Statistics: Posted by menyarito — Thu Mar 28, 2024 6:41 pm
# 2024-03-28 17:10:04 by RouterOS 7.14.2# software id = 0P78-XXXX## model = RB3011UiAS# serial number = xxx/interface bridgeadd admin-mac=E4:8D:8C:0A:41:B0 auto-mac=no comment=defconf name=bridge/interface pppoe-clientadd add-default-route=yes disabled=no interface=ether1 name=pppoe-out1 use-peer-dns=yes user=xxxxx@t-online.de/interface listadd comment=defconf name=WANadd comment=defconf name=LAN/interface wireless security-profilesset [ find default=yes ] supplicant-identity=MikroTik/ip pooladd name=dhcp ranges=10.21.21.90-10.21.21.199/ip dhcp-serveradd address-pool=dhcp interface=bridge lease-time=10m name=defconf/portset 0 name=serial0/zerotierset zt1 comment="ZeroTier Central controller - https://my.zerotier.com/" disabled=yes disabled=yes name=zt1 port=9993/interface bridge portadd bridge=bridge comment=defconf interface=ether2add bridge=bridge comment=defconf interface=ether3add bridge=bridge comment=defconf interface=ether4add bridge=bridge comment=defconf interface=ether5add bridge=bridge comment=defconf interface=ether6add bridge=bridge comment=defconf interface=ether7add bridge=bridge comment=defconf interface=ether8add bridge=bridge comment=defconf interface=ether9add bridge=bridge comment=defconf interface=ether10add bridge=bridge comment=defconf interface=sfp1/ip firewall connection trackingset udp-timeout=10s/ip neighbor discovery-settingsset discover-interface-list=LAN/interface list memberadd comment=defconf interface=bridge list=LANadd comment=defconf interface=ether1 list=WANadd interface=pppoe-out1 list=WAN/ip addressadd address=10.21.21.254/24 comment=defconf interface=bridge network=10.21.21.0/ip dhcp-clientadd comment=defconf disabled=yes interface=ether1/ip dhcp-server networkadd address=10.21.21.0/24 comment=defconf dns-server=10.21.21.254 gateway=10.21.21.254 netmask=24/ip dnsset allow-remote-requests=yes/ip dns staticadd address=10.21.21.254 comment=defconf name=router.lan/ip firewall filteradd action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=invalidadd action=accept chain=input comment="defconf: accept ICMP" protocol=icmpadd action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LANadd action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsecadd action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yesadd action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" connection-state=invalidadd action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN/ip firewall natadd action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=out,none out-interface-list=WANadd action=dst-nat chain=dstnat comment=submission dst-port=587 in-interface-list=WAN protocol=tcp to-addresses=10.21.21.244 to-ports=587add action=dst-nat chain=dstnat comment=smtp dst-port=25 in-interface-list=WAN protocol=tcp to-addresses=10.21.21.244 to-ports=25add action=dst-nat chain=dstnat comment=imaps dst-port=993 in-interface-list=WAN protocol=tcp to-addresses=10.21.21.244 to-ports=993add action=masquerade chain=srcnat comment="hairpin : mikrotik youtube" dst-address=10.21.21.244 log=yes log-prefix=HAIRPIN: out-interface=bridge protocol=tcp src-address=10.21.21.0/24/ipv6 firewall address-listadd address=::1/128 comment="defconf: lo" list=bad_ipv6add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6add address=100::/64 comment="defconf: discard only " list=bad_ipv6add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6/ipv6 firewall filteradd action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=invalidadd action=accept chain=input comment="defconf: accept ICMPv6" protocol=icmpv6add action=accept chain=input comment="defconf: accept UDP traceroute" dst-port=33434-33534 protocol=udpadd action=accept chain=input comment="defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp src-address=fe80::/10add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 protocol=udpadd action=accept chain=input comment="defconf: accept ipsec AH" protocol=ipsec-ahadd action=accept chain=input comment="defconf: accept ipsec ESP" protocol=ipsec-espadd action=accept chain=input comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsecadd action=drop chain=input comment="defconf: drop everything else not coming from LAN" in-interface-list=!LANadd action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" connection-state=invalidadd action=drop chain=forward comment="defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6add action=drop chain=forward comment="defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" hop-limit=equal:1 protocol=icmpv6add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=icmpv6add action=accept chain=forward comment="defconf: accept HIP" protocol=139add action=accept chain=forward comment="defconf: accept IKE" dst-port=500,4500 protocol=udpadd action=accept chain=forward comment="defconf: accept ipsec AH" protocol=ipsec-ahadd action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=ipsec-espadd action=accept chain=forward comment="defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsecadd action=drop chain=forward comment="defconf: drop everything else not coming from LAN" in-interface-list=!LAN/system clockset time-zone-name=Europe/Berlin/system identityset name=RB3011/system noteset show-at-login=no/system package updateset channel=testing/system routerboard settingsset auto-upgrade=yes silent-boot=yes/tool mac-serverset allowed-interface-list=LAN/tool mac-server mac-winboxset allowed-interface-list=LAN
Statistics: Posted by tesme33 — Thu Mar 28, 2024 6:21 pm
Statistics: Posted by Michiganbroadband — Thu Mar 28, 2024 6:01 pm
Statistics: Posted by infabo — Thu Mar 28, 2024 5:54 pm
/ip/firewall/filter/add in-interface=management action=accept place-before=1
/ip/firewall/filter/add action=accept chain=input comment="Allow to management" in-interface=ether15
Statistics: Posted by jordanp123 — Thu Mar 28, 2024 5:52 pm
Statistics: Posted by Michiganbroadband — Thu Mar 28, 2024 5:50 pm
Columns: NAME, VERSION, BUILD-TIME, SIZE# NAME VERSION BUILD-TIME SIZE 0 routeros 7.15beta8 2024-03-21 07:12:27 12.2MiB
Columns: NAME, VERSION, BUILD-TIME, SIZE# NAME VERSION BUILD-TIME SIZE 0 wifi-qcom-ac 7.15beta8 2024-03-21 07:12:27 2920.1KiB1 routeros 7.15beta8 2024-03-21 07:12:27 11.5MiB
/interface wifi export
# 2024-03-28 16:37:39 by RouterOS 7.15beta8# software id = GI7S-LL99## model = RB5009UPr+S+# serial number = HFF***/interface wifiadd configuration.mode=ap name="Bedroom - Wireless Backhaul 5GHz" radio-mac=18:FD:...add configuration.mode=ap name="Living Room - Wireless Backhaul 5GHz" radio-mac=18:FD:.../interface wifi channeladd band=2ghz-n disabled=no frequency=2300-7300 name="Network 2GHz" width=20mhzadd band=5ghz-ac disabled=no frequency=2300-7300 name="Network 5GHz" width=20/40mhz-Ce/interface wifi datapathadd bridge=bridge_lan disabled=no name="WiFi Path"/interface wifi securityadd authentication-types=wpa2-psk,wpa3-psk disabled=no group-encryption=ccmp name="Network Security"/interface wifi configurationadd channel="Network 2GHz" country=Spain datapath="WiFi Path" disabled=no name="Network 2GHz" security=\ "Network Security" ssid=Network2add channel="Network 5GHz" country=Spain datapath="WiFi Path" disabled=no name="Network 5GHz" security=\ "Network Security" ssid=Network5/interface wifiadd configuration="Network 2GHz" configuration.mode=ap disabled=no name="Bedroom - 2GHz" radio-mac=\ 18:FD:...add configuration="Network 5GHz" configuration.mode=ap disabled=no name="Bedroom - 5GHz" radio-mac=\ 18:FD:...add configuration="Network 2GHz" configuration.mode=ap disabled=no name="Living Room - 2GHz" radio-mac=\ 18:FD:...add configuration="Network 5GHz" configuration.mode=ap disabled=no name="Living Room - 5GHz" radio-mac=\ 18:FD:.../interface wifi capsmanset ca-certificate=auto certificate=auto enabled=yes interfaces=bridge_lan package-path="" \ require-peer-certificate=no upgrade-policy=none
/interface wifi export
# 2024-03-28 16:41:27 by RouterOS 7.15beta8# software id = BVUP-2TEH## model = RBD25G-5HPacQD2HPnD# serial number = HCZ***/interface wifi# managed by CAPsMAN# mode: AP, SSID: Network2, channel: 2427/nset [ find default-name=wifi1 ] configuration.manager=capsman datapath=capdp \ disabled=no# managed by CAPsMANset [ find default-name=wifi2 ] configuration.manager=capsman datapath=capdp# managed by CAPsMAN# mode: AP, SSID: Network5, channel: 5660/ac/Ceset [ find default-name=wifi3 ] configuration.manager=capsman datapath=capdp \ disabled=no/interface wifi capset discovery-interfaces=bridgeLocal enabled=yes slaves-datapath=capdp/interface wifi datapathadd bridge=bridgeLocal comment=defconf disabled=no name=capdp
Statistics: Posted by synchro — Thu Mar 28, 2024 5:43 pm
Hey! I did connected this modem to my RBM33G via USB port
To be fair, i have to make it clear that I don’t own the CAT18 LHGG but the CAT6 so i could use some upgrade here.
It seems odd that the T99W175 wouldn’t work as the DW5821e is listed on the supported modems and it’s very similar to the one I am talking about.
I don’t mind about the 2 more antennas it needs to work, it’s an easy modification for me.
However if you’re 100% sure this modem doesn’t support the usb protocol I won’t event try it. I’ve seen some sellers listing it as supported by MBIM via USB. So I don’t know what to believe anymore.
Statistics: Posted by xristostsilis — Thu Mar 28, 2024 5:41 pm
Statistics: Posted by anav — Thu Mar 28, 2024 5:40 pm
Statistics: Posted by thomassocz — Thu Mar 28, 2024 5:34 pm
Statistics: Posted by gigabyte091 — Thu Mar 28, 2024 5:29 pm
Statistics: Posted by spookymulder84 — Thu Mar 28, 2024 5:28 pm
Statistics: Posted by loloski — Thu Mar 28, 2024 5:24 pm
#notfixed - it's getting ridiculous..
Statistics: Posted by Archous — Thu Mar 28, 2024 5:08 pm
# 2024-03-28 15:45:29 by RouterOS 7.14.1# model = RB5009UG+S+/interface bridgeadd admin-mac=78:9A:18:C3:18:7F auto-mac=no name=bridge1 vlan-filtering=yes/interface wifiadd name=cap-wifi1 radio-mac=78:9A:18:CE:19:FFadd name=cap-wifi2 radio-mac=78:9A:18:CE:1A:00/interface vlanadd interface=bridge1 name=vlan10 vlan-id=10add interface=bridge1 name=vlan20 vlan-id=20add interface=bridge1 name=vlan30 vlan-id=30add interface=bridge1 name=vlan40 vlan-id=40/interface listadd name=LANadd name=WAN/ip pooladd name=pool10 ranges=10.50.10.200-10.50.10.210add name=pool20 ranges=10.50.20.100-10.50.20.200add name=pool30 ranges=10.50.30.100-10.50.30.200add name=pool40 ranges=10.50.40.100-10.50.40.200/ip dhcp-serveradd address-pool=pool10 interface=vlan10 name=server10add address-pool=pool20 interface=vlan20 name=server20add address-pool=pool30 interface=vlan30 name=server30add address-pool=pool40 interface=vlan40 name=server40/interface bridge portadd bridge=bridge1 frame-types=admit-only-vlan-tagged interface=ether3add bridge=bridge1 frame-types=admit-only-vlan-tagged interface=ether4add bridge=bridge1 frame-types=admit-only-vlan-tagged interface=ether5add bridge=bridge1 frame-types=admit-only-vlan-tagged interface=ether6add bridge=bridge1 frame-types=admit-only-vlan-tagged interface=ether7add bridge=bridge1 frame-types=admit-only-vlan-tagged interface=ether8/ipv6 settingsset disable-ipv6=yes/interface bridge vlanadd bridge=bridge1 tagged=bridge1,ether3,ether4,ether5,ether6,ether7,ether8 \ vlan-ids=10add bridge=bridge1 tagged=bridge1,ether3,ether4,ether5,ether6,ether7,ether8 \ vlan-ids=20add bridge=bridge1 tagged=bridge1,ether3,ether4,ether5,ether6,ether7,ether8 \ vlan-ids=30add bridge=bridge1 tagged=bridge1,ether3,ether4,ether5,ether6,ether7,ether8 \ vlan-ids=40/interface list memberadd interface=ether1 list=WANadd interface=vlan10 list=LANadd interface=vlan20 list=LANadd interface=vlan30 list=LANadd interface=vlan40 list=LAN/interface wifi capsmanset enabled=yes interfaces=vlan10 package-path="" require-peer-certificate=no \ upgrade-policy=none/ip addressadd address=10.50.10.1/24 interface=vlan10 network=10.50.10.0add address=10.50.20.1/24 interface=vlan20 network=10.50.20.0add address=10.50.30.1/24 interface=vlan30 network=10.50.30.0add address=10.50.40.1/24 interface=vlan40 network=10.50.40.0/ip dhcp-clientadd interface=ether1 use-peer-dns=no use-peer-ntp=no/ip dhcp-server networkadd address=10.50.10.0/24 dns-server=1.1.1.1 gateway=10.50.10.1 ntp-server=\ 10.50.10.1add address=10.50.20.0/24 dns-server=1.1.1.1 gateway=10.50.20.1 ntp-server=\ 10.50.20.1add address=10.50.30.0/24 dns-server=1.1.1.1 gateway=10.50.30.1 ntp-server=\ 10.50.30.1add address=10.50.40.0/24 dns-server=1.1.1.1 gateway=10.50.40.1 ntp-server=\ 10.50.40.1/ip dnsset servers=1.1.1.1/ip firewall filteradd action=accept chain=inputadd action=accept chain=forward/ip firewall natadd action=masquerade chain=srcnat out-interface-list=WAN/system clockset time-zone-name=Europe/Prague/system identityset name=router/system noteset show-at-login=no/system ntp clientset enabled=yes/system ntp serverset enabled=yes/system ntp client serversadd address=cz.pool.ntp.org/tool romonset enabled=yes
# 2024-03-28 15:45:52 by RouterOS 7.14.1# model = cAPGi-5HaxD2HaxD/interface bridgeadd admin-mac=78:9A:18:CE:19:FD auto-mac=no name=bridge1 vlan-filtering=yes/interface wifi# managed by CAPsMANset [ find default-name=wifi1 ] configuration.manager=capsman .mode=ap \ datapath.bridge=bridge1 disabled=no# managed by CAPsMANset [ find default-name=wifi2 ] configuration.manager=capsman .mode=ap \ datapath.bridge=bridge1 disabled=no/interface vlanadd interface=bridge1 name=vlan10 vlan-id=10/interface bridge portadd bridge=bridge1 frame-types=admit-only-vlan-tagged interface=ether1add bridge=bridge1 frame-types=admit-only-untagged-and-priority-tagged \ interface=ether2 pvid=10/interface bridge vlanadd bridge=bridge1 tagged=bridge1,ether1 untagged=ether2 vlan-ids=10add bridge=bridge1 tagged=bridge1,ether1 vlan-ids=20add bridge=bridge1 tagged=bridge1,ether1 vlan-ids=30add bridge=bridge1 tagged=bridge1,ether1 vlan-ids=40/interface wifi capset certificate=request discovery-interfaces=vlan10 enabled=yes/ip addressadd address=10.50.10.51/24 interface=vlan10 network=10.50.10.0/ip dnsset servers=1.1.1.1/ip firewall filteradd action=accept chain=inputadd action=accept chain=forward/ip routeadd disabled=no dst-address=0.0.0.0/0 gateway=10.50.10.1 routing-table=main \ suppress-hw-offload=no/system clockset time-zone-name=Europe/Prague/system identityset name=cAP-ax-1/system noteset show-at-login=no/system ntp clientset enabled=yes/system ntp client serversadd address=cz.pool.ntp.org/tool romonset enabled=yes
Statistics: Posted by neki — Thu Mar 28, 2024 5:07 pm
/ip/firewall/filter/add in-interface=management action=accept place-before=1
/ip/firewall/filter/add action=accept chain=input comment="Allow to management" in-interface=ether15
Statistics: Posted by Archous — Thu Mar 28, 2024 5:06 pm
Third times the charm? Or is it? :|What's new in 7.14.2 (2024-Mar-27 09:48):
*) defconf - do not override default DHCP server lease time;
*) defconf - fixed 5ghz-ax channel width for L11, L22 devices;
*) ethernet - fixed interface disable for CRS326-4C+20G+2Q;
*) ethernet - improved port speed downshift functionality for CRS326-4C+20G+2Q;
*) leds - fixed LEDs for L22 device;
*) lte - fixed firmware upgrade not found issue for Chateau LTE12 (introduced in v7.14.1);
*) ssh - require "policy" user policy when adding public key;
*) timezone - updated timezone information from "tzdata2024a" release;
*) traffic-flow - improved system stability;
*) vrf - fixed VRF interfaces being moved to main table after reboot (introduced in v7.14);
*) wifi-qcom - added configuration.distance setting to enable operation over multi-kilometer distances (CLI only);
[jmoore@arch-homerville-pop-487-holly-oob-r1] > /tool/sniffer/quick interface=ether15 port=22Columns: INTERFACE, TIME, NUM, DIR, SRC-MAC, DST-MAC, SRC-ADDRESS, DST-ADDRESS, PROTOCOL, SIZE, CPUINTERFACE TIME NUM DIR SRC-MAC DST-MAC SRC-ADDRESS DST-ADDRESS PROTOCOL SIZE CPUether15 3.8 1 <- 00:0C:29:29:D7:66 DC:2C:6E:8A:96:E5 172.16.30.254:35375 172.16.30.199:22 (ssh) ip:tcp 66 1ether15 4.791 2 <- 00:0C:29:29:D7:66 DC:2C:6E:8A:96:E5 172.16.30.254:35375 172.16.30.199:22 (ssh) ip:tcp 66 1ether15 6.799 3 <- 00:0C:29:29:D7:66 DC:2C:6E:8A:96:E5 172.16.30.254:35375 172.16.30.199:22 (ssh) ip:tcp 66 1[jmoore@arch-homerville-pop-487-holly-oob-r1] > /ip/service/printFlags: X - DISABLED, I - INVALIDColumns: NAME, PORT, CERTIFICATE, VRF# NAME PORT CERTIFICATE VRF0 X telnet 23 management1 X ftp 212 www 80 management3 ssh 22 management4 X www-ssl 443 none main5 X api 8728 main6 X winbox 8291 main7 X api-ssl 8729 none main[jmoore@arch-homerville-pop-487-holly-oob-r1] > /ip/vrf/printFlags: X - disabled; * - builtin 0 name="management" interfaces=ether15,wireguard1 1 * name="main" interfaces=all[jmoore@arch-homerville-pop-487-holly-oob-r1] > /ip/firewall/filter/printFlags: X - disabled, I - invalid; D - dynamic 0 ;;; Allow VPN chain=input action=accept in-interface=wireguard1 log=no log-prefix="" 1 ;;; Allow VPN chain=forward action=accept in-interface=wireguard1 log=no log-prefix="" 2 ;;; Allow BGP chain=input action=accept protocol=tcp dst-port=179 log=no log-prefix="" 3 ;;; Allow Established/Related chain=input action=accept connection-state=established,related,untracked log=no log-prefix="" 4 ;;; Allow Wireguard chain=input action=accept protocol=udp in-interface-list=WAN dst-port=13231 5 ;;; Allow ICMP to WANs chain=input action=accept protocol=icmp log=no log-prefix="" 6 ;;; Allow to management chain=input action=accept in-interface=ether15 log=no log-prefix="" 7 chain=input action=drop[jmoore@arch-homerville-pop-487-holly-oob-r1] > /system/routerboard/print routerboard: yes model: CCR2004-16G-2S+ serial-number: HBJ07H8VK5V firmware-type: al64 factory-firmware: 7.0.4 current-firmware: 7.14.2 upgrade-firmware: 7.14.2[jmoore@arch-homerville-pop-487-holly-oob-r1] >
Statistics: Posted by Archous — Thu Mar 28, 2024 4:59 pm
Statistics: Posted by gunther01 — Thu Mar 28, 2024 4:39 pm
Statistics: Posted by Michiganbroadband — Thu Mar 28, 2024 4:37 pm
Statistics: Posted by Michiganbroadband — Thu Mar 28, 2024 4:28 pm
/interface bridge vlanadd bridge=bridge tagged=bridge vlan-ids=100
Statistics: Posted by jharig — Thu Mar 28, 2024 4:25 pm
That's exactly what is expected for beginners...Still it a good request. Since beyond just the proxy feature of BTH... BTH also has the "friendly" apps to set it a VPN. That's another benefit to BTH over "plain" WG, which requires more manual cut-and-pasting of keys.
Statistics: Posted by Amm0 — Thu Mar 28, 2024 4:20 pm
Statistics: Posted by marekm — Thu Mar 28, 2024 4:15 pm
Statistics: Posted by Josephny — Thu Mar 28, 2024 4:12 pm
Statistics: Posted by Amm0 — Thu Mar 28, 2024 4:09 pm
Statistics: Posted by KILLPC — Thu Mar 28, 2024 4:08 pm
Statistics: Posted by Dezoteck55 — Thu Mar 28, 2024 4:03 pm
Statistics: Posted by anav — Thu Mar 28, 2024 4:03 pm
Statistics: Posted by Amm0 — Thu Mar 28, 2024 3:55 pm
Statistics: Posted by andrep — Thu Mar 28, 2024 3:51 pm
Statistics: Posted by andrep — Thu Mar 28, 2024 3:36 pm
Statistics: Posted by mrz — Thu Mar 28, 2024 3:26 pm
Statistics: Posted by flapviv — Thu Mar 28, 2024 3:06 pm
Statistics: Posted by S8T8 — Thu Mar 28, 2024 3:03 pm
Statistics: Posted by cdblue — Thu Mar 28, 2024 2:58 pm
Statistics: Posted by DeDMorozzzz — Thu Mar 28, 2024 2:50 pm
/interface/wifi/security/set sec1 ft-over-ds=no ft-preserve-vlanid=no ft=no
Statistics: Posted by achu — Thu Mar 28, 2024 2:12 pm
Statistics: Posted by rarlup — Thu Mar 28, 2024 2:02 pm
To be fair, i have to make it clear that I don’t own the CAT18 LHGG but the CAT6 so i could use some upgrade here.
- t99w175 works only in PCI mode so it is unsuitable to be mounted on routerboards.
- Keep the LHG lte18 with its original module from ros7 you can directly update the modem firmware.
- The performance of lte18 is amazing ,then with a 5G modem you should add another 2/4 auxiliary antennas is not easy.
Statistics: Posted by kiloon — Thu Mar 28, 2024 1:55 pm
Statistics: Posted by kiloon — Thu Mar 28, 2024 1:53 pm
Statistics: Posted by giovanniv — Thu Mar 28, 2024 1:19 pm
Statistics: Posted by drpioneer — Thu Mar 28, 2024 1:16 pm
Statistics: Posted by marcelofares — Thu Mar 28, 2024 1:10 pm
Statistics: Posted by mogiretony — Thu Mar 28, 2024 1:04 pm
Statistics: Posted by Ullinator — Thu Mar 28, 2024 1:03 pm
Statistics: Posted by kevinds — Thu Mar 28, 2024 1:00 pm
Statistics: Posted by korg — Thu Mar 28, 2024 12:59 pm
/interface bridge portadd bridge=bridge comment=defconf interface=ether2add bridge=bridge comment=defconf interface=ether3add bridge=bridge comment=defconf interface=ether4add bridge=bridge comment=defconf interface=ether5 pvid=100/interface bridge vlanadd bridge=bridge tagged=bridge,ether4,ether5 vlan-ids=100
/interface bridge vlanadd bridge=bridge tagged=bridge vlan-ids=100
/interface bridge vlanadd bridge=bridge tagged=bridge untagged=ether5 vlan-ids=100
Statistics: Posted by Buckeye — Thu Mar 28, 2024 12:54 pm
Statistics: Posted by iustin — Thu Mar 28, 2024 12:43 pm
Statistics: Posted by normis — Thu Mar 28, 2024 12:43 pm
Statistics: Posted by airpulse — Thu Mar 28, 2024 12:10 pm
Statistics: Posted by spookymulder84 — Thu Mar 28, 2024 11:56 am
Statistics: Posted by Josephny — Thu Mar 28, 2024 11:53 am
/ip addressadd address=10.10.100.254/24 interface=vlan100-corp network=10.10.100.0add address=10.20.100.254/24 interface=vlan200-guests network=10.20.100.0add address=10.30.100.254/24 interface=vlan300-cameras network=10.30.100.0add address=10.50.100.254/24 interface=vlan500-dali network=10.50.100.0add address=10.60.100.254/24 interface=vlan600-IoT1 network=10.60.100.0add address=10.70.100.254/24 interface=vlan700-POS network=10.70.100.0add address=10.80.100.254/24 interface=vlan800-IoT2 network=10.80.100.0add address=10.99.99.254/24 interface=vlan999-mgmt network=10.99.99.0add address=192.168.55.5/24 comment="spare mgmt port" interface=ether22 network=192.168.55.0
Statistics: Posted by korg — Thu Mar 28, 2024 11:45 am
Statistics: Posted by mada3k — Thu Mar 28, 2024 11:40 am
But if you choose 1 second, everything works.
Thank you for the report!
We have managed to reproduce the issue locally in our labs and look forward to fixing it on upcoming RouterOS versions, unfortunately, I cannot provide a release date now.
As a workaround, I can only suggest disabling the MLAG.
Statistics: Posted by toto4ds — Thu Mar 28, 2024 11:30 am
Statistics: Posted by InfraErik — Thu Mar 28, 2024 11:15 am
Statistics: Posted by CaptainRisky — Thu Mar 28, 2024 11:14 am
Statistics: Posted by pe1chl — Thu Mar 28, 2024 11:08 am
/interface/bridge/port monitor [find]
Statistics: Posted by EdPa — Thu Mar 28, 2024 11:01 am
Statistics: Posted by kevinds — Thu Mar 28, 2024 10:47 am
Statistics: Posted by quackyo — Thu Mar 28, 2024 10:44 am
#hex s/interface vlanadd name=MGMT interface=bridge vlan-id=99add name=VLAN10 interface=bridge vlan-id=10add name=VLAN20 interface=bridge vlan-id=20add name=VLAN30 interface=bridge vlan-id=30add name=VLAN_Guest interface=bridge vlan-id=30/ip addressadd address=10.16.99.1/24 network=10.16.99.0 interface=MGMTadd address=10.16.10.1/24 network=10.16.10.0 interface=VLAN10add address=10.16.20.1/24 network=10.16.20.0 interface=VLAN20add address=10.16.30.1/24 network=10.16.30.0 interface=VLAN30add address=10.16.40.1/24 network=10.16.40.0 interface=VLAN_Guest/ip pooladd ranges=10.16.99.2-10.16.99.254 name=pool_MGMTadd ranges=10.16.10.2-10.16.10.254 name=pool_VLAN10add ranges=10.16.20.2-10.16.20.254 name=pool_VLAN20add ranges=10.16.30.2-10.16.30.254 name=pool_VLAN30add ranges=10.16.40.2-10.16.30.254 name=pool_VLAN40/ip dhcp-server networkadd address=10.16.99.0/24 gateway=10.16.99.1add address=10.16.10.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=10.16.10.1add address=10.16.20.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=10.16.20.1add address=10.16.30.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=10.16.30.1add address=10.16.40.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=10.16.40.1/ip dhcp-serveradd address-pool=pool_MGMT interface=MGMT name=dhcp_MGMTadd address-pool=pool_VLAN10 interface=VLAN10 name=dhcp_VLAN10add address-pool=pool_VLAN20 interface=VLAN20 name=dhcp_VLAN20add address-pool=pool_VLAN30 interface=VLAN30 name=dhcp_VLAN30add address-pool=pool_VLAN40 interface=VLAN_Guest name=dhcp_VLAN40/interface bridge port set [find interface=ether2] pvid=99/interface bridge vlanadd bridge=bridge tagged=bridge,ether3,ether4,ether5 vlan-ids=99add bridge=bridge tagged=bridge,ether3 vlan-ids=10add bridge=bridge tagged=bridge,ether4 vlan-ids=20add bridge=bridge tagged=bridge,ether5 vlan-ids=30add bridge=bridge tagged=bridge,ether5 vlan-ids=40/interface bridge set bridge vlan-filtering=yes/ip firewall filter add action=accept chain=forward in-interface=VLAN_Guest out-interface=VLAN30#cap ax/interface wifiset wifi1 disabled=no configuration.ssid=Private5 datapath.bridge=bridge security.authentication-types=wpa2-psk,wpa3-psk security.passphrase=securepassword123set wifi2 disabled=no configuration.ssid=Private2 datapath.bridge=bridge security.authentication-types=wpa2-psk,wpa3-psk security.passphrase=securepassword123add name=wifi3 master-interface=wifi1 configuration.ssid=Guest2 datapath.vlan-id=40 security.authentication-types=wpa2-psk,wpa3-psk security.passphrase=password123add name=wifi4 master-interface=wifi2 configuration.ssid=Guest5 datapath.vlan-id=40 security.authentication-types=wpa2-psk,wpa3-psk security.passphrase=password123/interface vlan add name=MGMT interface=bridge vlan-id=99/ip dhcp-client add interface=MGMT/interface bridge portset [find interface=ether2] pvid=30,99set [find interface=wifi1] pvid=30,99set [find interface=wifi2] pvid=30,99/interface bridge vlanadd bridge=bridge tagged=bridge,ether1 vlan-ids=30add bridge=bridge tagged=bridge,ether1,wifi3,wifi4 vlan-ids=40add bridge=bridge tagged=bridge,ether1 vlan-ids=99/interface bridge set bridge vlan-filtering=yes
Statistics: Posted by TheCat12 — Thu Mar 28, 2024 10:44 am
Statistics: Posted by CaptainRisky — Thu Mar 28, 2024 10:35 am
Still the same with v7.14.1...After upgrading to v7.14 I lost connectivity between OpenVPN server and clients in Ethernet mode. The connection is established normally and automatic routes are created, but still peers are inaccessible.
Anyone experiencing similar behaviour?
Edit: It's the same with v7.15beta4. Reverting back to v.7.13.5 solves the issue for me.
Statistics: Posted by konradnh — Thu Mar 28, 2024 10:33 am
Statistics: Posted by kevinds — Thu Mar 28, 2024 10:30 am
Statistics: Posted by NetTecture — Thu Mar 28, 2024 10:24 am
Statistics: Posted by fengyuclub — Thu Mar 28, 2024 10:24 am
Statistics: Posted by kevinds — Thu Mar 28, 2024 10:05 am
Statistics: Posted by TheCat12 — Thu Mar 28, 2024 10:04 am
Statistics: Posted by kevinds — Thu Mar 28, 2024 9:58 am
Statistics: Posted by BioMax — Thu Mar 28, 2024 9:55 am
Statistics: Posted by kevinds — Thu Mar 28, 2024 9:49 am
Statistics: Posted by kevinds — Thu Mar 28, 2024 9:48 am
Statistics: Posted by petardo — Thu Mar 28, 2024 9:44 am
Statistics: Posted by wispmikrotik — Thu Mar 28, 2024 9:38 am
Statistics: Posted by gabrielpc1190 — Thu Mar 28, 2024 9:31 am
Statistics: Posted by ccz117 — Thu Mar 28, 2024 9:19 am
Statistics: Posted by petardo — Thu Mar 28, 2024 9:19 am