Switched the AP from nstreme to 802.11 and it's much much better.
Must be in the nstreme settings...
/ip firewall filter add action=drop chain=forward comment="UDP Conn Limits" connection-limit=30,32 disabled=yes dst-port=!53 protocol=udp
system routerboard settings set force-backup-booter=no system routerboard upgrade system reboot
chain=forward action=drop protocol=tcp src-address=10.12.16.0/24 connection-limit=100,24
chain=forward action=drop protocol=tcp src-address=10.12.16.0/24 connection-limit=100,32
No. I have not. 5.19 is latest I have running.Have you tried this on 5.21?
/system routerboard upgrade y /system reboot y
/interface wireless export compact file=settings.auto.rsc
/queue simple add dst-address=18.104.22.168/24 name="example" priority=1 queue=default/default total-queue=default
statistics and marking packets.passthrough - ignore this rule and go to next one (useful for statistics).
/system health print
No, I didn't.Have you set "/system logging" on for the topic "interface"? Its not by default and if not you will see no notification of the port flap.
/interface wireless export
I just happened to have one on the bench and I loaded 3.30 on it.let us know if anyone has tested on 133c board as 3.27 was stable
Cool. Good to know.no, all RouterBOARDs are manufactured with a preinstalled RouterOS license. Even if it was overwritten at some point, he can still get it back.
I saw the 133 was loaded with openware software.Aug: why would you have to buy a license? I don't get it.
/ip firewall nat add action=dst-nat chain=dstnat comment="" disabled=no dst-address=<your public ip> dst-port=3389 in-interface=WAN protocol=tcp to-addresses=\ 192.168.1.10 to-ports=3389