When we run this command through the API on a OS v3.2 we get an argument error:
/ip/firewall/filter/reset-counters-all
This used to work in OS v3rc1 to v3rc6. Any ideas?
Thanks in advance!
When we run this command through the API on a OS v3.2 we get an argument error:
/ip/firewall/filter/reset-counters-all
This used to work in OS v3rc1 to v3rc6. Any ideas?
Thanks in advance!
works for me on mips and ppc routers
Thanks for the response. We are using X86 so will try it out on a Mipps.
Just to confirm, are you issuing the command in the API or on the terminal?
Here’s the raw data being sent through the socket (I’m with bunrsa):
(offset, char value, char)
000 038 & --length descriptor
001 047 /
002 105 i
003 112 p
004 047 /
005 102 f
006 105 i
007 114 r
008 101 e
009 119 w
010 097 a
011 108 l
012 108 l
013 047 /
014 102 f
015 105 i
016 108 l
017 116 t
018 101 e
019 114 r
020 047 /
021 114 r
022 101 e
023 115 s
024 101 e
025 116 t
026 045 -
027 099 c
028 111 o
029 117 u
030 110 n
031 116 t
032 101 e
033 114 r
034 115 s
035 045 -
036 097 a
037 108 l
038 108 l
000 000 --terminator
The software I’ve written reads rules from the firewall and queries stats. It then attempts to reset the counters and this is the only part that fails. What’s weird is that the above command worked perfectly in a prior version of Mikrotik. I tried the command on a Mipps as well but had the same result.
Any help would be appreciated!
Turns out I was sending a bad argument further up in the script. Even though I sent a legitimate command after this, the response was still that a bad argument had been supplied.
Anyways, in case anyone else has this problem the command:
/ip/firewall/filter/print
=filter=IPAC
should now be replaced with
/ip/firewall/filter/print
=chain=IPAC