Is there a why to find out what this does? New version from the vendor and if so what does it fix/add/break?*) wifi-qcom - updated driver;
True for MT perhaps but not universal. If you break TLS inspection can be done. We do this with squid which works great.All you do is useless, nowaday (near) all sites use HTTPS and http(not S) web proxy can't do anything.
https://www.reddit.com/r/mikrotik/comme ... &context=3Power related issues have caused a chain of events in our internal server system, we are working on it.
Love this. Many thanks!*) added "Windows" menu for list of all currently opened windows
*) allow changing column order by using drag and drop
Have a look at this: viewtopic.php?f=7&t=176086Silently removed 66960 Mhz channel support. Why?
No info in the changelog just nothing :-(
When I read stuff like this I get a little mad with myself. Why oooo why did I not think of this! I will implement this on the main resolver at once.At the end the graph jumps down. Is that just disabling verification or a reboot? So would a scheduled disable and enable work around the issue?
No not this one but the previous one 6.48.1 fixed that issue if we are talking about issues that where added into 6.48 release.The new update fix the RB3011's port flapping?
What's new in 6.49beta22 (2021-Mar-08 09:07):
Changes in this release:
*) crs3xx - improved 1Gbps Ethernet port group traffic forwarding for CRS354 devices;
It's this oneWhat about RB3011 port flapping re-introduced in 6.48?
) switch - fixed interface toggling for devices with multiple QCA8337, Atheros8327 or RTL8367 switch chips (introduced in v6.48);
I would guess we will get a 6.48.1 today.Will be there no further V6.48.XX versions?
From the doomed V6.48 straight to V6.49?
Either keep this blog up to date (which is not what is happening now) or shut it down.*) hotspot - fixed special character parsing in "target" variable (CVE-2021-3014);
*) switch - fixed interface toggling for devices with multiple QCA8337, Atheros8327 or RTL8367 switch chips (introduced in v6.48);
So it may be but we are not marwell customers but Mikrotik customers so we are affected how MT handle this.It's not the Mikrotik's fault.
The Marvell chip manufacturer is responsible for this.
Thanks for the clarification.Currently only the long-term version channel (v6.46.7) has all the necessary fixes for this CVE. We are working on getting them published in stable and testing channels as well. Sorry for any inconvenience.
I might be off here but my understanding is that this is a feature in the Linux kernel and version 6 will not upgrade the kernel without major overall I think this will be a V7 feature we have to wait for,MikroTik is there any chance to add wireguard in v6?
Many thanks for a super quick response! All my issues are now gone!What's new in v3.27:
*) fixed content drawing of read-only tables (introduced in v3.26);
Well that sucks. Have you created a supout during the issues and sent to MT?Installed beta27
Worked for ~12 hours
Then the problem came again
It works more if there's only a few ports busy or traffic is low
Now all can test :)What's new in 6.48beta27 (2020-Aug-18 06:20):
Changes in this release:
*) crs3xx - improved Ethernet port group traffic forwarding for CRS354 devices;
E-mail support and you will get access to the version that way. I would never run anything I can download outside official channels.6.48beta12 I still have a problem! Please attach 6.48beta23
Tested this and I have no issues with this so this might be related to your setup.Great!
But Winbox CRASH DOWN, when Press + under System -> IPsec-> Policies.
Please fix that bug...
No I don't think you have to do that. You should try Netinstall and reinstall the OS on the router. Google around there are briliant guides out there how to use Netinstall.I guess i should Trash-Can it?
Thank you..