Hi,
Thanks for the work with the user manager. Is there any reason why the administrators portal is removed? Or will this be part of webfig/winbox?
Right now, i miss the nice possibility to generate and print vouchers from the web interface.
/user-manager/user/generate-voucher voucher-template=printable_vouchers.html numbers=<insert user IDs here from /user-manager/user/print>
/user-manager/user/generate-voucher [f] voucher-template=printable_vouchers.html
Kudos to the mikrotik team for the work done so far on the new user-manager!
Since UserManager now contains also RADIUS server features it was better in long-term to move UserManager controls into Winbox/Webfig (Still Work In Progress, no ETA available).
As for vouchers - the command Youre looking for is:to generate for specific users, orCode: Select all/user-manager/user/generate-voucher voucher-template=printable_vouchers.html numbers=<insert user IDs here from /user-manager/user/print>
Since UserManager now contains also RADIUS server features it was better in long-term to move UserManager controls into Winbox/Webfig (Still Work In Progress, no ETA available).
I guess the standard way of selecting some entries should work here as well? In the command above replace <insert user IDs here from /user-manager/user/print> with construct [ find <selection criterion here>]. I don't know how selection criterion would look like (I'm not runnin userman), but I guess usual regular expressions work here a well ...is there a command option to generate vouchers for specific group of users sorting either by prefix of the of the user ID or by profile?Code: Select all/user-manager/user/generate-voucher voucher-template=printable_vouchers.html numbers=<insert user IDs here from /user-manager/user/print>
That works!! ThanksI guess the standard way of selecting some entries should work here as well? In the command above replace <insert user IDs here from /user-manager/user/print> with construct [ find <selection criterion here>]. I don't know how selection criterion would look like (I'm not runnin userman), but I guess usual regular expressions work here a well ...is there a command option to generate vouchers for specific group of users sorting either by prefix of the of the user ID or by profile?Code: Select all/user-manager/user/generate-voucher voucher-template=printable_vouchers.html numbers=<insert user IDs here from /user-manager/user/print>
you may ask: ... what the **ck took him so long ?
a.) ... tried that on my production-machine ... which has an eval-license ... resources are tight ... dependencies were neglected ... a backup had to do it's job
b.) ... provisioned a new VM ... these are minutes too !
c.) ... there's kind of a mini-bar in homeland-labs :shock: ... sometimes it spurs ... sometimes it brakes
169 Dec/13/2019 00:30:55 memory manager, debug >>> rx Access-Request from [192.168.2.25]:45652, id: 119
170 Dec/13/2019 00:30:55 memory manager, debug <<< tx Access-Challenge to [192.168.2.25]:45652, id: 119
171 Dec/13/2019 00:30:55 memory manager, debug >>> rx Access-Request from [192.168.2.25]:42899, id: 120
172 Dec/13/2019 00:30:55 memory manager, debug <<< tx Access-Challenge to [192.168.2.25]:42899, id: 120
173 Dec/13/2019 00:30:55 memory manager, debug >>> rx Access-Request from [192.168.2.25]:41869, id: 121
174 Dec/13/2019 00:30:55 memory manager, debug <<< tx Access-Reject to [192.168.2.25]:41869, id: 121
175 Dec/13/2019 00:31:44 memory manager, debug >>> rx Access-Request from [192.168.2.25]:35311, id: 122
176 Dec/13/2019 00:31:44 memory manager, debug <<< tx Access-Challenge to [192.168.2.25]:35311, id: 122
177 Dec/13/2019 00:31:44 memory manager, debug >>> rx Access-Request from [192.168.2.25]:57176, id: 123
178 Dec/13/2019 00:31:44 memory manager, debug <<< tx Access-Challenge to [192.168.2.25]:57176, id: 123
/user-manager attribute add name=Mikrotik-Wireless-PSK type-id=26 value-type=string
I have not loaded v7 Bx and will not until v7 RC is out -- but I wanted to THANK YOU for including RADIUS server implementation in RouterOS under user manager. A great addition and will look forward to testing when RC is out.User Manager is RADIUS server implementation in RouterOS which provides centralized user authentication and authorization to a certain service. Having a central user database allows better track of system users and customers.
------ ubnt bananapi CHR
//// \\\\ +-------+ +-------+ +-------+
| SSID | | | | | | |
| |---+ AP |-----+freerad|-----+ MTik |
| xolotl | | | | 3.0 | | UM |
\\\\ //// | | | | | |
------ +-------+ +-------+ +-------+
.253 .28 .161
andro-client
54-25-EA-59-26-EC 192.168.222.0/24
win10-client NAS EAP-Proxy MSCHAP
F8-16-54-05-67-F7
###### mods-available/radius #####
#
# The module adds a Proxy-State attribute to all proxied packets.
# This `Proxy-State` contains a 32-bit random number, which is unique
# to this module. This unique number helps to detect proxy loops.
#
proxy-hlandtikrad - Status check packet type will be Status-Server
(proxy-hlandtikrad) Event-Timestamp = "Jan 1 1970 00:00:00 UTC"
(proxy-hlandtikrad) NAS-Identifier = "status check - are you alive?"
Info : FreeRADIUS Version 4.0.0
Info : Copyright 1999-2019 The FreeRADIUS server project and contributors
Info : There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
Info : PARTICULAR PURPOSE
[admin@chr-7-1] /user-manager/attribute> add name=Mikrotik-Group vendor-id=14988 type-id=3 value-type=string packet-types=access-accept
[admin@chr-7-1] /user-manager/attribute>
[admin@chr-7-1] /user-manager/user> print
Flags: X - disabled
0 name="v7" password="***" group=default shared-users=unlimited attributes=""
1 name="v7w" password="***" group=default shared-users=unlimited attributes=""
[admin@chr-7-1] /user-manager/user>
[admin@chr-7-1] /user-manager/user> set 0 attributes=
Mikrotik-Group :
[admin@chr-7-1] /user-manager/user> set 0 attributes=Mikrotik-Group:Testgroup
[admin@chr-7-1] /user-manager/user>
02:47:37 echo: system,info UMS user <v7> changed by admin
[admin@chr-7-1] /user-manager/user>
########################################
# jun/24/2020 03:36:09 by RouterOS 7.0beta8
# software id =
#
/user-manager attribute
add name=Mikrotik-Recv-Limit type-id=1 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Xmit-Limit type-id=2 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Group type-id=3 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Wireless-Forward type-id=4 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Wireless-Skip-Dot1x type-id=5 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Wireless-Enc-Algo type-id=6 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Wireless-Enc-Key type-id=7 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Rate-Limit type-id=8 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Realm type-id=9 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Mark-Id type-id=11 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Advertise-URL type-id=12 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Advertise-Interval type-id=13 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Recv-Limit-Gigawords type-id=14 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Xmit-Limit-Gigawords type-id=15 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Wireless-PSK type-id=16 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Total-Limit type-id=17 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Total-Limit-Gigawords type-id=18 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Address-List type-id=19 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Wireless-MPKey type-id=20 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Wireless-Comment type-id=21 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Delegated-IPv6-Pool type-id=22 value-type=string vendor-id=Mikrotik
add name=Mikrotik-DHCP-Option-Set type-id=23 value-type=string vendor-id=Mikrotik
add name=Mikrotik-DHCP-Option-Param-STR1 type-id=24 value-type=string vendor-id=Mikrotik
add name=Mikortik-DHCP-Option-Param-STR2 type-id=25 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Wireless-VLANID type-id=26 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Wireless-VLANIDtype type-id=27 value-type=uint32 vendor-id=Mikrotik
add name=Mikrotik-Wireless-Minsignal type-id=28 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Wireless-Maxsignal type-id=29 value-type=string vendor-id=Mikrotik
add name=Mikrotik-Switching-Filter type-id=30 value-type=string vendor-id=Mikrotik
[admin@chr-7-1] /user-manager/attribute>
Don't think it would handle up to 2000How many Users can the new Manager handle?
100?
500?
1000?
2000?
THX
Is synchronization with Active Directory supported nowadays?feature request:
sync new users from Microsoft Active Directory or other standard LDAP protocols.(can add users with special profile if they belong to a user group in AD)
The big benefit to running this on routeros is that it reduces the number of components in a system. Sure, run a second box and freeradius etc etc, but that's another component likely mounted to a wall somewhere that already has 15 devices haphazardly bolted up there. Another component to fail.You should be able to do it via API.
Of course when you want something that is available today (and has been available for years) you can always use freeradius on a Linux box, even a Raspberry Pi.
I'm not talking about user manager. I'm talking about how to use Radius server for EAP
Maybe maybe ....the Windows 10 problem is related to the special requirements for the certificates, as explained in the openSource FreeRadiusDoes WPA2-Enterprise work with the new UM and radius for windows 10 WiFi clients in 7.1beta6?
Best regards
@bpwl
@floaty
@bpwl have you got it tested with ipsec vpn and the new user manager in Ros 7 by any chance, I just cannot get it to work? thank youMaybe maybe ....the Windows 10 problem is related to the special requirements for the certificates, as explained in the openSource FreeRadiusDoes WPA2-Enterprise work with the new UM and radius for windows 10 WiFi clients in 7.1beta6?
Best regards
@bpwl
@floaty
https://wiki.freeradius.org/guide/certi ... patibility
Trying to use a downloaded daloRadius+FreeRAdius virtual machine right now ... everything works fine, with all clients .... except Windows10 .... .
(Is this yet a new TLS 1.2 problem? https://support.microsoft.com/en-us/top ... a6b80fa955 )
Well in 2021 it's likely to be TLS 1.3 as new challenge.
No, only tested WPA2/Enterprise in wifi.@bpwl have you got it tested with ipsec vpn and the new user manager in Ros 7 by any chance, I just cannot get it to work? thank you
OK. Wonderfull. Txs.it's there, install the the npk-file from extra package & use winbox 3.29 .. 802.1x status for windows-clients: unchanged
[admin@MikroTik] > /certificate print detail
Flags: K - private-key; L - crl; C - smart-card-key; A - authority; I - issued, R - revoked; E - expired; T - trusted
0 KL A T name="certCA" digest-algorithm=sha256 key-type=rsa country="BE" state="BE" locality="BE" organization="IT" unit="IT" common-name=""CA certificate"" key-size=2048
subject-alt-name=email:x@radius.com days-valid=3650 trusted=yes key-usage=digital-signature,key-encipherment,key-cert-sign serial-number="6E88885BABE37DA3"
fingerprint="af83423ca92d460d497372e98fec3f6f879a3a72efadec1878b11f0728fd3980" akid="" skid=9dec5aa8aed0c5e83c3068d41d87dad820a53819
invalid-before=aug/24/2021 16:11:31 invalid-after=aug/22/2031 16:11:31 expires-after=521w1d19h27m15s
1 K I T name="certServer" digest-algorithm=sha256 key-type=rsa country="BE" state="BE" locality="BE" organization="IT" unit="IT" common-name=""Server cert""
key-size=2048 subject-alt-name=email:x@radius.com days-valid=365 trusted=yes key-usage=digital-signature,content-commitment,key-encipherment,tls-server
ca=certCA serial-number="6154EA9192EC3FEC" fingerprint="5c2a6ea6b80351c9f048d3ff3ca034bf50019436323d4002cf3d6c447d287123"
akid=9dec5aa8aed0c5e83c3068d41d87dad820a53819 skid=ab88601c211543cb13d5a7a166b585f76a8d93ce invalid-before=aug/24/2021 16:13:18
invalid-after=aug/24/2022 16:13:18 expires-after=51w6d19h29m2s
2 L T name="freeradius_ca" issuer=C=FR,ST=Radius,L=Somewhere,O=Example Inc.,emailAddress=admin@example.org,CN=Example Certificate Authority digest-algorithm=sha256
key-type=rsa country="FR" state="Radius" locality="Somewhere" organization="Example Inc." common-name="Example Certificate Authority" key-size=2048
subject-alt-name="" days-valid=60 trusted=yes serial-number="48D506B5C0702BC1AD2928E1FA06BF361D7F2ECB"
fingerprint="0c4d10a2799ceb0f7eacaacafa1328649f2ff5794167d9cbd9c43f8d9a528192" akid=dfed13bbebd2e75e01cce11b2853f72d9aa66d16
skid=dfed13bbebd2e75e01cce11b2853f72d9aa66d16 invalid-before=aug/25/2021 18:54:58 invalid-after=oct/24/2021 18:54:58 expires-after=8w3d22h10m42s
3 KL T name="freeradius_server" issuer=C=FR,ST=Radius,L=Somewhere,O=Example Inc.,emailAddress=admin@example.org,CN=Example Certificate Authority digest-algorithm=sha256
key-type=rsa country="FR" state="Radius" organization="Example Inc." common-name="Example Server Certificate" key-size=2048 subject-alt-name="" days-valid=60
trusted=yes key-usage=tls-server serial-number="01" fingerprint="11c03bcf3ed302c9264cb83e79c364acbab82e561b092dd9d0521aa586791172" akid="" skid=""
invalid-before=aug/25/2021 18:57:35 invalid-after=oct/24/2021 18:57:35 expires-after=8w3d22h13m19s
@bpwl I am very appreciated what you have done. I have also tried to connect Windows 10 clients (Wired and Wireless) to User Manager in RouterOS 7 but no luck.Well , I did the experiment, and created the certificates with the FreeRadius 3.0 scripts.
Imported them in ROS System Certification, as PEM files and modified the Setting in User Manager session settings to use the server cert.
Same results: Android works, Windows10 fails.
The only key-usage parameter for the server certificate retained after the import is "tls-server". No trace of the "TLS Web Server Authentication" .
TLS-server. Which is actually the one we need ! (seen in the export CRT file)
Klembord-2.jpg
Code: Select all[admin@MikroTik] > /certificate print detail Flags: K - private-key; L - crl; C - smart-card-key; A - authority; I - issued, R - revoked; E - expired; T - trusted 0 KL A T name="certCA" digest-algorithm=sha256 key-type=rsa country="BE" state="BE" locality="BE" organization="IT" unit="IT" common-name=""CA certificate"" key-size=2048 subject-alt-name=email:x@radius.com days-valid=3650 trusted=yes key-usage=digital-signature,key-encipherment,key-cert-sign serial-number="6E88885BABE37DA3" fingerprint="af83423ca92d460d497372e98fec3f6f879a3a72efadec1878b11f0728fd3980" akid="" skid=9dec5aa8aed0c5e83c3068d41d87dad820a53819 invalid-before=aug/24/2021 16:11:31 invalid-after=aug/22/2031 16:11:31 expires-after=521w1d19h27m15s 1 K I T name="certServer" digest-algorithm=sha256 key-type=rsa country="BE" state="BE" locality="BE" organization="IT" unit="IT" common-name=""Server cert"" key-size=2048 subject-alt-name=email:x@radius.com days-valid=365 trusted=yes key-usage=digital-signature,content-commitment,key-encipherment,tls-server ca=certCA serial-number="6154EA9192EC3FEC" fingerprint="5c2a6ea6b80351c9f048d3ff3ca034bf50019436323d4002cf3d6c447d287123" akid=9dec5aa8aed0c5e83c3068d41d87dad820a53819 skid=ab88601c211543cb13d5a7a166b585f76a8d93ce invalid-before=aug/24/2021 16:13:18 invalid-after=aug/24/2022 16:13:18 expires-after=51w6d19h29m2s 2 L T name="freeradius_ca" issuer=C=FR,ST=Radius,L=Somewhere,O=Example Inc.,emailAddress=admin@example.org,CN=Example Certificate Authority digest-algorithm=sha256 key-type=rsa country="FR" state="Radius" locality="Somewhere" organization="Example Inc." common-name="Example Certificate Authority" key-size=2048 subject-alt-name="" days-valid=60 trusted=yes serial-number="48D506B5C0702BC1AD2928E1FA06BF361D7F2ECB" fingerprint="0c4d10a2799ceb0f7eacaacafa1328649f2ff5794167d9cbd9c43f8d9a528192" akid=dfed13bbebd2e75e01cce11b2853f72d9aa66d16 skid=dfed13bbebd2e75e01cce11b2853f72d9aa66d16 invalid-before=aug/25/2021 18:54:58 invalid-after=oct/24/2021 18:54:58 expires-after=8w3d22h10m42s 3 KL T name="freeradius_server" issuer=C=FR,ST=Radius,L=Somewhere,O=Example Inc.,emailAddress=admin@example.org,CN=Example Certificate Authority digest-algorithm=sha256 key-type=rsa country="FR" state="Radius" organization="Example Inc." common-name="Example Server Certificate" key-size=2048 subject-alt-name="" days-valid=60 trusted=yes key-usage=tls-server serial-number="01" fingerprint="11c03bcf3ed302c9264cb83e79c364acbab82e561b092dd9d0521aa586791172" akid="" skid="" invalid-before=aug/25/2021 18:57:35 invalid-after=oct/24/2021 18:57:35 expires-after=8w3d22h13m19s
I advise you to read about this problem outside of the scope of User Manager. E.g. Freeradius can do this and when you read the documentation and forumsWith User Manager acting as RADIUS Server, I can connect EAP WPA2 Wi-Fi via android phones but not with Windows 10 clients in both wired and wireless connections. Hopefully MikroTik supports see this post and able to tell us what happens in it.
We use this on our company WiFi but so far only for WiFi authentication for company-supplied clients, which are mostly Samsung Phones and Windows laptops.That EAP/PEAP/MSChapv2 is a rather difficult thing to debug. The client devices are a bunch of different BYOD every week. There is no local support, and they cannot contact me.
In general that's it's not new, the MDM (Mobile Device Management) do that stuff. When company have got many SIM cards then even ISP/MNO give that app to manage. We use that to create a VPN profiles at users corp phones. GPS is always on even if user thinks it's off and we can help with loss phones that way. This is differ market and I think MikroTik not be interested to create own a VPN Client for Phones/Mac/Linux etc...Many universities use "CAT - the Configuration Assistant Tool for Enterprise Wi-Fi networks such as eduroam" to deploy wireless profiles (including certificates) for mobile phones to endusers.
see https://github.com/GEANT/CAT
Unfortunately there is no response at all from enterprise-wifi.net admins, apparently a dead project.Ok thank you (Buster2) for that info! I have been looking for this in many places but never received an answer as helpful as this!
I will see if we can use that system (enterprise-wifi.net) in our organization.
Yet another overview of EAP certificate requirements: https://wiki.geant.org/display/H2eduroa ... iderationsI advise you to read about this problem outside of the scope of User Manager. E.g. Freeradius can do this and when you read the documentation and forumsWith User Manager acting as RADIUS Server, I can connect EAP WPA2 Wi-Fi via android phones but not with Windows 10 clients in both wired and wireless connections. Hopefully MikroTik supports see this post and able to tell us what happens in it.
you can see that it is a real can of worms and you need to do everything exactly as Windows expects, or else it will not work.
(e.g. the certificate parameters are very important)
Today I heard about a new issue (the reverse of that one) where after an update an Android phone will no longer accept a cert with MD5 signature.And I agree with the can of worms ... just found another worm , old Android devices do not function with the newer OpenSSL lib on the server, they answer with what FreeRadius sees as TLSv1.3
andA new freshly designed customer portal is also developed specially for the new User Manager.
So web portal is still available, otherwise why /um replies with a login screen? Or it should be used only by the end user to see his account details (ie remaining traffic, time etc..)?The customer portal is available at http://x.x.x.x/um
In internal testing, our issues with Windows 10 PEAP clients were resolved. You can gain more insights as to the cause of the connection failure by capturing network traffic to port 1812 on the device running User Manager and then dissecting the EAP messages in Wiresshark.viewtopic.php?p=887577#p887577
Windows PEAP logon failure has been adressed V7.1rc5 !
Not tested yet ...
EDIT: no success. Tablet OK, Windows PC .... "cannot connect to this network"
Klembord-2.jpg
Thank you for the packet captures.Windows 10 just hangs , and then about 1 minute later the time-out is mentioned in the log. (Timeout set at the RADIUS client is 600ms)
145 seconds later in the file : The tablet seems to generate exactly the same packets , and the tablet connects.
# Generating a Certificate Authority
/certificate
add name=radius-ca common-name="RADIUS CA" key-size=secp384r1 digest-algorithm=sha384 days-valid=1825 key-usage=key-cert-sign,crl-sign
# sign it
sign radius-ca ca-crl-host=radius.mikrotik.test
# Generating a server certificate for User Manager
add name=userman-cert common-name=radius.mikrotik.test subject-alt-name=DNS:radius.mikrotik.test key-size=secp384r1 digest-algorithm=sha384 days-valid=800 key-usage=tls-server
# and sign it
sign userman-cert ca=radius-ca
# to be set in the usermanager settings
Thank you. I tried to test it again on my windows 10 laptop (PEAP-MSCHAPv2). It works with the User Manager based on RouterOS v.7!In internal testing, our issues with Windows 10 PEAP clients were resolved. You can gain more insights as to the cause of the connection failure by capturing network traffic to port 1812 on the device running User Manager and then dissecting the EAP messages in Wiresshark.viewtopic.php?p=887577#p887577
Windows PEAP logon failure has been adressed V7.1rc5 !
Not tested yet ...
EDIT: no success. Tablet OK, Windows PC .... "cannot connect to this network"
Klembord-2.jpg
One possible issue is that the default RADIUS client timeout on the Access Point is too short. You may want to increase it if you haven't already.
/user-manager
set certificate="replace this with Cert name" enabled=yes
/user-manager router
add address=127.0.0.1 name=Test-RB
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa2-eap interim-update=5m mode=dynamic-keys radius-eap-accounting=yes \
radius-mac-accounting=yes radius-mac-authentication=yes supplicant-identity=""
Been toying with um on 7.1rc6 and I'm seeing similar issues. No accounting, no data.7.1rc6 Mac Authentication is working fine for me with a ZyXEL XGS1930 Switch however there are no Sessions showing also in the users section I am not showing any Uptime.
Anyone else had any issues?
Not all connections provide session data. It is possible to have it with Wireless or PPPoE connections, but I don't think it is possible with MAC authentication on switches. The Switch just asks for permission to admit a certain MAC, and that's it.Been toying with um on 7.1rc6 and I'm seeing similar issues. No accounting, no data.7.1rc6 Mac Authentication is working fine for me with a ZyXEL XGS1930 Switch however there are no Sessions showing also in the users section I am not showing any Uptime.
Anyone else had any issues?
Hosts does show uptime but not user.
Correction:You enabled it on 2 places ?
Hotspot server radius
And User Manager incoming
Out of the top of my head...
Documentation is wrong because correct path using cli is /user-manager.Documentation for RouterOS v7 is here: https://help.mikrotik.com/docs/
Specifically for User Manager it is here: https://help.mikrotik.com/docs/display/ ... management
Same in Winbox.[xyz@Map2nD] > /user-manager/
[xyz@Map2nD] /user-manager> /tool user-manager
bad command name user-manager (line 1 column 7)
[xyz@Map2nD] /user-manager>
Ok I have complained about the lack of version-awareness in the help system beforeDocumentation is still about the old User Manager.
Absolutely true !The help system really should be organized in such a way that it is clear what is for v6 and what is for v7... v6 will be around for some time, I suppose.
/caps-man access-list
add action=accept private-passphrase= PPSK_User1 vlan-id=VLAN_User1 vlan-mode=use-tag comment=User1
add action=accept private-passphrase= PPSK_User1 vlan-id=VLAN_User1 vlan-mode=use-tag comment=User1
add action=accept private-passphrase= PPSK_User2a vlan-id=VLAN_User2a vlan-mode=use-tag comment=User2_trusted_devices
add action=accept private-passphrase= PPSK_User2b vlan-id=VLAN_User2b vlan-mode=use-tag comment=User2_untrusted_devices
Hello guys. Can someone please direct me to documentation for migrating my user database to the new manager?
Hey folks,
just wanted to let you know that I have written up a light howto on setting up EAP-TLS and EAP-PEAP wireless auth via CAPsMAN using RouterOS 6 and RouterOS 7 with UM 5.
https://github.com/multiduplikator/mikrotik_EAP
It is far from perfect, I know, but maybe it will come in handy for someone.
Happy to improve this, if you have comments...
Cheers,
multiduplikator
Old Unifi APs are much better than current MikroTik offerings!Sadly I am still using my "old" Unifi AP's
Old Unifi APs are much better than current MikroTik offerings!Sadly I am still using my "old" Unifi AP's
With new Unifi APs I am not sure, I have not studied them in detail but I think they can only operate from a cloud service these days.
(we host our Unifi controller on a local VM)
it's really hard to be 'years' behind in WiFi considering standards. If you use a hAP ac3 or audience with the wave2 drivers it's great, just as good as any comparably spec'd WiFi5 radio. I think routeros 6's very old kernel was a major hurdle to that and then the 16MB of flash on a lot of wave2 capable hardware keeps us from good wifi performance on today's cAPs and hAP ac2. routeros7's modern kernel sweeps away the 'old' WiFi limitations with modern drivers and kernel.The point is that all the competing manufacturers are YEARS ahead of MikroTik w.r.t. enterprise WiFi. Wave2, 802.11k/r/v, etc.
Time limit?Has anyone managed to put a time limit on vouchers?
Time limit?Has anyone managed to put a time limit on vouchers?
"Validity" at User-Manager>Profiles works for me.
But "Session Limit" at User-Manager>Limitation not works.
CMIIW
Hi,
Thanks for the work with the user manager. Is there any reason why the administrators portal is removed? Or will this be part of webfig/winbox?
Right now, i miss the nice possibility to generate and print vouchers from the web interface.
Since UserManager now contains also RADIUS server features it was better in long-term to move UserManager controls into Winbox/Webfig (Still Work In Progress, no ETA available).
As for vouchers - the command Youre looking for is:to generate for specific users, orCode: Select all/user-manager/user/generate-voucher voucher-template=printable_vouchers.html numbers=<insert user IDs here from /user-manager/user/print>
to generate for all users.Code: Select all/user-manager/user/generate-voucher [f] voucher-template=printable_vouchers.html
This will create a file gen_printable_vouchers.html.
To access it You either have to download the file to Your device and print that way, or You can access from the via link: <IP>/um/PRIVATE/GENERATED/vouchers/gen_printable_vouchers.html
(Note: For link to work You first need to set username and password : /user-manager/advanced/set web-private-username=<USER> web-private-password=<PASSWORD>)
That works!! Thanks
I guess the standard way of selecting some entries should work here as well? In the command above replace <insert user IDs here from /user-manager/user/print> with construct [ find <selection criterion here>]. I don't know how selection criterion would look like (I'm not runnin userman), but I guess usual regular expressions work here a well ...
Second last paragraph on the very first post:feature request: Administrator portal or customers menu as the old one.
there won't be a separate administrators portal as in the old User Manager.
---You may want to enable the wireless and radius log as well...
Not really - it only does when you use MikroTik wireless. Unless something is broken on v7.8 I'm not getting any extra messages with "radius" nor "wireless" channels. I'm using different APs and I see that it tries to authenticate with RADIUS on MT with username "X" and reports that RADIUS responded with reject.indeed RADIUS log has much more info ... (...)
Yes and no - if I don't see an obvious problem on the AP I look at the server and see why it returns Access-Reject. Currently MT is the missing the link here.When you use different APs you should use the debugging method for THOSE APs (w.r.t. authentication, radius etc) instead of in RouterOS.
Current logs indeed are minimal ... just lost 30 minutes in starting a simple User Manager in ROS7.8 for wifi PEAP authentication with a nearby ROS6 wAP , setting WPA2/EAP , and failing failing failing.Feature request: logs
No, but seriously, the current logs are insufficient for any troubleshooting. Currently I have one user that cannot connect to EAP wifi and the logs contain just this:
radius_logs.jpg
I downloaded version 7.92 yesterday but i cant see private information such as firstname and surname unlike in the old version. Private Information is very necessary so admin can know who is doing what. For now,i will make use of the comment feature to display the name.how to add private information like in usermanager routerOS v6 at usermanager routeros v7?
..
How do we add Vendor Specific attributes?
.
add name=Fortinet-Group-Name packet-types=access-accept type-id=1 value-type=string vendor-id=12356
add name=Fortinet-Client-IP-Address packet-types=access-accept type-id=2 value-type=string vendor-id=12356
add name=Fortinet-Vdom-Name packet-types=access-accept type-id=3 value-type=string vendor-id=12356
add name=Fortinet-Client-IPv6-Address packet-types=access-accept type-id=4 value-type=string vendor-id=12356
add name=Fortinet-Interface-Name packet-types=access-accept type-id=5 value-type=string vendor-id=12356
add name=Fortinet-Access-Profile packet-types=access-accept type-id=6 value-type=string vendor-id=12356
add name=Fortinet-SSID packet-types=access-accept type-id=7 value-type=string vendor-id=12356
add name=Fortinet-AP-Name packet-types=access-accept type-id=8 value-type=string vendor-id=12356
add name=Fortinet-FAC-Auth-Status packet-types=access-accept type-id=11 value-type=string vendor-id=12356
add name=Fortinet-FAC-Token-ID packet-types=access-accept type-id=12 value-type=string vendor-id=12356
add name=Fortinet-FAC-Challenge-Code packet-types=access-accept type-id=15 value-type=string vendor-id=12356
add name=Fortinet-Webfilter-Category-Allow packet-types=access-accept type-id=16 value-type=string vendor-id=12356
add name=Fortinet-Webfilter-Category-Block packet-types=access-accept type-id=17 value-type=string vendor-id=12356
add name=Fortinet-Webfilter-Category-Monitor packet-types=access-accept type-id=18 value-type=string vendor-id=12356
add name=Fortinet-AppCtrl-Category-Allow packet-types=access-accept type-id=19 value-type=string vendor-id=12356
add name=Fortinet-AppCtrl-Category-Block packet-types=access-accept type-id=20 value-type=string vendor-id=12356
add name=Fortinet-AppCtrl-Risk-Allow packet-types=access-accept type-id=21 value-type=string vendor-id=12356
add name=Fortinet-AppCtrl-Risk-Block packet-types=access-accept type-id=22 value-type=string vendor-id=12356
add name=Fortinet-WirelessController-Device-MAC packet-types=access-accept type-id=23 value-type=string vendor-id=12356
add name=Fortinet-WirelessController-WTP-ID packet-types=access-accept type-id=24 value-type=string vendor-id=12356
add name=Fortinet-WirelessController-Assoc-Time packet-types=access-accept type-id=25 value-type=string vendor-id=12356
add name=Fortinet-FortiWAN-AVPair packet-types=access-accept type-id=26 value-type=string vendor-id=12356
add name=Fortinet-FDD-Access-Profile packet-types=access-accept type-id=30 value-type=string vendor-id=12356
add name=Fortinet-FDD-Trusted-Hosts packet-types=access-accept type-id=31 value-type=string vendor-id=12356
add name=Fortinet-FDD-SPP-Name packet-types=access-accept type-id=32 value-type=string vendor-id=12356
add name=Fortinet-FDD-Is-System-Admin packet-types=access-accept type-id=33 value-type=string vendor-id=12356
add name=Fortinet-FDD-Is-SPP-Admin packet-types=access-accept type-id=34 value-type=string vendor-id=12356
add name=Fortinet-FDD-SPP-Policy-Group packet-types=access-accept type-id=35 value-type=string vendor-id=12356
add name=Fortinet-FDD-Allow-API-Access packet-types=access-accept type-id=36 value-type=string vendor-id=12356
add name=Fortinet-Fpc-User-Role packet-types=access-accept type-id=40 value-type=string vendor-id=12356
add name=Fortinet-Tenant-Identification packet-types=access-accept type-id=41 value-type=string vendor-id=12356
add name=Fortinet-Host-Port-AVPair packet-types=access-accept type-id=42 value-type=string vendor-id=12356
Fortinet-Client-IP-Address 2 ipaddr
Fortinet-Client-IPv6-Address 4 octets
Fortinet-Webfilter-Category-Allow 16 octets
Fortinet-Webfilter-Category-Block 17 octets
Fortinet-Webfilter-Category-Monitor 18 octets
Fortinet-AppCtrl-Category-Allow 19 octets
Fortinet-AppCtrl-Category-Block 20 octets
Fortinet-AppCtrl-Risk-Allow 21 octets
Fortinet-AppCtrl-Risk-Block 22 octets
Fortinet-WirelessController-Device-MAC 23 ether
Fortinet-WirelessController-Assoc-Time 25 date
I've just connected successfully another phone with android 11 using EAP-TLS and certificates on both the phone and routeros. So apparently, this is not an issue with android version.Hi
I've openwrt wifi access point (using hostapd) connecting to router os 7.13 user manager. I use only EAP-TLS with certificates. tried 3 clients so far : 2 android devices and 1 windows 10 22h2. Windows is connecting every time, the (old) android 9 device is connecting fine also but another android 10 is failing to connect with the message as seen on the screenshot : EAP rejected for user: <user> handshake timed out. tried another rom, resetted this phone but no changes.
the messages repeating as long as client wifi is on. Any ideas ? maybe a TLS version issue ?
Clipboard01.jpg