="" type=ptp
add area=ospf-area-0 interfaces=OSPF_vlan networks=""
/routing ospf interface-template
add area=ospf-area-0 interfaces=OSPF_vlan
add area=ospf-area-0 interfaces=ovpn-in1,ovpn-in2 type=ptp
Thank you! It really worked. Do you know if it is already possible to set costs for OSPF?.My OSPF stoped working after upgrade. When I downgrade back to 7.1beta5 it works again.
this also happened to me, I found that if the config for interface templates looks like this, it will not work:.Code: Select all/routing ospf interface-template add area=ospf-area-0 interfaces=ovpn-in1,ovpn-in2 networks="" type=ptp add area=ospf-area-0 interfaces=OSPF_vlan networks=""
removing the networks= fixed for me:
.Code: Select all/routing ospf interface-template add area=ospf-area-0 interfaces=OSPF_vlan add area=ospf-area-0 interfaces=ovpn-in1,ovpn-in2 type=ptp
What's new in 7.1beta6 (2021-May-18 14:49):
!) ported features and fixes introduced in v6.49;
Yes, now you can set cost in interface templateDo you know if it is already possible to set costs for OSPF?
+1I would like to request a separate wifiwave2 package for IPQ4018/IPQ4019 devices with 16MB of ROM. With such a package a lot of more users could test this it, send feedbacks and bug reports which will result in an earlier available bugfree stable release.
mfry i have wireguard working with vlans but dont use VRF on beta5. Assuming same for beta6My hAP ac3 hasn't crashed after setting cake as my download qeue type in queue tree so far, so that's an improvement.
VRF (with a VLAN and a WireGuard interface) still doesn't work and leads to WinBox crashing when showing IP -> Routes.
For the L3 HW off-load support on CRS3xx can you confirm if that includes even the CRS305 model?RouterOS version 7.1beta6 has been released in public "development" channel!
What's new in 7.1beta6 (2021-May-18 14:49):
!) added support for Let's Encrypt certificate generation;
!) added L3 HW support for all CRS3xx devices;
!) added MLAG support for CRS3xx devices (CLI only);
!) ported features and fixes introduced in v6.49;
*) other minor fixes and improvements;
All released RouterOS v7 changelogs are available here:
https://mikrotik.com/download/changelog ... lease-tree
@normis mk messaging is not clear about this. What is clear is that wifiwave2 will not come to old products.There are no plans to support running both packages at the same time, no.I know it was said that there are no plans for AR9300 to be supported in WiFiWave2 package. However are there any plans of supporting running both wifiwave2 and the normal wireless package alongside?
The wifiwave2 package beta is offered as a preview of wireless functionality developed for future products. For currently available products, the regular wireless package is still being maintained and improved.
OSPFv3 seems to be even more broken than before, sadly. Adding an area to OSPFv3 (without any interface-templates) causes one CPU to go into high utilization and all of the OSPF menus stop responding. It is not possible to remove the configuration since the menus stop responding, and the only solution is to reset the device config and restore from backup.Thanks for the new features like MLAG!
Were the issues with OSPFv3 checksum fixed?
:Ocan't wait to see this bad boy: crs520-4xs-16xq
That is the reason I was against this feature. Don't get me wrong - LetsEncrypt is beautiful, but opens whole can of worms because many tasks are done by custom made scripts. e.g. I want a DNS challenge on cloudflare. Someone else wants a DNS challenge on Azure etc... It would be all beautiful, but my feeling is, that full support of all (or at least major) methods of validation will take too much development effort.Is there is a way to use this new Lets Encrypt support without having to open www (and, by extension, webfig) to the world? The Lets Encrypt support is a great idea and I am glad it is there, it is really handy for VPNs etc, but it seems like I am having to open port 80 and webfig to the planet if I want to use it - unless I am missing something.
I don't necessarily have an issue with port 80 validation, but I would want to be able to do that without webfig and everything else being opened at the same time. For instance, certbot has the standalone mode where it runs only a limited webserver for getting the certificate. With such a solution, the www service could be left disabled. It is unusual to open the main www service on a MikroTik router to the world, to say the least - it is contrary to all recommended security practice.That is the reason I was against this feature. Don't get me wrong - LetsEncrypt is beautiful, but opens whole can of worms because many tasks are done by custom made scripts. e.g. I want a DNS challenge on cloudflare. Someone else wants a DNS challenge on Azure etc... It would be all beautiful, but my feeling is, that full support of all (or at least major) methods of validation will take too much development effort.
For the L3 HW off-load support on CRS3xx can you confirm if that includes even the CRS305 model?
The changes (in the form of features and fixes) introduced with 6.49beta46, are included in 7.1beta6.
What's new in 7.1beta6 (2021-May-18 14:49):
!) ported features and fixes introduced in v6.49;
All the features of v6.49beta46?
Regards,
yup.but I would want to be able to do that without webfig and everything else being opened at the same time. For instance, certbot has the standalone mode where it runs only a limited webserver for getting the certificate.
https://help.mikrotik.com/docs/display/ ... tion+GroupMmmm MLAG - sounds tasty.
Any hint on how this could be configured and how it is implemented between boxes?
thx!
agree, make stable and release it.I'm a bit disappointed, would like to see more focus on stability and features that not in V7 but are available in V6 instead of brand new features.
I had the same problem, keep messing around with manual band selection and USB resets until it works again.my LTE stopped working after upgrading (from beta3). This is simply ridiculous.
board: rbm33g
modem: R11e-LTE6
firmware: R11e-LTE6_V026
after upgrading the board it booted with "A newer version of modem firmware is available!" sign at the top of the modem page. pin status is ok but "tx and rc rf disabled".
nothing brings it back to life.
Some problem here: wAP ac LTE kit with R11e-LTE modem firmware MikroTik_CP_2.160.000_v018my LTE stopped working after upgrading (from beta3). This is simply ridiculous.
board: rbm33g
modem: R11e-LTE6
firmware: R11e-LTE6_V026
after upgrading the board it booted with "A newer version of modem firmware is available!" sign at the top of the modem page. pin status is ok but "tx and rc rf disabled".
nothing brings it back to life.
Some problem here: wAP ac LTE kit with R11e-LTE modem firmware MikroTik_CP_2.160.000_v018my LTE stopped working after upgrading (from beta3). This is simply ridiculous.
board: rbm33g
modem: R11e-LTE6
firmware: R11e-LTE6_V026
after upgrading the board it booted with "A newer version of modem firmware is available!" sign at the top of the modem page. pin status is ok but "tx and rc rf disabled".
nothing brings it back to life.
pin status is ok but "tx and rc rf disabled" after upgrading from 7.1beta5 to 7.1beta6
With a downgrade back to 7.1beta5 the LTE is working again.
Do you know what BETA is ?This "beta" thing has been absolute shitshow
Do you know what BETA is ?This "beta" thing has been absolute shitshow
and because you seem to approve of the beta rollout process probably can help me find the beta5 binaries so that I can downgrade from the latest UNTESTED betaDo you know what BETA is ?This "beta" thing has been absolute shitshow
You like shitshow, and more shitshow than before...and because you seem to approve of the beta rollout process probably can help me find the beta5 binaries so that I can downgrade from the latest UNTESTED betaDo you know what BETA is ?This "beta" thing has been absolute shitshow
Excellent thank you!For the L3 HW off-load support on CRS3xx can you confirm if that includes even the CRS305 model?
Yes, all CRS3xx devices now support L3 HW offloading. That includes CRS305.
L3HW: Supported Devices
and because you seem to approve of the beta rollout process probably can help me find the beta5 binaries so that I can downgrade from the latest UNTESTED beta
Route filters are workingHello can anyone from mikrotik confirm if route filters and ospfv3 is working or not?
blah, blah, blah...>>>I've been doing software for 2 decades for a living<<<
and because you seem to approve of the beta rollout process probably can help me find the beta5 binaries so that I can downgrade from the latest UNTESTED beta
Hello person who has been doing software development for decades; you can find the binaries of the previous untested beta release for your device architecture via the following links:
mipsbe: https://download.mikrotik.com/routeros/ ... mipsbe.npk
arm64: https://download.mikrotik.com/routeros/ ... -arm64.npk
smips: https://download.mikrotik.com/routeros/ ... -smips.npk
tile: https://download.mikrotik.com/routeros/ ... 5-tile.npk
ppc: https://download.mikrotik.com/routeros/ ... a5-ppc.npk
arm: https://download.mikrotik.com/routeros/ ... a5-arm.npk
x86: https://download.mikrotik.com/routeros/ ... 1beta5.npk
mmips: https://download.mikrotik.com/routeros/ ... -mmips.npk
blah, blah, blah...>>>I've been doing software for 2 decades for a living<<<
your ego is so big ... what a pleasure to discover that there is someone more modest than me ...
Well, for a "programmer"? ("doing software") do not find a link with intuition is ridiculous...
I'm a programmer too, but unlike you, I have the intuition...
I do not reply to anything for you, please do not consider my words, I'm so idiot and modest from decades.
wget https://download.mikrotik.com/routeros/ ... mipsbe.npkand because you seem to approve of the beta rollout process probably can help me find the beta5 binaries so that I can downgrade from the latest UNTESTED betaDo you know what BETA is ?This "beta" thing has been absolute shitshow
So they can tell you "Sorry works on my machine" lmao alright fam.Anyone who has some problems with OSPF please contact support with attached supout files and brief description on what exactly is not working. "OSPF not work" doesn't help much.
Fun feature, but why? Who absolutly needs valid certificates for the www-ssl service, and can not do it separatly?!) added support for Let's Encrypt certificate generation;
I have seen similar issues both in a hAP ac and an hAP ac^2, in all betas from beta3, but in some cases the radio blacklists the clients (or the client blacklists the AP, not an expert on how it goes) and I need to reboot the router or at least a disable; enable cycle to get it accepting clients again. This kind of error seems related to noisy associations (low signal or noisy channels),In essence when pushing a stream of 50-80Mb/s it will stop passing TCP traffic after 20-60 minutes. What's interesting it will still allow for pinging but every existing or new TCP connection will freeze. Connections aren't dropped, they just stop carrying data. It seems like this problem is isolated to the 5Ghz interface only. I see nothing in the log. Reconnecting to the AP solves the issue for up to an hour.
We had a constructive and respectful discussion about that earlier in an earlier beta. People expecting beta quality are disappointed because beta means a different thing in the software engineering world than it means to Mikrotik and some of their users. Which I won't bother explaining again. Let's just say that it creates frustrations and loss of time. Ppl feel tricked when basic functionality don't work. Ultimately it hurts Mikrotik and they lose a testing pool of users, without even talking about trust and brand recognition (and ultimately sales). It's a shame their wireless products, their hardware products released using "beta" software and the quality of their release cycle is so poor. They could have eaten shares out of the Ubiquity fiasco recently. And we see their steer their brand more in the consumer market now. But good luck fooling the "consumer" market. Again, see how many users went away of Ubiquity recently.Too many complaints about beta or alpha.
It is a testing release so bad things happen. Whether it is beta or alpha, I do not see the point, you install it and take the risk of things not working as supposed to. Remember that mikrotik tries to put lot of features in one box so it is not that easy to fix lots of them in one shot. It is not like other vendors who put a couple of features in one router and that is it.
Instead of many complaints, try to cooperate and pinpoint the issue if you can, or write to support for the issue you are experiencing, that is how testing works. I do not see you trying to solve the issues but venting your frustration in the forum which has been said a thousands times that is just a user forum, you need to write to support for problem solving if not found in the forum.
There are also features that are only in v7 that have had issues so any fixes wouldn't be in the 6.49beta release notes. A compete list for v7 would be very helpful.The changes (in the form of features and fixes) introduced with 6.49beta46, are included in 7.1beta6.
That said, there are features of RouterOS v6, which RouterOS v7 does not support (e.g. MetaRouter), so it would not be accurate to say that 7.1beta6 includes all features of 6.49beta46.
Wrong, when one should get irate or have expectations is paid delivery of released firmware versions.Yes, I do. I've been doing software for 2 decades for a living. I'd be ashamed to deliver such consistently untested software
Do you know what BETA is ?This "beta" thing has been absolute shitshow
Wrong, when one should get irate or have expectations is paid delivery of released firmware versions.Yes, I do. I've been doing software for 2 decades for a living. I'd be ashamed to deliver such consistently untested software
Do you know what BETA is ?This "beta" thing has been absolute shitshow
Even then, all 'released' software, unless its for my iphone, and including military systems has issues................
The forum is full of whiners, who seem to have expectations beyond the scope of the beta releases provided.
if they wanted to do something constructive then they should donate lots of money to Normis so he can hire more programmers and more testers for in-house work.
Magically some think it gets done for free and by prayer, or smoking much ganja.
Everyday life in testing:Magically some think it gets done for free and by prayer, or smoking much ganja.
We all paid when we bought the package, which includes support and upgrades. The time devoted by a user to test is also a support in some sense. The years of expertise of someone testing your product is also a form a contribution. Buying more products and recommending it to friends is also some kind of support. Normis also already has a salary, it does not do it for free because he is a saint. Mikrotik makes money and also does it for the business of it. Seeing the official reply from Mikrotik also does it for me and also confirms the lack of seriousness of the community revolving around it. Seriously, who replies with some kind of memes to a question like that.if they wanted to do something constructive then they should donate lots of money to Normis so he can hire more programmers and more testers for in-house work.
Magically some think it gets done for free and by prayer, or smoking much ganja.
If it was advertised as such, I wouldn't have said anything in the first place and I would make a decision based on that.v7 beta releases are somewhat nightly builds with a tag.
Route filters aren't working. See detailed post: viewtopic.php?f=1&t=175428 Also check ticket# SUP-50226Route filters are workingHello can anyone from mikrotik confirm if route filters and ospfv3 is working or not?
Well, then you should also know what "development" branch/channel is...Yes, I do. I've been doing software for 2 decades for a living. I'd be ashamed to deliver such consistently untested software
Do you know what BETA is ?This "beta" thing has been absolute shitshow
Got the working partially with the help of Mrz via support portal. Will update once it get it fully working. Maybe updated documentation will do the job for others.Route filters aren't working. See detailed post: viewtopic.php?f=1&t=175428 Also check ticket# SUP-50226Route filters are workingHello can anyone from mikrotik confirm if route filters and ospfv3 is working or not?
You have to have service "www" enabled and port 80 open to the world.How to debug this further?
Agree, I find it hard to believe that the RBD53G-5HacD2HnD-TC&EG12-EA was released and has been sold for quite some time with alpha code availble for it, it should never have been released before mainline software support was available, otherwise you're just releasing a commercial product that costs actual money but are forced to run buggy and potentially insecure code that has not been properly tested internally, add this to the fact that some of these devices will go into 'production' with 'development' code that never sees the light of an upgrade then you have a product with undeveloped alpha code with unfinished features sitting on potentially the public internet awaiting its fate.Side note, so we all agree that there are devices out there (ex.: Chateau), on shelves, required to be run on a nightly build. Is that what we're saying here. And the manufacturer is posting memes about it.
Okay..
It probably would be more ethical to add note to the product which doesn't have yet stable software, like Pinephone manufacturers does:Agree, I find it hard to believe that the RBD53G-5HacD2HnD-TC&EG12-EA was released and has been sold for quite some time with alpha code availble for it, it should never have been released before mainline software support was available, otherwise you're just releasing a commercial product that costs actual money but are forced to run buggy and potentially insecure code that has not been properly tested internally, add this to the fact that some of these devices will go into 'production' with 'development' code that never sees the light of an upgrade then you have a product with undeveloped alpha code with unfinished features sitting on potentially the public internet awaiting its fate.Side note, so we all agree that there are devices out there (ex.: Chateau), on shelves, required to be run on a nightly build. Is that what we're saying here. And the manufacturer is posting memes about it.
Okay..
I do love MikroTik gear but 7.1 needs to lose the beta tag, testing has a beta tag and people expect the same maturity from an RC line as they do with 7.x.
Also I believe a product shouldn't be commercially sold until mainline stable code is available for it, by all means ship it to users in a development testing program but it shouldn't see the hands of the average joe until thats sorted out.
Now I'll go and netinstall my RB3011 to remove the 7.1beta6 that wont downgrade or sidegrade due to a kernel panic in the reboot cycle.
If hardware is ready, I think it's ok to release product earlier. Because you can get it now with RouterOS functionality, instead of looking to other vendors which may have less of features. 5G is not broadly adopted yet anyway.Note:
Beta Edition PinePhones are aimed solely at early adopters. More specifically, only intend for these units to find their way into the hands of users with extensive Linux experience.
Quote source: https://pine64.com/product/pinephone-be ... 46c16e2e66
That's what I thought too.I'd guess this setting will just be silently ignored on other-than-CRS3xx devices.
One error found - IPv6 doesn't work unfortunately.Gents, I appreciate it. It is first version of V7 Branch, I can use on hAP ac^2 (256MB RAM) in my home network installation for long time without issues. Good job!
You shouldn't just upgrade from one beta to the next keeping the configuration, unless your configuration is simple (ex. basic home router config). The issue is that going from one beta to another does NOT update the config syntax where there were syntax changes, so it can potentially make the device unstable. This will be the case for the routing protocols and other parts of the router where the syntax is still in flux. You should export to RSC, reset to no-defaults, upgrade, and paste the RSC back in section by section. This way any incorrect syntax will throw an error and not make it into the config, rather than having a situation with wrong syntax already being there and causing malfunctions because it should not exist in the config in the first place.I can confirm that my RB3011's kernel panic on downgrade/upgrade and on reboot after upgrading to 7.1beta6 was resolved by doing a netinstall back to 6.48.2 and restore of backup config taken prior to 7.1beta6 upgrade. I think i'll hold off for a few more versions before trying again.
I can confirm on 4011 recently upgraded from 6.48.2. Simple SLAAC configuration with prefix and address:What exactly is not working with IPv6?
Make sure admin mac address is set for your bridge, and that "Disable IPv6" is not checked under IPv6->Settings.may/23 00:35:32 radvd,debug RADVD:: skip Router Advertisement sending on bridge: no link local address
/ipv6/settings/set disable-ipv6=yes
/ipv6/settings/set disable-ipv6=no
You can prevent port membership updates from affecting the bridge mac by hard setting the admin MAC instead of using auto MAC for the bridge.The issue re-appears after a bridge mac address reconfiguration, e.g. due to port membership update.
It doesn't matter which bridge (can be an unrelated bridge).
You can prevent port membership updates from affecting the bridge mac by hard setting the admin MAC instead of using auto MAC for the bridge.
Yes, it is a bug and certainly should be fixed, but there have been many auto MAC related bugs in the past similar to this, enough that kalamaja should probably set it as a part of best practice configuration to avoid encountering these sorts of bugs.Yes, but reconfiguring any bridge (e.g. bridge2) should not lead to loss of link local address of another bridge (e.g. bridge1).
I wonder what exactly the new option hw-offload=yes in firewall action=fasttrack rule do?
I guess it is added so we can choose which of fasttracked connection to be L3 HW Offloaded on CRS3XX.
But does setting it to yes/no change anything on other devices, that don't have L3 HW Offloading?
When will you fix the bug with LTE in bete6?Some problem here: wAP ac LTE kit with R11e-LTE modem firmware MikroTik_CP_2.160.000_v018my LTE stopped working after upgrading (from beta3). This is simply ridiculous.
board: rbm33g
modem: R11e-LTE6
firmware: R11e-LTE6_V026
after upgrading the board it booted with "A newer version of modem firmware is available!" sign at the top of the modem page. pin status is ok but "tx and rc rf disabled".
nothing brings it back to life.
pin status is ok but "tx and rc rf disabled" after upgrading from 7.1beta5 to 7.1beta6
With a downgrade back to 7.1beta5 the LTE is working again.
I've been able to reproduce it - it happens to me even when there is no bridge MAC address reconfiguration taking place, i.e. just one bridge with admin MAC set. So there must be some other trigger for this issue.The issue re-appears after a bridge mac address reconfiguration, e.g. due to port membership update.
It doesn't matter which bridge (can be an unrelated bridge).
Well, they are called Cloud Router Switch, after all.Isnt it a bit weird that now Mikrotik Switches can route and filter/nat much faster than actual Mikrotik Routers ? :)
I may be mistaken, but my understanding is that it is only limited to IPv4 for now, and L3 offloading for IPv6 is coming.It's a pity that L3 offloading is limited to IPv4 only, but it's impressive nevertheless.
https://github.com/openwrt/openwrt/pull/4055 => Nice to see that work was restarted for getting a port done. The actual goal would be to get it into official 21.02 branch in order to reach long term support.Meanwhile I am trying to support an openwrt project that would bring better wifi drivers to my cAP acs at home.
On my device, a kernel panic occurs on reboot that appears to be related to this issue. If I have no bridges, the kernel panic does not occur. If I have at least one bridge, I get this kernel panic each time I try to reboot:I've been able to reproduce it - it happens to me even when there is no bridge MAC address reconfiguration taking place, i.e. just one bridge with admin MAC set. So there must be some other trigger for this issue.
[admin@Michael-RB4011] >
Rebooting...
[ 573.721183] Internal error: Oops: 17 [#1] SMP ARM
[ 573.725884] CPU: 2 PID: 263 Comm: sysinit Not tainted 5.6.3 #60
[ 573.731791] Hardware name: Annapurna Labs Alpine
[ 573.736402] PC is at _stext+0x2c610/0x4338e8
[ 573.740663] LR is at _stext+0x2c5c8/0x4338e8
[ 573.744924] pc : [<8012c610>] lr : [<8012c5c8>] psr: 60000093
[ 573.751177] sp : bf0afbb8 ip : 00000000 fp : 00000000
[ 573.756390] r10: 8087d23c r9 : 00000004 r8 : 8087d23c
[ 573.761604] r7 : bcefd6c0 r6 : 00000002 r5 : bcdc4e00 r4 : 00000000
[ 573.768118] r3 : 00000003 r2 : 00000002 r1 : 07ffffff r0 : 00000000
[ 573.774632] Flags: nZCv IRQs off FIQs on Mode SVC_32 ISA ARM Segment none
[ 573.781839] Control: 10c5387d Table: 3975c06a DAC: 00000051
[ 573.787572] Process sysinit (pid: 263, stack limit = 0xed12ffa8)
[ 573.793571] {bf0afbe4} _stext+0x2c820/0x4338e8
[ 573.798014] {bf0afbfc} switch_switchdev_event+0x1cc/0x244 [switch@0x7f0e6000]
[ 573.805139] {bf0afc1c} _stext+0x32ab4/0x4338e8
[ 573.809573] {bf0afc3c} _stext+0x32c70/0x4338e8
[ 573.814009] {bf0afc4c} _stext+0x32c8c/0x4338e8
[ 573.818453] {bf0afc5c} br_switchdev_fdb_notify+0xbc/0xc4 [bridge2@0x7f0f4000]
[ 573.825583] {bf0afc74} br_fdb_find_port+0x73c/0xdb0 [bridge2@0x7f0f4000]
[ 573.832278] {bf0afc9c} br_fdb_find_port+0xa88/0xdb0 [bridge2@0x7f0f4000]
[ 573.838972] {bf0afd84} br_fdb_delete_by_port+0x88/0xb4 [bridge2@0x7f0f4000]
[ 573.845927] {bf0afda4} br_device_event+0x1b0/0x1dc [bridge2@0x7f0f4000]
[ 573.852527] {bf0afdc4} _stext+0x32ab4/0x4338e8
[ 573.856962] {bf0afde4} _stext+0x32d28/0x4338e8
[ 573.861397] {bf0afdf4} _stext+0x36124c/0x4338e8
[ 573.865919] {bf0afe04} _stext+0x366d54/0x4338e8
[ 573.870441] {bf0afe24} _stext+0x3673d0/0x4338e8
[ 573.874962] {bf0afe3c} _stext+0x3e44c8/0x4338e8
[ 573.879484] {bf0afe8c} _stext+0x3e66ac/0x4338e8
[ 573.884006] {bf0afef4} _stext+0x3490fc/0x4338e8
[ 573.888527] {bf0aff34} _stext+0xdd9cc/0x4338e8
[ 573.892963] {bf0aff3c} _stext+0xdded0/0x4338e8
[ 573.897397] {bf0affa4} _stext+0x1000/0x4338e8
[ 573.901745] Exception stack(0xbf0affa8 to 0xbf0afff0)
[ 573.906787] ffa0: 7efffbd0 0002d390 00000003 00008914 7efffb88 7efffb18
[ 573.914948] ffc0: 7efffbd0 0002d390 00000002 00000036 00000001 00000003 00000000 00000000
[ 573.923108] ffe0: 0002d018 7efffb00 00015410 76fced14
[ 573.928151] Code: 01a04003 0a000003 e1a0000b ebfffcd0 (e5940000)
[ 573.934234] ---[ end trace 35b3c22b82377f68 ]---
[ 573.939842] Kernel panic - not syncing: Fatal exception in interrupt
[ 573.946189] CPU1: stopping
[ 573.948896] CPU: 1 PID: 259 Comm: kworker/1:0 Tainted: G D 5.6.3 #60
[ 573.956534] Hardware name: Annapurna Labs Alpine
[ 573.961158] Workqueue: events phy_poll_task [phy_helper@0x7f0d5000]
[ 573.967417] {bf3e1e54} _stext+0x97a4/0x4338e8
[ 573.971766] {bf3e1e5c} _stext+0x420060/0x4338e8
[ 573.976288] {bf3e1e6c} _stext+0xbef0/0x4338e8
[ 573.980637] {bf3e1e84} _stext+0x1b348c/0x4338e8
[ 573.985159] {bf3e1e9c} _stext+0x1acc/0x4338e8
[ 573.989507] Exception stack(0xbf3e1ea0 to 0xbf3e1ee8)
[ 573.994550] 1ea0: 00000001 bdaef8c0 00000000 00000000 00000002 80965b70 00000000 bf7c3d00
[ 574.002712] 1ec0: 00000002 00000000 7f0dd498 8090aa70 80965b68 bf3e1ef0 bf3e0000 801479bc
[ 574.010871] 1ee0: 20000013 ffffffff
[ 574.014354] {bf3e1eec} _stext+0x479bc/0x4338e8
[ 574.018790] {bf3e1ef4} __schedule+0xed4/0xcc718
[ 574.023318] {bf3e1f2c} phy_poll_task+0x10/0x6c [phy_helper@0x7f0d5000]
[ 574.029834] {bf3e1f3c} _stext+0x2cae4/0x4338e8
[ 574.034269] {bf3e1f64} _stext+0x2cde4/0x4338e8
[ 574.038704] {bf3e1f8c} _stext+0x31acc/0x4338e8
[ 574.043139] {bf3e1fac} _stext+0x10e8/0x4338e8
[ 574.047486] Exception stack(0xbf3e1fb0 to 0xbf3e1ff8)
[ 574.052528] 1fa0: 00000000 00000000 00000000 00000000
[ 574.060689] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 574.068848] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 574.075449] CPU3: stopping
[ 574.078155] CPU: 3 PID: 0 Comm: swapper/3 Tainted: G D 5.6.3 #60
[ 574.085449] Hardware name: Annapurna Labs Alpine
[ 574.090059] {bf09bf34} _stext+0x97a4/0x4338e8
[ 574.094409] {bf09bf3c} _stext+0x420060/0x4338e8
[ 574.098931] {bf09bf4c} _stext+0xbef0/0x4338e8
[ 574.103280] {bf09bf64} _stext+0x1b348c/0x4338e8
[ 574.107802] {bf09bf7c} _stext+0x1acc/0x4338e8
[ 574.112149] Exception stack(0xbf09bf80 to 0xbf09bfc8)
[ 574.117193] bf80: 0056f0a8 00000000 0056f0a8 801142a0 bf09a000 00000008 80903e24 80903e60
[ 574.125354] bfa0: 0000406a 412fc0f4 00000000 00000000 00000000 bf09bfd0 80106f60 80106f50
[ 574.133512] bfc0: 60000013 ffffffff
[ 574.136994] {bf09bfcc} _stext+0x6f50/0x4338e8
[ 574.141343] {bf09bfd4} _stext+0x3a0d8/0x4338e8
[ 574.145778] {bf09bfec} _stext+0x3a368/0x4338e8
[ 574.150212] {bf09bff4} 0x10246c
[ 574.153348] CPU0: stopping
[ 574.156055] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G D 5.6.3 #60
[ 574.163348] Hardware name: Annapurna Labs Alpine
[ 574.167958] {80901f04} _stext+0x97a4/0x4338e8
[ 574.172307] {80901f0c} _stext+0x420060/0x4338e8
[ 574.176829] {80901f1c} _stext+0xbef0/0x4338e8
[ 574.181178] {80901f34} _stext+0x1b348c/0x4338e8
[ 574.185699] {80901f4c} _stext+0x1acc/0x4338e8
[ 574.190046] Exception stack(0x80901f50 to 0x80901f98)
[ 574.195089] 1f40: 03e58ba8 00000000 03e58ba8 801142a0
[ 574.203251] 1f60: 80900000 00000001 80903e24 80903e60 80824a38 412fc0f4 10c5387d 00000000
[ 574.211411] 1f80: 00000000 80901fa0 80106f60 80106f50 60000013 ffffffff
[ 574.218013] {80901f9c} _stext+0x6f50/0x4338e8
[ 574.222361] {80901fa4} _stext+0x3a0d8/0x4338e8
[ 574.226796] {80901fbc} _stext+0x3a368/0x4338e8
[ 574.231231] {80901fc4} _sinittext+0x934/0x20d80
[ 574.235820] save panic in NOR
[ 574.238782] al_spi_flash_init
[ 574.241751] ------------[ cut here ]------------
[ 574.246358] kernel BUG at mm/vmalloc.c:2111!
[ 574.250619] Internal error: Oops - BUG: 0 [#2] SMP ARM
[ 574.255747] CPU: 2 PID: 263 Comm: sysinit Tainted: G D 5.6.3 #60
[ 574.263039] Hardware name: Annapurna Labs Alpine
[ 574.267647] PC is at _stext+0xbd370/0x4338e8
[ 574.271908] LR is at _stext+0xbd558/0x4338e8
[ 574.276169] pc : [<801bd370>] lr : [<801bd558>] psr: 20000113
[ 574.282422] sp : bf0af998 ip : ff800000 fp : bf0afab0
[ 574.287636] r10: 809077a8 r9 : 00000000 r8 : c0800000
[ 574.292848] r7 : 00000cc0 r6 : 00000001 r5 : fd882000 r4 : 00001000
[ 574.299362] r3 : 00000400 r2 : 00000400 r1 : 00000001 r0 : 00001000
[ 574.305874] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none
[ 574.312994] Control: 10c5387d Table: 3975c06a DAC: 00000051
[ 574.318727] Process sysinit (pid: 263, stack limit = 0xed12ffa8)
[ 574.324722] {bf0af9bc} _stext+0xbd558/0x4338e8
[ 574.329157] {bf0af9d4} _stext+0x11e1c/0x4338e8
[ 574.333592] {bf0af9f4} _stext+0x11ea0/0x4338e8
[ 574.338036] {bf0afa04} al_spi_flash_init+0x28/0xac [flash@0x7f000000]
[ 574.344470] {bf0afa1c} custom_spi_on+0x14/0x190 [flash@0x7f000000]
[ 574.350642] {bf0afa24} panic_saver_release+0x110/0x1dc [panics@0x7f00f000]
[ 574.357502] {bf0afa44} _stext+0x32ab4/0x4338e8
[ 574.361937] {bf0afa64} _stext+0x32c70/0x4338e8
[ 574.366372] {bf0afa74} _stext+0x32c8c/0x4338e8
[ 574.370807] {bf0afa84} _stext+0x19b24/0x4338e8
[ 574.375243] {bf0afaac} _stext+0x9a20/0x4338e8
[ 574.379591] {bf0afae4} _stext+0xff90/0x4338e8
[ 574.383940] {bf0afafc} _stext+0x102b0/0x4338e8
[ 574.388375] {bf0afb3c} _stext+0x103f8/0x4338e8
[ 574.392809] {bf0afb64} _stext+0x1a38/0x4338e8
[ 574.397157] Exception stack(0xbf0afb68 to 0xbf0afbb0)
[ 574.402198] fb60: 00000000 07ffffff 00000002 00000003 00000000 bcdc4e00
[ 574.410359] fb80: 00000002 bcefd6c0 8087d23c 00000004 8087d23c 00000000 00000000 bf0afbb8
[ 574.418518] fba0: 8012c5c8 8012c610 60000093 ffffffff
[ 574.423559] {bf0afbb4} _stext+0x2c610/0x4338e8
[ 574.427994] {bf0afbe4} _stext+0x2c820/0x4338e8
[ 574.432433] {bf0afbfc} switch_switchdev_event+0x1cc/0x244 [switch@0x7f0e6000]
[ 574.439553] {bf0afc1c} _stext+0x32ab4/0x4338e8
[ 574.443988] {bf0afc3c} _stext+0x32c70/0x4338e8
[ 574.448423] {bf0afc4c} _stext+0x32c8c/0x4338e8
[ 574.452865] {bf0afc5c} br_switchdev_fdb_notify+0xbc/0xc4 [bridge2@0x7f0f4000]
[ 574.459993] {bf0afc74} br_fdb_find_port+0x73c/0xdb0 [bridge2@0x7f0f4000]
[ 574.466687] {bf0afc9c} br_fdb_find_port+0xa88/0xdb0 [bridge2@0x7f0f4000]
[ 574.473381] {bf0afd84} br_fdb_delete_by_port+0x88/0xb4 [bridge2@0x7f0f4000]
[ 574.480335] {bf0afda4} br_device_event+0x1b0/0x1dc [bridge2@0x7f0f4000]
[ 574.486935] {bf0afdc4} _stext+0x32ab4/0x4338e8
[ 574.491370] {bf0afde4} _stext+0x32d28/0x4338e8
[ 574.495805] {bf0afdf4} _stext+0x36124c/0x4338e8
[ 574.500326] {bf0afe04} _stext+0x366d54/0x4338e8
[ 574.504847] {bf0afe24} _stext+0x3673d0/0x4338e8
[ 574.509368] {bf0afe3c} _stext+0x3e44c8/0x4338e8
[ 574.513890] {bf0afe8c} _stext+0x3e66ac/0x4338e8
[ 574.518411] {bf0afef4} _stext+0x3490fc/0x4338e8
[ 574.522931] {bf0aff34} _stext+0xdd9cc/0x4338e8
[ 574.527366] {bf0aff3c} _stext+0xdded0/0x4338e8
[ 574.531801] {bf0affa4} _stext+0x1000/0x4338e8
[ 574.536148] Exception stack(0xbf0affa8 to 0xbf0afff0)
[ 574.541190] ffa0: 7efffbd0 0002d390 00000003 00008914 7efffb88 7efffb18
[ 574.549350] ffc0: 7efffbd0 0002d390 00000002 00000036 00000001 00000003 00000000 00000000
[ 574.557509] ffe0: 0002d018 7efffb00 00015410 76fced14
[ 574.562552] Code: e59f30fc e0033002 e3530000 0a000000 (e7f001f2)
[ 574.568633] ---[ end trace 35b3c22b82377f69 ]---
[ 574.574240] Kernel panic - not syncing: Fatal exception in interrupt
Exactly. L3 HW for IPv6 is on the roadmap.I may be mistaken, but my understanding is that it is only limited to IPv4 for now, and L3 offloading for IPv6 is coming.It's a pity that L3 offloading is limited to IPv4 only, but it's impressive nevertheless.
Be still, my beating heart !Exactly. L3 HW for IPv6 is on the roadmap.I may be mistaken, but my understanding is that it is only limited to IPv4 for now, and L3 offloading for IPv6 is coming.It's a pity that L3 offloading is limited to IPv4 only, but it's impressive nevertheless.
And any news on fasttrack for ipv6 on CCRs (when you have fw rules) ?Exactly. L3 HW for IPv6 is on the roadmap.I may be mistaken, but my understanding is that it is only limited to IPv4 for now, and L3 offloading for IPv6 is coming.It's a pity that L3 offloading is limited to IPv4 only, but it's impressive nevertheless.
Looks like identical behaviour that I was seeing on my RB3011-iUAS-RM - Kernel panic was posted a number of posts up.
On my device, a kernel panic occurs on reboot that appears to be related to this issue. If I have no bridges, the kernel panic does not occur. If I have at least one bridge, I get this kernel panic each time I try to reboot:
Device is RB4011 wifi model. 7.1beta6 works OK aside from this.Code: Select all[admin@Michael-RB4011] > Rebooting... [ 573.721183] Internal error: Oops: 17 [#1] SMP ARM [ 573.725884] CPU: 2 PID: 263 Comm: sysinit Not tainted 5.6.3 #60 [ 573.731791] Hardware name: Annapurna Labs Alpine [ 573.736402] PC is at _stext+0x2c610/0x4338e8 [ 573.740663] LR is at _stext+0x2c5c8/0x4338e8 [ 573.744924] pc : [<8012c610>] lr : [<8012c5c8>] psr: 60000093 [ 573.751177] sp : bf0afbb8 ip : 00000000 fp : 00000000 [ 573.756390] r10: 8087d23c r9 : 00000004 r8 : 8087d23c [ 573.761604] r7 : bcefd6c0 r6 : 00000002 r5 : bcdc4e00 r4 : 00000000 [ 573.768118] r3 : 00000003 r2 : 00000002 r1 : 07ffffff r0 : 00000000 [ 573.774632] Flags: nZCv IRQs off FIQs on Mode SVC_32 ISA ARM Segment none [ 573.781839] Control: 10c5387d Table: 3975c06a DAC: 00000051 [ 573.787572] Process sysinit (pid: 263, stack limit = 0xed12ffa8) [ 573.793571] {bf0afbe4} _stext+0x2c820/0x4338e8 [ 573.798014] {bf0afbfc} switch_switchdev_event+0x1cc/0x244 [switch@0x7f0e6000] [ 573.805139] {bf0afc1c} _stext+0x32ab4/0x4338e8 [ 573.809573] {bf0afc3c} _stext+0x32c70/0x4338e8 [ 573.814009] {bf0afc4c} _stext+0x32c8c/0x4338e8 [ 573.818453] {bf0afc5c} br_switchdev_fdb_notify+0xbc/0xc4 [bridge2@0x7f0f4000] [ 573.825583] {bf0afc74} br_fdb_find_port+0x73c/0xdb0 [bridge2@0x7f0f4000] [ 573.832278] {bf0afc9c} br_fdb_find_port+0xa88/0xdb0 [bridge2@0x7f0f4000] [ 573.838972] {bf0afd84} br_fdb_delete_by_port+0x88/0xb4 [bridge2@0x7f0f4000] [ 573.845927] {bf0afda4} br_device_event+0x1b0/0x1dc [bridge2@0x7f0f4000] [ 573.852527] {bf0afdc4} _stext+0x32ab4/0x4338e8 [ 573.856962] {bf0afde4} _stext+0x32d28/0x4338e8 [ 573.861397] {bf0afdf4} _stext+0x36124c/0x4338e8 [ 573.865919] {bf0afe04} _stext+0x366d54/0x4338e8 [ 573.870441] {bf0afe24} _stext+0x3673d0/0x4338e8 [ 573.874962] {bf0afe3c} _stext+0x3e44c8/0x4338e8 [ 573.879484] {bf0afe8c} _stext+0x3e66ac/0x4338e8 [ 573.884006] {bf0afef4} _stext+0x3490fc/0x4338e8 [ 573.888527] {bf0aff34} _stext+0xdd9cc/0x4338e8 [ 573.892963] {bf0aff3c} _stext+0xdded0/0x4338e8 [ 573.897397] {bf0affa4} _stext+0x1000/0x4338e8 [ 573.901745] Exception stack(0xbf0affa8 to 0xbf0afff0) [ 573.906787] ffa0: 7efffbd0 0002d390 00000003 00008914 7efffb88 7efffb18 [ 573.914948] ffc0: 7efffbd0 0002d390 00000002 00000036 00000001 00000003 00000000 00000000 [ 573.923108] ffe0: 0002d018 7efffb00 00015410 76fced14 [ 573.928151] Code: 01a04003 0a000003 e1a0000b ebfffcd0 (e5940000) [ 573.934234] ---[ end trace 35b3c22b82377f68 ]--- [ 573.939842] Kernel panic - not syncing: Fatal exception in interrupt [ 573.946189] CPU1: stopping [ 573.948896] CPU: 1 PID: 259 Comm: kworker/1:0 Tainted: G D 5.6.3 #60 [ 573.956534] Hardware name: Annapurna Labs Alpine [ 573.961158] Workqueue: events phy_poll_task [phy_helper@0x7f0d5000] [ 573.967417] {bf3e1e54} _stext+0x97a4/0x4338e8 [ 573.971766] {bf3e1e5c} _stext+0x420060/0x4338e8 [ 573.976288] {bf3e1e6c} _stext+0xbef0/0x4338e8 [ 573.980637] {bf3e1e84} _stext+0x1b348c/0x4338e8 [ 573.985159] {bf3e1e9c} _stext+0x1acc/0x4338e8 [ 573.989507] Exception stack(0xbf3e1ea0 to 0xbf3e1ee8) [ 573.994550] 1ea0: 00000001 bdaef8c0 00000000 00000000 00000002 80965b70 00000000 bf7c3d00 [ 574.002712] 1ec0: 00000002 00000000 7f0dd498 8090aa70 80965b68 bf3e1ef0 bf3e0000 801479bc [ 574.010871] 1ee0: 20000013 ffffffff [ 574.014354] {bf3e1eec} _stext+0x479bc/0x4338e8 [ 574.018790] {bf3e1ef4} __schedule+0xed4/0xcc718 [ 574.023318] {bf3e1f2c} phy_poll_task+0x10/0x6c [phy_helper@0x7f0d5000] [ 574.029834] {bf3e1f3c} _stext+0x2cae4/0x4338e8 [ 574.034269] {bf3e1f64} _stext+0x2cde4/0x4338e8 [ 574.038704] {bf3e1f8c} _stext+0x31acc/0x4338e8 [ 574.043139] {bf3e1fac} _stext+0x10e8/0x4338e8 [ 574.047486] Exception stack(0xbf3e1fb0 to 0xbf3e1ff8) [ 574.052528] 1fa0: 00000000 00000000 00000000 00000000 [ 574.060689] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 574.068848] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 574.075449] CPU3: stopping [ 574.078155] CPU: 3 PID: 0 Comm: swapper/3 Tainted: G D 5.6.3 #60 [ 574.085449] Hardware name: Annapurna Labs Alpine [ 574.090059] {bf09bf34} _stext+0x97a4/0x4338e8 [ 574.094409] {bf09bf3c} _stext+0x420060/0x4338e8 [ 574.098931] {bf09bf4c} _stext+0xbef0/0x4338e8 [ 574.103280] {bf09bf64} _stext+0x1b348c/0x4338e8 [ 574.107802] {bf09bf7c} _stext+0x1acc/0x4338e8 [ 574.112149] Exception stack(0xbf09bf80 to 0xbf09bfc8) [ 574.117193] bf80: 0056f0a8 00000000 0056f0a8 801142a0 bf09a000 00000008 80903e24 80903e60 [ 574.125354] bfa0: 0000406a 412fc0f4 00000000 00000000 00000000 bf09bfd0 80106f60 80106f50 [ 574.133512] bfc0: 60000013 ffffffff [ 574.136994] {bf09bfcc} _stext+0x6f50/0x4338e8 [ 574.141343] {bf09bfd4} _stext+0x3a0d8/0x4338e8 [ 574.145778] {bf09bfec} _stext+0x3a368/0x4338e8 [ 574.150212] {bf09bff4} 0x10246c [ 574.153348] CPU0: stopping [ 574.156055] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G D 5.6.3 #60 [ 574.163348] Hardware name: Annapurna Labs Alpine [ 574.167958] {80901f04} _stext+0x97a4/0x4338e8 [ 574.172307] {80901f0c} _stext+0x420060/0x4338e8 [ 574.176829] {80901f1c} _stext+0xbef0/0x4338e8 [ 574.181178] {80901f34} _stext+0x1b348c/0x4338e8 [ 574.185699] {80901f4c} _stext+0x1acc/0x4338e8 [ 574.190046] Exception stack(0x80901f50 to 0x80901f98) [ 574.195089] 1f40: 03e58ba8 00000000 03e58ba8 801142a0 [ 574.203251] 1f60: 80900000 00000001 80903e24 80903e60 80824a38 412fc0f4 10c5387d 00000000 [ 574.211411] 1f80: 00000000 80901fa0 80106f60 80106f50 60000013 ffffffff [ 574.218013] {80901f9c} _stext+0x6f50/0x4338e8 [ 574.222361] {80901fa4} _stext+0x3a0d8/0x4338e8 [ 574.226796] {80901fbc} _stext+0x3a368/0x4338e8 [ 574.231231] {80901fc4} _sinittext+0x934/0x20d80 [ 574.235820] save panic in NOR [ 574.238782] al_spi_flash_init [ 574.241751] ------------[ cut here ]------------ [ 574.246358] kernel BUG at mm/vmalloc.c:2111! [ 574.250619] Internal error: Oops - BUG: 0 [#2] SMP ARM [ 574.255747] CPU: 2 PID: 263 Comm: sysinit Tainted: G D 5.6.3 #60 [ 574.263039] Hardware name: Annapurna Labs Alpine [ 574.267647] PC is at _stext+0xbd370/0x4338e8 [ 574.271908] LR is at _stext+0xbd558/0x4338e8 [ 574.276169] pc : [<801bd370>] lr : [<801bd558>] psr: 20000113 [ 574.282422] sp : bf0af998 ip : ff800000 fp : bf0afab0 [ 574.287636] r10: 809077a8 r9 : 00000000 r8 : c0800000 [ 574.292848] r7 : 00000cc0 r6 : 00000001 r5 : fd882000 r4 : 00001000 [ 574.299362] r3 : 00000400 r2 : 00000400 r1 : 00000001 r0 : 00001000 [ 574.305874] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 574.312994] Control: 10c5387d Table: 3975c06a DAC: 00000051 [ 574.318727] Process sysinit (pid: 263, stack limit = 0xed12ffa8) [ 574.324722] {bf0af9bc} _stext+0xbd558/0x4338e8 [ 574.329157] {bf0af9d4} _stext+0x11e1c/0x4338e8 [ 574.333592] {bf0af9f4} _stext+0x11ea0/0x4338e8 [ 574.338036] {bf0afa04} al_spi_flash_init+0x28/0xac [flash@0x7f000000] [ 574.344470] {bf0afa1c} custom_spi_on+0x14/0x190 [flash@0x7f000000] [ 574.350642] {bf0afa24} panic_saver_release+0x110/0x1dc [panics@0x7f00f000] [ 574.357502] {bf0afa44} _stext+0x32ab4/0x4338e8 [ 574.361937] {bf0afa64} _stext+0x32c70/0x4338e8 [ 574.366372] {bf0afa74} _stext+0x32c8c/0x4338e8 [ 574.370807] {bf0afa84} _stext+0x19b24/0x4338e8 [ 574.375243] {bf0afaac} _stext+0x9a20/0x4338e8 [ 574.379591] {bf0afae4} _stext+0xff90/0x4338e8 [ 574.383940] {bf0afafc} _stext+0x102b0/0x4338e8 [ 574.388375] {bf0afb3c} _stext+0x103f8/0x4338e8 [ 574.392809] {bf0afb64} _stext+0x1a38/0x4338e8 [ 574.397157] Exception stack(0xbf0afb68 to 0xbf0afbb0) [ 574.402198] fb60: 00000000 07ffffff 00000002 00000003 00000000 bcdc4e00 [ 574.410359] fb80: 00000002 bcefd6c0 8087d23c 00000004 8087d23c 00000000 00000000 bf0afbb8 [ 574.418518] fba0: 8012c5c8 8012c610 60000093 ffffffff [ 574.423559] {bf0afbb4} _stext+0x2c610/0x4338e8 [ 574.427994] {bf0afbe4} _stext+0x2c820/0x4338e8 [ 574.432433] {bf0afbfc} switch_switchdev_event+0x1cc/0x244 [switch@0x7f0e6000] [ 574.439553] {bf0afc1c} _stext+0x32ab4/0x4338e8 [ 574.443988] {bf0afc3c} _stext+0x32c70/0x4338e8 [ 574.448423] {bf0afc4c} _stext+0x32c8c/0x4338e8 [ 574.452865] {bf0afc5c} br_switchdev_fdb_notify+0xbc/0xc4 [bridge2@0x7f0f4000] [ 574.459993] {bf0afc74} br_fdb_find_port+0x73c/0xdb0 [bridge2@0x7f0f4000] [ 574.466687] {bf0afc9c} br_fdb_find_port+0xa88/0xdb0 [bridge2@0x7f0f4000] [ 574.473381] {bf0afd84} br_fdb_delete_by_port+0x88/0xb4 [bridge2@0x7f0f4000] [ 574.480335] {bf0afda4} br_device_event+0x1b0/0x1dc [bridge2@0x7f0f4000] [ 574.486935] {bf0afdc4} _stext+0x32ab4/0x4338e8 [ 574.491370] {bf0afde4} _stext+0x32d28/0x4338e8 [ 574.495805] {bf0afdf4} _stext+0x36124c/0x4338e8 [ 574.500326] {bf0afe04} _stext+0x366d54/0x4338e8 [ 574.504847] {bf0afe24} _stext+0x3673d0/0x4338e8 [ 574.509368] {bf0afe3c} _stext+0x3e44c8/0x4338e8 [ 574.513890] {bf0afe8c} _stext+0x3e66ac/0x4338e8 [ 574.518411] {bf0afef4} _stext+0x3490fc/0x4338e8 [ 574.522931] {bf0aff34} _stext+0xdd9cc/0x4338e8 [ 574.527366] {bf0aff3c} _stext+0xdded0/0x4338e8 [ 574.531801] {bf0affa4} _stext+0x1000/0x4338e8 [ 574.536148] Exception stack(0xbf0affa8 to 0xbf0afff0) [ 574.541190] ffa0: 7efffbd0 0002d390 00000003 00008914 7efffb88 7efffb18 [ 574.549350] ffc0: 7efffbd0 0002d390 00000002 00000036 00000001 00000003 00000000 00000000 [ 574.557509] ffe0: 0002d018 7efffb00 00015410 76fced14 [ 574.562552] Code: e59f30fc e0033002 e3530000 0a000000 (e7f001f2) [ 574.568633] ---[ end trace 35b3c22b82377f69 ]--- [ 574.574240] Kernel panic - not syncing: Fatal exception in interrupt
someone at MT could add "known problems" and reflect this in the changelog. Basic respect for your users.After update my RBM11G w/ R11e-LTE6 from beta5 to beta6 the LTE modem can't connect to BS. I'm downgrade to beta5 now.
i also noticed a similar thing. my ltap mini was running 7.1b5, and i upgraded it to 7.1b6. it worked for 2-3 days, and after a reboot it suddenly got into a state, that the LTE modem kept saying "tx/rx circuits disabled". SIM PIN was OK, i even disabled it just to make sure.After update my RBM11G w/ R11e-LTE6 from beta5 to beta6 the LTE modem can't connect to BS. I'm downgrade to beta5 now.
i also noticed a similar thing. my ltap mini was running 7.1b5, and i upgraded it to 7.1b6. it worked for 2-3 days, and after a reboot it suddenly got into a state, that the LTE modem kept saying "tx/rx circuits disabled". SIM PIN was OK, i even disabled it just to make sure.After update my RBM11G w/ R11e-LTE6 from beta5 to beta6 the LTE modem can't connect to BS. I'm downgrade to beta5 now.
it all boiled down to routeros saying "modem not initialised" if i wanted to do cell scan or operator scan. regardless what i did. i did a full reset (/system reset-config no-defaults=yes) and a modem reset via AT command "AT+RSTSET", none of this helped. rebooted / power cycled it, also the modem separately via /sys/routerboard/usb/bus-reset, still no improvement.
i felt puzzled as it clearly worked before and it seemed to be ok.
then i took a breath and downgraded it to 6.49b46, and everything works.
will try to reproduce and do some supout files for support
That is great news. Will this include IPv6 fasttrack to allow firewall usage?Exactly. L3 HW for IPv6 is on the roadmap.
OSPFv3 is still not working in v7. Given that the beta releases have been about 2 months apart from one another, the next will likely be mid to late July, unless they start speeding up.Any news on IPv6 hardware offload? That's what I'm waiting on to start testing. I want the hardware offload for an ospfv3 routed network and with no fastpath support for ipv6 in routeros6 (or 7...) it kinda disqualifies the hardware.
It's marketed as beta, and there is hardware that is shipped with beta software!! Whatever it is, Mikrotik has decided to ship beta/testing/whatever software to it's end customers. Of course you expect a more stable product then.Too many complaints about beta or alpha.
It is a testing release so bad things happen. Whether it is beta or alpha, I do not see the point, you install it and take the risk of things not working as supposed to. Remember that mikrotik tries to put lot of features in one box so it is not that easy to fix lots of them in one shot. It is not like other vendors who put a couple of features in one router and that is it.
Instead of many complaints, try to cooperate and pinpoint the issue if you can, or write to support for the issue you are experiencing, that is how testing works. I do not see you trying to solve the issues but venting your frustration in the forum which has been said a thousands times that is just a user forum, you need to write to support for problem solving if not found in the forum.
/routing ospf instance
add name=OSPFv2 router-id=TestMTik
/routing ospf area
add instance=OSPFv2 name=Backbone-v2
/routing ospf interface-template
add area=Backbone-v2 interfaces=ether1
add area=Backbone-v2 interfaces=Loopback passive
add area=Backbone-v2 networks=x.x.x.x/19 passive
routing/ospf/instance/add name=OSPFv3 router-id=TestMTik version=3
routing/ospf/area/add instance=OSPFv3 name=Backbone-v3
routing/ospf/export
I installed OpenWRT on both my CapAcs this weekend and I am truly impressed. My use case is they are dumb access points with 2 VLANs, one for my private network and one for my guest network. The transition went smoothly, the wife didn't even notice.https://github.com/openwrt/openwrt/pull/4055 => Nice to see that work was restarted for getting a port done. The actual goal would be to get it into official 21.02 branch in order to reach long term support.Meanwhile I am trying to support an openwrt project that would bring better wifi drivers to my cAP acs at home.
Probably if you are doing a factory reset to load the DefConf, you may need to do it without the wifiwave2 package enabled, then enable the wifiwave2 package afterwards.RB4011iGS+5HacQ2HnD
v7.1beta6 + wave2
errors in log:
memory - script - warning - DefConf gen: Unable to find wireless interface(s)
memory - system - error - critical - error while running customized default configuration script: interrupted
It isn't just with yours - this happens to everybody with beta6 from what I can tell. I reported this exact issue already earlier in this thread, here: viewtopic.php?f=1&t=175369&p=859147#p858140The Winbox that I enabled safe mode in says that it's been 40 minutes since it lost connection. The automatic reboot that is supposed to occur upon loss of connection has not happened. I'll be using the console to restore a backup from before the upgrade to v7.1beta6 which did not have OSPFv3 configured.
That's the plan. Unless something utterly goes wrong.@raimondsp thanks for the info. Do you guys expect this by year end? (HW IPv6)
Good evening, I am using the rbm11g router, this router has 7.1beta6 firmware installed
The Quectel EC25-E module is connected to this device in mbim mode, but there is no connection. The module works, but the IP address of the provider is not issued, an error in the mbim operation is displayed
https://drive.google.com/file/d/1Cm53aY ... sp=sharing
https://drive.google.com/file/d/11HamUs ... sp=sharing
That's the plan. Unless something utterly goes wrong.
That's the plan. Unless something utterly goes wrong.
Are the DX3000/2000 Series products capable of HW IPv6 routing as well?
If yes, and if implementation is successful, do you expect they'll hold at least 1000-2000 IPv6 prefixes?
What's this mean for routeros though? (DX3000/2000 devices) Will we see hardware ipv6 routing so long as we either don't configure any ipv6 firewall rules (ie, no way to get the route 'out' of the CPU) or if we do a VRF or something? Routing via CPU on these devices is abysmal, currently hanging a router-on-a-stick off them but I'd really like to ditch this process and get hardware offload onboard. NP16 is a fantastic device so this is a big ticket item for me and a lot of wisps.The DX3000/2000 Series products are capable of HW IPv6 routing (no HW Fasttrack, though). Both IPv4 and IPv6 routes share the same hardware memory; IPv6 routes occupy 4x more space than IPv4. If I'm not mistaken, the DX3000/2000 series products will be able to hold up to 3328 IPv6 prefixes (13312 / 4).
Please take into account that the DX8000 series have a completely different hardware routing engine than DX3000/2000, so we have to write two L3 HW offload implementations. We are focusing on the DX8000 first (CRS309, CRS317, etc.), then move on to DX3000/2000 (CRS305, CRS328, etc.).
Well I do not determine the priorities and I do not know about that big customer that wanted hw acceleration, but I would (and I think I am not the only one) prefer this sequence of v7 implementation:That's the plan. Unless something utterly goes wrong.@raimondsp thanks for the info. Do you guys expect this by year end? (HW IPv6)
Although I don't know what their priorities are, one issue that i might see with where you place #1 is that to finish porting everything that is in v6 (meaning the various kernel modifications), they would lock themselves down to a particular kernel version. They might have to redo the modifications in #1 later if they wanted to upgrade the kernel. I suspect they are doing 2 and some of 3 beforehand on purpose, so that they can give the kernel one final update to whatever the latest LTS kernel is, before porting the modifications over, like GRE keepalives. This is just a guess, but otherwise, we would likely have seen GRE keepalives already. This means it would take longer for us to get a v7 with all the kernel modifications to v6, but we could get a newer kernel sooner.Well I do not determine the priorities and I do not know about that big customer that wanted hw acceleration, but I would (and I think I am not the only one) prefer this sequence of v7 implementation:
1. finish the porting of everything that was in v6 so it can be realistically BETA-tested (maybe with exception of the routing code)
2. add/finish the major features that have been promised for the past 5+ years to be available in v7 (new routing, new VPN protocols, better IPv6 support etc)
3. work on completely new features that were not in v6 and now become possible (wifi wave2, hw accel etc)
I do appreciate that MikroTik work on new (for them) features like hw accel, but in the meantime I (and others) am waiting on features were promised for v7, are available as unfinished teasers, but now have to wait longer and longer for a stable version because the effort goes into features I don't need on router or wifi devices...
What's this mean for routeros though? (DX3000/2000 devices) Will we see hardware ipv6 routing so long as we either don't configure any ipv6 firewall rules (ie, no way to get the route 'out' of the CPU) or if we do a VRF or something? Routing via CPU on these devices is abysmal, currently hanging a router-on-a-stick off them but I'd really like to ditch this process and get hardware offload onboard. NP16 is a fantastic device so this is a big ticket item for me and a lot of wisps.
For another network, I use IPv6 as an underlay so customers are isolated in a tunnel at the DMARC (can't wait for vxlan over IP/evpn etc hopefully in hardware...SRv6 even better.). Similar question here in that I mostly want hardware IPv6 routing and a basic firewall for packets targeting the device just to be on the safe side. Generally packets will be encapsulated so no worries. Also, this is likely a DX8xxx series switch, probably CRS309 for those SFP+ ports. It's not clear if you we're saying that only the DX2/3 series can't do fasttrack while the DX8x CAN.
Well I do not determine the priorities and I do not know about that big customer that wanted hw acceleration, but I would (and I think I am not the only one) prefer this sequence of v7 implementation:
1. finish the porting of everything that was in v6 so it can be realistically BETA-tested (maybe with exception of the routing code)
2. add/finish the major features that have been promised for the past 5+ years to be available in v7 (new routing, new VPN protocols, better IPv6 support etc)
3. work on completely new features that were not in v6 and now become possible (wifi wave2, hw accel etc)
I do appreciate that MikroTik work on new (for them) features like hw accel, but in the meantime I (and others) am waiting on features were promised for v7, are available as unfinished teasers, but now have to wait longer and longer for a stable version because the effort goes into features I don't need on router or wifi devices...
In other words, the development takes time, and assigning more developers to the same task is not always effective and sometimes even counterproductive. For example, if we had moved developers from Wireguard or L3HW Offloading to aid in routing protocols development, would the latter be finished by this day? Maybe, or maybe not. However, the one is certain: there wouldn't be Wireguad and L3HW now. I can assure you that MikroTik did NOT sacrifice the existing (in v6) features to favor the new ones. On the contrary, the developer staff has been greatly expanded. For instance, such new features as Wireguard, RestAPI, or L3 HW Offloading have been developed by newly hired developers while the existing staff continued doing #1 and #2 of your list.While it takes one woman nine months to make one baby, "nine women can't make a baby in one month"
I know about that, I have developed software for many years, but I also recognize the phenomenon that it is much more attractive to work on shiny new features than to make existing features that were broken by accident or because of unfinished work to be working again.In other words, the development takes time, and assigning more developers to the same task is not always effective and sometimes even counterproductive. For example, if we had moved developers from Wireguard or L3HW Offloading to aid in routing protocols development, would the latter be finished by this day? Maybe, or maybe not.
That is the basic problem behind kernel upgrades in RouterOS and it is caused by working on a fork of the Linux kernel instead of submitting patches back to the kernel developers and getting them accepted.Although I don't know what their priorities are, one issue that i might see with where you place #1 is that to finish porting everything that is in v6 (meaning the various kernel modifications), they would lock themselves down to a particular kernel version. They might have to redo the modifications in #1 later if they wanted to upgrade the kernel.
The DX3000/2000 Series products are capable of HW IPv6 routing (no HW Fasttrack, though). Both IPv4 and IPv6 routes share the same hardware memory; IPv6 routes occupy 4x more space than IPv4. If I'm not mistaken, the DX3000/2000 series products will be able to hold up to 3328 IPv6 prefixes (13312 / 4).
Please take into account that the DX8000 series have a completely different hardware routing engine than DX3000/2000, so we have to write two L3 HW offload implementations. We are focusing on the DX8000 first (CRS309, CRS317, etc.), then move on to DX3000/2000 (CRS305, CRS328, etc.).
Is there any hope for jumbo frames and L3 HW to work at the same time?RouterOS version 7.1beta6 has been released in public "development" channel!
What's new in 7.1beta6 (2021-May-18 14:49):
!) added support for Let's Encrypt certificate generation;
!) added L3 HW support for all CRS3xx devices;
!) added MLAG support for CRS3xx devices (CLI only);
!) ported features and fixes introduced in v6.49;
*) other minor fixes and improvements;
All released RouterOS v7 changelogs are available here:
https://mikrotik.com/download/changelog ... lease-tree
Is there any hope for jumbo frames and L3 HW to work at the same time?
What do they expect to be different this time? This sounds like the same process that got us here — 5 years of unprocessed feature backlog, big bang release, etc.That is the basic problem behind kernel upgrades in RouterOS and it is caused by working on a fork of the Linux kernel instead of submitting patches back to the kernel developers and getting them accepted.Although I don't know what their priorities are, one issue that i might see with where you place #1 is that to finish porting everything that is in v6 (meaning the various kernel modifications), they would lock themselves down to a particular kernel version. They might have to redo the modifications in #1 later if they wanted to upgrade the kernel.
I understand why they do that, because it is very difficult to get patches accepted and it will take several developer FTE extra to coordinate that, probably much more than to re-develop the patches every couple of years to track the kernel.
I think now a new kernel version for v7 has been decided (a long-term supported version) and only security fixes from upstream will be integrated into their own fork.
We will have that same kernel (at least that version number) for the next 5-10 years.
I look forward to it very much, it is my biggest obstacle to using L3 HWIs there any hope for jumbo frames and L3 HW to work at the same time?
Yes, it is also on the roadmap.
Having contributed to the Kernel before I would say the process works pretty well, as long as you are able to align your own development processes with it.That is the basic problem behind kernel upgrades in RouterOS and it is caused by working on a fork of the Linux kernel instead of submitting patches back to the kernel developers and getting them accepted.Although I don't know what their priorities are, one issue that i might see with where you place #1 is that to finish porting everything that is in v6 (meaning the various kernel modifications), they would lock themselves down to a particular kernel version. They might have to redo the modifications in #1 later if they wanted to upgrade the kernel.
I understand why they do that, because it is very difficult to get patches accepted and it will take several developer FTE extra to coordinate that, probably much more than to re-develop the patches every couple of years to track the kernel.
I think now a new kernel version for v7 has been decided (a long-term supported version) and only security fixes from upstream will be integrated into their own fork.
We will have that same kernel (at least that version number) for the next 5-10 years.
They have removed IP accounting.keep in mind that mikrotik doesn't have to 'port' a lot of things from v6
Incorrect. RouterOS does not run the opensource openvpn implementation, it has its own crippled version.keep in mind that mikrotik doesn't have to 'port' a lot of things from v6, they have up-to-date mainline packages they can bring in and just 'port' the UI for it. ie, they aren't going to re-implement openvpn from v6.... they'll bring in mainline openvpn w/o having to do any weird stuff to it because they aren't held back by the old kernel.
I don't mean work in the development, but work w.r.t. convincing kernel developers that some addition is a good idea, that it should not be done in aHaving contributed to the Kernel before I would say the process works pretty well, as long as you are able to align your own development processes with it.
I would argue MikroTik has about as much work with maintaining a fork of their own as it would have putting everything upstream.
I'm pretty sure none of these are in mainline, even today: PPP BCP, GRE keepalives, iptables and ebtables "set priority" and other priority related handling. Probably more things aside from those.you guys are way too deep in the weeds here. In the past maybe a bunch of kernel patches were necessary but today the kernel is really mature and most anything mikrotik wants to do is likely in mainline already, else it's being handled by the SoC vendors because they need that feature to work too.
Fortunately I had migrated from IP accounting to netflow some time ago. I do not need an expensive netflow analyzer package, I just want to keepThey have removed IP accounting.
Enabling L3 offloading on my CRS309 completely ignores switch ACL rules then all traffics are permitted, even those only for L2 switching.
Disable L3 offloading and reboot makes ACL rules working again.
Are ACL rules broken with L3 offloading enabled in v7.1beta6?
/interface export hide-sensitive
Hi,Enabling L3 offloading on my CRS309 completely ignores switch ACL rules then all traffics are permitted, even those only for L2 switching.
Disable L3 offloading and reboot makes ACL rules working again.
Are ACL rules broken with L3 offloading enabled in v7.1beta6?
ACL rules should work with L3 HW offloading with exception of Fasttrack offloading. Offloaded Fasttrack connections have higher priority and bypass ACL rules. Other than that, hardware routing should obey ACL rules. Can you post your interface config please, so we try reproducing your issue on our side?
Code: Select all/interface export hide-sensitive
/interface bridge
add admin-mac=C4:AD:34:D5:C2:53 auto-mac=no comment=defconf igmp-snooping=yes name=bridge pvid=90 vlan-filtering=yes
/interface vlan
add interface=bridge name=uplink vlan-id=80
add interface=bridge name=vlan10 vlan-id=10
add interface=bridge name=vlan20 vlan-id=20
/interface ethernet switch
set 0 l3-hw-offloading=yes
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/interface bridge port
add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged interface=ether1 pvid=90
add bridge=bridge comment=defconf interface=sfp-sfpplus1 pvid=20
add bridge=bridge comment=defconf interface=sfp-sfpplus2 pvid=20
add bridge=bridge comment=defconf interface=sfp-sfpplus3 pvid=20
add bridge=bridge comment=defconf interface=sfp-sfpplus4 pvid=20
add bridge=bridge comment=defconf interface=sfp-sfpplus5
add bridge=bridge comment=defconf interface=sfp-sfpplus6
add bridge=bridge comment=defconf interface=sfp-sfpplus7
add bridge=bridge comment=defconf interface=sfp-sfpplus8
/interface bridge vlan
add bridge=bridge comment=MGMT tagged=sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus6,sfp-sfpplus5 vlan-ids=90
add bridge=bridge comment="Uplink to Transit" tagged=sfp-sfpplus5,bridge vlan-ids=80
add bridge=bridge comment="User VLAN" tagged=sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,bridge,sfp-sfpplus5 vlan-ids=10
add bridge=bridge comment="Service VLAN" tagged=bridge,sfp-sfpplus5 vlan-ids=20
/interface ethernet switch rule
add comment="Accept MGMT" dst-address=100.100.16.0/24 ports=sfp-sfpplus8,sfp-sfpplus7,sfp-sfpplus6,sfp-sfpplus5 src-address=100.100.16.0/24 \
switch=switch1
add comment="disallow non-MGMT" dst-address=100.100.16.0/24 new-dst-ports="" ports=sfp-sfpplus8,sfp-sfpplus7 src-address=0.0.0.0/0 switch=\
switch1
add comment="completely disable sfpplus1" new-dst-ports="" ports=sfp-sfpplus1 switch=switch1
/interface list member
add interface=ether1 list=WAN
add interface=sfp-sfpplus1 list=LAN
add interface=sfp-sfpplus2 list=LAN
add interface=sfp-sfpplus3 list=LAN
add interface=sfp-sfpplus4 list=LAN
add interface=sfp-sfpplus5 list=LAN
add interface=sfp-sfpplus6 list=LAN
add interface=sfp-sfpplus7 list=LAN
add interface=sfp-sfpplus8 list=LAN
Hi,Enabling L3 offloading on my CRS309 completely ignores switch ACL rules then all traffics are permitted, even those only for L2 switching.
Disable L3 offloading and reboot makes ACL rules working again.
Are ACL rules broken with L3 offloading enabled in v7.1beta6?
ACL rules should work with L3 HW offloading with exception of Fasttrack offloading. Offloaded Fasttrack connections have higher priority and bypass ACL rules. Other than that, hardware routing should obey ACL rules. Can you post your interface config please, so we try reproducing your issue on our side?
Code: Select all/interface export hide-sensitive
Sure.
In my following config, I added the 3rd switch rule to completely disable the sfpplus1 port. However, it has no effects when l3 offloading is on. If I turn off l3 offloading, that port will be completely blocked and cannot send out any packets, but if turn l3 offloading on again, the port is working again.
I don't have any stateful firewall configuration in /ip/firewall.
Code: Select all/interface bridge add admin-mac=C4:AD:34:D5:C2:53 auto-mac=no comment=defconf igmp-snooping=yes name=bridge pvid=90 vlan-filtering=yes /interface vlan add interface=bridge name=uplink vlan-id=80 add interface=bridge name=vlan10 vlan-id=10 add interface=bridge name=vlan20 vlan-id=20 /interface ethernet switch set 0 l3-hw-offloading=yes /interface list add name=WAN add name=LAN /interface wireless security-profiles set [ find default=yes ] supplicant-identity=MikroTik /interface bridge port add bridge=bridge comment=defconf frame-types=admit-only-untagged-and-priority-tagged interface=ether1 pvid=90 add bridge=bridge comment=defconf interface=sfp-sfpplus1 pvid=20 add bridge=bridge comment=defconf interface=sfp-sfpplus2 pvid=20 add bridge=bridge comment=defconf interface=sfp-sfpplus3 pvid=20 add bridge=bridge comment=defconf interface=sfp-sfpplus4 pvid=20 add bridge=bridge comment=defconf interface=sfp-sfpplus5 add bridge=bridge comment=defconf interface=sfp-sfpplus6 add bridge=bridge comment=defconf interface=sfp-sfpplus7 add bridge=bridge comment=defconf interface=sfp-sfpplus8 /interface bridge vlan add bridge=bridge comment=MGMT tagged=sfp-sfpplus7,sfp-sfpplus8,sfp-sfpplus6,sfp-sfpplus5 vlan-ids=90 add bridge=bridge comment="Uplink to Transit" tagged=sfp-sfpplus5,bridge vlan-ids=80 add bridge=bridge comment="User VLAN" tagged=sfp-sfpplus6,sfp-sfpplus7,sfp-sfpplus8,bridge,sfp-sfpplus5 vlan-ids=10 add bridge=bridge comment="Service VLAN" tagged=bridge,sfp-sfpplus5 vlan-ids=20 /interface ethernet switch rule add comment="Accept MGMT" dst-address=100.100.16.0/24 ports=sfp-sfpplus8,sfp-sfpplus7,sfp-sfpplus6,sfp-sfpplus5 src-address=100.100.16.0/24 \ switch=switch1 add comment="disallow non-MGMT" dst-address=100.100.16.0/24 new-dst-ports="" ports=sfp-sfpplus8,sfp-sfpplus7 src-address=0.0.0.0/0 switch=\ switch1 add comment="completely disable sfpplus1" new-dst-ports="" ports=sfp-sfpplus1 switch=switch1 /interface list member add interface=ether1 list=WAN add interface=sfp-sfpplus1 list=LAN add interface=sfp-sfpplus2 list=LAN add interface=sfp-sfpplus3 list=LAN add interface=sfp-sfpplus4 list=LAN add interface=sfp-sfpplus5 list=LAN add interface=sfp-sfpplus6 list=LAN add interface=sfp-sfpplus7 list=LAN add interface=sfp-sfpplus8 list=LAN
I think he is talking about this link (not updated yet to 7.1v5)Please be more specific, in general route filters are working.
Yes, mine (Chateau LTE12) crashes within minutes after enabling cake simple queue.Does it crashes this beta (beta6) as well?Well Cake QoS crashes routeros
/ip/route/add routing-table=ecmptable dst-address=0.0.0.0/0 gateway="lte1,lte2"
/ip/route/print detail
2 IsH dst-address=0.0.0.0/0 routing-table=ecmptable pref-src="" gateway=0.0.0.0 immediate-gw="" distance=1 scope=30 target-scope=10 suppress-hw-offload=no
Thanks MRZ - that worked - knew I was missing something... Pretty much as described, although avoiding doing anything winbox with ROS v7beta6 helped.In v7 gateway can be only one "IP/interface", you need to add two route entries and that will form ECMP route.
/routing/table/add name=ecmp2 comment=ecmp2
/ip/route/add routing-table=ecmp2 gateway=lte1 comment=ecmp2
/ip/route/add routing-table=ecmp2 gateway=lte2 comment=ecmp2
/routing/route/print detail
As + ;;; ecmp2
afi=ip4
contribution=active dst-address=0.0.0.0/0 routing-table=ecmp2 pref-src="" gateway=lte2 immediate-gw=lte2 distance=1 scope=30 target-scope=10
belongs-to="Static route"
debug.fwp-ptr=0x20202000
As + ;;; ecmp2
afi=ip4
contribution=active dst-address=0.0.0.0/0 routing-table=ecmp2 pref-src="" gateway=lte1 immediate-gw=lte1 distance=1 scope=30 target-scope=10
belongs-to="Static route"
debug.fwp-ptr=0x20202060
# vlan for ECMP route
/interface/vlan/add name=vlan-ecmp2 vlan-id=2 interface=bridge comment=ecmp2
/ip/address/add interface=vlan-ecmp2 address=203.0.113.1/24 comment=ecmp2
# dchp-server on ECMP route
/ip/dhcp-server/network/add address=203.0.113.0/24 gateway=203.0.113.1 comment=ecmp2
/ip/pool/add name=ecmp2 ranges=203.0.113.101-203.0.113.199 comment=ecmp2
/ip/dhcp-server/add address-pool=ecmp2 name=ecmp2 interface=vlan-ecmp2 disabled=no
# with default firewall, adding to LAN interface list will do NAT
/interface/list/member/add interface=vlan-ecmp2 list=LAN
# many ways to do this part, a policy rule seemed simple to show this working (NOTE: v6 had this under "/ip route rule")
/routing/rule/add src-address=203.0.113.0/24 table=ecmp2 comment=ecmp2
/interface/lte> monitor lte1,lte2
status: connected connected
model: LM960A18 MC7354
revision: 32.00.144 SWI9X15C_05.05.58.01
current-operator: AT&T Verizon
data-class: LTE LTE
session-uptime: 1h33m40s 1h28m28s
imei: 356299100000000 359225050000000
imsi: 310410000000000 311480000000000
uicc: 89014100000000000000 89148000000000000000
rssi: -93dBm -75dBm
/interface/lte> /interface/monitor-traffic lte1,lte2
name: lte1 lte2
rx-packets-per-second: 2 409 4 440
rx-bits-per-second: 13.0Mbps 25.2Mbps
fp-rx-packets-per-second: 2 409 4 440
fp-rx-bits-per-second: 13.0Mbps 25.2Mbps
rx-drops-per-second: 0 0
rx-errors-per-second: 0 0
tx-packets-per-second: 547 1 083
tx-bits-per-second: 285.6kbps 625.4kbps
fp-tx-packets-per-second: 0 0
fp-tx-bits-per-second: 0bps 0bps
tx-drops-per-second: 0 0
tx-queue-drops-per-second: 0 0
tx-errors-per-second: 0 0
Like others, the Let's Encrypt worked (with port 80/firewall changes) - been waiting for that almost as long as MBIM: don't like the self-signed certs but too lazy to deal with a cert hierachy.v7 seems to have come a long way.
/interface/lte/at-chat lte2 input="AT!LTEINFO\?"
output: !LTEINFO: Serving: EARFCN MCC MNC TAC CID Bd D U SNR PCI RSRQ RSRP RSSI RXLV 2100 311 480 7939 007A230C 4 3 3 -10 390 -11.1 -70.9 -42.6 53
IntraFreq: PCI RSRQ RSRP RSSI RXLV 390 -11.1 -70.9 -42.6 53 374 -19.0 -79.2 -50.2 53 InterFreq: EARFCN ThresholdLow ThresholdHi Priority PCI RSRQ
RSRP RSSI RXLV GSM: ThreshL ThreshH Prio NCC ARFCN 1900 valid BSIC RSSI RXLV WCDMA: UARFCN ThreshL ThreshH Prio PSC RSCP ECN0 RXLV CDMA 1x: Chan BC
Offset Phase Str CDMA HRPD: Chan BC Offset Phase Str OK
/interface/lte/at-chat lte2 input="AT!GSTATUS\?"
output: !GSTATUS: Current Time: 5268 Temperature: 38 Bootup Time: 0 Mode: ONLINE System mode: LTE PS state: Attached LTE band: B4 LTE bw: 10 MHz LTE Rx
chan: 2100 LTE Tx chan: 20100 EMM state: Registered Normal Service RRC state: RRC Connected IMS reg state: No Srv IMS mode: Normal RSSI (dBm): -41
Tx Power: 0 RSRP (dBm): -71 TAC: 1F03 (7939) RSRQ (dB): -15 Cell ID: 00... (80...) SINR (dB): 15.0 OK
at!gstatus?
!GSTATUS:
Current Time: 7483 Temperature: 64
Reset Counter: 1 Mode: ONLINE
System mode: LTE PS state: Attached
LTE band: B7 LTE bw: 20 MHz
LTE Rx chan: 3148 LTE Tx chan: 21148
LTE SSC1 state:INACTIVE LTE SSC1 band: B7
LTE SSC1 bw : 20 MHz LTE SSC1 chan: 2950
LTE SSC2 state:INACTIVE LTE SSC2 band: B3
LTE SSC2 bw : 15 MHz LTE SSC2 chan: 1275
LTE SSC3 state:NOT ASSIGNED
LTE SSC4 state:NOT ASSIGNED
EMM state: Registered Normal Service
RRC state: RRC Connected
IMS reg state: No Srv
PCC RxM RSSI: -62 PCC RxM RSRP: -100
PCC RxD RSSI: -65 PCC RxD RSRP: -105
SCC1 RxM RSSI: -74 SCC1 RxM RSRP: -103
SCC1 RxD RSSI: -80 SCC1 RxD RSRP: -108
SCC2 RxM RSSI: -70 SCC2 RxM RSRP: -93
SCC2 RxD RSSI: -75 SCC2 RxD RSRP: -97
Tx Power: 3 TAC: 204c (8268)
RSRQ (dB): -17.9 Cell ID: 080ba821 (134981665)
SINR (dB): -5.8
/interface/lte>> at-chat lte1 input="AT#RFSTS"
output: #RFSTS: "310 410",800,-93,-59,-14,8B1E,255,-5,1280,19,2,A20...,"310410...","AT&T",3,2
OK
/interface/lte>> at-chat lte1 input="AT#moni"
output: #MONI: AT&T RSRP:-92 RSRQ:-17 TAC:8B1E Id:A204... EARFCN:800 PWR:-54dbm DRX:1280
at-chat lte1 input="AT#FIRMWARE"
output: HOST FIRMWARE : 32.00.005_1 MODEM FIRMWARE : 4 INDEX STATUS CARRIER VERSION TMCFG CNV LOC 1 Generic 32.00.115 1025 empty 1 2 Verizon 32.00.124 2020
empty 2 3 Activated ATT 32.00.144 4021 empty 3 4 TMUS 32.00.153 5004 empty 4 OK
/ip dns static;
:put [get [ find type=A ]]
:put [:len [/ip dns cache find where type=A]] :put [:len [/ip dns cache find where type=AA]] :put [:len [/ip dns cache find where type=AAA]] :put [:len [/ip dns cache find where type=AAAA]]type AAA and AA does not exist, right?
:put [/ip dns static find where type!=AAAA and type!=CNAME and type!=FWD and type!=MX and type!=NS and type!=NXDOMAIN and type!=SRV and type!=TXT]or exclude any item with type set:
:put [/ip dns static find where !type]
Replying to myself for broader awareness and ask for hints :)Is there any known issue with Traffic Flow in beta6? It looks like I can't get any netflow info into logstash (and I have checked everything in terms of config, FW, etc.)
If no one has an idea, I will open a support case to check if it really is an issue in MT or not.
Cheers,
anthonws.
AFAIK ECMP depends on connection tracking (and NAT too here). While not privy to the internals, I assume ECMP the same as unweighted PCC. So yeah ECMP works better with both a greater number and diversity of connections with different IP/ports, & ideally shorter in length - stuff like dozens of devices browsing the web generates a fair amount of connections to various different place, or BitTorrent of common file, will show the Mikrotik "sharing" connections in my experience.
How does that actually work? I presume you rely on the ECMP only for the first packet of each connection to be routed to a random external connection, and then the connection tracking (NAT table) will force all the other traffic out of the chosen interface?
Otherwise it would only be useful for UDP traffic where a single UDP exchange constitutes the entire connection (DNS, NTP etc).
Since v7 is still beta was trying to just test ECMP using "regular LTE", In v6, we use ECMP with PBR a lot, but still use some firewall filters and marking stuff. I used a VLAN here for example only - since if you use ECMP in the main routing table, you'd almost certainly need to do at least connection and route marking, which add to a minimal example of it working & HOW a connection/packet found it's way to a route table is different thing. A VLAN-based subnet + PBR was easier than /ip/firewall/manage rules,....I would consider ECMP mostly to balance traffic over two links (e.g. VPN tunnels) where both ends are under my control and no NAT is involved.
Is there any advantage of using ECMP in your scenario, vs the "standard" solution of setting up route marking via some form of per-connection classification (based on IP+port or N'th matchers)?
action=src-nat
action=masquerade
Not sure what you mean.On STATIC all type are set and searchable except for "A" (with or without quotes are useless)
:put [/ip dns cache find where type="A"]
:put [/ip dns cache find where type="AAAA"]
Ok, I do run a v6 load balancing configuration (unfortunately only IPv4 as v6 cannot do this for IPv6) but I have setup the PCC using only source address as the classifier, as I am not sure that every service on the internet is able to handle the changing source IP well. There are about 500 users on that network and I cannot rely on them reporting problems they have with certain sites or apps, and I do not want a buzz "the network is not working well" going around and coming back to me via management 3 months later.AFAIK ECMP depends on connection tracking (and NAT too here). While not privy to the internals, I assume ECMP the same as unweighted PCC. So yeah ECMP works better with both a greater number and diversity of connections with different IP/ports, & ideally shorter in length - stuff like dozens of devices browsing the web generates a fair amount of connections to various different place, or BitTorrent of common file, will show the Mikrotik "sharing" connections in my experience.
Same result.try [find type="A"]
Exact, as yourself quoted, I mean STATIC, not cache...Not sure what you mean.On STATIC all type are set and searchable except for "A" (with or without quotes are useless)
I also had my date "reset" after the upgrade. But because the LTE interface wouldn't work (no other WAN for me) I don't know if this was interim issue or general one with NTP or whatever...anyhow I downgraded due to the LTE problem.Replying to myself for broader awareness and ask for hints :)Is there any known issue with Traffic Flow in beta6? It looks like I can't get any netflow info into logstash (and I have checked everything in terms of config, FW, etc.)
If no one has an idea, I will open a support case to check if it really is an issue in MT or not.
Cheers,
anthonws.
After adding another target to Traffic Flow (v9), I could confirm that indeed the issue is that date is showing up as 1970... Hence why I was seeing no data in Kibana... I just had to look into the Index Mapping to see why...
I confirmed with nfcapd and nfdump that date is showing up as 1970-01-01.
Can anyone confirm is they see the same with beta6?
Thanks,
anthonws.
Thanks for sharing!I also had my date "reset" after the upgrade. But because the LTE interface wouldn't work (no other WAN for me) I don't know if this was interim issue or general one with NTP or whatever...anyhow I downgraded due to the LTE problem.
Hi,
Another minor issue with l3 hw I found is updating next-hop in an existing static route doesn’t take effect. A workaround could be turning that route off and on again.
Yeah i figured it already and disabled IPV6 as we dont use it at all.Those messages are related to IPv6 on your local network. Unfortunately they do not include enough info to hunt down what device is causing them.
(there should be a MAC address or IPv6 address in those messages...)
/interface bridge
add mtu=9216 name=bridge1 vlan-filtering=yes
add name=lo0
/interface ethernet
set [ find default-name=sfp-sfpplus3 ] comment=”Proxmox – ens2f0″ l2mtu=10218 \
mtu=9216
set [ find default-name=sfp-sfpplus4 ] comment=”Proxmox – ens2f1″ l2mtu=10218 \
mtu=9216
/interface vlan
add interface=bridge1 mtu=9216 name=vlan103 vlan-id=103
add interface=bridge1 mtu=9216 name=vlan104 vlan-id=104
/interface ethernet switch
set 0 l3-hw-offloading=yes
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp_pool0 ranges=10.255.34.11-10.255.34.254
add name=dhcp_pool1 ranges=10.255.35.2-10.255.35.254
/ip dhcp-server
add address-pool=dhcp_pool0 disabled=no interface=vlan103 name=dhcp1
add address-pool=dhcp_pool1 disabled=no interface=vlan104 name=dhcp2
/interface bridge port
add bridge=bridge1 interface=sfp-sfpplus3 pvid=103
add bridge=bridge1 interface=sfp-sfpplus4 pvid=104
/interface bridge vlan
add bridge=bridge1 tagged=bridge1 untagged=sfp-sfpplus3 vlan-ids=103
add bridge=bridge1 tagged=bridge1 untagged=sfp-sfpplus4 vlan-ids=104
/ip address
add address=10.255.34.1/24 interface=vlan103 network=10.255.34.0
add address=10.255.35.1/24 interface=vlan104 network=10.255.35.0
/ip dhcp-server network
add address=10.255.34.0/24 dns-server=9.9.9.9 gateway=10.255.34.1
add address=10.255.35.0/24 dns-server=9.9.9.9 gateway=10.255.35.1
/system routerboard settings
set boot-os=router-os
There was a thread about L3 HW performance (or rather lack of it) and it was said that L3 HW offload for jumbo frames was not there yet. I'm not sure if that limitation is already lifted. So you might try to test similar scenario but using standard MTU values ...
I find it very useful too - saves a lot of guesswork - so please update it.Hi,
Does anyone know if the following protocol status page will be updated with information of beta 5 and beta 6 ?
https://help.mikrotik.com/docs/display/ ... col+Status
I found this page really useful to check everything before a migration from older OS
This means the flash filesystem somehow got corrupted. Re-install with netinstall and use the format option.Anyone else having an issue here with v7.1beta6 and the hap ac^2, where on power loss all configuration is lost?
Thankyou
MLAG works with jumbo frames, but make sure to use the same L2MTU settings on both peers.Will MLAG work well with jumbo frames now, how does it depend on L3 hardware offload?
Does (or will) mlag work in combination with 802.1BR?
Is MLAG planned to work with MSTP in the future? Or will it only work with STP/RSTP?
Nice! You guys are f***ing awesome!MLAG works with jumbo frames, but make sure to use the same L2MTU settings on both peers.
We are researching the ways to make MLAG compatible with 802.1BR, L3HW and MSTP.
Yes I had the same issue on my RB4011iGS+5HacQ2HnD.Anyone else having an issue here with v7.1beta6 and the hap ac^2, where on power loss all configuration is lost?
Thankyou
Hi, so I reformatted using Netinstall at this dev version - same issue occurred. The issue does not occur now that I have downgraded to 6.48.3 stable.This means the flash filesystem somehow got corrupted. Re-install with netinstall and use the format option.Anyone else having an issue here with v7.1beta6 and the hap ac^2, where on power loss all configuration is lost?
Thankyou
Hi, so I reformatted using Netinstall at this dev version - same issue occurred. The issue does not occur now that I have downgraded to 6.48.3 stable.This means the flash filesystem somehow got corrupted. Re-install with netinstall and use the format option.Anyone else having an issue here with v7.1beta6 and the hap ac^2, where on power loss all configuration is lost?
Thankyou
Is this issue solved in v6 yet? It seems to me the overall IPv6 support in current v7.1beta is still unstable, even for switching. Actually I have moved my main router from Mikrotik to Ubiquiti Edgerouter for IPv6 :(@vfreex this problem exists for many months now (v6), and has been reported to support. I hope they get this right with the stable release of v7.
viewtopic.php?f=2&t=161792#p797122
Is this issue solved in v6 yet? It seems to me the overall IPv6 support in current v7.1beta is still unstable, even for switching. Actually I have moved my main router from Mikrotik to Ubiquiti Edgerouter for IPv6 :(
It seems to me that names are resolved (or just tried) only once. If there is no answer from DNS (for example on boot-up, Wireguard is started before DHCP Client gets parameters), Wireguard won't start.How are IP cloud names handled as wireguard endpoints? Are they like Firewall addresses that are resolved (dynamically) and checked/updated every xx seconds??
One last question along these lines. Will existing CCR products get hardware/fasttrack/any accellerated IPv6 support or is this only happening in the new devices with the newer switch hardware?As I already said, L3 HW offloading for IPv6 is on the roadmap. Actually, it is the next big feature to be done for L3 HW. However, do not expect it in the next beta - the expected development effort is extensive, and then testing (you may not believe, but we are actually testing our firmware).
Initially, IPv6 HW offloading will come in full routing mode only (l3-hw-offloading=yes for the switch and ports; no firewall support). We cannot do Fasttrack offloading until the software IPv6 Fasttrack gets implemented. The latter is on the TODO list (backlog) but not on the roadmap yet. I suggest creating a feature request thread on RouterOS v7 forums for IPv6 Fasttrack - if it gets enough user attention, it might receive a priority boost.
One last question along these lines. Will existing CCR products get hardware/fasttrack/any accellerated IPv6 support or is this only happening in the new devices with the newer switch hardware?
[admin@MikroTik] /interface/ethernet> print
Flags: R - RUNNING; S - SLAVE
Columns: NAME, MTU, MAC-ADDRESS, ARP, SWITCH
# NAME MTU MAC-ADDRESS ARP SWITCH
0 S ether1 1500 D4:CA:6D:41:78:C1 enabled switch1
1 S ether2 1500 D4:CA:6D:41:78:C0 enabled switch1
2 S ether3 1500 D4:CA:6D:41:78:BF enabled switch1
3 S ether4 1500 D4:CA:6D:41:78:BE enabled switch1
4 S ether5 1500 D4:CA:6D:41:78:BD enabled switch1
5 S ether6 1500 D4:CA:6D:41:78:BC enabled
6 S ether7 1500 D4:CA:6D:41:78:BB enabled
7 RS ether8 1500 D4:CA:6D:41:78:BA enabled
8 S ether9 1500 D4:CA:6D:41:78:B9 enabled
9 S ether10 1500 D4:CA:6D:41:78:B8 enabled
[admin@MikroTik] /interface/ethernet>
sw02#show mac address-table interface gigabitEthernet 1/0/1
Mac Address Table
-------------------------------------------
Vlan Mac Address Type Ports
---- ----------- -------- -----
110 d4ca.6d41.78ba STATIC Gi1/0/1
111 0007.855c.8e3f STATIC Gi1/0/1
Total Mac Addresses for this criterion: 2
sw02#
[admin@MikroTik] /ip/arp> print
Flags: D - DYNAMIC, P - PUBLISHED
Columns: ADDRESS, INTERFACE
# ADDRESS INTERFA
0 D 192.168.110.123 bridge1
[admin@MikroTik] /ip/arp>
See 1st post here: https://forum.openwrt.org/t/instruction ... nwrt/89976Yes, please! I think NordVPN uses something on top of wireguard and calls it "NordLynx"... Having the details here would much appreciated!
Correct, this is exactly what I did as they require Debian or RHEL family while I am big fun of Funtoo (Gentoo).Well, you still need to run the nordvpn app to extract your private key... Though this can be done in a virtual machine I guess.
I will give it a try. Thanks!
root@vm ~ # nordvpn status
Status: Connected
Current server: de971.nordvpn.com
Country: Germany
City: Frankfurt
Server IP: 5.180.62.69
Current technology: NordLynx
Current protocol: UDP
Transfer: 139.87 KiB received, 26.37 KiB sent
Uptime: 38 minutes 27 seconds
root@vm ~ # wg show nordlynx private-key
Unable to access interface: Operation not supported
root@vm ~ # modprobe wireguard
root@vm ~ # nordvpn c de
Connecting to Germany #931 (de931.nordvpn.com)
You are connected to Germany #931 (de931.nordvpn.com)!
root@vm ~ # wg show nordlynx private-key
<private-key-here>
Well done mateAh, got it. Looks like the app falls back to userspace implementation if the wireguard module is not loaded...
So this worked:
# jun/27/2021 20:41:19 by RouterOS 7.1beta6
# software id = FLQZ-RXUL
#
# model = RBD25G-5HPacQD2HPnD
# serial number = B6BE0A143FE7
/interface bridge
add name=bridge-trunk vlan-filtering=yes
/interface wifiwave2
add band=2ghz-n channel-width=20/40mhz-Ce configuration.country=Malaysia disabled=no mac-address=XXX mode=ap mtu=1500 name=wifi1 \
security.authentication-types=wpa2-psk .disable-pmkid=yes ssid=X
add band=5ghz-ac channel-width=20/40/80mhz configuration.country=Malaysia disabled=yes mac-address=XXX mode=ap mtu=1500 name=wifi2 \
security.authentication-types=wpa2-psk ssid="X"
# changed intended channel to 5500/ac/Ceee+5775
add band=5ghz-ac channel-width=20/40/80+80mhz configuration.country=Malaysia disabled=no mac-address=XXX mode=ap mtu=1500 name=wifi3 \
security.authentication-types=wpa2-psk .disable-pmkid=yes ssid="X"
/interface vlan
add interface=bridge-trunk name=vlan1000 vlan-id=1000
add action=mark-routing chain=prerouting comment="via WG" dst-address=0.0.0.0/0 passthrough=no src-address=10.0.0.0/16 new-routing-mark=via-gw
add action=mark-routing chain=prerouting comment="via WG" dst-address=0.0.0.0/0 passthrough=no src-address=10.0.0.0/16
Did you add the routing table named "via-gw" first? It doesn't let you mark-routing for a routing mark unless that mark matches the name of a routing table defined on the router in v7./ip/firewall/mangle/export doesn't work correctly for mark-routing action.
Yes it is there and working correctly.Did you add the routing table named "via-gw" first? It doesn't let you mark-routing for a routing mark unless that mark matches the name of a routing table defined on the router in v7./ip/firewall/mangle/export doesn't work correctly for mark-routing action.
Hi,/ip/firewall/mangle/export doesn't work correctly for mark-routing action.
nope, nothing.Hi,
Try export verbose
That is correct, what you observed is a bug (I think) but sometimes it is possible to gather more information by checking /export verbose and see what happens then.Besides, my understanding of verbose is that it is printing defaults?
But my value is not default.
L2 traffic between the 2 switching groups is slow as well.Is anyone else seeing high CPU usage on their RB3011 with v7?
Routing 100Mbit/s with the default configuration shows <5% CPU usage on v.6.48.3.
v7.1b6 with the default configuration and same load shows about 30%.
[admin@RB3011] /tool> profile
Columns: NAME, USAGE
NAME USAGE
lcd 0.5%
ethernet 10.2%
console 0%
firewall 0%
networking 21.5%
management 0.2%
profiling 0%
bridging 2.2%
unclassified 12.2%
total 46.8%
beta7 is apparently being sent to invited users at the moment, no idea why it is not distributed using the normal mechanism...It's July and we're due for beta7.
I have no "insider information", but I personally suspect beta7 might take a bit longer rather than the usual two month window between releases, if only due to the fact that they have been redesigning and re-implementing the route filter system from the ground up from beta6. If they were able to do that in two months I would be very surprised as that is a big task.It's July and we're due for beta7.