Thank you very much!RouterOS version 7.2rc5 has been released "v7 testing" channel!
What's new in 7.2rc5 (2022-Mar-23 12:04):
*) bgp - added BGP advertisements display (requires output.keep-sent-attributes to be set);
What's new in 7.2rc5 (2022-Mar-23 12:04):
*) bgp - added BGP advertisements display (requires output.keep-sent-attributes to be set);
A quick check looks promising, no errors found as in the other ROS7.X releases :-)Update on RB5009 from RC4 to RC5 (ROS and RouterBoard FW) without Issues.
I´ll now test the IPv6 Queues......keep your fingers crossed ;-)
Many many data fields are not populated with the MT App under IOS on my iPhone ... far too many to take pics .... I do not think that MikroTik look at this frequently.Do you also update the MT Apps in RC releases ( like missing allowed IP addresses in peer settings )?
*) ios app - text
Is it anticipated that this release will resolve the slower than expected transfer rate issues with the RB5009 2.5G interface forwarding traffic when 2.5G is being advertised on the interface?*) switch - improved packet forwarding with enabled "cpu-flow-control" setting between different rate interfaces for 88E6393X (RB5009) and 88E6191X (CCR2004-16G-2S+) switch chips;
/ip vrf
add interfaces=0077.GUEST name=VRF-GUEST
#works
/ipv6 firewall filter
add action=accept chain=forward out-interface=WG.MULLVAD.V6 src-address=fc00:0:0:77::/64
#doesn't work
/ipv6 firewall filter
add action=accept chain=forward in-interface=0077.GUEST out-interface=WG.MULLVAD.V6 src-address=fc00:0:0:77::/64
/system clock
set time-zone-name=America/Sao_Paulo
/system ntp client
set enabled=yes
/system ntp client servers
add address=time1.google.com
add address=time2.google.com
add address=time3.google.com
add address=time4.google.com
/system package update
set channel=testing
/system routerboard settings
set auto-upgrade=yes
/tool graphing
set store-every=hour
/tool graphing interface
add
/tool graphing queue
add
/tool graphing resource
add
Unfortunately it is not fixed completely.*) route - fixed "table" menu emptying after RouterOS upgrade;
but what command can we use for displaying BGP advertisements ?RouterOS version 7.2rc5 has been released "v7 testing" channel!
What's new in 7.2rc5 (2022-Mar-23 12:04):
*) bgp - added BGP advertisements display (requires output.keep-sent-attributes to be set);
ThanksThere is some discussion about that BGP viewing in this topic: viewtopic.php?p=920879#p920879
+1but what command can we use for displaying BGP advertisements ?RouterOS version 7.2rc5 has been released "v7 testing" channel!
What's new in 7.2rc5 (2022-Mar-23 12:04):
*) bgp - added BGP advertisements display (requires output.keep-sent-attributes to be set);
Confirmed, this is finally working again :)*) ipv6 - fixed VLAN tagged PPPoE packet receiving on RB5009;
I can confirm that this also fixes the issue of DSCP marked SSH or VoIP connections when using PPPoE with VLAN tagged interfaces.*) ipv6 - fixed VLAN tagged PPPoE packet receiving on RB5009;
That is interesting... When reading that I eagerly upgraded my RB4011 but for me this problem has not been fixed.I can confirm that this also fixes the issue of DSCP marked SSH or VoIP connections when using PPPoE with VLAN tagged interfaces.*) ipv6 - fixed VLAN tagged PPPoE packet receiving on RB5009;
# mar/24/2022 11:38:03 by RouterOS 7.2rc5
# software id =
#
# model = RouterBOARD 750G r3
# serial number =
/interface wireguard
add listen-port=443 mtu=1420 name=ep3 private-key="..."
add listen-port=63016 mtu=1420 name=njalla private-key="..."
/interface wireguard peers
add allowed-address=0.0.0.0/0,::/0 endpoint-address=198.167.192.13 \
endpoint-port=51820 interface=njalla public-key="..."
add allowed-address=10.2.1.2/32,fd02:21::2/128 interface=ep3 public-key="..."
add allowed-address=10.2.1.3/32,fd02:21::3/128 interface=ep3 public-key="..."
/ipv6 firewall address-list
add address=::/128 list=bogon
add address=fec0::/10 list=bogon
add address=::ffff:0.0.0.0/96 list=bogon
add address=::/96 list=bogon
add address=100::/64 list=bogon
add address=2001:db8::/32 list=bogon
add address=2001:10::/28 list=bogon
add address=3ffe::/16 list=bogon
add address=ipv6.google.com disabled=yes list=resolve
add address=mikrotik.com list=resolve
add address=ipv6.google.com list=resolve
add address=wireguard.com list=resolve
add address=fd02:20::/64 list=njalla
add address=fd02:21::/64 list=njalla
/ipv6 firewall filter
add action=drop chain=input comment="drop invalid" connection-state=invalid
add action=accept chain=input comment="accept ICMPv6" protocol=icmpv6
add action=accept chain=input comment="accept established,related,untracked" \
connection-state=established,related,untracked
add action=accept chain=input comment="accept UDP traceroute" port=\
33434-33534 protocol=udp
add action=accept chain=input comment=\
"accept DHCPv6-Client prefix delegation" dst-port=546 protocol=udp \
src-address=fe80::/10
add action=accept chain=input comment="accept WG" dst-port=51820,6310 \
in-interface-list=all-input protocol=udp
add action=accept chain=input comment="accept IPsec ESP" protocol=ipsec-esp
add action=accept chain=input comment="accept IPsec AH" protocol=ipsec-ah
add action=accept chain=input comment="accept IPsec" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="accept all that matches ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="accept established, related" \
connection-state=established,related
add action=drop chain=input comment="drop all from WAN" in-interface-list=\
all-input
add action=drop chain=forward comment="drop invalid" connection-state=invalid
add action=drop chain=forward comment="drop packets with bad src ipv6" \
src-address-list=bogon
add action=drop chain=forward comment="drop packets with bad dst ipv6" \
dst-address-list=bogon
add action=drop chain=forward comment="rfc4890 drop hop-limit=1" hop-limit=\
equal:1 protocol=icmpv6
add action=accept chain=forward comment="accept ICMPv6" protocol=icmpv6
add action=accept chain=forward comment="accept HIP" protocol=139
add action=accept chain=forward comment="accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=forward comment="accept ipsec AH" protocol=ipsec-ah
add action=accept chain=forward comment="accept ipsec ESP" protocol=ipsec-esp
add action=accept chain=forward comment=\
"accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"drop everything else not coming from LAN" in-interface-list=all-input
/ipv6 firewall nat
add action=masquerade chain=srcnat ipsec-policy=out,none out-interface=njalla \
src-address-list=njalla
/ipv6 address
add address=fd02:20::1 interface=lo1
add address=fd02:21::1 interface=ep3
add address=fd03:1337::10 advertise=no interface=njalla
/ipv6 route
add disabled=no dst-address=::/0 gateway=fd03:1337::1 routing-table=main
add disabled=no distance=1 dst-address=2000::/3 gateway=njalla routing-table=\
main scope=30 target-scope=10
/ip address
add address=10.2.0.1/21 interface=lo1 network=10.2.0.0
add address=10.13.37.10/24 interface=njalla network=10.13.37.0
add address=10.2.1.0/24 interface=ep3 network=10.2.1.0
/ip firewall address-list
add address=0.0.0.0/8 list=bogon
add address=10.0.0.0/8 list=bogon
add address=100.64.0.0/10 list=bogon
add address=127.0.0.0/8 list=bogon
add address=169.254.0.0/16 list=bogon
add address=172.16.0.0/12 list=bogon
add address=192.0.0.0/24 list=bogon
add address=192.0.2.0/24 list=bogon
add address=192.168.0.0/16 list=bogon
add address=198.18.0.0/15 list=bogon
add address=198.51.100.0/24 list=bogon
add address=203.0.113.0/24 list=bogon
add address=224.0.0.0/4 list=bogon
add address=240.0.0.0/4 list=bogon
add address=10.2.0.0/21 list=local
add address=10.2.0.0/21 list=njalla
add address=10.2.8.0/21 list=njalla
/ip firewall filter
add action=add-src-to-address-list address-list=input-ep2 \
address-list-timeout=8h chain=input comment="list WG:443" disabled=yes \
dst-port=443 in-interface-list=all-input protocol=udp
add action=add-src-to-address-list address-list=input-ep1 \
address-list-timeout=8h chain=input comment="list WG:51820" disabled=yes \
dst-port=51820 in-interface-list=all-input protocol=udp
add action=accept chain=input comment="accept WG" dst-port=\
443,25260,51820,61952,62840,63016 in-interface-list=all-input protocol=\
udp
add action=accept chain=input comment="accept IPsec ESP" in-interface-list=\
all-input protocol=ipsec-esp
add action=accept chain=input comment="accept IPsec" dst-port=500,1701,4500 \
in-interface-list=all-input protocol=udp
add action=accept chain=input comment="accept WinBox" dst-port=8291 \
in-interface-list=all-input protocol=tcp src-address-list=white
add action=accept chain=input comment="accept SSH" dst-port=32610 \
in-interface-list=all-input protocol=tcp
add action=drop chain=input comment="drop invalid" connection-state=invalid
add action=accept chain=input comment="accept ICMP" protocol=icmp
add action=drop chain=input comment="drop bogon" in-interface-list=all-input \
src-address-list=bogon
add action=add-src-to-address-list address-list=trap address-list-timeout=2w \
chain=input comment="FIN scan" in-interface-list=all-input protocol=tcp \
src-address-list=!white tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list=trap address-list-timeout=2w \
chain=input comment="SYN/FIN scan" in-interface-list=all-input protocol=\
tcp src-address-list=!white tcp-flags=fin,syn
add action=add-src-to-address-list address-list=trap address-list-timeout=2w \
chain=input comment="SYN/RST scan" in-interface-list=all-input protocol=\
tcp src-address-list=!white tcp-flags=syn,rst
add action=add-src-to-address-list address-list=trap address-list-timeout=2w \
chain=input comment="FIN/PSH/URG scan" in-interface-list=all-input \
protocol=tcp src-address-list=!white tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list=trap address-list-timeout=2w \
chain=input comment="ALL/ALL scan" in-interface-list=all-input protocol=\
tcp src-address-list=!white tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list=trap address-list-timeout=2w \
chain=input comment="NULL scan" in-interface-list=all-input protocol=tcp \
src-address-list=!white tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list=trap address-list-timeout=2w \
chain=input comment="TCP psd=21,3s,3,1 scan" in-interface-list=all-input \
protocol=tcp psd=21,3s,3,1 src-address-list=!white
add action=add-src-to-address-list address-list=trap address-list-timeout=2w \
chain=input comment="port knocking" dst-port=\
20-25,53,109,110,137-139,445,1433,3389,5060 in-interface-list=all-input \
protocol=tcp src-address-list=!white
add action=accept chain=input comment="accept established, related" \
connection-state=established,related,untracked
add action=drop chain=input comment="drop all from WAN" in-interface-list=\
all-input
add action=accept chain=forward comment="accept IPsec in policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="accept IPsec out policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=fasttrack \
connection-state=established,related hw-offload=yes out-interface=\
all-ethernet
add action=accept chain=forward comment=\
"accept established, related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="drop invalid" connection-state=invalid
add action=drop chain=forward comment="drop all from WAN not DSTNATed" \
connection-nat-state=!dstnat connection-state=new in-interface-list=\
all-input
/ip firewall mangle
add action=change-mss chain=forward comment="pdmtu njalla" new-mss=\
clamp-to-pmtu out-interface=njalla passthrough=yes protocol=tcp \
tcp-flags=syn tcp-mss=1390-65535
add action=route chain=prerouting comment="route to njalla" dst-address-list=\
!bogon passthrough=no route-dst=10.13.37.1 src-address-list=njalla
/ip firewall nat
add action=masquerade chain=srcnat comment=masqurade ipsec-policy=out,none \
out-interface=njalla src-address-list=njalla
/ip firewall raw
add action=drop chain=prerouting comment="drop trap" in-interface-list=\
all-input src-address-list=trap
add action=drop chain=prerouting dst-address-list=!njalla src-address-list=\
drop
/ip firewall service-port
set ftp disabled=yes
set tftp disabled=yes
set irc disabled=yes
set h323 disabled=yes
set sip disabled=yes
set pptp disabled=yes
[Interface]
PrivateKey = ...
Address = fd02:21::2/128, 10.2.1.2/32
DNS = 10.2.0.1
[Peer]
PublicKey = M8sxz8etMnVkwmjcsKhfC0tpIc2p4Dlatq/3KShPtys=
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = ...:443
That is a catch-all, so traffic is sent to this peer. Looks like configuration issue on your device...Code: Select all/interface wireguard peers add allowed-address=0.0.0.0/0,::/0 [...]
please look into an export, i’ve included all the detailshe has two wireguard interfaces, one containing that peer with ::/0 and another interface with two other peers, they shouldn't interfere as long as he has proper routing for all that, which I didn't check.
I am on an RB5009, so it may have not been fixed on the 4011 (as the Change log explicitly mentions the 5009 only). Probably good idea to let MT know in any ticket you may have open with them on this.That is interesting... When reading that I eagerly upgraded my RB4011 but for me this problem has not been fixed.
I can confirm that this also fixes the issue of DSCP marked SSH or VoIP connections when using PPPoE with VLAN tagged interfaces.
I have a ticket open, but to make it proceed I need to supply them with debugging info like traces, and it is a lot of work to setup a suitable test environment.I am on an RB5009, so it may have not been fixed on the 4011 (as the Change log explicitly mentions the 5009 only). Probably good idea to let MT know in any ticket you may have open with them on this.
Yes, I do "plain" VLAN+PPPoE. In my case it's the WAN connection and then I access SSH or VoIP resources on the internet. This was broken with certain DSCP values before but now seems to be fixed on my 5009.Did you do plain SSH over PPPoE+VLAN? In my case I have a GRE/IPsec tunnel over PPPoE+VLAN and inside that I do SSH or BGP which gets stuck (due to nonzero DSCP).
I mean this, to me, strongly suggests that you are seeing the same bug that we've seen on the 5009. I do remember seeing the same thing on my 4011 before I replaced it with a 5009.I can fix it by putting a mangle rule in postrouting that clears the DSCP.
No, it doesn´t :-/Does CAPsMAN already support Wave2 drivers?
Unfortunately, yes, it is normal. But I start to think that in v6 it never really worked and now it is omitted because this device does not support it (which v6 did not know).I've noticed that CPU frequency missing from Resources. Is it normal?
Take download link for rc5 and replace all occurrences of "rc5" with "rc4" ... e.g. https://download.mikrotik.com/routeros/7.2rc5/routeros-7.2rc5-arm.npk -> https://download.mikrotik.com/routeros/7.2rc4/routeros-7.2rc4-arm.npk and similarly for the ZIP file containing extra packages.To do comparison is it possible to get the rc4 SW on which all worked fine?
You can just switch to your other partition where you saved the 7.2rc4 before upgrading, to compare it.To do comparison is it possible to get the rc4 SW on which all worked fine?
Thanks MKX, great tip, works !What are the issues you encountered?
I have had zero problems with this build so far. Or at least no new ones ;). Upgraded several systems from v7.2rc4 to rc5: MIPSBE (RB953), ARM (wAPacR,hAPac2), ARM64 (RB5009).I'm just happy as Dude is back.
I'm just happy as Dude is back.
PS: Still waiting for unicorn mug.
Furthermore, the client (using latest 7.2rc5 client) says no dude package found when connecting to this router[admin@rb5009] > /dude/print
error - contact MikroTik support and send a supout file (2)
[admin@rb5009] > /dude/export
#error exporting /dude
SSLv2 not offered (OK)
SSLv3 not offered (OK)
TLS 1 offered (deprecated)
TLS 1.1 offered (deprecated)
TLS 1.2 offered (OK)
TLS 1.3 not offered and downgraded to a weaker protocol
NPN/SPDY not offered
ALPN/HTTP2 not offered
Testing cipher categories
NULL ciphers (no encryption) not offered (OK)
Anonymous NULL Ciphers (no authentication) not offered (OK)
Export ciphers (w/o ADH+NULL) not offered (OK)
LOW: 64 Bit + DES, RC[2,4] (w/o export) not offered (OK)
Triple DES Ciphers / IDEA not offered
Obsolete CBC ciphers (AES, ARIA etc.) offered
Strong encryption (AEAD ciphers) offered (OK)
tls-version=only-1.2
Nope not on RB5009, didn't try... Only an Audience I use for testing. But I very interested in it working on RB5009.@Amm0 I'm guessing it's not working on your rb5009 either?I'm just happy as Dude is back.
Is there a good way of not forgetting to copy your current config to all partitions after any configuration changes?You can just switch to your other partition where you saved the 7.2rc4 before upgrading, to compare it.
Not sure what that "fix" implies but on my rb5009 the issue hasn't been fixed. With frequency set to auto(default) and using simple queue with cake or fq codel max speed is 700-750, but setting frequency to 1400 gets full 940 speed on a gigabit link
*) arm - fixed "auto" CPU frequency setting;
Well, in my case I use it to store entire versions before upgrade, so the "copy partition" operation is just part of my procedure to upgrade:Is there a good way of not forgetting to copy your current config to all partitions after any configuration changes?You can just switch to your other partition where you saved the 7.2rc4 before upgrading, to compare it.
unified kernel = easy to maintain != easy to bring up
kudos to whoever behind this development
I think the RB4011 does not have settable CPU frequency and the fact you could set it in 6.49.5 was an error that has been fixed in 7.2On my RB4011iGS+ after upgrade from 6.49.5 to 7.2rc5 I can't even set CPU frequency
I didn't said that MikroTik should bring different kernel for each board/releases, what i mean is since mikrotik adopt unified kernel style then initial migrations/bringup to new kernel would take more time. lets say ARM arch, there's atleast 25 device using same build/kernel even phisically looks the same but kernel conf (pinctrl, gpio, clock freq, pci, etc) was different. thats only the kernel side, tons of proprietary modules need to be adapted as well.I don't think that having several kernel variants with different patch sets and compile options would ensure better stability and/or lower number of bugs.
well nvm this is just my opinions tho. and uh.. which debate ?BTW, I don't see what "unified kernel style" means in context of this debate.
Our debate... which debate ?BTW, I don't see what "unified kernel style" means in context of this debate.
dude, how this can be a debate? lolOur debate.
Umm.. I have mine set at 1.2 instead of 1.4 and it seems to work, I could test if throughput is hurt at even lower frequencies.I think the RB4011 does not have settable CPU frequency and the fact you could set it in 6.49.5 was an error that has been fixed in 7.2On my RB4011iGS+ after upgrade from 6.49.5 to 7.2rc5 I can't even set CPU frequency
dude, how this can be a debate? lolOur debate.
well, so umm.. i lose this debate i guess?
When I was still using v6 I set the CPU frequency to the lowest available and the temperature remained exactly the same. So I doubt it changed anything.Umm.. I have mine set at 1.2 instead of 1.4 and it seems to work, I could test if throughput is hurt at even lower frequencies.
I think the RB4011 does not have settable CPU frequency and the fact you could set it in 6.49.5 was an error that has been fixed in 7.2
2.WLAN AutoConfig service started a connection to a wireless network.
Network Adapter: Intel(R) Dual Band Wireless-AC 8265
Interface GUID: {............................}
Connection Mode: Connection to a secure network without a profile
Profile Name: Beta
SSID: Beta
BSS Type: Infrastructure
3.Wireless network association started.
Network Adapter: Intel(R) Dual Band Wireless-AC 8265
Interface GUID: {..........................}
Local MAC Address: XX:XX:XX:XX:XX:XX
Network SSID: Beta
BSS Type: Infrastructure
Authentication: WPA2-Personal
Encryption: AES-CCMP
802.1X Enabled: No
None of the 2 Audience logs shows any attempt of this laptop to connect to the wireless networks.WLAN AutoConfig service failed to connect to a wireless network.
Network Adapter: Intel(R) Dual Band Wireless-AC 8265
Interface GUID: {...................................}
Connection Mode: Connection to a secure network without a profile
Profile Name: Beta
SSID: Beta
BSS Type: Infrastructure
Failure Reason:The specific network is not available.
RSSI: 255
I saw this as well. Clients report that password is incorrect and can't connect, but nothing in the audience log at all (info logging enabled)None of the 2 Audience logs shows any attempt of this laptop to connect to the wireless networks.
Wow!!Did IPv6 and MPLS get enabled for hw-offload?
I'm pushing 1.6Gbps over VPLS using LDPv6 through a CCR2116 P router and have two CCR2004-16G-2S+ acting as PEs
The routing/route output shows IPv6 labeled prefixes as hw-offloaded and the cpu on the CCR2116 is only at 4% under a 1.6Gbps load
when we full support OpenVPN option ? why don't have import .ovpn edit file ? udp non stable..*) ovpn - improved memory allocation on Tile in "ethernet" mode;
*) ovpn - improved system stability in high load scenarios;
MikroTik only support (part of) the OpenVPN protocol, they do not even call it OpenVPN but rather OVPN. Any similarity seems like a coincidence.when we full support OpenVPN option ? why don't have import .ovpn edit file ? udp non stable..