I know that it's main purpose is switching. But with fasttrack the cpu has no problem to route 1Gbps. So why using a separate device for that? And it's an CRS not a CCSCRS s a switch
the better way to do what you want to do is using a router + switch
that's just a left from previous tests.You say sfp-sfpplus1 is not a member of bridge1 and no vlan on it, but it is configured as untagged for vlan-id = 123?
That would be also my preferred setup up. You have some bytes overhead on the on hand but with VPLS/MPLS you need less cpu power on your other devices. MPLS was always fastpath.
that does not mean that RouterOS is supporting that crypto accelerator. Would be nice to know otherwise i would buy some device from a competitor and stop waiting for RB3011
according to
https://wikidevi.com/wiki/Qualcomm_Atheros
it has crypto accelerator
and a packet engine
Can you provide an estimated time for when you start shipping?It was not posted, because the product is not even available yet. We will publish when device will start shipping.
it's not need to be a /32. If it is one sure proxy-arp can't work. it's a bit sad. as some redundancy would be nicetake in count vrrp interface has to be a /32 address
Can you be a bit more specific what exactly you're trying to achieve? What kind of Traffic/Applications?A Simple Load Balancing wont do it because i need a Single IP for my Applications.
What are you going to do with a SSD inside low power router?I hope this device will have a Hard Disk Connection.
That we finally can add a SSD HD.
People don't understand it, i've tried to explain it multiple times in this forum.No, you can't. You can't impersonate an HTTPS site without either causing a certificate error or getting your own CA certificate onto the client. That's just how HTTPS works.
I agree on it and if people use a software based "switch" safety it's a practices but let us keep that topic out of this thread.Ok. I admitted in the beginning that the device doesn't work as designed. But it is not designed to be safety switch for the cases you referred to anyway.
we used SEXTANTs for that project@jaykay2342
Which hardware did you go with?
Also, if you used the stationbox, which board did you use?
That's quite bad. Looks like interference. Have you checked the spectrum usage ?I tried to used best frequency.
Tx Rx CCQ: 60/43 %
i'm also interested to monitor CCQ via SNMP. I wounder why it's not part of the values we get from the registration table via SNMP.Thanks for the info.
Any suggestions to collect the CCQ via SNMP with NV2?
thanks, than it should not tab complete "main"Print all your routes and you will see that there are no routing-mark=main
To print all routes in main table use
/ip route print where !routing-mark
/ip route print where routing-mark=main
> /certificate print
Flags: K - private-key, D - dsa, L - crl, C - smart-card-key,
A - authority, I - issued, R - revoked, E - expired, T - trusted
# NAME COMMON-NAME FINGERPRINT
you're right. i thought you reimported it after upgrade and your file get broken while uploading. what about other 6.x versions? newest version i run is 6.11 so far no problems with certificatesIf its corrupted isn't strange that it works on 5.26?
no, with scripts you can't sync the connection tracking.With using VRRP and OnMaster/OnBackup scripting you could essentially have stateful HA.
are all theses fans really needed? looks like a lot heat needs to be blown away, how is the power consumption?CCR1072 inside
have you tried a pcq queue? http://wiki.mikrotik.com/wiki/Manual:Queues_-_PCQ1. 60-70 ppl coming to the lan
2. We got 100/10mbs internet speed and we wan't to limit the user traffic to 1mbs/person.
Tha's the only thing we need really!
thx , i've not found that flag my self when i check the wireless manualIn http://wiki.mikrotik.com/wiki/Manual:Interface/Wireless search for disable-running-check
How to apply it:
/interface wireless set [find name~"wlan1"] disable-running-check=yes;
The Input chain is only for traffic which belongs to the router ( towards IP-addresses configured on some router interface ) not for traffic which is forwarded by the routerTry input in place of forward
Unfortunately there is no way to "fix" it. if you find a way to "fix" it you find also a way to "hack" https.yes i know but how to fix it ? is it any way to use HTTPS in hotspot login without got that issue ?