Statistics: Posted by pimmie — Wed Apr 10, 2024 9:14 am
Statistics: Posted by Stefgrifon — Wed Apr 10, 2024 8:54 am
[admin@OR8-Switch-KG] > /sys pac upd che channel: long-term installed-version: 6.49.13 latest-version: 6.49.13 status: New version is available
What's up with that? Is there a problem with the updating process somewhere?Statistics: Posted by tdussa — Wed Apr 10, 2024 8:52 am
Statistics: Posted by sebus46 — Wed Apr 10, 2024 8:38 am
Statistics: Posted by nichky — Wed Apr 10, 2024 8:20 am
Statistics: Posted by holvoetn — Wed Apr 10, 2024 8:16 am
Statistics: Posted by washcroft — Wed Apr 10, 2024 8:11 am
I have the same problem how to solve? not sure what to add there.In Android IPSec identifier has to be set to something or will not connect.
Statistics: Posted by ToTheCLI — Wed Apr 10, 2024 7:59 am
Statistics: Posted by Archous — Wed Apr 10, 2024 7:51 am
UGH. Just to follow up from my previous post. It seems the firewall filtering logic with VRFs has also changed. I can now get IP services to respond on my broken router if I add:Where "management" is the automatically generated VRF interface for my VRF named "management". This worked before with the following rule:Code:/ip/firewall/filter/add in-interface=management action=accept place-before=1
Where "ether15" is a layer 3 interface added to the VRF "management". This needs to be fixed ASAP as backward compatibility with firewall rules for VRF interfaces is now broken.Code:/ip/firewall/filter/add action=accept chain=input comment="Allow to management" in-interface=ether15
Hate to be the bearer of bad news but MikroTik now considers this to be "expected behavior". I opened a support request with them on this and attached PDF is our conversation. If you want to continue to use VRFs on the platform then their expectation is that you change your firewall configs.after going for 7.14.2 on CCR2004-1G-12S+2XS winbox connect fails (connects, immediately disconnects), going back to 7.13.5 winbox connect is working again (connect is done using a management vrf)
Statistics: Posted by Archous — Wed Apr 10, 2024 7:50 am
Statistics: Posted by Glinka — Wed Apr 10, 2024 7:32 am
Statistics: Posted by Glinka — Wed Apr 10, 2024 7:13 am
Statistics: Posted by abbio90 — Wed Apr 10, 2024 7:12 am
Statistics: Posted by kwade — Wed Apr 10, 2024 6:57 am
> /ip firewall filter export# 2024-04-10 13:34:27 by RouterOS 7.10.2# software id = 0PWY-H7QX## model = RB5009UG+S+# serial number = HEH08JH56F9/ip firewall filteradd action=accept chain=forward comment="allow HA to qi" disabled=yes dst-address=192.168.1.91 protocol=tcp src-address=192.168.1.40 src-port=8123add action=accept chain=forward comment="allow HA from qi" disabled=yes dst-address=192.168.1.40 protocol=tcp src-address=192.168.1.91 src-port=8123add action=drop chain=forward comment="drop all others from HA" src-address=192.168.1.40add action=drop chain=forward comment="drop all others to qi" dst-address=192.168.1.40add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=invalidadd action=accept chain=input comment="defconf: accept ICMP" protocol=icmpadd action=accept chain=input comment="defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LANadd action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsecadd action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yesadd action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" connection-state=invalidadd action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
Statistics: Posted by Glinka — Wed Apr 10, 2024 6:42 am
Statistics: Posted by Amm0 — Wed Apr 10, 2024 5:58 am
Statistics: Posted by patterno — Wed Apr 10, 2024 5:12 am
/interface wireguardadd listen-port=23231 mtu=1420 name=wireguardB/interface list memberadd interface=ether1 list=WANadd interface="Lan Bridge" list=LANadd interface=wireguardB list=LAN/interface wireguard peersadd allowed-address=0.0.0.0/0 endpoint-address=123.456.789.1 endpoint-port=23231 \ interface=wireguard1 public-key="***********************************************=" persistent-keepalive=35sec/ip addressadd address=192.168.88.1/24 interface="Lan Bridge" network=192.168.88.0add address=192.168.202.2/30 interface=wireguardB network=192.168.202.0/ip routeadd dst-address=192.168.201.0/24 gateway=wireguard1 routing-table=mainadd dst-address=0.0.0.0/0 gateway=wireguardB routing-table=useWG
Statistics: Posted by MTNick — Wed Apr 10, 2024 4:30 am
Statistics: Posted by Amm0 — Wed Apr 10, 2024 4:23 am
Statistics: Posted by papayeya — Wed Apr 10, 2024 4:09 am
/tool/mac-telnet <tab>
Statistics: Posted by giguard — Wed Apr 10, 2024 4:08 am
interface bridgeadd name="Lan Bridge"/interface wireguardadd listen-port=23231 mtu=1420 name=wireguardB/interface listadd comment=defconf name=WANadd comment=defconf name=LAN/ip pooladd comment="Lan Bridge" name=LAN ranges=192.168.88.20-192.168.88.150/routing tableadd fib name=useWG/ip dhcp-serveradd address-pool=LAN interface="Lan Bridge" name=dhcp1/interface bridge portadd bridge="Lan Bridge" interface=ether2add bridge="Lan Bridge" interface=ether3add bridge="Lan Bridge" interface=ether4add bridge="Lan Bridge" interface=ether5/ip firewall connection trackingset loose-tcp-tracking=no tcp-established-timeout=1h/ip settingsset max-neighbor-entries=4096 rp-filter=loose tcp-syncookies=yes/ipv6 settingsset disable-ipv6=yes/interface list memberadd interface=ether1 list=WANadd interface="Lan Bridge" list=LANadd interface=wireguardB list=LAN/interface wireguard peersadd allowed-address=0.0.0.0/0 endpoint-address=123.456.789.1 endpoint-port=23231 \ interface=wireguard1 public-key="***********************************************=" persistent-keepalive=35sec/ip addressadd address=192.168.88.1/24 interface="Lan Bridge" network=192.168.88.0add address=192.168.202.2/30 interface=wireguardB network=192.168.202.0/ip dhcp-clientadd interface=ether1 script=":if (\$bound=1) do={\r\ \n:local gw \$\"gateway-address\"\r\ \n/ip firewall address-list set [find where comment=\"ISP1\"] address=\$\"\ lease-address\"\r\ \n/ip firewall nat set [find where comment=\"Masquerade\"] to-addresses=\$\ \"lease-address\"\r\ \n}" use-peer-dns=no use-peer-ntp=no/ip dhcp-server networkadd address=192.168.88.0/24 dns-server=192.168.88.1 gateway=192.168.88.1 ntp-server=192.168.201.1/ip dnsset allow-remote-requests=yes max-concurrent-tcp-sessions=30 servers=76.76.2.2,76.76.10.2,1.1.1.2 use-doh-server=https://freedns.controld.com/p2 verify-doh-cert=yes/ip dns staticadd address=76.76.2.11 match-subdomain=yes name=https://freedns.controld.com/p2/ip firewall address-list { Use static set DHCP leases mostly }add address=192.168.88.151/32 list=Authorized comment="admindDesktop" add address=192.168.88.152/32 list=Authorized comment="admin laptop"add address=192.168.201.X/32 list=Authorized comment="admin when at router A"add address=192.168.202.Y/32 list=Authorized comment="remote admin" { laptop or smartphone ) when you expand wireguard }add address=192.168.88.5/32 list=Excluded comment="LANIP going out wireguard for internet on router A"/ip firewall filteradd action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=invalid log-prefix=drop-invalid-inputadd action=accept chain=input comment="defconf: accept to local loopback" dst-address=127.0.0.1add action=accept chain=input comment="defconf: accept ICMP" protocol=icmpadd action=accept chain=input comment="allow admin access for Config" src-address-list=Authorizedadd action=accept chain=input comment="LAN access to DNS/NTP services" dst-port=53,123 protocol=udp in-interface-list=LANadd action=accept chain=input comment="LAN access to DNS services" dst-port=53 protocol=tcp in-interface-list=LANadd action=drop chain=input comment="drop all else" log-prefix=drop-inputadd action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related hw-offload=yes packet-mark=!Queue-listadd action=accept chain=forward comment="defconf: accept established,related,untracked" connection-state=established,related,untrackedadd action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid log-prefix=drop-invalidadd action=accept chain=forward comment="internet access" in-interface-list=LAN out-interface-list=WANadd action=accept chain=forward comment="port forwarding" connection-nat-state=dstnatadd action=accept chain=forward comment="allow remote subnet to local subnet" in-interface=wireguardB dst-address=192.168.88.0/24 src-address-list=192.168.201.0/24add action=accept chain=forward comment="allow local subnet enter tunnel" out-interface=wireguardB src-address=192.168.88.0/24add action=drop chain=forward comment="drop all else" log=yes/ip firewall natadd action=src-nat chain=srcnat out-interface-list=WAN to-addresses=123.456.789.2add action=redirect chain=dstnat comment="Redirect DNS to Mikrotik DNS Server - TCP" dst-port=53 in-interface-list=LAN protocol=tcp src-address-list=!excludedadd action=redirect chain=dstnat comment="Redirect DNS to Mikrotik DNS Server - UDP" dst-port=53 in-interface-list=LAN protocol=udp src-address-list=!excluded/ip routeadd dst-address=192.168.201.0/24 gateway=wireguard1 routing-table=mainadd dst-address=0.0.0.0/0 gateway=wireguardB routing-table=useWG/routing ruleadd src-address=192.168.88.5 action=lookup-only-in-table table=useWG { if WG is down, no internet traffic for 192.168.88.5 }/ip serviceset telnet disabled=yesset ftp disabled=yesset www disabled=yesset ssh disabled=yesset api disabled=yesset api-ssl disabled=yes/ip serviceset telnet disabled=yesset ftp disabled=yesset www disabled=yesset ssh disabled=yesset api disabled=yesset api-ssl disabled=yes/routing ruleadd action=unreachable dst-address=10.0.0.0/8add action=unreachable dst-address=169.254.0.0/16add action=unreachable dst-address=172.16.0.0/12add action=unreachable dst-address=192.0.0.0/24add action=unreachable dst-address=192.0.2.0/24add action=unreachable dst-address=192.88.99.0/24add action=unreachable dst-address=198.18.0.0/15add action=unreachable dst-address=198.51.100.0/24add action=unreachable dst-address=203.0.113.0/24add action=unreachable dst-address=233.252.0.0/24add action=unreachable dst-address=240.0.0.0/5add action=unreachable dst-address=248.0.0.0/6add action=unreachable dst-address=252.0.0.0/7add action=unreachable dst-address=254.0.0.0/8/system identityset name=Crawford-hEX/system loggingadd disabled=yes topics=dns/system noteset show-at-login=no/system ntp clientset enabled=yes/system ntp serverset broadcast=yes broadcast-addresses=192.168.88.255 enabled=yes multicast=yes/system ntp client serversadd address=162.159.200.123add address=162.159.200.1add address=198.71.50.75add address=64.6.144.6/system routerboard settingsset auto-upgrade=yes
Statistics: Posted by anav — Wed Apr 10, 2024 3:00 am
Statistics: Posted by TonicME — Wed Apr 10, 2024 2:56 am
Statistics: Posted by MTNick — Wed Apr 10, 2024 2:37 am
Statistics: Posted by Josephny — Wed Apr 10, 2024 2:35 am
Statistics: Posted by edielson_atm — Wed Apr 10, 2024 2:31 am
Statistics: Posted by edielson_atm — Wed Apr 10, 2024 2:29 am
Statistics: Posted by anav — Wed Apr 10, 2024 2:20 am
Statistics: Posted by Josephny — Wed Apr 10, 2024 2:12 am
# 2024-04-09 19:01:05 by RouterOS 7.14.2# software id = *******## model = RB5009UG+S+# serial number = ************/interface wireguard peersadd allowed-address=192.168.202.2/32,192.168.88.0/24 interface=wireguard1 \ public-key="************************"Router B:# 2024-04-09 19:00:31 by RouterOS 7.14.2# software id = *****## model = RB750Gr3# serial number = *******/interface wireguard peersadd allowed-address=192.168.202.0/24,192.168.201.0/24 endpoint-address=\ 123.456.789.1 endpoint-port=23231 interface=wireguard1 \ persistent-keepalive=35s public-key=\ "********************************"
Statistics: Posted by MTNick — Wed Apr 10, 2024 2:07 am
Statistics: Posted by robmaltsystems — Wed Apr 10, 2024 2:04 am
Statistics: Posted by kryztoval — Wed Apr 10, 2024 2:00 am
Statistics: Posted by ToTheCLI — Wed Apr 10, 2024 1:45 am
Statistics: Posted by ckleea — Wed Apr 10, 2024 1:35 am
Statistics: Posted by anav — Wed Apr 10, 2024 1:20 am
Statistics: Posted by anav — Wed Apr 10, 2024 1:17 am
Statistics: Posted by bpwl — Wed Apr 10, 2024 12:59 am
# 2024-04-09 17:31:25 by RouterOS 7.14.2# software id = ******## model = RB5009UG+S+# serial number = ******/interface wireguard peersadd allowed-address=192.168.202.2/32,192.168.88.0/24 endpoint-address=\ 123.456.789.2 endpoint-port=23231 interface=wireguard1 public-key=\ "******************************"Router B:# 2024-04-09 17:34:40 by RouterOS 7.14.2# software id = ******## model = RB750Gr3# serial number = ****/interface wireguard peersadd allowed-address=192.168.202.1/32,192.168.201.0/24 endpoint-address=\ 123.456.789.1 endpoint-port=23231 interface=wireguard1 \ persistent-keepalive=35s public-key=\ "**************"
The reason for this is that the RB5009 (Router A) is my home local router. My home router is the wireguard host./ip firewall filter
add action=accept chain=input comment="allow LAN_to_router access" in-interface-list=LAN src-address-list=RB5009-LAN
WHY> The whole reason for using wireguard is to safely access the router. The rule above bypasses wireguard and is a direct and potentially dangerous connection!
The reason for this is for testing. Crawford (Router B) is a trusted source. But I agree, my plan is to locked it down once everything is complete.We do not want every user from the LAN on router B to be able to access the input chain either!!!
add action=accept chain=input comment="allow LAN_to_router access" in-interface-list=LAN log=yes log-prefix=Crawford-WG-In src-address-list=Crawford-LAN
At this time, it is the only wireguard I have going & need. This is intentional for now.add action=accept chain=input comment="allow wireguard handshake for Crawford" dst-port=23231 protocol=udp src-address-list=Crawford
FINE BUT LIMITING, lets say you as admin or in a hotel room on your laptop or in the cafe on your smartphone and need to reach the router. You cannot, and can only reach RouterA, or Router for that matter if physically behind Router B................. limiting!!
LOL. For testing & making sure traffic is flowing. Mangle rules will be removed once everything is setup.WHY are you mangling??????
/ip firewall mangle
The comment is wrong. It used to be masquerade until I added a script in dhcp-client to update this rule's "to-address" when the dhcp lease address changes, to allow me to use src-nat instead of masquerade. It's found by comment, which I havent changed yet. The redirect are in place to redirect any DNS requests to the Mikrotik. If a local user, or device, has hard DNS set, the Mikrotik willl answer it instead of reaching out to the internet.SRCNAT RULE comment is WRONG, not masquerade LOL
ALSO WHY are you redirecting dstnat ?? purpose ???
/ip firewall nat
add action=src-nat chain=srcnat comment=Masquerade out-interface-list=WAN to-addresses=123.456.789.1
add action=redirect chain=dstnat comment="Redirect DNS to Mikrotik DNS Server - TCP" dst-port=53 in-interface-list=LAN protocol=tcp
add action=redirect chain=dstnat comment="Redirect DNS to Mikrotik DNS Server - UDP" dst-port=53 in-interface-list=LAN protocol=udp
Statistics: Posted by MTNick — Wed Apr 10, 2024 12:54 am
Statistics: Posted by bpwl — Wed Apr 10, 2024 12:49 am
Statistics: Posted by k6ccc — Wed Apr 10, 2024 12:48 am
Statistics: Posted by UkRainUa — Wed Apr 10, 2024 12:47 am
Statistics: Posted by StokkiesA — Wed Apr 10, 2024 12:16 am
[admin@MikroTik] > /ip/neighbor/print detail 0 interface=sfp-sfpplus1,bonding3,bridge address=192.168.1.1 address4=192.168.1.1 address6=2003:a:d59:3800::1 mac-address=F6:90:EA:00:CA:6A identity="opnsense" platform="" version="" unpack=none age=21s ipv6=yes interface-name="ax0" system-description=" FreeBSD 13.2-RELEASE-p11 FreeBSD 13.2-RELEASE-p11 stable/24.1-n255007-1d6e165fb40 SMP amd64" system-caps=bridge,wlan-ap,router,station-only system-caps-enabled=router discovered-by=lldp 1 interface=sfp-sfpplus2,bonding3,bridge address=192.168.1.1 address4=192.168.1.1 address6=2003:a:d59:3800::1 mac-address=F6:90:EA:00:CA:6A identity="opnsense" platform="" version="" unpack=none age=21s ipv6=yes interface-name="ax1" system-description=" FreeBSD 13.2-RELEASE-p11 FreeBSD 13.2-RELEASE-p11 stable/24.1-n255007-1d6e165fb40 SMP amd64" system-caps=bridge,wlan-ap,router,station-only system-caps-enabled=router discovered-by=lldp
-------------------------------------------------------------------------------LLDP neighbors:-------------------------------------------------------------------------------Interface: ax0, via: LLDP, RID: 1, Time: 0 day, 00:03:49 Chassis: ChassisID: mac d4:01:c3:3a:fb:7f SysName: MikroTik SysDescr: MikroTik RouterOS 7.15beta9 (development) 2024-03-27 19:55:08 CRS326-24G-2S+ MgmtIP: 192.168.1.8 MgmtIface: 26 MgmtIP: fe80::d601:c3ff:fe3a:fb7f MgmtIface: 26 MgmtIP: 2003:a:d59:3800:d601:c3ff:fe3a:fb7f MgmtIface: 26 Capability: Bridge, on Capability: Router, on Port: PortID: ifname sfp-sfpplus1 PortDescr: bridge/bonding3/sfp-sfpplus1 TTL: 120-------------------------------------------------------------------------------Interface: ax1, via: LLDP, RID: 1, Time: 0 day, 00:03:50 Chassis: ChassisID: mac d4:01:c3:3a:fb:7f SysName: MikroTik SysDescr: MikroTik RouterOS 7.15beta9 (development) 2024-03-27 19:55:08 CRS326-24G-2S+ MgmtIP: 192.168.1.8 MgmtIface: 26 MgmtIP: fe80::d601:c3ff:fe3a:fb7f MgmtIface: 26 MgmtIP: 2003:a:d59:3800:d601:c3ff:fe3a:fb7f MgmtIface: 26 Capability: Bridge, on Capability: Router, on Port: PortID: ifname sfp-sfpplus2 PortDescr: bridge/bonding3/sfp-sfpplus2 TTL: 120-------------------------------------------------------------------------------
Statistics: Posted by pmh — Wed Apr 10, 2024 12:13 am
Statistics: Posted by vmnx — Tue Apr 09, 2024 11:59 pm
https://services.nvd.nist.gov/rest/json/cves/2.0?cpeName=cpe:2.3:o:mikrotik:routeros:7.14.2:*:*:*:*:*:*:*
"nodes": [{ "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DED322B-DACD-4FD1-8EBE-BF3B6E897921" } ]}
Statistics: Posted by g18c — Tue Apr 09, 2024 11:59 pm
Statistics: Posted by aaronk6 — Tue Apr 09, 2024 11:58 pm
Statistics: Posted by miankamran7100 — Tue Apr 09, 2024 11:38 pm
Statistics: Posted by anav — Tue Apr 09, 2024 11:18 pm
Statistics: Posted by holvoetn — Tue Apr 09, 2024 11:16 pm
Statistics: Posted by vbn2020 — Tue Apr 09, 2024 11:03 pm
:log info "Checking for updates";/system/package/update/check-for-updates:delay 5s;:if (/system/package/update/get installed-version != /system/package/update/get latest-version) do={(:log info "New version found, updating") (/system/package/update/install)} else={:log info "Already in the latest version"};
:log info "Checking for RouterBOARD upgrade";:delay 10s;:if ([/system/routerboard/get current-firmware] != [/system/routerboard/get upgrade-firmware]) do={[:log info "Upgrading RouterBOARD"] [:execute script={/system/routerboard/upgrade}] [:delay 10s] [:execute script={/system/reboot};]} else={:log info "RouterBOARD already in the latest version"};
Statistics: Posted by rogerioqueiroz — Tue Apr 09, 2024 11:03 pm
Statistics: Posted by sbotnick — Tue Apr 09, 2024 11:03 pm
Statistics: Posted by pe1chl — Tue Apr 09, 2024 10:54 pm
Statistics: Posted by pe1chl — Tue Apr 09, 2024 10:45 pm
Statistics: Posted by llamajaja — Tue Apr 09, 2024 10:33 pm
In a room with 2/3 beds?Topic: "How I upgraded 203 CAPs to wifi-qcom-ac"
But RBwsAP-5Hac2nD not wave2 compatible. Sad. Would have been a fun to listen to such a talk
Statistics: Posted by infabo — Tue Apr 09, 2024 10:28 pm
Statistics: Posted by llamajaja — Tue Apr 09, 2024 10:27 pm
- 180 rooms and 200 APs? Does that mean that every room has a single AP, how big are those rooms?!Installed in a village-hotel with around 180 rooms.
...
1) Powers tx at 10/16 dBm,
Statistics: Posted by videolab — Tue Apr 09, 2024 10:04 pm
Statistics: Posted by videolab — Tue Apr 09, 2024 10:00 pm
Statistics: Posted by unhuzpt — Tue Apr 09, 2024 9:57 pm
Statistics: Posted by vingjfg — Tue Apr 09, 2024 9:47 pm
Statistics: Posted by ecastellani — Tue Apr 09, 2024 9:46 pm
[admin@********] > /ip/neighbor/print detail 0 interface=wifi3,bridge mac-address=XX:XX:XX:XX:XX:XX identity="*****" platform="" version="" unpack=none age=3s interface-name="bridge/wifi3" system-description="MikroTik RouterOS 7.14.2 (stable) 2024-03-27 07:48:52 XXXXXXXXXXXXXXXX" system-caps=bridge,router system-caps-enabled=bridge,router discovered-by=lldp
Statistics: Posted by vingjfg — Tue Apr 09, 2024 9:36 pm
Statistics: Posted by dazzaling69 — Tue Apr 09, 2024 9:32 pm
Statistics: Posted by abbio90 — Tue Apr 09, 2024 9:19 pm
Statistics: Posted by llamajaja — Tue Apr 09, 2024 9:14 pm
<!doctype html><html lang="en"><head> <meta charset="utf-8"> <meta http-equiv="pragma" content="no-cache" /> <meta http-equiv="expires" content="-1" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <title>Internet hotspot - Log in</title> <link rel="stylesheet" href="css/style.css"></head><body> <!-- two other colors<body class="lite"><body class="dark">--> $(if chap-id) <form name="sendin" action="$(link-login-only)" method="post" style="display:none"> <input type="hidden" name="username" /> <input type="hidden" name="password" /> <input type="hidden" name="number" /> <input type="hidden" name="dst" value="http://green.hotspot/policy.html" /> <input type="hidden" name="popup" value="true" /> </form> <script src="/md5.js"></script> <script> function doLogin() { document.sendin.username.value = document.login.username.value; document.sendin.password.value = hexMD5('$(chap-id)' + document.login.password.value + '$(chap-challenge)'); document.sendin.submit(); return false; } </script> $(endif) <div class="ie-fixMinHeight"> <div class="main"> <div class="wrap animated fadeIn"> <form name="login" action="$(link-login-only)" method="post" $(if chap-id) onSubmit="return doLogin()" $(endif)> <input type="hidden" name="dst" value="$(link-orig)" /> <input type="hidden" name="popup" value="true" /> <div style="margin:0px"> <img src="img/green-logo.png" alt="" width="280px" > <p class="info $(if error)alert$(endif)"> $(if error == "")Inserisci il tuo indirizzo mail per eseguire la Registrazione. Riceverai una email con le credenziali di accesso. $(if trial == 'yes')<br />Free trial available, <a href="$(link-login-only)?dst=$(link-orig-esc)&username=T-$(mac-esc)">click here</a>.$(endif) $(endif) $(if error)$(error)$(endif) </p> <label> <img class="ico" src="img/email.svg" alt="#" /> <input name="Email" type="email" value="$(username)" placeholder="Email" /> </label> <input type="checkbox" value="checkbox" name="checkbox" checked="checked" id="checkbox"> <label for="checkbox"> Accetto le condizioni generali</label> <a href="http://green.hotspot/policy.html" style="color:rgb(57, 186, 143); text-align:center" target="_blank" rel="noopener noreferrer">Condizioni Generali</a> <br> <br> </p> <input type="submit" value="Registrati" /> <br> <br> </p> <p class="info bt1">Torna alla pagina del <a href="http://green.hotspot/login.html" style="color:rgb(57, 186, 143); text-align:center" target="_blank" rel="noopener noreferrer">Login</a> <br> <form action=""> </form> <br> <br> <br> <br> </p> <a href="https://foisfabio.it/" style="color:rgb(57, 186, 143); text-align:center" target="_blank" rel="noopener noreferrer">Powered by foisfabio.it</a> </p> </div> </div> </div></body></html>
Statistics: Posted by abbio90 — Tue Apr 09, 2024 9:12 pm
Statistics: Posted by llamajaja — Tue Apr 09, 2024 9:06 pm
back-to-home-vpn: [peer19] CHWCHPuLuweWVZkq3r2HynUP59yxk3GsMX4i9XamAQw=: Handshake for peer did not complete after 20 attempts, giving up
Statistics: Posted by diamuxin — Tue Apr 09, 2024 8:59 pm
Statistics: Posted by llamajaja — Tue Apr 09, 2024 8:56 pm
Statistics: Posted by llamajaja — Tue Apr 09, 2024 8:52 pm
With SwOS version 2.13, it is recommended to set VLAN Receive to any on trunk ports.
Statistics: Posted by TheCat12 — Tue Apr 09, 2024 7:40 pm
Which is why IMO effort should be directed at web applications, not native apps.
There should be a simple small portable MikroTik app (program) that you can run to:But there's a very important difference, which can not be fixed by web app at all: WinBox can connect via MAC. And many users use WinBox because this function was a deciding point (when using it for one reason, one can use it always).
Statistics: Posted by pe1chl — Tue Apr 09, 2024 7:32 pm
Statistics: Posted by sirbryan — Tue Apr 09, 2024 7:31 pm
Statistics: Posted by sirbryan — Tue Apr 09, 2024 7:27 pm
/ping 2606:4700:4700::1111
/ipv6 address print
Statistics: Posted by CGGXANNX — Tue Apr 09, 2024 7:26 pm
Statistics: Posted by Carlcox89 — Tue Apr 09, 2024 7:21 pm
Statistics: Posted by AlexM2020 — Tue Apr 09, 2024 7:16 pm
Statistics: Posted by TheCat12 — Tue Apr 09, 2024 7:07 pm
Statistics: Posted by llamajaja — Tue Apr 09, 2024 7:03 pm