on address list 0.0.0.0/0 = everything... so...
if you want match EXACTLY 0.0.0.0/0 (accept only default route, if is transmitted....), use filter
if (dst == 0.0.0.0/0) { accept }
+100If the network team cannot see the ONT …. ESCALATE TO some one who can … do not give up … this is not rocket science … someone from the NOC should be able to help you to resolve this ….
So if you need to learn Italian, start by looking at examples of Swahili?I'm new to MikroTik and scripting and wanted to get a basis to start off of.
So, obviously is lost time. This forum is full of correct examples.That obviously didn't work.
And for what reason?@normis and others working on Winbox 4 should prioritize SUP-175441
More or less reliable sources, or do you just write because you don't know what to write?Probably it will be added soon (7.18)
/caps-man interface disable [find where name~"^AP-1stFloor-.*"]
(And if you had an ISP that knows how to do its job, there wasn't one)...
Surely this is something the ISP should be fixing rather than you at the edge of their network?
(And if you had an ISP that knows how to do its job, there wasn't one)...
Oops, sorry, I actually meant it as a serious question...Thanks for the confirmation you missed the point. My bad for not including a at the end.
this makes updating old scripts much complicated.
I don't know where you read this, but change your dealer...using the JSON Parse :parse command
:parse command cannot properly process the incoming data
The topic was created 15 years ago and still no "break" functionality for loops
We have identified the issue and a fix is coming shortly.
No need for +1 comments. You already have the attention by Mikrotik.
We have identified the issue and a fix is coming shortly.
If the RB951Ui-2HnD does indeed have a public IP, I highly recommend updating it to 6.49.17 and then resetting it to default settings.
This will reset the firewall and everything else you need to the correct defaults.
:foreach item in=[/ppp secret find where $comment~[/system clock get date]] do={ /ppp secret disable $item /ppp active remove [find where name=[/ppp secret get $item name]] }
One of the most beautiful sentences read on the forum.Rushing cloud solutions gets you hacked.
absolutely FALSE and WRONGRouterOS doesn't allow to export/import certificates on another Mikrotik device
I see you get the point...If somehow I find out that my ISP is using such way to update their router, from public source script without proper automated source checks / sanitization, I will be concerned and probably switch to another ISP, just saying, maybe it's just me...
Yes, because most users can only copy & paste without knowing what they are doing, without distinguishing a list of commands from a list of IPs...I'm not sure the "CRITICAL" is necessary.
two of my routers unable to access google.com
FWIW that is in most cases the advised way to setup things.The network config does not look very good, everything is on the same bridge.
One bridge only.
Code: Select all# ARP Fixup table :put "### ARP Fixup table" :local dumplist [/ip arp find complete=no ] :foreach i in=$dumplist do={ /ip arp remove $i }
/ip arp remove [find where complete=no]
You have also disappointed me I expected more from someone like you. Shame to your name for you have becometh that which you criticized the most.
Not Mikrotik microwave hardware
The avatar is a cat shitting? Seriously?Thank you, sir
/interface reset-counters [find]
{
/ip address
:local allIPs [:toarray ""]
[pri as-value where [:set allIPs ($allIPs,$address)]]
:put [:tostr $allIPs]
}
Not true, I use Macromedia HomeSite 5.5+ for almost everything...While I like @rextended, I know he uses notepad.exe to edit script..
I always done on that way, ":toip" do not convert numbert to IP...And you could convert that to a string by adding 0.0.0.0 to it?
igmp is the protocol behind multicasting. you could google that.
:put [/user get admin last-logged-in]
Precisely...Preprepredecessor of ASCII comes from 1932 ( ITA2) and only had 5 bits. Only uppercase.
/dude export-db
The goal is to to only use wpa3.
А къде е останалото?This is my firewall config:
/ip hotspot active remove [find where user=$username and mac-address!=$"mac-address"]
I didn't quite understand the meaning, because of the language, but if what I understood is right:I guess everything is relative.