Statistics: Posted by kevinds — Tue Mar 19, 2024 3:42 am
Statistics: Posted by tovi — Tue Mar 19, 2024 3:02 am
Statistics: Posted by anav — Tue Mar 19, 2024 2:43 am
Statistics: Posted by robkampen — Tue Mar 19, 2024 2:40 am
# 2024-03-18 19:38:06 by RouterOS 7.12.2# model = C52iG-5HaxD2HaxD/interface bridgeadd admin-mac=XXXXXXXX auto-mac=no comment=defconf name=bridge/interface wifiwave2set [ find default-name=wifi1 ] channel.band=5ghz-ax .skip-dfs-channels=\ 10min-cac .width=20/40/80mhz configuration.mode=ap .ssid="Mikro5g" \ disabled=no security.authentication-types=wpa2-psk,wpa3-pskset [ find default-name=wifi2 ] channel.band=2ghz-ax .skip-dfs-channels=\ 10min-cac .width=20/40mhz configuration.mode=ap .ssid=MikroTik-E74BB0 \ disabled=no security.authentication-types=wpa2-psk,wpa3-psk/interface wireguardadd listen-port=13231 mtu=1420 name=wireguard1/interface listadd comment=defconf name=WANadd comment=defconf name=LAN/ip pooladd name=default-dhcp ranges=10.0.1.10-10.0.1.254/ip dhcp-serveradd address-pool=default-dhcp disabled=yes interface=bridge lease-time=8h \ name=defconf/interface bridge portadd bridge=bridge comment=defconf interface=ether2add bridge=bridge comment=defconf interface=ether3add bridge=bridge comment=defconf interface=ether4add bridge=bridge comment=defconf interface=ether5add bridge=bridge comment=defconf interface=wifi1add bridge=bridge comment=defconf interface=wifi2add bridge=bridge comment=defconf interface=ether1/ip neighbor discovery-settingsset discover-interface-list=LAN/interface detect-internetset detect-interface-list=LAN internet-interface-list=LAN lan-interface-list=\ LAN wan-interface-list=LAN/interface list memberadd comment=defconf interface=bridge list=LANadd comment=defconf interface=ether1 list=LANadd interface=wireguard1 list=LAN/interface wireguard peersadd allowed-address=192.168.100.2/32 interface=wireguard1 public-key=\ "XXXXXXXXXXXXXXXXXXXXX"/ip addressadd address=10.0.1.0/24 comment=defconf interface=bridge network=10.0.1.0add address=192.168.100.1/24 interface=wireguard1 network=192.168.100.0/ip dhcp-client# DHCP client can not run on slave or passthrough interface!add comment=defconf interface=ether1/ip dhcp-server networkadd address=10.0.1.0/24 comment=defconf dns-server=10.0.1.1 gateway=10.0.1.1/ip dnsset allow-remote-requests=yes/ip dns staticadd address=10.0.1.1 comment=defconf disabled=yes name=router.lan/ip firewall filteradd action=accept chain=input comment="Allow wireguard" dst-port=13231 \ protocol=udpadd action=accept chain=input comment="Allow wiregurad traffic" src-address=\ 192.168.100.0/24add action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalidadd action=accept chain=input comment="defconf: accept ICMP" protocol=icmpadd action=accept chain=input comment=\ "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=accept chain=forward comment="defconf: accept in ipsec policy" \ ipsec-policy=in,ipsecadd action=accept chain=forward comment="defconf: accept out ipsec policy" \ ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment="defconf: fasttrack" \ connection-state=established,related hw-offload=yesadd action=accept chain=forward comment=\ "defconf: accept established,related, untracked" connection-state=\ established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalidadd action=drop chain=forward comment=\ "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \ connection-state=new in-interface-list=WAN/ip firewall natadd action=masquerade chain=srcnat comment="defconf: masquerade" \ ipsec-policy=out,none out-interface-list=WANadd action=dst-nat chain=dstnat disabled=yes dst-port=3389 in-interface=\ all-ethernet protocol=tcp to-addresses=10.0.0.0/24 to-ports=3389add action=dst-nat chain=dstnat disabled=yes dst-port=3389 in-interface=\ all-wireless protocol=tcp to-addresses=10.0.0.0/24 to-ports=3389add action=dst-nat chain=dstnat disabled=yes dst-port=3389 in-interface=\ bridge protocol=tcp to-addresses=10.0.0.0/24 to-ports=3389/ipv6 firewall address-listadd address=::/128 comment="defconf: unspecified address" list=bad_ipv6add address=::1/128 comment="defconf: lo" list=bad_ipv6add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6add address=100::/64 comment="defconf: discard only " list=bad_ipv6add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6/ipv6 firewall filteradd action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalidadd action=accept chain=input comment="defconf: accept ICMPv6" protocol=\ icmpv6add action=accept chain=input comment="defconf: accept UDP traceroute" port=\ 33434-33534 protocol=udpadd action=accept chain=input comment=\ "defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\ udp src-address=fe80::/10add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \ protocol=udpadd action=accept chain=input comment="defconf: accept ipsec AH" protocol=\ ipsec-ahadd action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\ ipsec-espadd action=accept chain=input comment=\ "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsecadd action=drop chain=input comment=\ "defconf: drop everything else not coming from LAN" in-interface-list=\ !LANadd action=accept chain=forward comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalidadd action=drop chain=forward comment=\ "defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6add action=drop chain=forward comment=\ "defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \ hop-limit=equal:1 protocol=icmpv6add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\ icmpv6add action=accept chain=forward comment="defconf: accept HIP" protocol=139add action=accept chain=forward comment="defconf: accept IKE" dst-port=\ 500,4500 protocol=udpadd action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\ ipsec-ahadd action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\ ipsec-espadd action=accept chain=forward comment=\ "defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsecadd action=drop chain=forward comment=\ "defconf: drop everything else not coming from LAN" in-interface-list=\ !LAN/system clockset time-zone-name=America/New_York/system noteset show-at-login=no/tool mac-serverset allowed-interface-list=LAN/tool mac-server mac-winboxset allowed-interface-list=LAN
[Interface]PrivateKey = xxxxxxxxxxxxxxxxxxAddress = 192.168.100.2/32DNS = 192.168.100.1[Peer]PublicKey = xxxxxxxxxxxxxxxxxxxxAllowedIPs = 0.0.0.0/0Endpoint = xxxxxxxxxxxxxxxxxx
Statistics: Posted by badger — Tue Mar 19, 2024 1:59 am
ip firewall address-list:local update do={:do {:local data ([:tool fetch url=$url output=user as-value]->"data"):local array [find dynamic list=blacklist]:foreach value in=$array do={:set array (array,[get $value address])}:while ([:len $data]!=0) do={:if ([:pick $data 0 [:find $data "\n"]]~"^[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}") do={:local ip ([:pick $data 0 [:find $data $delimiter]].$cidr):do {add list=blacklist address=$ip comment=$description timeout=1d} on-error={:do {set ($array->([:find $array $ip]-[:len $array]/2)) timeout=1d} on-error={}}}:set data [:pick $data ([:find $data "\n"]+1) [:len $data]]}} on-error={:log warning "Address list <$description> update failed"}}$update url=https://www.spamhaus.org/drop/drop.txt description="Spamhaus DROP" delimiter=("\_")$update url=https://www.spamhaus.org/drop/edrop.txt description="Spamhaus EDROP" delimiter=("\_")
Statistics: Posted by UkRainUa — Tue Mar 19, 2024 1:56 am
Statistics: Posted by Cha0s — Tue Mar 19, 2024 1:49 am
Statistics: Posted by neki — Tue Mar 19, 2024 1:33 am
Statistics: Posted by Scoox — Tue Mar 19, 2024 1:25 am
Statistics: Posted by Kaldek — Tue Mar 19, 2024 12:41 am
Statistics: Posted by jaclaz — Tue Mar 19, 2024 12:38 am
Statistics: Posted by LeoNaXe — Tue Mar 19, 2024 12:25 am
Statistics: Posted by anav — Tue Mar 19, 2024 12:15 am
Statistics: Posted by anav — Tue Mar 19, 2024 12:13 am
Statistics: Posted by anav — Tue Mar 19, 2024 12:10 am
Statistics: Posted by inna — Tue Mar 19, 2024 12:05 am
Statistics: Posted by LeoNaXe — Tue Mar 19, 2024 12:03 am
Statistics: Posted by anav — Tue Mar 19, 2024 12:03 am
Statistics: Posted by anav — Tue Mar 19, 2024 12:02 am
Statistics: Posted by anav — Tue Mar 19, 2024 12:00 am
Statistics: Posted by inna — Mon Mar 18, 2024 11:54 pm
prefix-hint=::/60
Statistics: Posted by mkx — Mon Mar 18, 2024 11:48 pm
do you mean via RADIUS?Please make dynamic vlan assignment possible for wifi-qcom-ac wireless driver
Statistics: Posted by hoboristi — Mon Mar 18, 2024 11:47 pm
Statistics: Posted by Hominidae — Mon Mar 18, 2024 11:40 pm
Statistics: Posted by Trilis — Mon Mar 18, 2024 11:38 pm
Statistics: Posted by mkx — Mon Mar 18, 2024 11:38 pm
Statistics: Posted by brad0x52 — Mon Mar 18, 2024 11:38 pm
Statistics: Posted by jaclaz — Mon Mar 18, 2024 11:29 pm
# 2024-03-18 23:02:05 by RouterOS 7.14.1# software id = SHWC-BANU## model = CRS109-8G-1S-2HnD# serial number = D54E0D114A32/interface bridgeadd admin-mac=08:55:31:62:27:46 auto-mac=no comment=defconf igmp-snooping=yes \ igmp-version=3 mld-version=2 multicast-querier=yes name=bridge \ port-cost-mode=short/interface ethernetset [ find default-name=ether1 ] mac-address=30:EB:25:24:6E:CC/interface wirelessset [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX \ country=estonia disabled=no distance=indoors frequency=2432 installation=\ indoor mode=ap-bridge ssid=OhanaKii wireless-protocol=802.11/interface listadd comment=defconf name=WANadd comment=defconf name=LAN/interface lte apnset [ find default=yes ] ip-type=ipv4 use-network-apn=no/interface wireless security-profilesset [ find default=yes ] authentication-types=wpa-psk,wpa2-psk mode=\ dynamic-keys supplicant-identity=MikroTik/ip pooladd name=dhcp ranges=192.168.88.10-192.168.88.254/ip dhcp-serveradd address-pool=dhcp interface=bridge lease-time=1d10m name=defconf/portset 0 name=serial0/interface bridge filteradd action=drop chain=output out-interface=wlan1 packet-type=multicast/interface bridge portadd bridge=bridge comment=defconf ingress-filtering=no interface=ether2 \ internal-path-cost=10 path-cost=10add bridge=bridge comment=defconf ingress-filtering=no interface=ether3 \ internal-path-cost=10 path-cost=10add bridge=bridge comment=defconf ingress-filtering=no interface=ether4 \ internal-path-cost=10 path-cost=10add bridge=bridge comment=defconf ingress-filtering=no interface=ether5 \ internal-path-cost=10 path-cost=10add bridge=bridge comment=defconf ingress-filtering=no interface=ether6 \ internal-path-cost=10 path-cost=10add bridge=bridge comment=defconf ingress-filtering=no interface=ether7 \ internal-path-cost=10 path-cost=10add bridge=bridge comment=defconf ingress-filtering=no interface=ether8 \ internal-path-cost=10 path-cost=10add bridge=bridge comment=defconf ingress-filtering=no interface=sfp1 \ internal-path-cost=10 path-cost=10add bridge=bridge comment=defconf ingress-filtering=no interface=wlan1 \ internal-path-cost=10 path-cost=10/ip firewall connection trackingset udp-timeout=10s/ip neighbor discovery-settingsset discover-interface-list=LAN/ip settingsset max-neighbor-entries=8192/ipv6 settingsset disable-ipv6=yes max-neighbor-entries=8192/interface detect-internetset detect-interface-list=LAN/interface list memberadd comment=defconf interface=bridge list=LANadd comment=defconf interface=ether1 list=WAN/interface ovpn-server serverset auth=sha1,md5/ip addressadd address=192.168.88.1/24 comment=defconf interface=bridge network=\ 192.168.88.0/ip dhcp-clientadd comment=defconf interface=ether1/ip dhcp-server leaseadd address=192.168.88.251 client-id=1:be:86:fb:f1:c9:a0 mac-address=\ BE:86:FB:F1:C9:A0 server=defconfadd address=192.168.88.249 client-id=1:72:5b:69:25:b2:7e mac-address=\ 72:5B:69:25:B2:7E server=defconf/ip dhcp-server networkadd address=192.168.88.0/24 comment=defconf gateway=192.168.88.1/ip dnsset allow-remote-requests=yes/ip dns staticadd address=192.168.88.1 comment=defconf name=router.lan/ip firewall filteradd action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untrackedadd action=accept chain=input in-interface=ether1 protocol=udpadd action=accept chain=forward in-interface=ether1 protocol=udpadd action=accept chain=input in-interface=ether1 protocol=igmpadd action=accept chain=forward in-interface=ether1 protocol=igmpadd action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalid disabled=yesadd action=accept chain=input comment="defconf: accept ICMP" protocol=icmpadd action=accept chain=input comment=\ "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=drop chain=input comment="defconf: drop all not coming from LAN" \ disabled=yes in-interface-list=!LANadd action=accept chain=forward comment="defconf: accept in ipsec policy" \ ipsec-policy=in,ipsecadd action=accept chain=forward comment="defconf: accept out ipsec policy" \ ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment="defconf: fasttrack" \ connection-state=established,related hw-offload=yesadd action=accept chain=forward comment=\ "defconf: accept established,related, untracked" connection-state=\ established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalid disabled=yesadd action=drop chain=forward comment=\ "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \ connection-state=new disabled=yes in-interface-list=WAN/ip firewall natadd action=masquerade chain=srcnat comment="defconf: masquerade" \ ipsec-policy=out,none out-interface-list=WAN/lcdset time-interval=hour/routing bfd configurationadd disabled=no interfaces=all min-rx=200ms min-tx=200ms multiplier=5/routing igmp-proxy interfaceadd alternative-subnets=0.0.0.0/0 interface=ether1 upstream=yesadd interface=bridge/system clockset time-zone-name=Europe/Tallinn/system noteset show-at-login=no/tool mac-serverset allowed-interface-list=LAN/tool mac-server mac-winboxset allowed-interface-list=LAN
Statistics: Posted by kvitek79 — Mon Mar 18, 2024 11:18 pm
Statistics: Posted by h1ghrise — Mon Mar 18, 2024 11:17 pm
Statistics: Posted by mabels — Mon Mar 18, 2024 11:11 pm
Statistics: Posted by kevinds — Mon Mar 18, 2024 11:10 pm
Statistics: Posted by LeoNaXe — Mon Mar 18, 2024 11:05 pm
Statistics: Posted by anav — Mon Mar 18, 2024 11:03 pm
Statistics: Posted by Hominidae — Mon Mar 18, 2024 11:03 pm
Statistics: Posted by kevinds — Mon Mar 18, 2024 11:01 pm
Statistics: Posted by jaclaz — Mon Mar 18, 2024 11:00 pm
Statistics: Posted by anav — Mon Mar 18, 2024 10:59 pm
Statistics: Posted by neki — Mon Mar 18, 2024 10:58 pm
Statistics: Posted by LeoNaXe — Mon Mar 18, 2024 10:58 pm
Statistics: Posted by LeoNaXe — Mon Mar 18, 2024 10:56 pm
Statistics: Posted by anav — Mon Mar 18, 2024 10:56 pm
Statistics: Posted by donmunyak — Mon Mar 18, 2024 10:54 pm
/interface wireguardadd listen-port=13231 private-key="private_key_from_provider" name=wireguard1/interface wireguard peersadd allowed-address=0.0.0.0/0 endpoint-address=5.172.196.95 endpoint-port="wireguard_port" interface=wireguard1 public-key="public_key_of_provider"/ip addressadd address=192.168.32.2xx/30 network=192.168.32.0 interface=wireguard1/ip routeadd dst-address=0.0.0.0 gateway=192.168.32.1add dst-address=5.172.196.95 gateway=192.168.1.1 distance=1add dst-address=5.172.196.95 gateway=192.168.2.1 distance=5
Statistics: Posted by LeoNaXe — Mon Mar 18, 2024 10:51 pm
Might be a silly question, but have you tried updating to the latest version?yup .. again same state... need to reboot crs312 to fix all...
Yes, have now done some debugging .. Hosts that has static ip works ok.Curious.. If you give the hosts static IPs, do they keep working? What is the lease time set to? What happens if you change it?to keep clients get ip addr with dhcp
Statistics: Posted by sakke42 — Mon Mar 18, 2024 10:46 pm
Statistics: Posted by Amm0 — Mon Mar 18, 2024 10:44 pm
Statistics: Posted by DeathRat — Mon Mar 18, 2024 10:39 pm
Statistics: Posted by Maggiore81 — Mon Mar 18, 2024 10:24 pm
Statistics: Posted by samsung172 — Mon Mar 18, 2024 10:19 pm
make a search in the forum before posting...
thank you
Statistics: Posted by pocci — Mon Mar 18, 2024 10:06 pm
<snip/>@Larsa I have not addressed any question towards you.
Statistics: Posted by t0mm13b — Mon Mar 18, 2024 9:59 pm
/system/routerboard/wps-button
/system routerboard wps-button set enabled=yes on-event=":log \"WPS button pressed\""
Statistics: Posted by akkurad — Mon Mar 18, 2024 9:57 pm
/caps-man access-listadd action=accept signal-range=-90..120add action=reject signal-range=-120..-91
Statistics: Posted by keyfersk8 — Mon Mar 18, 2024 9:54 pm
Statistics: Posted by Valerio5000 — Mon Mar 18, 2024 9:52 pm
Statistics: Posted by kevinds — Mon Mar 18, 2024 9:47 pm
Statistics: Posted by Maggiore81 — Mon Mar 18, 2024 9:47 pm
No, use ip->firewall->connections to see how the Internet works
Doesn't this mean this sentence?
If src-mac-address is my laptop for example, then allow this mac address.
But what do you mean by the dst-mac? My laptop connects to Mikrotik and Mikrotik again sends the data to my laptop. Do you mean in this case, I should assign the dst to my laptop again?
I mean both src and dst should be the same?
Statistics: Posted by inna — Mon Mar 18, 2024 9:46 pm
Statistics: Posted by inna — Mon Mar 18, 2024 9:45 pm
Doesn't this mean this sentence?"src-mac-address=some_mac_address"
What about dst?
Statistics: Posted by UkRainUa — Mon Mar 18, 2024 9:43 pm
Statistics: Posted by UkRainUa — Mon Mar 18, 2024 9:38 pm
Statistics: Posted by inna — Mon Mar 18, 2024 9:37 pm
Statistics: Posted by inna — Mon Mar 18, 2024 9:35 pm
Statistics: Posted by UkRainUa — Mon Mar 18, 2024 9:33 pm
Statistics: Posted by UkRainUa — Mon Mar 18, 2024 9:32 pm
Statistics: Posted by Railander — Mon Mar 18, 2024 9:26 pm
Statistics: Posted by inna — Mon Mar 18, 2024 9:24 pm
Statistics: Posted by Savanture — Mon Mar 18, 2024 9:20 pm
Statistics: Posted by anav — Mon Mar 18, 2024 9:18 pm
Statistics: Posted by KKTK — Mon Mar 18, 2024 9:16 pm
Statistics: Posted by chechito — Mon Mar 18, 2024 9:12 pm
The world should know, Mikrotik is NOT reliable.It is useful for the community to know. Yes, do let MikroTik know directly. They probably source these power supply units and do not make them themselves.
Statistics: Posted by inteq — Mon Mar 18, 2024 9:08 pm
Statistics: Posted by Larsa — Mon Mar 18, 2024 9:08 pm
[admin@RouterOS] > /ip firewall filter printFlags: X - disabled, I - invalid, D - dynamic 0 ;;; saeed-laptop chain=forward action=accept src-mac-address=some_mac_address log=no log-prefix="" 1 ;;; saeed-phone chain=input action=accept src-mac-address=some_mac_address log=no log-prefix="" 2 ;;; saeed-phone chain=forward action=accept src-mac-address=some_mac_address log=no log-prefix="" 3 ;;; bro-phone chain=forward action=accept src-mac-address=some_mac_address log=no log-prefix="" 4 ;;; bro-laptop chain=forward action=accept src-mac-address=some_mac_address log=no log-prefix="" 5 chain=forward action=drop log=no log-prefix=""
Statistics: Posted by inna — Mon Mar 18, 2024 9:07 pm
Statistics: Posted by jaclaz — Mon Mar 18, 2024 9:07 pm
Statistics: Posted by devnull0 — Mon Mar 18, 2024 9:02 pm
Statistics: Posted by anav — Mon Mar 18, 2024 8:51 pm
Statistics: Posted by DarkNate — Mon Mar 18, 2024 8:50 pm
Statistics: Posted by anav — Mon Mar 18, 2024 8:49 pm
Statistics: Posted by mstanciu — Mon Mar 18, 2024 8:35 pm
I'm curious though.. When was it needed? Surely you are not doing this using your mobile phone to send the commands to the working router?More I do know the QEMU emulation approach works on RB1100AHx4,
The RB1100 is kinda my main test router. But have plenty of ports to spare on it... so I configure a port that just always run netinstall on it (with modification to the Dockerfile to keep running). Thus if a netinstall is needed, I can just do the "power-and-push-reset" on device, and using the RB1100's "netinstall port" map to /container. I leave a PoE injector on it, so it's pretty plug-and-play.You will need to configure it anyways after Netboot.. If you are using a computer, why not just run netinstall from it?
Statistics: Posted by Amm0 — Mon Mar 18, 2024 8:21 pm
ccr2004-1g-12s: upgrade failed, free 209 kB disk space for a (null)upgrade
I see no special data on disk ... I removed the wifi package without any modification.Uptime00:10:24Free Memory3866.9 MiBTotal Memory4096.0 MiBCPUARM64CPU Count4CPU Load0 %Free HDD Space91.2 MiBTotal HDD Size128.0 MiBSector Writes Since Reboot39Total Sector Writes663 093Bad Blocks0.0 %Architecture Namearm64Board NameCCR2004-1G-12S+2XSVersion7.14.1 (stable)Build Time2024-03-08 12:50:23Factory Software6.48.2
Statistics: Posted by ffries — Mon Mar 18, 2024 8:16 pm
Statistics: Posted by holvoetn — Mon Mar 18, 2024 8:05 pm
Statistics: Posted by jaclaz — Mon Mar 18, 2024 7:53 pm
Statistics: Posted by Amm0 — Mon Mar 18, 2024 7:49 pm
Statistics: Posted by anav — Mon Mar 18, 2024 7:47 pm
Statistics: Posted by anav — Mon Mar 18, 2024 7:44 pm
Statistics: Posted by jaclaz — Mon Mar 18, 2024 7:37 pm