New feature Loop Protect - how it works

Here is an article on MikroTik’s new feature Loop Protect and how it works as well as some use cases.

http://www.stubarea51.net/2016/11/16/mikrotik-routeros-new-feature-loop-protect/

Thank you for this information.
In my case (audio networking) the most important is the delay to reactivate a link…
A manufacturer provide specific with a “fast STP” protocol to accelerate the refresh…

why disabled interface go up 10 half duplex ? (asked already on the linked page)

Will it only work for routers or also for SWOS?

I still don’t understand how Loop Protection works. I have a vlan, the vlan is a part of bridge. There is a loop on the vlan, vlan is disabled by Loop Protection correctly. There are no packets on vlan (nothing on Sniffer), but bridge is still receiving everything (catching by Sniffer, input firewall, etc.) Packets are not transmitted to the bridge, but they are still received from. Is it a bug?
Using RouterOS 6.37.4 bugfix.

There are many options inside Loop Protect settings for EoIPv6 tunnels.

Those options are normally related to TCP state reports in the Firewall connections.

Seen inside Router OS 6.39 and 6.40rc2

Is that a bug ? Or a side effect of Vodka ? :slight_smile:
Loop-Protect.png

“The feature works by checking source MAC address of received loop protect packet against MAC addresses of loop protect enabled interfaces. If the match is found, loop protect disables the interface which received the loop protect packet.”

It means the protect interfece will send out package (Let’s say MT to any other vendor), So if it received…than loop will happen?

Thanks